-
Notifications
You must be signed in to change notification settings - Fork 6
Expand file tree
/
Copy pathindex.html
More file actions
215 lines (213 loc) · 14.8 KB
/
index.html
File metadata and controls
215 lines (213 loc) · 14.8 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>NUS CuriOSity</title>
<link rel="icon" href="assets/favicon.ico" type="image/x-icon">
<link rel="stylesheet" href="css/style.css">
</head>
<body>
<header>
<img src="assets/logo-curiosity.png" alt="Lab Logo" class="logo">
<h1 class="lab-name">Research Group</h1>
</header>
<nav>
<ul>
<li><a href="index.html">Home</a></li>
<li><a href="news.html">News</a></li>
<li><a href="people.html">People</a></li>
<li><a href="publications.html">Publications</a></li>
<li><a href="projects.html">Projects</a></li>
<li><a href="contact.html">Contact</a></li>
</ul>
</nav>
<div class="container">
<main>
<h2 class="larger-h2">Welcome to CuriOSity!</h2>
<div class="welcome-section">
<div class="welcome-text">
<div class="float-window">
<img src="assets/gallery/2024-12-03.jpg" alt="research loop enlarged">
</div>
<p>CuriOSity is a cybersecurity research group led by <a href="https://www.comp.nus.edu.sg/~liangzk/" target="_blank">Prof. Zhenkai Liang</a> at <a href="https://www.nus.edu.sg/" target="_blank">NUS</a>. </p>
<p>Our research mainly focuses on system security, covering provenance, anomaly detection, trusted computing, Android malware detection, cyber range and attack replay, vulnerability detection and management, program analysis, fuzzing and testing, AI for security, etc.</p>
<p><strong>Our Missions:</strong></p>
<ul>
<li>Understand systems (理解系统)</li>
<li>Abstract knowledge (提炼知识)</li>
<li>Connect facts (参悟规律)</li>
</ul>
<p>Our group ethos is: <strong>Be interesting people, do meaningful work.</strong> We strive to embody this ethos — to think deeply, collaborate openly, and act purposefully. Through understanding systems, abstracting knowledge, and connecting facts, we seek both <em>elegance in thought</em> and <em>meaning in action</em>.</p>
</div>
<!-- <div class="welcome-image">
<img src="assets/gallery/2024-09-24.jpeg" alt="research loop">
</div> -->
<div class="welcome-image">
<img src="assets/gallery/2024-12-03.jpg" alt="research loop">
</div>
</div>
<h2>Latest News</h2>
<section class="news-section">
<div class="news-item">
<span class="news-date">Apr 2026</span>
<p class="news-content">🎉 Our recent work on Android malware analysis is accepted by TOSEM!</p>
</div>
<div class="news-item">
<span class="news-date">Apr 2026</span>
<p class="news-content">🎉 Our junior students' work on strategy analysis of tennis games is accepted by ISACE'26!</p>
</div>
<div class="news-item">
<span class="news-date">Sep 2025</span>
<p class="news-content">🎉 Our recent work on kernel auditing is accepted at S&P'26!</p>
</div>
<div class="news-item">
<span class="news-date">Sep 2025</span>
<p class="news-content">🎉 Our junior students' work on strategy analysis of tennis games wins the <font color="red">Distinguished Paper Award</font> at ISACE'25!</p>
</div>
<div class="news-item">
<span class="news-date">Sep 2025</span>
<p class="news-content">🎉 Our recent work on LLM-based log parsing is accepted at ASE'25!</p>
</div>
<div class="news-item">
<span class="news-date">Sep 2025</span>
<p class="news-content">🎉 Our recent work on software-supply-chain vulnerability assessment is accepted at ASE'25!</p>
</div>
<!-- Repeat the above block for each news item -->
</section>
<!-- <h2>To Prospective Students</h2> -->
<h2>Featured Publications</h2>
<p>Refer to <a href="publications.html">this link</a> for the full list of publications.</p>
<div class="publications-container">
<div class="publication">
<h3 class="paper-title">Unraveling the Key of Machine Learning-based Android Malware Detection.</h3>
<p class="authors">Jiahao Liu, Jun Zeng, Fabio Pierazzi, Ziqi Yang, Lorenzo Cavallaro, and Zhenkai Liang.</p>
<p class="publisher">In Transactions on Software Engineering and Methodology (TOSEM), 2026.</p>
</div>
<div class="publication">
<h3 class="paper-title">TANS-Agent: Structured, Multi-Agent Tactical Reasoning for Tennis Match Analysis and Strategy Recommendation.</h3>
<p class="authors">Emma Cai, Yuexi Song, Chuanfei Li, and Zhenkai Liang.</p>
<p class="publisher">In the 3rd International Sports Analytics Conference and Exhibition (ISACE), 2026.</p>
</div>
<div class="publication">
<h3 class="paper-title">Kernel Auditing using Augmented Reference Behavior Analysis and Virtualized Selective Tracing</h3>
<p class="authors">Chuqi Zhang, Spencer Faith, Feras Al-Qassas, Theodorus Wensan Februanto, Zhenkai Liang, and Adil Ahmad.</p>
<p class="publisher">In the 47th IEEE Symposium on Security and Privacy (S&P), 2026.</p>
</div>
<div class="publication">
<h3 class="paper-title">PromoGuardian: Detecting Promotion Abuse Fraud with Multi-Relation Fused Graph Neural Networks</h3>
<p class="authors">Shaofei Li, Xiao Han, Ziqi Zhang, Zhenkai Liang, Yao Guo, Xiangqun Chen, Ding Li, Shuli Gao, and Minyao Hua.</p>
<p class="publisher">In the 47th IEEE Symposium on Security and Privacy (S&P), 2026.</p>
</div>
<div class="publication">
<h3 class="paper-title">TAPPecker: TAP Logic Inference and Violation Detection in Heterogeneous Smart Home Systems</h3>
<p class="authors">Qixiao Lin, Jian Mao, Ziwen Liu, and Zhenkai Liang.</p>
<p class="publisher">In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), 2025.</p>
</div>
<div class="publication">
<h3 class="paper-title">TANS: A Chess-Inspired Notation System for Strategy Analysis of Tennis Games</h3>
<p class="authors">Yuexi Song, Chuanfei Li, Hao Cao, Ling Wu, Huanhuan Zheng, Zhenkai Liang.</p>
<font color="red">Distinguished Paper Award</font>
<p class="publisher">In the 2nd International Sports Analytics Conference and Exhibition (ISACE), 2025.</p>
</div>
<div class="publication">
<h3 class="paper-title">Improving LLM-based Log Parsing by Learning from Errors in Reasoning Traces</h3>
<p class="authors">Jialai Wang, Juncheng Lu, Jie Yang, Junjie Wang, Zeyu Gao, Chao Zhang, Zhenkai Liang, Ee-Chien Chang.</p>
<p class="publisher">In the 40th IEEE/ACM International Conference on Automated Software Engineering, 2025.</p>
</div>
<div class="publication">
<h3 class="paper-title">Propagation-Based Vulnerability Impact Assessment for Software Supply Chains</h3>
<p class="authors">Bonan Ruan, Zhiwei Lin, Jiahao Liu, Chuqi Zhang, Kaihang Ji, Zhenkai Liang.</p>
<p class="publisher">In the 40th IEEE/ACM International Conference on Automated Software Engineering, 2025.</p>
</div>
<div class="publication">
<h3 class="paper-title">Evaluating Disassembly Errors With Only Binaries</h3>
<p class="authors">Lambang Akbar Wijayadi, Yuancheng Jiang, Roland Yap, Zhenkai Liang, Zhuohao Liu.</p>
<p class="publisher">In ACM Asia Conference on Computer and Communications Security, 2025.</p>
</div>
<div class="publication">
<h3 class="paper-title">Erebor: A Drop-In Sandbox Solution for Private Data Processing in Untrusted Confidential Virtual Machines</h3>
<p class="authors">Chuqi Zhang, Rahul Priolkar, Yuancheng Jiang, Yuan Xiao, Mona Vij, Zhenkai Liang, Adil Ahmad.</p>
<p class="publisher">In the 20th ACM European Conference on Computer Systems, 2025.</p>
</div>
<div class="publication">
<h3 class="paper-title">Fuzzing the PHP Interpreter via Dataflow Fusion</h3>
<p class="authors">Yuancheng Jiang, Chuqi Zhang, Bonan Ruan, Jiahao Liu, Manuel Rigger, Roland Yap, Zhenkai Liang.</p>
<font color="red">Distinguished Paper Award</font>
<p class="publisher">In the 34th USENIX Security Symposium, 2025.</p>
</div>
<div class="publication">
<h3 class="paper-title">UI-CTX: Understanding UI Behaviors with Code Contexts for Mobile Applications</h3>
<p class="authors">Jiawei Li*, Jiahao Liu*, Jian Mao, Jun Zeng, Zhenkai Liang.</p>
<p class="publisher">In the 32nd Network and Distributed System Security Symposium, 2025.</p>
</div>
<div class="publication">
<h3 class="paper-title">The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches</h3>
<p class="authors">Chuqi Zhang, Jun Zeng, Yiming Zhang, Adil Ahmad, Fengwei Zhang, Zhenkai Liang, Hai Jin.</p>
<p class="publisher">In Proceedings of the 31th ACM Conference on Computer and Communications Security, 2024.</p>
</div>
<div class="publication">
<h3 class="paper-title">MaskDroid: Robust Android Malware Detection with Masked Graph Representations</h3>
<p class="authors">Jingnan Zheng*, Jiahao Liu*, An Zhang, Jun Zeng, Ziqi Yang, Zhenkai Liang, Tat-Seng Chua.</p>
<p class="publisher">In Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024.</p>
</div>
<div class="publication">
<h3 class="paper-title">CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning</h3>
<p class="authors">Jianing Wang, Shanqing Guo, Wenrui Diao, Yue Liu, Haixin Duan, Yichen Liu, Zhenkai Liang.</p>
<p class="publisher">In 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2024).</p>
</div>
<div class="publication">
<h3 class="paper-title">KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities</h3>
<p class="authors">Bonan Ruan, Jiahao Liu, Chuqi Zhang, Zhenkai Liang.</p>
<font color="red">Best Practical Paper Award</font>
<p class="publisher">In 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2024).</p>
</div>
<div class="publication">
<h3 class="paper-title">UIHASH: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation</h3>
<p class="authors">Jiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, Shaowen Feng, Zhenkai Liang.</p>
<p class="publisher">In Proceedings of the 33rd USENIX Security Symposium, 2024.</p>
</div>
<div class="publication">
<h3 class="paper-title">Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation</h3>
<p class="authors">Yuancheng Jiang, Jiahao Liu, Jinsheng Ba, Roland Yap, Zhenkai Liang, Manuel Rigger.</p>
<p class="publisher">In Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024.</p>
</div>
<div class="publication">
<h3 class="paper-title">Learning Graph-based Code Representations for Source-level Functional Similarity Detection</h3>
<p class="authors">Jiahao Liu*, Jun Zeng*, Xiang Wang and Zhenkai Liang.</p>
<p class="publisher">In Proceedings of the 45th International Conference on Software Engineering, 2023.</p>
</div>
<div class="publication">
<h3 class="paper-title">PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability</h3>
<p class="authors">Jun Zeng*, Chuqi Zhang*, Zhenkai Liang.</p>
<p class="publisher">In Proceedings of the 29th ACM Conference on Computer and Communications Security, 2022.</p>
</div>
<div class="publication">
<h3 class="paper-title">FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation</h3>
<p class="authors">Kaihang Ji, Jun Zeng, Yuancheng Jiang, Zhenkai Liang, Zheng Leong Chua, Prateek Saxena, Abhik Roychoudhury.</p>
<p class="publisher">In Proceedings of the 31st USENIX Security Symposium, 2022.</p>
</div>
<div class="publication">
<h3 class="paper-title">Tell: Log Level Suggestions via Modeling Multi-level Code Block Information</h3>
<p class="authors">Jiahao Liu, Jun Zeng, Xiang Wang, Kaihang Ji, Zhenkai Liang.</p>
<p class="publisher">In Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, 2022.</p>
</div>
<div class="publication">
<h3 class="paper-title">ShadeWatcher: Recommendation-guided Cyber Threat Analysis using System Audit Records</h3>
<p class="authors">Jun Zeng, Xiang Wang, Jiahao Liu, Yinfang Chen, Zhenkai Liang, Tat-Seng Chua, Zheng Leong Chua.</p>
<p class="publisher">In Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022.</p>
</div>
<div class="publication">
<h3 class="paper-title">Watson: Abstracting Behaviors from Audit logs via Aggregation of Contextual Semantics</h3>
<p class="authors">Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang, Jian Mao.</p>
<p class="publisher">In Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021.</p>
</div>
</div>
</main>
</div>
<footer>
<p>© 2026 CuriOSity Research Group. All rights reserved.</p>
</footer>
<script src="js/script.js"></script>
</body>
</html>