News
Feb 2023 - Our paper Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack was accepted by USENIX Security 2023.
Feb 2023 - Our paper DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing was accepted by USENIX Security 2023.
Feb 2023 - Our paper MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries was accepted by USENIX Security 2023.
Jan 2023 - Our paper KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations was accepted by USENIX Security 2023.
Jan 2023 - Our paper Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks was accepted by USENIX Security 2023.
Dec 2022 - Our paper Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning was accepted by IEEE S&P 2023.
Sep 2022 - Our paper AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering was accepted by USENIX Security 2023.
Aug 2022 - Our paper PACMem: Enforcing Spatial and Temporal Memory Safety via ARM Pointer Authentication was accepted by ACM CCS 2022.
Aug 2022 - Our paper Evocatio: Conjuring Bug Capabilities from a Single PoC was accepted by ACM CCS 2022.
Aug 2022 - Our paper HTFuzz: Heap Operation Sequence Sensitive Fuzzing was accepted by ASE 2022.
June 2022 - Our paper StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing was accepted by USENIX Security 2022.
June 2022 - Our paper AutoDA: Automated Decision-based Iterative Adversarial Attacks was accepted by USENIX Security 2022.
May 2022 - Our paper jTrans: Jump-Aware Transformer for Binary Code Similarity Detection was accepted by ISSTA 2022.
May 2022 - Our paper BET: Black-box Efficient Testing for Convolutional Neural Networks was accepted by ISSTA 2022.
May 2022 - Our paper PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation was accepted by ISSTA 2022.
May 2022 - Our paper NCScope: Hardware-Assisted Analyzer for Native Code in Android Apps was accepted by ISSTA 2022.
Web Security

Network Security

System Security

Software Security

Data-driven Security

AI Security

Announcement
Looking for highly motivated students, postdoc, and research assistants.
Faculty positions are available as well.