InfoSec Research Group

Publication List

The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches

Chuqi Zhang, Jun Zeng, Yiming Zhang, Adil Ahmad, Fengwei Zhang, Zhenkai Liang, and Hai Jin.

In Proceedings of the 31th ACM Conference on Computer and Communications Security, 2024.

MaskDroid: Robust Android Malware Detection with Masked Graph Representations

Jingnan Zheng*, Jiahao Liu*, An Zhang, Jun Zeng, Ziqi Yang, Zhenkai Liang, and Tat-Seng Chua.

In Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024.

VulZoo: A Comprehensive Vulnerability Intelligence Dataset

Bonan Ruan, Jiahao Liu, Weibo Zhao, Zhenkai Liang.

In the 39th IEEE/ACM International Conference on Automated Software Engineering, Tool Demonstrations, 2024.

CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning

Jianing Wang, Shanqing Guo, Wenrui Diao, Yue Liu, Haixin Duan, Yichen Liu, Zhenkai Liang

In the 27th International Symposium on Research in Attacks, Intrusions and Defenses, 2024.

KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities

Bonan Ruan, Jiahao Liu, Chuqi Zhang, Zhenkai Liang.

In the 27th International Symposium on Research in Attacks, Intrusions and Defenses, 2024.

UIHASH: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation

Jiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, Shaowen Feng, and Zhenkai Liang.

In Proceedings of the 33rd USENIX Security Symposium, 2024.

Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation

Yuancheng Jiang, Jiahao Liu, Jinsheng Ba, Roland Yap, Zhenkai Liang, Manuel Rigger.

In Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024.

Evaluating Disassembly Ground Truth Through Dynamic Tracing

Lambang Akbar, Yuancheng Jiang, Roland Yap, Zhenkai Liang, Zhuohao Liu.

In the Workshop on Binary Analysis Research co-located with NDSS Symposium, 2024.

Learning Graph-based Code Representations for Source-level Functional Similarity Detection

Jiahao Liu*, Jun Zeng*, Xiang Wang and Zhenkai Liang.

In Proceedings of the 45th International Conference on Software Engineering, 2023.

PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability

Jun Zeng*, Chuqi Zhang*, and Zhenkai Liang.

In Proceedings of the 29th ACM Conference on Computer and Communications Security, 2022.

FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation

Kaihang Ji, Jun Zeng, Yuancheng Jiang, Zhenkai Liang, Zheng Leong Chua, Prateek Saxena, and Abhik Roychoudhury.

In Proceedings of the 31st USENIX Security Symposium, 2022.

TeLL: Log Level Suggestions via Modeling Multi-level Code Block Information

Jiahao Liu, Jun Zeng, Xiang Wang, Kaihang Ji, and Zhenkai Liang.

In Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, 2022.

ShadeWatcher: Recommendation-guided Cyber Threat Analysis using System Audit Records

Jun Zeng, Xiang Wang, Jiahao Liu, Yinfang Chen, Zhenkai Liang, Tat-Seng Chua, and Zheng Leong Chua.

In Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022.

Extensible Virtual Call Integrity

Yuancheng Jiang, Gregory J. Duck, Roland Yap, Zhenkai Liang, Pinghai Yuan.

In the 27th European Symposium on Research in Computer Security, 2022.

AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports

Zhenyuan Li, Jun Zeng, Yan Chen, and Zhenkai Liang.

In Proceedings of the 27th European Symposium on Research in Computer Security, 2022.

RecIPE: Revisiting the Evaluation of Memory Error Defenses

Yuancheng Jiang, Roland Yap, Zhenkai Liang, Hubert Rosier.

In the 17th ACM ASIA Conference on Computer and Communications Security, 2022.

Watson: Abstracting Behaviors from Audit logs via Aggregation of Contextual Semantics

Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang, and Jian Mao.

In Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021.

Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment

Ziqi Yang, Jiyi Zhang, Ee-Chien Chang, and Zhenkai Liang.

In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019.

One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics.

Zheng Leong Chua, Yanhao Wang, Teodora Baluta, Prateek Saxena, Zhenkai Liang, and Purui Su.

In NDSS, 2019.

Neural Nets Can Learn Function Type Signatures From Binaries

Zheng Leong Chua, Shiqi Shen, Prateek Saxena, and Zhenkai Liang.

In 26th USENIX Security Symposium, 2017.

"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing

Yaoqi Jia, Zheng Leong Chua, Hong Hu, Shuo Chen, Prateek Saxena, and Zhenkai Liang.

In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016.

Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks

Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, and Zhenkai Liang.

In 2016 IEEE Symposium on Security and Privacy, 2016.

Automatic Generation of Data-Oriented Exploits

Hong Hu, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena, and Zhenkai Liang.

In 24th USENIX Security Symposium, 2015.