About me
I am a postdoc researcher at the Hong Kong University of Science and Technology, supported by the HK RGC Postdoctoral Fellowship Scheme (PDFS).
I obtained my Ph.D. degree supervised by Prof. Shuai Wang at the Department of Computer Science and Engineering, HKUST, in 2023. Before joining HKUST, I received my B.Eng. degree from Nankai University, Tianjin, China in 2019.
My research currently focuses on Reverse Engineering, my research interests include Computer Security and Software Engineering.
Work Experience
Postdoc, Hong Kong University of Science and Technology Oct 2023 - now
Education
Ph.D., Hong Kong University of Science and Technology Sept 2019 - Sept 2023
B.E. in Information Security, Nankai University Sept 2015 - June 2019
Publications
(* corresponding author)
ICSE 2025
Preserving Privacy in Software Composition Analysis: A Study of Technical Solutions and Enhancements
Huaijin Wang, Zhibo Liu*, Yanbo Dai, Shuai Wang, Qiyi Tang, Sen Nie, and Shi Wu.
ICSE 2025
Testing and Understanding Deviation Behaviors in FHE-hardened Machine Learning Models
Yiteng Peng, Daoyuan Wu, Zhibo Liu, Dongwei Xiao, Zhenlan Ji, Juergen Rahmel, and Shuai Wang.
IEEE S&P 2025
CipherSteal: Stealing Input Data from TEE-Shielded Neural Networks with Ciphertext Side Channels
Yuanyuan Yuan, Zhibo Liu, Sen Deng, Ynazuo Chen, Shuai Wang, Yinqian Zhang, and Zhendong Su.
2025 IEEE Symposium on Security and Privacy (SP)
NDSS 2025
MTZK: Testing and Exploring Bugs in Zero-Knowledge (ZK) Compilers
Dongwei Xiao, Zhibo Liu*, Yiteng Peng, and Shuai Wang*
The Network and Distributed System Security Symposium, 2025.
NDSS 2025
Compiled Models, Built-In Exploits: Uncovering Pervasive Bit-Flip Attack Surfaces in DNN Executables
Yanzuo Chen, Zhibo Liu, Yuanyuan Yuan, Sihang Hu, Tianxiang Li, and Shuai Wang
The Network and Distributed System Security Symposium, 2025.
Blackhat Europe 2024
The Devil is in the (Micro-) Architectures: Uncovering New Side-Channel and Bit-Flip Attack Surfaces in DNN Executables
Yanzuo Chen, Zhibo Liu(co-speaker), Yuanyuan Yuan, Tianxiang Li, Sihang Hu, Zhihui Lin, and Shuai Wang
CCS 2024
DeepCache: Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables
Zhibo Liu, Yuanyuan Yuan, Yanzuo Chen, Sihang Hu, Tianxiang Li, and Shuai Wang
The ACM Conference on Computer and Communications Security, 2024.
CCS 2024
HyperTheft: Thieving Model Weights from TEE-Shielded Neural Networks via Ciphertext Side Channels
Yuanyuan Yuan, Zhibo Liu, Sen Deng, Yanzuo Chen, Shuai Wang, Yinqian Zhang, and Zhendong Su
The ACM Conference on Computer and Communications Security, 2024.
Euro S&P 2024
Are We There Yet? Filling the Gap Between ML-Based Binary Similarity Analysis and Binary Software Composition Analysis
Huaijin Wang, Zhibo Liu*, Shuai Wang*, Ying Wang, Qiyi Tang, Sen Nie, Shi Wu
The 9th IEEE European Symposium on Security and Privacy, 2024.
FSE 2024
DTD: Comprehensive and Scalable Testing for Debuggers
Hongyi Lu, Zhibo Liu*, Shuai Wang, and Fengwei Zhang*
The ACM International Conference on the Foundations of Software Engineering, 2024.
FSE 2024
Metamorphic Testing of Secure Multi-Party Computation (MPC) Compilers
Yichen Li, Dongwei Xiao, Zhibo Liu, Qi Pang, and Shuai Wang
The ACM International Conference on the Foundations of Software Engineering, 2024.
TDSC 2024
Evaluating C/C++ Vulnerability Detectability of Query-Based Static Application Security Testing Tools
Zongjie Li, Zhibo Liu, Wai Kin Wong, Pingchuan Ma, and Shuai Wang
IEEE Transactions on Dependable and Secure Computing, 2024.
ASE 2023
PHYFU: Fuzzing Modern Physics Simulation Engines
Dongwei Xiao, Zhibo Liu, Shuai Wang.
the 38th IEEE/ACM International Conference on Automated Software Engineering.
ACM Distinguished Paper Award
Blackhat USA 2023
BTD: Unleashing the Power of Decompilation for x86 Deep Neural Network Executables
Zhibo Liu, Yuanyuan Yuan, Xiaofei Xie, Tianxiang Li, Wenqiang Li, and Shuai Wang.
ISSTA 2023
Exploring Missed Optimizations in WebAssembly Optimizers [Paper]
Zhibo Liu, Dongwei Xiao, Zongjie Li, Shuai Wang, Wei Meng.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis.
ICSE 2023
Metamorphic Shader Fusion for Testing Graphics Shader Compilers
Dongwei Xiao, Zhibo Liu, Shuai Wang.
Proceedings of the 45th International Conference on Software Engineering.
ICSE 2023
CCTEST: Testing and Repairing Code Completion Systems
Zongjie Li, Chaozheng Wang, Zhibo Liu, Haoxuan Wang, Dong Chen, Shuai Wang, Cuiyun Gao.
Proceedings of the 45th International Conference on Software Engineering.
USENIX Sec’23
CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software [Code]
Yuanyuan Yuan, Zhibo Liu, Shuai Wang.
Proceedings of the 32nd USENIX Security Symposium.
USENIX Sec’23
Decompiling x86 Deep Neural Network Executables
[Extended Version] [Code]
Zhibo Liu, Yuanyuan Yuan, Shuai Wang, Xiaofei Xie, Lei Ma.
Proceedings of the 32nd USENIX Security Symposium.
🎉 Artifact Evaluated, Badges: Available, Functional, Reproduced.
TSE 2022
Enhancing DNN-Based Binary Code Function Search With Low-Cost Equivalence Checking [Code]
Huaijin Wang, Pingchuan Ma, Yuanyuan Yuan, Zhibo Liu, Shuai Wang, Qiyi Tang, Sen Nie, Shi Wu.
IEEE Transactions on Software Engineering, 2022.
IEEE T-IFS, 2022
NeuralD: Detecting Indistinguishability Violations of Oblivious RAM with Neural Distinguishers [Code]
Pingchuan Ma, Zhibo Liu, Yuanyuan Yuan, and Shuai Wang.
IEEE Transactions on Information Forensics and Security, 2022.
SIGMETRICS, 2022
Metamorphic Testing of Deep Learning Compilers [Code]
Dongwei Xiao, Zhibo Liu, Yuanyuan Yuan, Qi Pang, and Shuai Wang.
Proceedings of the ACM on Measurement and Analysis of Computing Systems, 2022.
IEEE S&P, 2022
SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications [Artifact]
Zhibo Liu, Yuanyuan Yuan, Shuai Wang, Yuyan Bao.
2022 IEEE Symposium on Security and Privacy (SP)
CCS, 2022
Cache Refinement Type for Side-channel Detection of Cryptographic Software
Ke Jiang, Yuyan Bao, Shuai Wang, Zhibo Liu, Tianwei Zhang.
the 29th ACM Conference on Computer and Communications Security (CCS), 2022
ISSTA, 2020
How far we have come: testing decompilation correctness of C decompilers [Code]
Zhibo Liu, Shuai Wang.
Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis
🎉 Artifact Evaluated, Badges: Functional.
Services
Reviewer:
- 2023: T-IFS, TDSC
Artifact Evaluation Committee:
- 2023: USENIX Security, ISSTA
- 2022: ISSTA, OSDI, USENIX ATC, WiSec
External Reviewer:
- 2023: IEEE S&P, USENIX Security, ISSTA, NeurIPS, SANER ERA Track
- 2022: ASE, NDSS BAR, CCS, AsiaCCS
- 2020: TIFS, ICICS, ICSE SEIP
- 2019: ICICS
External Artifact Reviewer:
- 2020: ICSE
- 2019: SOSP
Teaching
Teaching Assistant for COMP 3632: Principles of Cybersecurity (HKUST, Spring 2023)
Teaching Assistant for COMP 3632: Principles of Cybersecurity (HKUST, Fall 2020)
Teaching Assistant for COMP 3632: Principles of Cybersecurity (HKUST, Spring 2020)
Awards & Honors
2023 HK RGC Postdoctoral Fellowship Scheme (HK$1.2 million over 36 months)
2023 HKUST CSE Best PhD Dissertation Award (2022-23) - Honorable Mention
2023 ACM SIGSOFT Distinguished Paper Award at ASE 2023
2023 Black Hat USA Briefing Speaker
2019-2023 HKUST Postgraduate Studentship
2022 HKUST Research Travel Grant
2022 HKUST RedBird Academic Excellence Award
2019 China National Cyber Security Scholarship
2019 China National College Information Security Contest (CISCN CTF Contest), group second class prize
2018 NKU Gongneng Scholarship
2018 CISCN CTF Contest, group second class prize
2017 ACM/ICPC Asia Regional Urumqi Site Bronze Medal
Misc
The Good, the Bad, and the Bye Bye by Yanick ‘reyammer’ Fratantonio
Latest Updated in November 2024