Jiongyi Chen 陈炯峄


  • I am a lecturer in National University of Defense Technology(国防科技大学).

  • I received my B.Eng. and Ph.D. degrees from the Chinese University of Hong Kong in 2015 and 2019, respectively.

  • I was fortunately advised by Prof. Kehuan Zhang.

  • The vision of my research is to promote vulnerability detection to a new level.

  • Contact: jiongyi[UNDERLINE]chen[WHERE]126[DOT]com

Papers for Open Access

  1. Bin2Summary: Beyond Function Name Prediction in Stripped Binaries with Functionality-specific Code Embeddings
    Zirui Song, Jiongyi Chen, Kehuan Zhang.
    In Proceedings of the ACM International Conference on the Foundations of Software Engineering (FSE'24).

  2. Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing
    Bin Zhang, Jiongyi Chen*, Runhao Li, Chao Feng, Ruilin Li, Chaojing Tang.
    In Proceedings of the 32th USENIX Security Symposium (USENIX Security'23).

  3. HomeSpy: The Invisible Sniffer of Infrared Remote Control of Smart TVs
    Kong Huang, Yutong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang.
    In Proceedings of the 32th USENIX Security Symposium (USENIX Security'23).

  4. Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs
    Runhao Li, Bin Zhang*, Jiongyi Chen*, Wenfeng Lin, Chao Feng, Chaojing Tang.
    In Proceedings of the 30th Annual Network and Distributed System Security Symposium (NDSS'23).

  5. Cast Away: On the Security of DLNA Deployments in the SmartTV Ecosystem
    Guangwei Tian, Jiongyi Chen*, Kailun Yan, Shishuai Yang, and Wenrui Diao*.
    The 22nd International Conference on Software Quality, Reliability and Security (QRS'22).

  6. SEVulDet: A Semantics-Enhanced Learnable Vulnerability Detector
    Zhiquan Tang, Qiao Hu, Yupeng Hu, Wenxin Kuang, Jiongyi Chen.
    In Proceedings of the 52th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'22).

  7. Game of Hide-and-Seek: Exposing Hidden Interfaces in Embedded Web Applications of IoT Devices
    Wei Xie, Jiongyi Chen*, Zhenhua Wang, Chao Feng, Enze Wang, Yifei Gao, Baosheng Wang, Kai Lu.
    In Proceedings of the Web Conference 2022 (WWW'22).

  8. DeFault: Mutual Information-based Crash Triage for Massive Crashes
    Xing Zhang, Jiongyi Chen*, Chao Feng, Ruilin Li, Wenrui Diao, Kehuan Zhang, Jing Lei, Chaojing Tang.
    In Proceedings of the 44th International Conference on Software Engineering (ICSE'22) .

  9. Demystifying Android Non-SDK APIs: A Large-scale Empirical Measurement in the Wild
    Shishuai Yang, Rui Li, Jiongyi Chen, Wenrui Diao, Shanqing Guo
    In Proceedings of the 44th International Conference on Software Engineering (ICSE'22) .

  10. Reducing Test Cases with Attention Mechanism of Neural Networks
    Xing Zhang, Jiongyi Chen*, Chao Feng, Ruilin Li, Yunfei Su, Bin Zhang, Jing Lei, Chaojing Tang.
    In Proceedings of the 30th USENIX Security Symposium (USENIX Security'21) .

  11. Authorization Inconsistency in IoT Third-Party Integration
    Jiongyi Chen, Fenghao Xu, Shuaike Dong, Wei Sun, Kehuan Zhang
    IET Information Security 2021,1–11 (IET Information Security 2021).

  12. Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Deep Learning
    Shuaike Dong, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, Kehuan Zhang
    In Proceedings of the 15th ACM ASIA Conference on Computer and Communications Security (AsiaCCS'20).

  13. CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices
    Li Zhang, Jiongyi Chen, Wenrui Diao, Shanqing Guo, Jian Weng, Kehuan Zhang
    In Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID'19).

  14. Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users
    Jiongyi Chen, Chaoshun Zuo, Wenrui Diao, Shuaike Dong, Qingchuan Zhao, Menghan Sun, Zhiqiang Lin, Yinqian Zhang, and Kehuan Zhang
    In Proceedings of the 49th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'19).

  15. BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals
    Fenghao Xu, Wenrui Diao, Zhou Li, Jiongyi Chen, and Kehuan Zhang
    In Proceedings of the 26th Annual Network and Distributed System Security Symposium (NDSS'19).

  16. Vetting Single Sign-On SDK Implementations via Symbolic Reasoning
    Ronghai Yang, Wing Cheong Lau, Jiongyi Chen, and Kehuan Zhang
    In Proceedings of the 27th USENIX Security Symposium (USENIX Security'18).
    Internet Defense Prize (2nd Runner-up)

  17. IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing
    Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, XiaoFeng Wang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, and Kehuan Zhang
    In Proceedings of the 25th Annual Network and Distributed System Security Symposium (NDSS'18).