Jia Zhang (张甲)

Associate Research Professor
FIT 4-204 Tsinghua University, Beijing, China 100084
zhangjia # cernet.edu.cn
zhangjia2017 # tsinghua.edu.cn

About

  • I am a associate research professor in the Institute for Network Science and Cyberspace of Tsinghua University. I received my bachelor’s degree and doctor’s degree in computer science and technology from Shandong University and Tsinghua University in 2005 and 2010 respectively. After graduation, I worked in the government information security management department and well-known Internet companies and network security companies, mainly engaged in the research of network security architecture design and network security protocol design.

    Since 2017, I have returned to the Institute for Network Science and Cyberspace of Tsinghua University to engage in research work related to network security. I have more than 10 years of network security research experience. Some of my research results were deployed by some big IT companies like Alibaba and Huawei. My research interests include protocol vulnerability analysis, Internet infrastructure security measurement, network behavior anomaly detection and Internet underground economy detection etc.

Experience

  • Associate Research Professor, Institute for Network Science and Cyberspace of Tsinghua University, Beijing, China, 2022-
  • Assistant Research Professor, Institute for Network Science and Cyberspace of Tsinghua University, Beijing, China, 2017–2022.
  • Senior Researcher, Westone Information Industry INC, Beijing, China, 2015–2016.
  • Senior Engineer, Alibaba Group, Beijing, China, 2014–2015.

Education

Research Interests

  • Network Security, Protocol Vulnerability Analysis
  • Internet Infrastructure(DNS, CDN, HTTP etc.) Security Measurement
  • Network Behavior Anomaly Detection, Encrypted Traffic Analysis
  • Internet Underground Economy Detection

Publications

Conferences

  1. Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild
    Zhenrui Zhang, Geng Hong, Xiang Li, Zhuoqun Fu, Jia Zhang*, Mingxuan Liu, Chuhan Wang, Jianjun Chen, Baojun Liu, Haixin Duan, Chao Zhang, Min Yang
    In the CCS 2023, Nov. 26-30, 2023
  2. Stolen Risks of Models with Security Properties
    Yue Qin, Zhuoqun Fu, Chuyun Deng, Xiaojing Liao, Jia Zhang, Haixin Duan
    In the CCS 2023, Nov. 26-30, 2023
  3. TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers
    Wei Xu, Xiang Li, Chaoyi Lu, Baojun Liu, Haixin Duan, Jia Zhang, Jianjun Chen, Tao Wan
    In the CCS 2023, Nov. 26-30, 2023
  4. Encrypted Malware Traffic Detection via Graph-based Network Analysis
    Zhuoqun Fu, Mingxuan Liu, Yue Qin, Jia Zhang*, Yuan Zou, Qilei Yin, Qi Li, Haixin Duan
    In the RAID 2022, Oct. 26-28, 2022
  5. HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations (Best Paper Runner-Up)
    Kaiwen Shen, Jianyu Lu, Yaru Yang, Jianjun Chen, Mingming Zhang, Haixin Duan, Jia Zhang*, Xiaofeng Zheng
    In the DSN 2022, June, 2022
  6. ValCAT: Variable-Length Contextualized Adversarial Transformations Using Encoder-Decoder Language Model
    Chuyun Deng, Mingxuan Liu, Yue Qin, Jia Zhang*, Haixin Duan, Donghong Sun
    In the Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. (NAACL 2022), July 2022.
  7. Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO
    Hao Yang, Kun Du, Yubao Zhang, Shuai Hao, Haining Wang, Jia Zhang*, Haixin Duan
    In the ESORICS 2021, Oct. 4-8, 2021
  8. On Evaluating Delegated Digital Signing of Broadcasting Messages in 5G
    Hui Gao, Yiming Zhang, Tao Wan, Jia Zhang*, Haixin Duan In the IEEE GLOBECOM 2021, December 2021, p 1-7
  9. CDN Backfired: Amplification Attacks Based on HTTP Range Requests (Best Paper Award)
    Weizhong Li, Kaiwen Shen, Run Guo, Baojun Liu, Jia Zhang*, Haixin Duan*, Shuang Hao, Xiarun Chen, Yao Wang
    In the 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), VALÈNCIA, SPAIN, 29th June - 2th July, 2020
  10. CDN Judo: Breaking the CDN DoS Protection with Itself
    Run Guo, Weizhong Li, Baojun Liu, Shuang Hao, Jia Zhang*, Haixin Duan*, Kaiwen Shen, Jianjun Chen, Ying Liu
    In the 2020 Network and Distributed System Security Symposium (NDSS 2020), San Diego, CA, USA, Feb 2020
  11. Abusing CDNs for Fun and Profit: Security Issues in CDNs’ Origin Validation
    Run Guo, Jianjun Chen, Baojun Liu, Jia Zhang*, Chao Zhang*, Haixin Duan, Tao Wan, Jian Jiang, Shuang Hao, Yaoqi Jia
    In the 37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018), Bahia, Brazil, Oct 2018
  12. Measuring Privacy Threats in China-Wide Mobile Networks
    Mingming Zhang, Baojun Liu, Chaoyi Lu, Jia Zhang*, Shuang Hao, Haixin Duan
    In the 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 2018), 2018
  13. Analysis and Measurement of Zone Dependency in the Domain Name System
    Jian Jiang, Jia Zhang*, Haixin Duan, Kang Li, Wu Liu
    In 2018 IEEE International Conference on Communications (ICC 2018), Kansas, USA, 2018
  14. How to notify a vulnerability to the right person? Case study: in an ISP scope
    Jia Zhang, Haixin Duan, Wu Liu, Xingkun Yao
    In 2017 IEEE Global Communications Conference (Globecom 2017), Singapore, 2017
  15. Analysis of Anonymity in P2P Anonymous Communication Systems
    Jia Zhang,Haixin Duan,Wu Liu
    In the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2010), Perth, Australia, 20-13 April 2010.
  16. A light-weighted extension of anonymous communications in IPv6 Network
    Jia Zhang, Haixin Duan, Wu Liu, Jianping Wu
    In 2010 International Conference on Green Circuits and Systems (ICGCS 2010), Shanghai, China, 2010
  17. A Fast Method of Signature Generation for Polymorphic Worms
    Jia Zhang, Haixin Duan, Lanjia Wang, Yuntao Guan, Jianping Wu
    In 2008 International Conference on Computer and Electrical Engineering (ICCEE 2008), Thailand, 2008
  18. A Novel Method to Prevent Traffic Analysis in Low-Latency Anonymous Communication Systems
    Jia Zhang, Haixin Duan, Jianping Wu
    In 2008 International Conference on Computer and Electrical Engineering (ICCEE 2008), Thailand, 2008
  19. AMCAS: An Automatic Malicious Code Analysis System
    Jia Zhang, Yuantao Guan, Xiaoxin Jiang, Haixin Duan, Jianping Wu
    In 2008 International Conference on Web-Age Information Management (WAIM 2008), Zhangjiajie, China, 2008

Journals

  1. Finding the best answer: measuring the optimization of public and authoritative DNS
    Jia Zhang, Haixin Duan, Jian Jiang, Jinjin Liang, Jianping Wu
    Sci China Inf Sci, vol.62, No.3, 2019
  2. EDU.CN子域名异常解析现象测量
    冷春莹, 陆超逸, 张甲*, 段海新
    通信学报, 2018.9, 39(Z1): 99~103
  3. 教育类官网推广感染研究
    王郁, 张一铭, 张甲*, 段海新
    通信学报, 2018.9, 39(Z1): 78~85
  4. Anonymity analysis of P2P anonymous communication systems
    Jia Zhang, Haixin Duan, Wu Liu, Jianping Wu
    Computer Communications, 2011.1, 34(1): 358~366
  5. IPv6环境下匿名通信系统的设计与实现
    张甲, 段海新, 吴建平
    清华学报(自然科学版), 2011.1, (1): 63~67
  6. WindTalker: A P2P-Based Low-Latency Anonymous Communication Network
    Jia Zhang, Haixin Duan, Wu Liu, Jianping Wu
    IEICE Trans. Commun., 2009.10.1, E92-B(10)
  7. 基于事件序列的蠕虫网络行为分析算法
    张甲, 段海新, 葛连升
    山东大学学报(理学版), 2007.9, (9): 36~40