I am a Research Assistant Professor in Information Engineering at The Chinese University of Hong Kong (CUHK) since August 2019. Prior to CUHK, I earned my PhD degree in 2019 from Singapore Management University (SMU) in the School of Information Systems. My PhD study was generously supported by SMU's Secure Mobile Center (SMC) PhD Scholarship (the only awardee). Before pursuing my PhD in Singapore, I received the M.Phil. in Computing from The Hong Kong Polytechnic University in 2015, and B.E. from Nanjing University of Posts and Telecommunications in 2011.
I am broadly interested in system and network security, with a focus on the vulnerability and privacy research. My major research methodology includes program analysis, network measurement, and data mining or analytics. In particular, I am one of the pioneers in using on-device app crowdsourcing (see our NetMon and MopEye apps) for security and networking research. I am also an expert in developing practical Android static analysis, for which I am leading a long-term project on using search-based static analysis for Android security. Besides publishing papers in top-tier venues (NDSS, USENIX ATC, CoNEXT, and INFOCOM), I have reported many app vulnerabilities on both Android and iOS (over 60 CVEs), as well as one system issue in Android (CVE-2014-7224) and one in iOS (CVE-2015-5921).
I am leading the Vulnerability and Privacy Research (VPR) Group, which is affiliated with Prof. Kehuan Zhang's LASR.
Positions available: Oversea PhD Students in CUHK; and Research Engineers and Postdoctoral Fellows in SMU.
Network Component Auditing: VoIP Fuzzing (technical report).
Mining or Learning for Security: Android Vuln. Reports [AsiaCCS'19].
Blockchain and Smart Contract: Under research (stay tuned).
Towards Understanding Android System Vulnerabilities: Techniques and Insights AsiaCCS '19
An Empirical Study of Mobile Network Behavior and Application Performance in the Wild IWQoS '19
Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment NDSS '19
Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild WiSec '18
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications CODASPY '18
MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance USENIX ATC '17
Measuring the Declared SDK Versions and Their Consistency with API Calls in Android Apps WASA '17
Demystifying and Puncturing the Inflated Delay in Smartphone-based WiFi Network Measurement CoNEXT '16
Stack Layout Randomization with Minimal Rewriting of Android Binaries ICISC '15
On the Accuracy of Smartphone-based Mobile Network Measurement INFOCOM '15
Indirect File Leaks in Mobile Applications MoST '15
Analyzing Android Browser Apps for file:// Vulnerabilities ISC '14
Toward Accurate Network Delay Measurement on Android Phones TMC '17
Scalable Online Vetting of Android Apps for Measuring Declared SDK Versions and Their Consistency with API Calls arXiv '19
Understanding Android VoIP Security: A System-level Vulnerability Assessment TR'19
MopEye: Monitoring Per-app Network Performance with Zero Measurement Traffic CoNEXT '15 Poster
A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in Android Apps arXiv '14
Boosting Android Security through App-, Network-, and System-level Vulnerability Analysis CUHK Seminar '19
On-device Crowdsourcing and Bytecode Search for Advancing Android App Analysis HKBU Seminar '19
Cross-Platform Analysis of Indirect File Leaks in Android and iOS Applications HitCon Pacific '17
On the Feasibility of Automatically Generating Android Component Hijacking Exploits HitCon '14
PhD Students: Xiao Yi (at CUHK from 2019 to present).
MSc Students at CUHK (19-20): CHEN Mengjie, FANG Ming, LI Lixiang, and XIONG Weiyan.