Jiongyi Chen 陈炯峄


  • Hi there. I am a lecturer in National University of Defense Technology, China.

  • I am interested in binary code analysis, bug detection, and firmware analysis.

  • I received my B.Eng. and Ph.D. degrees from the Chinese University of Hong Kong in 2015 and 2019, respectively.

  • I was fortunately advised by Prof. Kehuan Zhang and Prof. Wing Cheong Lau.

  • Contact: jiongyi[UNDERLINE]chen[WHERE]126[DOT]com

  • Youth Editorial Board Member: 信息安全学报, Cybersecurity

  • TCP Member: ACM Conference on Computer and Communications Security 2025.

  • Reviewer: ACM Transactions on Software Engineering and Methodology (2025).

List of Published Papers

  1. OSmart: Whitebox Program Option Fuzzing
    Kelin Wang, Mengda Chen, Liang He, Purui Su, Yan Cai, Jiongyi Chen, Bin Zhang, Chao Feng, Chaojing Tang.
    In Proceedings of the 31st ACM Conference on Computer and Communications Security (CCS'24).

  2. LIFTFUZZ: Validating Binary Lifters through Context-aware Fuzzing with GPT
    Yutong Zhou, Fan Yang, Zirui Song, Jiongyi Chen, Kehuan Zhang.
    In Proceedings of the 31st ACM Conference on Computer and Communications Security (CCS'24).

  3. FirmRES: Exposing Broken Device-Cloud Access Control in IoT Through Static Firmware Analysis
    Yuting Xiao, Jiongyi Chen*, Yupeng Hu*, Jing Huang.
    In Proceedings of the 54th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'24).

  4. Bin2Summary: Beyond Function Name Prediction in Stripped Binaries with Functionality-specific Code Embeddings
    Zirui Song, Jiongyi Chen, Kehuan Zhang.
    In Proceedings of the ACM International Conference on the Foundations of Software Engineering (FSE'24).

  5. Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing
    Bin Zhang, Jiongyi Chen*, Runhao Li, Chao Feng, Ruilin Li, Chaojing Tang.
    In Proceedings of the 32th USENIX Security Symposium (USENIX Security'23).

  6. HomeSpy: The Invisible Sniffer of Infrared Remote Control of Smart TVs
    Kong Huang, Yutong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang.
    In Proceedings of the 32th USENIX Security Symposium (USENIX Security'23).

  7. Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs
    Runhao Li, Bin Zhang*, Jiongyi Chen*, Wenfeng Lin, Chao Feng, Chaojing Tang.
    In Proceedings of the 30th Annual Network and Distributed System Security Symposium (NDSS'23).

  8. Cast Away: On the Security of DLNA Deployments in the SmartTV Ecosystem
    Guangwei Tian, Jiongyi Chen*, Kailun Yan, Shishuai Yang, and Wenrui Diao*.
    The 22nd International Conference on Software Quality, Reliability and Security (QRS'22).

  9. SEVulDet: A Semantics-Enhanced Learnable Vulnerability Detector
    Zhiquan Tang, Qiao Hu, Yupeng Hu, Wenxin Kuang, Jiongyi Chen.
    In Proceedings of the 52th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'22).

  10. Game of Hide-and-Seek: Exposing Hidden Interfaces in Embedded Web Applications of IoT Devices
    Wei Xie, Jiongyi Chen*, Zhenhua Wang, Chao Feng, Enze Wang, Yifei Gao, Baosheng Wang, Kai Lu.
    In Proceedings of the Web Conference 2022 (WWW'22).

  11. DeFault: Mutual Information-based Crash Triage for Massive Crashes
    Xing Zhang, Jiongyi Chen*, Chao Feng, Ruilin Li, Wenrui Diao, Kehuan Zhang, Jing Lei, Chaojing Tang.
    In Proceedings of the 44th International Conference on Software Engineering (ICSE'22) .

  12. Demystifying Android Non-SDK APIs: A Large-scale Empirical Measurement in the Wild
    Shishuai Yang, Rui Li, Jiongyi Chen, Wenrui Diao, Shanqing Guo
    In Proceedings of the 44th International Conference on Software Engineering (ICSE'22) .

  13. Reducing Test Cases with Attention Mechanism of Neural Networks
    Xing Zhang, Jiongyi Chen*, Chao Feng, Ruilin Li, Yunfei Su, Bin Zhang, Jing Lei, Chaojing Tang.
    In Proceedings of the 30th USENIX Security Symposium (USENIX Security'21) .

  14. Authorization Inconsistency in IoT Third-Party Integration
    Jiongyi Chen, Fenghao Xu, Shuaike Dong, Wei Sun, Kehuan Zhang
    IET Information Security 2021,1–11 (IET Information Security 2021).

  15. Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Deep Learning
    Shuaike Dong, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, Kehuan Zhang
    In Proceedings of the 15th ACM ASIA Conference on Computer and Communications Security (AsiaCCS'20).

  16. CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices
    Li Zhang, Jiongyi Chen, Wenrui Diao, Shanqing Guo, Jian Weng, Kehuan Zhang
    In Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID'19).

  17. Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users
    Jiongyi Chen, Chaoshun Zuo, Wenrui Diao, Shuaike Dong, Qingchuan Zhao, Menghan Sun, Zhiqiang Lin, Yinqian Zhang, and Kehuan Zhang
    In Proceedings of the 49th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'19).

  18. BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals
    Fenghao Xu, Wenrui Diao, Zhou Li, Jiongyi Chen, and Kehuan Zhang
    In Proceedings of the 26th Annual Network and Distributed System Security Symposium (NDSS'19).

  19. Vetting Single Sign-On SDK Implementations via Symbolic Reasoning
    Ronghai Yang, Wing Cheong Lau, Jiongyi Chen, and Kehuan Zhang
    In Proceedings of the 27th USENIX Security Symposium (USENIX Security'18).
    Internet Defense Prize (2nd Runner-up)

  20. IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing
    Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, XiaoFeng Wang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, and Kehuan Zhang
    In Proceedings of the 25th Annual Network and Distributed System Security Symposium (NDSS'18).