|
|
LIANG Zhenkai
梁振凯
Mailing address:
13 Computing Drive
Computing 1, #03-27
Singapore, 117417
Phone: (+65) 6516 1226
Email: liangzk @ comp.nus.edu.sg
Office: COM1 #03-16
|
I am an Associate Professor at
the School of Computing,
National University of Singapore.
My interests include research in systems and system security, as well
as education. I'm advising the Curiosity Reserach Group with the
following missions:
Understanding systems (理解系统), abstracting knowledge (提炼知识),
and connecting facts (参悟规律).
We are looking for curious minds to join our exploration. If you share
the same view of the world, please do not hesitate to reach me.
Curiosity is required, while mentality for repairing things (such as
bicycles) is a plus. Positions are available at
all levels, from undergraduate researcher/interns, Ph.D. students, and
postdoctural research fellows.
Selected Publications of Current Research Focus Full List
-
WATSON: Abstracting Behaviors from Audit Logs via
Aggregation of Contextual Semantics.
Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang
and Jian Mao.
In Annual Network &
Distributed System Security Symposium (NDSS), February 2021.
-
One Engine To Serve 'em All: Inferring Taint Rules Without
Architectural Semantics.
Zheng Leong Chua, Yanhao
Wang, Teodora Baluta, Prateek Saxena, Zhenkai Liang, and Purui Su.
In Annual Network & Distributed System Security
Symposium (NDSS), February 2019.
-
Neural Nets Can Learn Function Type Signatures From
Binaries.
Zheng Leong Chua, Shiqi Shen, Prateek
Saxena, and Zhenkai Liang.
In USENIX Security Symposium, August 2017.
-
Data-Oriented Programming: On the Expressiveness of
Non-Control Data Attacks.
Hong Hu, Shweta Shinde,
Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, and Zhenkai
Liang.
In the IEEE Symposium on Security and Privacy,
May 2016.
-
Tool, Technique, and Tao in Computer Security
Education.
Zhenkai Liang and Jian Mao.
In
IEEE Reliability Magazine, August/September/October, 2015.
-
Automatic Generation of Data-Oriented Exploits.
Hong Hu, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena, and
Zhenkai Liang.
In the 24th USENIX Security
Symposium, Washington DC, August 2015.
-
Protecting Sensitive Web Content from Client-side
Vulnerabilities with Cryptons. [PDF]
Xinshu Dong, Zhaofeng Chen,
Hossein Siadati, Shruti Tople, Prateek Saxena, and Zhenkai Liang.
In the 14th ACM Conference on Computer and Communications
Security (CCS), Berlin, Germany, November 2013.
-
Codejail: Application-transparent
Isolation of Libraries with Tight Program Interactions. [PDF]
Yongzheng Wu, Sai
Sathyanarayan, Roland Yap, and Zhenkai Liang.
In the 17th European Symposium on Research
in Computer Security (ESORICS), Pisa, Italy, September 2012.
-
Identifying and Analyzing Pointer
Misuses for Sophisticated Memory-corruption Exploit
Diagnosis.[PDF]
Mingwei
Zhang, Aravind Prakash, Xiaolei Li, Zhenkai Liang, and Heng Yin.
In the 19th Annual Network &
Distributed System Security Symposium (NDSS), San Diego, CA,
February 2012.