651 61226

LIANG Zhenkai

Associate Professor
Lead Principal Investigator, National Cybersecurity R&D Lab (NCL)

  • Ph.D. (Computer Science, Stony Brook University)
  • B.S. (Computer Science & Economics, Peking University)

Dr. LIANG Zhenkai is an Associate Professor in the Department of Computer Science at National University of Singapore. He received his Ph.D. degree in Computer Science from Stony Brook University in 2006, and B.S. degrees in Computer Science and Economics from Peking University in 1999. His research area is in system and software security, and security in emerging platforms, such as Web, mobile, and Internet-of-things (IoT). He has been publishing high-impact papers in top security and software engineering conferences, and has won several best paper awards, namely, the Outstanding Paper Award at the Annual Computer Security Applications Conference (ACSAC) in 2003, the Best Paper Award at the USENIX Security Symposium in 2007, the ACM SIGSOFT Distinguished Paper at the ESEC and ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC-FSE) in 2009, and the Best Paper Award at the Web 2.0 Security & Privacy (W2SP) Workshop in 2014. He has been actively served as technical committee members and editorial board members of top security conferences and journals, including ACM Conference on Computer and Communications Security (CCS), USENIX Security Symposium, Network and Distributed System Security Symposium (NDSS), and IEEE Transactions on Dependable and Secure Computing (TSDC). He has taught various undergraduate-level and graduate-level modules (courses). He has won the Annual Teaching Excellence Award of NUS in 2014 and 2015, and has been publishing his teaching techniques and philosophy.


  • Program analysis

  • Web and IoT system security

  • Virtualization





  • Neural Nets Can Learn Function Type Signatures From Binaries.Zheng Leong Chua, Shiqi Shen, Prateek Saxena, and Zhenkai Liang.In USENIX Security Symposium, August 2017.
  • Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks.Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, and Zhenkai Liang.In the IEEE Symposium on Security and Privacy, May 2016.
  • Tool, Technique, and Tao in Computer Security Education.Zhenkai Liang and Jian Mao.In IEEE Reliability Magazine, August/September/October, 2015.
  • Automatic Generation of Data-Oriented Exploits.Hong Hu, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena, and Zhenkai Liang.In the 24th USENIX Security Symposium, Washington DC, August 2015.
  • I Know Where You've Been: Geo-Inference Attacks via the Browser Cache.Best Paper Award, Workshop version in W2SP 2014 Yaoqi Jia, Xinshu Dong, Zhenkai Liang, and Prateek Saxena.In IEEE Internet Computing, Januany/February 2015.
  • DroidVault: A Trusted Data Vault for Android Devices.Best Paper AwardXiaolei Li, Hong Hu, Guangdong Bai, Yaoqi Jia, Zhenkai Liang, and Prateek Saxena. In the 19th International Conference on Engineering of Complex Computer Systems ICECCS, Tianjin, China, August 2014.
  • Protecting Sensitive Web Content from Client-side Vulnerabilities with Cryptons.Xinshu Dong, Zhaofeng Chen, Hossein Siadati, Shruti Tople, Prateek Saxena, and Zhenkai Liang.In the 14th ACM Conference on Computer and Communications Security CCS, Berlin, Germany, November 2013.
  • A Framework to Eliminate Backdoors from Response Computable Authentication.Shuaifu Dai, Tao Wei, Chao Zhang, Tielei Wang, Yu Ding, Zhenkai Liang, and Wei Zou.In the IEEE Symposium on Security and Privacy, San Francisco, CA, May 2012.
  • Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis.Mingwei Zhang, Aravind Prakash, Xiaolei Li, Zhenkai Liang, and Heng Yin.In the 19th Annual Network & Distributed System Security Symposium NDSS, San Diego, CA, February 2012.



Introduction to Information Security
Systems Security


In the News

15 February 2021