Xiang Li (李想)
FIT 4-204, Tsinghua University, Beijing 100084, P.R.China
Website: https://lixiang521.com
[email protected]
Author and maintainer of tool XMap.
(Last modified: Feb. 24th, 2023)
Education
- 2022 - 2023: Visiting Scholar, University of California, Irvine
- 2019 - Present: Ph.D. Candidate in Cyberspace Security, Tsinghua University
- 2015 - 2019: B.E. in Information Security / LL.B. (Double Major), Nankai University
Research Interests
- Network Security
- Protocol Security
- IPv6 Security
- DNS Security
- Internet Measurement
- Network & Protocol Fuzzing
Publications
Conferences
[Security ‘23] Run Guo, Jianjun Chen, Yihang Wang, Keran Mu, Baojun Liu, Xiang Li, Chao Zhang, Haixin Duan, Jianping Wu (2023). Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack. In USENIX Security ‘23. Anaheim, California, August 9–11, 2023. (Acceptance rate: ??%, Acceptance rate in summer: 82/402=20.4%, Acceptance rate in fall: 89/569=15.6%), Acceptance rate in winter: ??%).
[Security ‘23] Xiang Li, Chaoyi Lu, Baojun Liu, Qifan Zhang, Zhou Li, Haixin Duan, Qi Li (2023). The Maginot Line: Attacking the Boundary of DNS Caching Protection. In USENIX Security ‘23. Anaheim, California, August 9–11, 2023. (Acceptance rate: ??%, Acceptance rate in summer: 82/402=20.4%, Acceptance rate in fall: 89/569=15.6%), Acceptance rate in winter: ??%).
[SIGMETRICS ‘23] Mingming Zhang, Xiang Li, Baojun Liu, Jianyu Lu, Jianjun Chen, Yiming Zhang, Xiaofeng Zheng, Haixin Duan, Shuang Hao (2023). DareShark: Detecting and Measuring Security Risks of Hosting-Based Dangling Domains. In SIGMETRICS ‘23. Orlando, Florida, June 19-23, 2023. (Acceptance rate: ??%, Acceptance rate in summer: 17/93=18.3%), Acceptance rate in fall: 26/119=21.9%), Acceptance rate in winter: ??%).
- Presented in OARC 40
[VehicleSec ‘23] Shangru Song, Hetian Shi, Ruoyu Lun, Yunchao Guan, Xiang Li, Jihu Zheng, Jianwei Zhuge (2023). Demo: Ransom Vehicle through Charging Pile. In VehicleSec 2023. San Diego, California, Feburary 27, 2023. (Acceptance rate: 32/83=36.0% (overall), 20/49=40.8% (regular), 2/6=33.3% (short), 6/16=37.5% (wpi), and 4/12=33.3% (demons/posters).
[NDSS ‘23] Xiang Li, Baojun Liu, Xuesong Bai, Mingming Zhang, Qifan Zhang, Zhou Li, Haixin Duan, Qi Li (2023). Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation. In NDSS ‘23. San Diego, California, 27 February – 3 March, 2023. (Acceptance rate: 101/581=17.4%, Acceptance rate in summer: 36/183=19.7%), Acceptance rate in fall: 65/398=16.3%).
- Presented in OARC 39
- Presented in ICANN DNS Symposium 2022
- Presented in Black Hat Asia 2023
[DSN ‘21] Xiang Li, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Qi Li, Youjun Huang (2021). Fast IPv6 Network Periphery Discovery and Security Implications. In DSN ‘21. Taipei, Taiwan, June 21-24, 2021 (Virtually). (Acceptance rate: 48/279=17.2%).
Journals
Services
Reviewers
- TDSC ‘23
- DTRP ‘23
- SCN ‘22
External Reviewers
- AsiaCCS ‘23
- ESF Proposal ‘22
- NDSS ‘22
- ICDCS ‘21
- ESORICS ‘20
- ICPDAS ‘19
Maintainer
XMap is an open-source network scanner that enables researchers to perform Internet-wide IPv6 & IPv4 network research scanning efficiently. XMap is reimplemented and improved thoroughly from ZMap and is fully compatible with ZMap, armed with the “5 minutes” probing speed and novel IPv6 scanning techniques. XMap can be used to conduct large-scale IPv6 network scanning for device discovery and security assessments and help us gain more insights into the IPv6 networks.
Awards
- The 1st Prize in IPv6 Technology Application Innovation Competition, 2022
- The 3rd Prize in IPv6 Technology Application Innovation Competition, 2022
- Tsinghua Outstanding 2rd Scholarship, 2022
- Outstanding Undergraduate, 2019
- Nankai Gongneng 1st Scholarship, 2018
- Cyber Security Scholarship of China Internet Development Foundation, 2018
- The 2nd Prize in National Collge Student Information Security Contest, 2018
- The 3rd Prize in National Cryptography Contest, 2017
- China National Scholarship, 2017
- China National Scholarship, 2016
Patent
CNVD/CNNVD/CVE
- 109/5/34 (total)
- Phoenix Domain Vulnerability (2022): n/n/9
- DNS Cache Poisoning Vulnerability (2022): n/n/3
- IPv6 Routing Loop Vulnerability (2021): 109/5/22