Profile:
Jinku Liis currently a Professor in theSchool of Cyber EngineeringatXidian University, Xi'an, China. He received the B.S., M.S., and Ph.D. degrees in Computer Science fromXi'an Jiaotong University, Xi'an, China, in 1998, 2001, and 2005, respectively. From Mar. 2009 to Mar. 2011, he was a Research Associate in theDepartment of Computer ScienceatNorth Carolina State University,Raleigh, NC, USA.
Selected Publications:
[24] Hao Xiang, Zehui Cheng,Jinku Li, Jianfeng Ma, and Kangjie Lu. Boosting Practical Control-Flow Integrity with Complete Field Sensitivity and Origin Awareness. To appear in Proceedings of the 31st ACM Conference on Computer and Communications Security (ACM CCS 2024), Salt Lake City, USA, Oct. 2024.
[23] Wenbo Shen, Yifei Wu, Yutian Yang, Qirui Liu, Nanzi Yang,Jinku Li, Kangjie Lu, and Jianfeng Ma. Towards Understanding and Defeating Abstract Resource Attacks for Container Platforms. To appear in IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2024.
[22] Zhuo Chen, Lei Wu, Yubo Hu, Jing Cheng, Yufeng Hu, Yajin Zhou, Zhushou Tang, Yexuan Chen,Jinku Li, and Kui Ren. Lifting The Grey Curtain: Analyzing the Ecosystem of Android Scam Apps. To appear in IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2023.
[21] Ziyi Lin,Jinku Li, Bowen Li, Haoyu Ma, Debin Gao, and Jianfeng Ma. TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis. In Proceedings of the 30th ACM Conference on Computer and Communications Security (ACM CCS 2023), Copenhagen, Denmark, Nov. 2023.
[20] Nanzi Yang, Wenbo Shen,Jinku Li, Xunqi Liu, Xin Guo, and Jianfeng Ma. Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications. In Proceedings of the 30th ACM Conference on Computer and Communications Security (ACM CCS 2023), Copenhagen, Denmark, Nov. 2023.
[19] Boyang Ma, Yilin Yang,Jinku Li, Fengwei Zhang, Wenbo Shen, Yajin Zhou, and Jianfeng Ma. Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery. In Proceedings of the 30th ACM Conference on Computer and Communications Security (ACM CCS 2023), Copenhagen, Denmark, Nov. 2023.
[18] Zhuo Chen, Jie Liu, Yubo Hu, Lei Wu, Yajin Zhou, Yiling He, Xianhao Liao, Ke Wang,Jinku Li, and Zhan Qin. Detecting Underground Economy Apps Based on UTG Similarity. In Proceedings of the 2023 ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023), Seattle, Washington, United States, Jul. 2023.
[17] Jietao Xiao^, Nanzi Yang^, Wenbo Shen,Jinku Li, Xin Guo, Zhiqiang Dong, Fei Xie, and Jianfeng Ma. Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding. In Proceedings of the 32nd USENIX Security Symposium (USENIX Security 2023), Anaheim, CA, USA, Aug. 2023. (^Co-first authors)
[16] Zechao Cai, Jiaxun Zhu, Wenbo Shen, Yutian Yang, Rui Chang, Yu Wang,Jinku Li, and Kui Ren. Demystifying Pointer Authentication on Apple M1. In Proceedings of the 32nd USENIX Security Symposium (USENIX Security 2023), Anaheim, CA, USA, Aug. 2023.
[15] Jun Qiu^, Xuewu Yang^, Huamao Wu, Yajin Zhou,Jinku Li, and Jianfeng Ma. LibCapsule: Complete Confinement of Third-party Libraries in Android Applications. IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2022, 19(5):2873-2889. (^Co-first authors)
[14] Nanzi Yang^, Wenbo Shen^,Jinku Li, Yutian Yang, Kangjie Lu, Jietao Xiao, Tianyu Zhou, Chenggang Qin, Wang Yu, Jianfeng Ma, and Kui Ren. Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization. In Proceedings of the 28th ACM Conference on Computer and Communications Security (ACM CCS 2021), Virtual Conference, Nov. 2021. (^Co-first authors)
[13] Zhongyuan Jiang, Xiaoke Tang, Yong Zeng,Jinku Li, and Jianfeng Ma. Adversarial link deception against the link prediction in complex networks.Physica A: Statistical Mechanics and its Applications, 2021, 577(2021):126074.
[12] Fei Tang, Boyang Ma,Jinku Li, Fengwei Zhang, Jipeng Su, and Jianfeng Ma. RansomSpector: An introspection-based approach to detect crypto ransomware.Computers & Security, 2020, 97(2020):1-14.
[11] Xiaonan Zhu,Jinku Li, Yajin Zhou, and Jianfeng Ma. AdCapsule: Practical Confinement of Advertisements in Android Applications. IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2020, 17(3):479-492.
[10] Zhen Cheng^, Xinrui Hou^, Runhuai Li, Yajin Zhou, Xiapu Luo,Jinku Li, and Kui Ren. Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum. In Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), Beijing, China, Sep. 2019. (^Co-first authors)
[9] Qingsong Yao, Jianfeng Ma, Rui Li, Xinghua Li,Jinku Li, and Jiao Liu, Energy-aware RFID authentication in Edge Computing,IEEE Access, 2019, 7(1):77964-77980.
[8]Jinku Li, Yangtian Ye, Yajin Zhou, and Jianfeng Ma. CodeTracker: A Lightweight Approach to Track and Protect Authorization Codes in SMS Messages.IEEE Access, 2018, 6(1):10107-10120.
[7]Jinku Li, Xiaomeng Tong, Fengwei Zhang, and Jianfeng Ma. FINE-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels. IEEE Transactions on Information Forensics and Security (IEEE TIFS), 2018, 13(6):1535-1550.
[6] Qingsong Yao, Jianfeng Ma, Cong Sun, Xinghua Li, andJinku Li. Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags. In Proceedings of the 3rd ACM Workshop on Mobile Sensing, Computing and Communication (MSCC 2016), Paderborn, Germany, Jul. 2016.
[5] Cong Sun, Ning Xi,Jinku Li, Qingsong Yao, and Jianfeng Ma. Verifying secure interface composition for component-based system designs. In Proceedings of the 21st Asia-Pacific Software Engineering Conference (APSEC 2014), Jeju Island, South Korean, Dec. 2014.
[4]Jinku Li, Zhi Wang, Tyler Bletsch, Deepa Srinivasan, Michael Grace, and Xuxian Jiang. Comprehensive and Efficient Protection of Kernel Control Data. IEEE Transactions on Information Forensics and Security (IEEE TIFS), 2011, 6(4):1404-1417.
[3] Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace,Jinku Li, Deepa Srinivasan, Junghwan Rhee, and Dongyan Xu. DKSM: Subverting Virtual Machine Introspection for Fun and Profit. In Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, India, Oct. 2010.
[2] Michael Grace, Zhi Wang, Deepa Srinivasan,Jinku Li, Xuxian Jiang, Zhenkai Liang, and Siarhei Liakh. Transparent Protection of Commodity OS Kernels using Hardware Virtualization. In Proceedings of the 6th International Conference on Security and Privacy in Communication Networks (SecureComm 2010), Singapore, Sep. 2010.
[1]Jinku Li, Zhi Wang, Xuxian Jiang, Mike Grace, and Sina Bahram. Defeating Return-Oriented Rootkits with "Return-less" Kernels. In Proceedings of the 5th ACM SIGOPS European Conference on Computer Systems (ACM EuroSys 2010), Paris, France, Apr. 2010.
Teaching:
- X2CE1011 - Computing System Security
- CE204017 - Computer Network Principles
- CE204009 - Network Programming
Education Background
Work Experience
Research Focus
- System and software security, cloud computing and its security, AI security, big data and its security.