I am an assistant professor at
the School of Computing,
National University of
Singapore. I'm a member of
My main research interest is in system and software security,
web security, mobile security, and software testing. As a
co-author, I received the ACM SIGSOFT Distinguished Paper Award
at ESEC/FSE in 2009, the Best Paper Award at USENIX Security
Symposium in 2007, and the Outstanding Paper Award at the Annual
Computer Security Applications Conference (ACSAC) in 2003. I
also received the Young Investigator Award of National
University of Singapore in 2008. I got my Ph.D. degree in
Computer Science from
Stony Brook University
in 2006, and B.S. in Computer
Science and Economics from
Peking University in 1999.
Selected Publications Full List
Codejail: Application-transparent Isolation of Libraries with Tight Program
Yongzheng Wu, Sai Sathyanarayan, Roland Yap, and Zhenkai
In the 17th European Symposium on Research in Computer
Security (ESORICS), Pisa, Italy, September 2012.
Framework to Eliminate Backdoors from Response Computable
Shuaifu Dai, Tao Wei, Chao Zhang, Tielei Wang, Yu Ding,
Zhenkai Liang, and Wei Zou.
In the IEEE Symposium on
Security and Privacy, San Francisco, CA, May 2012.
- Identifying and Analyzing
Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis. [PDF]
Mingwei Zhang, Aravind Prakash, Xiaolei Li, Zhenkai Liang,
and Heng Yin.
In the 19th Annual Network &
Distributed System Security Symposium (NDSS), San Diego, CA,
- AdSentry: Comprehensive and
Xinshu Dong, Minh Tran, Zhenkai Liang, and Xuxian Jiang.
In the 27th Annual Computer Security Applications Conference
(ACSAC), Orlando, FL, December 2011.
- Towards Fine-Grained Access
Kailas Patil, Xinshu Dong, Xiaolei Li, Zhenkai Liang, and
In the 31st IEEE International Conference on Distributed Computing
Systems (ICDCS), Minneapolis, MN, June 2011.
- DARWIN: An Approach for
Debugging Evolving Programs. [PDF]
In the ESEC and ACM SIGSOFT Symposium on the Foundations of
Engineering (ESEC-FSE), Amsterdam, the Netherlands, August 2009.
- BitBlaze: A New Approach to
Computer Security via Binary Analysis. [PDF] (*Invited keynote paper)
Dawn Song, David Brumley, Heng
Yin, Juan Caballero, Ivan Jager, Min Gyung
Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, and Prateek
In the 4th International
Information Systems Security (ICISS),
Hyderabad, India, December 2008.
- Towards Automatic Discovery of Deviations in Binary
Implementations with Applications to Error Detection and Fingerprint
David Brumley, Juan Caballero, Zhenkai Liang, James Newsome, and Dawn
In the 16th USENIX Security Symposium, Boston, MA, August 2007.
(Acceptance rate: 12.3%)
- Fast and Automated Generation of Attack Signatures: A Basis
for Building Self-Protecting Servers. [PDF]
Zhenkai Liang and R. Sekar.
In the 12th ACM Conference on Computer and Communications
2005. (Acceptance rate: 15.2%)
- Isolated Program Execution: An Application Transparent
Approach for Executing Untrusted Programs. [PDF]
Zhenkai Liang, V.N. Venkatakrishnan, and R. Sekar.
In the 19th Annual Computer Security Applications Conference (ACSAC),