Xiangkun Jia          

Xiangkun Jia

I am now working in Institute of Software Chinese Academy of Sciences,
in the group of Purui Su as an Associate Professor.


Mailing Address:
4# South Fourth Street, Zhong Guan Cun, Beijing, P.R. China, 100190
Phone:
(+86)15652143223
Email:



I obtained my Ph.D. degree of Computer Applications Technology from the TCA lab, at Institute of Software Chinese Academy of Sciences (ISCAS) in 2012-2018, co-advised by Professor Purui Su and Professor Dengguo Feng .
I obtained my B.E. degree of Information Security from Harbin Institute of Technology (HIT) in 2012.
I was exchanged to Feng Chia University in 2010 for a semester.
I was a Postdoc at the Software Systems Security lab headed by Professor Dinghao Wu in College of Information Sciences and Technology of The Pennsylvania State University (PSU) in 2018-2019.

Research:

My research interests focus on software security, including program analysis, vulnerability analysis and malware detection. The methods involve taint analysis, symbolic execution, fuzzing and reverse engineering. Machine-learning methods are also used for solving software security problems.
I am now working on fuzzing, program analysis and vulnerability exploit. There are several projects including:

  • Vulnerability discovery/detection/assessment
  • Application-oriented taint analysis system
  • Malware detection and analysis platform
  • Software supply chain security

Papers

Patents

  • Xiangkun Jia, Chao Zhang, Purui Su, …… An automatic identification method for custom heap management functions based on dynamic features. in Chinese.
  • Xiangkun Jia, Chao Zhang, Purui Su, …… An offline method for heap overflow discovery based active construction. in Chinese.
  • Xiangkun Jia, Liang He, Purui Su, …… A binary-oriented heap overflow detection method. in Chinese.
  • Xiangkun Jia, Jia Yan, Purui Su, …... A network protocol reverse analysis method based on identifying message segment separators. in Chinese.

Book

  • Purui Su, Lingyun Ying, Yi Yang. Software security analysis and application. Chapter 2 basic knowledge and Chapter 5 symbolic execution. in Chinese.

Bug Reports

  • ffmpeg CVE-2016-6164, Realplayer CVE-2016-9931, QuickTime CVE-2017-13823, PoDoFo CVE-2019-9687, etc.

  • Rewarded by Tencent Security Response Center, Alibaba Security Response Center

Student PC

  • IEEE Symposium on Security and Privacy (Oakland), 2018

Sub-reviewer

  • Conferences including AsiaCCS'2021, ICICS'2021, ICICS'2020, CCS'2019, CNS'2019, CSET'17, RAID'17, VARA'17, CODASPY'16
  • Journals including IEEE Transactions on Network and Service Management, Transactions on Software Engineering, Chinese Journal of Computers, Journal of Software, Chinese Journal of Electronics

Service

  • Judger for the 2019 graduate and undergraduate exhibition of PSU
  • The First Prize of "ZongHengBei" RHG AUTOPWN
  • The Third Prize of BCTF AUTOPWN (20200807) founded by Baidu
  • Internet security scholarship of CHINA internet development foundation in 2017
  • National Scholarship in 2017
  • Excellent graduate of Heilongjiang Province in China in 2012