|
|
LIANG Zhenkai
梁振凯
Mailing address:
13 Computing Drive
Computing 1, #03-27
Singapore, 117417
Phone: (+65) 6516 1226
Email: liangzk @ comp.nus.edu.sg
Office: COM1 #03-16
|
I am an Associate Professor at
the School of Computing,
National University of Singapore.
My interests include research in systems and system security, as well
as education. I'm advising the Curiosity Reserach Group with the
following missions:
Understanding systems (理解系统), abstracting knowledge (提炼知识),
and connecting facts (参悟规律).
We are looking for curious minds to join our exploration. If you share
the same view of the world, please do not hesitate to reach me.
Curiosity is required, while mentality for repairing things (such as
bicycles) is a plus. Positions are available at
all levels, from undergraduate researcher/interns, Ph.D. students, and
postdoc research fellows.
Selected Publications of Current Research Focus Full List
-
FlowMatrix: GPU-Assisted Information-Flow Analysis through
Matrix-Based Representation. .
Kaihang Ji, Jun Zeng,
Yuancheng Jiang, Zhenkai Liang, Zheng Leong Chua, Prateek Saxena,
and Abhik Roychoudhury.
In the 31st USENIX Security
Symposium , August 2022.
-
ShadeWatcher: Recommendation-guided Cyber Threat Analysis
using System Audit Records..
Jun Zeng, Xiang Wang,
Jiahao Liu, Yinfang Chen, Zhenkai Liang, Tat-Seng Chua, and Zheng
Leong Chua.
In the IEEE Symposium on Security and
Privacy, May 2022.
-
WATSON: Abstracting Behaviors from Audit Logs via
Aggregation of Contextual Semantics.
Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang
and Jian Mao.
In Annual Network &
Distributed System Security Symposium (NDSS), February 2021.
-
Neural Network Inversion in Adversarial Setting via
Background Knowledge Alignment.
Ziqi Yang, Jiyi
Zhang, Ee-Chien Chang, and Zhenkai Liang
In
ACM Conference on Computer and Communications Security
(CCS), November 2019.
-
One Engine To Serve 'em All: Inferring Taint Rules Without
Architectural Semantics.
Zheng Leong Chua, Yanhao
Wang, Teodora Baluta, Prateek Saxena, Zhenkai Liang, and Purui Su.
In Annual Network & Distributed System Security
Symposium (NDSS), February 2019.
-
Neural Nets Can Learn Function Type Signatures From
Binaries.
Zheng Leong Chua, Shiqi Shen, Prateek
Saxena, and Zhenkai Liang.
In USENIX Security Symposium, August 2017.
-
Data-Oriented Programming: On the Expressiveness of
Non-Control Data Attacks.
Hong Hu, Shweta Shinde,
Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, and Zhenkai
Liang.
In the IEEE Symposium on Security and Privacy,
May 2016.
-
Tool, Technique, and Tao in Computer Security
Education.
Zhenkai Liang and Jian Mao.
In
IEEE Reliability Magazine, August/September/October, 2015.
-
Automatic Generation of Data-Oriented Exploits.
Hong Hu, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena, and
Zhenkai Liang.
In the 24th USENIX Security
Symposium, Washington DC, August 2015.