If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Dive into the research topics where Peng Liu is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 4 Similar Profiles
Servers Engineering & Materials Science
Cryptography Engineering & Materials Science
Access control Engineering & Materials Science
Attack Mathematics
Semantics Engineering & Materials Science
Recovery Engineering & Materials Science
Application programs Engineering & Materials Science
Industry Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1998 2020

Simultaneous input and state estimation for stochastic nonlinear systems with additive unknown inputs

Kim, H., Guo, P., Zhu, M. & Liu, P., Jan 2020, In : Automatica. 111, 108588.

Research output: Contribution to journalArticle

State estimation
Error analysis
Nonlinear systems
Stochastic systems
Covariance matrix
1 Citation (Scopus)

Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM

Guan, L., Cao, C., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. & Jaeger, T., May 1 2019, In : IEEE Transactions on Dependable and Secure Computing. 16, 3, p. 438-453 16 p., 8423674.

Research output: Contribution to journalArticle

Dynamic random access storage
Random access storage
Dynamic mechanical analysis
Cryptography
Internet of things

Energy distribution matters in greybox fuzzing

Situ, L., Wang, L., Li, X., Guan, L., Zhang, W. & Liu, P., May 1 2019, Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion, ICSE-Companion 2019. Institute of Electrical and Electronics Engineers Inc., p. 270-271 2 p. 8802844. (Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion, ICSE-Companion 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

distribution strategy
Semantics
Scheduling
energy
scheduling

Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution

Yao, Y., Zhou, W., Jia, Y., Zhu, L., Liu, P. & Zhang, Y., Jan 1 2019, Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Proceedings. Sako, K., Schneider, S. & Ryan, P. Y. A. (eds.). Springer, p. 638-657 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11735 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Symbolic Execution
Firmware
Vulnerability
Wi-Fi
Denial of Service

IoT S&P 2019: 2nd workshop on internet of things security and privacy

Liu, P. & Zhang, Y., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2713-2714 2 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Security of data
Internet of things
Secure communication