Publications in systems, system security and cyber experimentation

  1. Kernel Auditing using Augmented Reference Behavior Analysis and Virtualized Selective Tracing.

    Chuqi Zhang, Spencer Faith, Feras Al-Qassas, Theodorus Wensan Februanto, Zhenkai Liang, and Adil Ahmad.

    In the 47th IEEE Symposium on Security and Privacy (S&P), 2026.

  2. Signals and Symptoms: ICS Attack Dataset from Railway Cyber Range.

    Anis Yusof, Yuancheng Liu, Niklaus Kang, Choon Meng Seah, and Zhenkai Liang and Ee-Chien Chang.

    In the 11th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems, 2025.

  3. Erebor: A Drop-In Sandbox Solution for Private Data Processing in Untrusted Confidential Virtual Machines.

    Chuqi Zhang, Rahul Priolkar, Yuancheng Jiang, Yuan Xiao, Mona Vij, Zhenkai Liang, and Adil Ahmad.

    In European Conference on Computer Systems (EuroSys), 2025.

  4. Scrutinizer: Towards Secure Forensics on Compromised TrustZone.

    Yiming Zhang, Fengwei Zhang, Xiapu Luo, Rui Hou, Xuhua Ding, Zhenkai Liang, Shoumeng Yan, Tao Wei, and Zhengyu He.

    In the 32nd Annual Network and Distributed System Security Symposium (NDSS), 2025.

  5. ProvGuard: Detecting SDN Control Policy Manipulation via Contextual Semantics of Provenance Graphs.

    Ziwen Liu, Jian Mao, Jun Zeng, Jiawei Li, Qixiao Lin, Jiahao Liu, Jianwei Zhuge, and Zhenkai Liang.

    In the 32nd Annual Network and Distributed System Security Symposium (NDSS), 2025.

  6. From Observations to Insights: Constructing Effective Cyberattack Provenance with PROVCON.

    Anis Yusof, Shaofei Li, Arshdeep Singh Kawatra, Ding Li, and Ee-Chien Chang and Zhenkai Liang.

    In Workshop on SOC Operations and Construction (WOSOC) 2025, 2025.

  7. VulZoo: A Comprehensive Vulnerability Intelligence Dataset (Tool Demonstration Track).

    Bonan Ruan, Jiahao Liu, Weibo Zhao, and Zhenkai Liang.

    In the 39th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2024.

  8. The HitchHiker's Guide to High-Assurance System Observability  Protection with Efficient Permission Switches.

    Chuqi Zhang, Jun Zeng, Yiming Zhang, Adil Ahmad, Fengwei Zhang, Zhenkai Liang, and Hai Jin.

    In ACM SIGSAC Conference on Computer and Communications Security (CCS), 2024.

  9. KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities.

    Bonan Ruan, Jiahao Liu, Chuqi Zhang, and Zhenkai Liang.

    In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), 2024.

    Best Practical Paper Award
  10. PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability.

    Jun Zeng, Chuqi Zhang, and Zhenkai Liang.

    In the 17th ACM ASIA Conference on Computer and Communications Security (CCS), 2022.

  11. AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports.

    Zhenyuan Li, Jun Zeng, Yan Chen, and Zhenkai Liang.

    In the 27th European Symposium on Research in Computer Security (ESORICS), 2022.

  12. ShadeWatcher: Recommendation-guided Cyber Threat Analysis using System Audit Records.

    Jun Zeng, Xiang Wang, Jiahao Liu, Yinfang Chen, Zhenkai Liang, Tat-Seng Chua, and Zheng Leong Chua.

    In the 2022 IEEE Symposium on Security and Privacy (S&P), 2022.

  13. Watson: Abstracting Behaviors from Audit logs via Aggregation of Contextual Semantics.

    Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang, and Jian Mao.

    In the 28th Annual Network and Distributed System Security Symposium (NDSS), 2021.

  14. Robust P2P Primitives Using SGX Enclaves.

    Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, and Zhenkai Liang.

    In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), 2020.

  15. Enabling Practical Experimentation in Cyber-security Training.

    Jian Mao, Zheng Leong Chua, and Zhenkai Liang.

    In International Conference on Dependable Systems and Communications (DSC), 2017.

  16. DroidVault: A Trusted Data Vault for Android Devices.

    Xiaolei Li, Hong Hu, Guangdong Bai, Yaoqi Jia, Zhenkai Liang, and Prateek Saxena.

    In the 19th International Conference on Engineering of Complex Computer Systems (ICECCS), 2014.

    Best Paper Award
  17. AirBag: Boosting Smartphone Resistance to Malware Infection.

    Chiachih Wu, Yajin Zhou, Kunal Patel, Zhenkai Liang, and Xuxian Jiang.

    In the 21st Network & Distributed System Security Symposium (NDSS), 2014.

  18. Enforcing system-wide control flow integrity for exploit detection and diagnosis.

    Aravind Prakash, Heng Yin, and Zhenkai Liang.

    In the 8th ACM SIGSAC symposium on Information, computer and communications security (AsiaCCS), 2013.