Skip to content

Commit

Permalink
under construction
Browse files Browse the repository at this point in the history
  • Loading branch information
brant-ruan committed Apr 25, 2024
1 parent a072cb4 commit f88d319
Showing 1 changed file with 11 additions and 4 deletions.
15 changes: 11 additions & 4 deletions index.html
Original file line number Diff line number Diff line change
Expand Up @@ -27,17 +27,24 @@ <h1 class="lab-name">InfoSec Research Group</h1>
<main>
<h2>Welcome to CURIOSITY!</h2>
<p>CURIOSITY is a cybersecurity research group led by Prof. Zhenkai Liang at National University of Singapore. </p>
<p>Our research mainly focuses on system security, covering provenance, anomaly detection, trusted computing, Android malware detection, cyber range and attack replay, vulnerability assessment, program analysis, fuzzing, AI for security, etc.</p>
<p>Our research mainly focuses on system security, covering provenance, anomaly detection, trusted computing, Android malware detection, cyber range and attack replay, vulnerability assessment, program analysis, fuzzing and testing, AI for security, etc.</p>
<p><strong>Group Motto: <em>Understanding systems, abstracting knowledge, connecting facts.</em></strong></p>
<h2>Selected Publications</h2>
<div class="publications-container">
<div class="publication">
<h3 class="paper-title">Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation</h3>
<p class="authors">Yuancheng Jiang, Jiahao Liu, Jinsheng Ba, Roland Yap, Zhenkai Liang, Manuel Rigger.</p>
<p class="publisher">In Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024.</p>
</div>
<div class="publication">
<h3 class="paper-title">Learning Graph-based Code Representations for Source-level Functional Similarity Detection</h3>
<p class="authors">Jiahao Liu*, Jun Zeng*, Xiang Wang and Zhenkai Liang.</p>
<p class="publisher">In Proceedings of the 45th International Conference on Software Engineering, 2023.</p>
</div>
<div class="publication">
<h3 class="paper-title">FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation</h3>
<p class="authors">Kaihang Ji, Jun Zeng, Yuancheng Jiang, Zhenkai Liang, Zheng Leong Chua, Prateek Saxena, and Abhik Roychoudhury</p>
<p class="publisher">In Proceedings of the 31st USENIX Security Symposium, 2022.</p>
<!-- <p class="links">
<a href="paper1.pdf" class="pdf-link">Paper</a> | <a href="code1.zip" class="code-link">Code</a> | <a href="slides1.ppt" class="slides-link">Slides</a>
</p> -->
</div>
<div class="publication">
<h3 class="paper-title">ShadeWatcher: Recommendation-guided Cyber Threat Analysis using System Audit Records</h3>
Expand Down

0 comments on commit f88d319

Please sign in to comment.