Network and Information Security Lab @ Tsinghua University

A research team focusing on cyber security at Tsinghua University.
A playground for fun hacking and fundamental research.
Base of the CTF teams Blue-Lotus and RedBud.


June 2022 - Our paper StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing was accepted by USENIX Security 2022.

June 2022 - Our paper AutoDA: Automated Decision-based Iterative Adversarial Attacks was accepted by USENIX Security 2022.

May 2022 - Our paper jTrans: Jump-Aware Transformer for Binary Code Similarity Detection was accepted by ISSTA 2022.

May 2022 - Our paper BET: Black-box Efficient Testing for Convolutional Neural Networks was accepted by ISSTA 2022.

May 2022 - Our paper PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation was accepted by ISSTA 2022.

May 2022 - Our paper NCScope: Hardware-Assisted Analyzer for Native Code in Android Apps was accepted by ISSTA 2022.

Jan 2022 - Dr. Chao Zhang became a tenured associate professor.

Oct 2021 - Our paper Trade or Trick? Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange was accepted by SIGMETRICS 2022.

Sep 2021 - Our paper Detecting and Characterizing SMS Spearphising Attacks was accepted by ACSAC 2021.

Sep 2021 - Our paper Igor: Crash Deduplication Through Root-Cause Clustering was accepted by CCS 2021.

Aug 2021 - Our paper Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem was accepted by CCS 2021.

Aug 2021 - Our paper On Evaluating Delegated Digital Signing of Broadcasting Messages in 5G was accepted by Globecom 2021.

July 2021 - Our paper Site Isolation Enables Timing-Based Cross-Site Browsing Surveillance was accepted by IEEE S&P 2022.


Web Security

Cookie Integrity...

Network Security

Protocol security analysis and design, HTTPS, SDN, 5G, IPv6.

System Security

BlockChain Security, IoT Security, ICS Security

Software Security

Vulnerability analysis, discovery, exploit and mitigation. Malware analysis.

Data-driven Security

Intrusion detection, underground economy analysis.

AI Security

AI for security, and Secure AI.


Looking for highly motivated students, postdoc, and research assistants.

Faculty positions are available as well.

Read more ...