-
Notifications
You must be signed in to change notification settings - Fork 4
/
index.html
157 lines (155 loc) · 9.96 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>NUS CuriOSity</title>
<link rel="icon" href="assets/favicon.ico" type="image/x-icon">
<link rel="stylesheet" href="css/style.css">
</head>
<body>
<header>
<img src="assets/logo-curiosity.png" alt="Lab Logo" class="logo">
<h1 class="lab-name">Research Group</h1>
</header>
<nav>
<ul>
<li><a href="index.html">Home</a></li>
<li><a href="news.html">News</a></li>
<li><a href="people.html">People</a></li>
<li><a href="publications.html">Publications</a></li>
<li><a href="projects.html">Projects</a></li>
<li><a href="contact.html">Contact</a></li>
</ul>
</nav>
<div class="container">
<main>
<h2 class="larger-h2">Welcome to CuriOSity!</h2>
<div class="welcome-section">
<div class="welcome-text">
<div class="float-window">
<img src="assets/gallery/2024-12-03.jpg" alt="research loop enlarged">
</div>
<p>CuriOSity is a cybersecurity research group led by <a href="https://www.comp.nus.edu.sg/~liangzk/" target="_blank">Prof. Zhenkai Liang</a> at <a href="https://www.nus.edu.sg/" target="_blank">NUS</a>. </p>
<p>Our research mainly focuses on system security, covering provenance, anomaly detection, trusted computing, Android malware detection, cyber range and attack replay, vulnerability detection and management, program analysis, fuzzing and testing, AI for security, etc.</p>
<p><strong>Group Motto: <em>Understanding systems, abstracting knowledge, and connecting facts. </em></strong></p>
<p class="motto-zh">理解系统,提炼知识,参悟规律。</p>
</div>
<!-- <div class="welcome-image">
<img src="assets/gallery/2024-09-24.jpeg" alt="research loop">
</div> -->
<div class="welcome-image">
<img src="assets/gallery/2024-12-03.jpg" alt="research loop">
</div>
</div>
<h2>Latest News</h2>
<section class="news-section">
<div class="news-item">
<span class="news-date">Nov 2024</span>
<p class="news-content">🎉 Our recent work on Android UI behavior analysis is accepted in NDSS'25!</p>
</div>
<div class="news-item">
<span class="news-date">Sep 2024</span>
<p class="news-content">🎉 Our recent work on high-assurance system observability protection is accepted in CCS'24!</p>
</div>
<div class="news-item">
<span class="news-date">Jul 2024</span>
<p class="news-content">🎉 Our recent work on mobile malware detection is accepted in ASE'24!</p>
</div>
<div class="news-item">
<span class="news-date">Jul 2024</span>
<p class="news-content">🎉 Our recent work on cryptographic misuse detection is accepted in RAID'24!</p>
</div>
<div class="news-item">
<span class="news-date">Jun 2024</span>
<p class="news-content">🎉 Our recent work on kernel vulnerability reproduction is accepted in RAID'24 and wins the <font color="red">Best Practical Paper Award</font>!</p>
</div>
<div class="news-item">
<span class="news-date">Jun 2024</span>
<p class="news-content">🎉 Our VulZoo vulnerability intelligence dataset is released!</p>
</div>
<div class="news-item">
<span class="news-date">May 2024</span>
<p class="news-content">🎉 Our recent work on Android UI similarity is accepted in USENIX Security'24!</p>
</div>
<!-- Repeat the above block for each news item -->
</section>
<!-- <h2>To Prospective Students</h2> -->
<h2>Selected Publications</h2>
<p>Refer to <a href="publications.html">this link</a> for the full list of publications.</p>
<div class="publications-container">
<div class="publication">
<h3 class="paper-title">UI-CTX: Understanding UI Behaviors with Code Contexts for Mobile Applications</h3>
<p class="authors">Jiawei Li*, Jiahao Liu*, Jian Mao, Jun Zeng, and Zhenkai Liang.</p>
<p class="publisher">In the 32nd Network and Distributed System Security Symposium, 2025.</p>
</div>
<div class="publication">
<h3 class="paper-title">The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches</h3>
<p class="authors">Chuqi Zhang, Jun Zeng, Yiming Zhang, Adil Ahmad, Fengwei Zhang, Zhenkai Liang, and Hai Jin.</p>
<p class="publisher">In Proceedings of the 31th ACM Conference on Computer and Communications Security, 2024.</p>
</div>
<div class="publication">
<h3 class="paper-title">MaskDroid: Robust Android Malware Detection with Masked Graph Representations</h3>
<p class="authors">Jingnan Zheng*, Jiahao Liu*, An Zhang, Jun Zeng, Ziqi Yang, Zhenkai Liang, and Tat-Seng Chua.</p>
<p class="publisher">In Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024.</p>
</div>
<div class="publication">
<h3 class="paper-title">CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning</h3>
<p class="authors">Jianing Wang, Shanqing Guo, Wenrui Diao, Yue Liu, Haixin Duan, Yichen Liu, and Zhenkai Liang.</p>
<p class="publisher">In 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2024).</p>
</div>
<div class="publication">
<h3 class="paper-title">KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities</h3>
<p class="authors">Bonan Ruan, Jiahao Liu, Chuqi Zhang, Zhenkai Liang.</p>
<p class="publisher">In 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2024).</p>
</div>
<div class="publication">
<h3 class="paper-title">UIHASH: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation</h3>
<p class="authors">Jiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, Shaowen Feng, and Zhenkai Liang.</p>
<p class="publisher">In Proceedings of the 33rd USENIX Security Symposium, 2024.</p>
</div>
<div class="publication">
<h3 class="paper-title">Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation</h3>
<p class="authors">Yuancheng Jiang, Jiahao Liu, Jinsheng Ba, Roland Yap, Zhenkai Liang, Manuel Rigger.</p>
<p class="publisher">In Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024.</p>
</div>
<div class="publication">
<h3 class="paper-title">Learning Graph-based Code Representations for Source-level Functional Similarity Detection</h3>
<p class="authors">Jiahao Liu*, Jun Zeng*, Xiang Wang and Zhenkai Liang.</p>
<p class="publisher">In Proceedings of the 45th International Conference on Software Engineering, 2023.</p>
</div>
<div class="publication">
<h3 class="paper-title">PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability</h3>
<p class="authors">Jun Zeng*, Chuqi Zhang*, and Zhenkai Liang.</p>
<p class="publisher">In Proceedings of the 29th ACM Conference on Computer and Communications Security, 2022.</p>
</div>
<div class="publication">
<h3 class="paper-title">FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation</h3>
<p class="authors">Kaihang Ji, Jun Zeng, Yuancheng Jiang, Zhenkai Liang, Zheng Leong Chua, Prateek Saxena, and Abhik Roychoudhury.</p>
<p class="publisher">In Proceedings of the 31st USENIX Security Symposium, 2022.</p>
</div>
<div class="publication">
<h3 class="paper-title">Tell: Log Level Suggestions via Modeling Multi-level Code Block Information</h3>
<p class="authors">Jiahao Liu, Jun Zeng, Xiang Wang, Kaihang Ji, and Zhenkai Liang.</p>
<p class="publisher">In Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, 2022.</p>
</div>
<div class="publication">
<h3 class="paper-title">ShadeWatcher: Recommendation-guided Cyber Threat Analysis using System Audit Records</h3>
<p class="authors">Jun Zeng, Xiang Wang, Jiahao Liu, Yinfang Chen, Zhenkai Liang, Tat-Seng Chua, and Zheng Leong Chua.</p>
<p class="publisher">In Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022.</p>
</div>
<div class="publication">
<h3 class="paper-title">Watson: Abstracting Behaviors from Audit logs via Aggregation of Contextual Semantics</h3>
<p class="authors">Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang, and Jian Mao.</p>
<p class="publisher">In Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021.</p>
</div>
<!-- Repeat for each publication -->
</div>
</main>
</div>
<footer>
<p>© 2024 CuriOSity Research Group. All rights reserved.</p>
</footer>
<script src="js/script.js"></script>
</body>
</html>