About me

I am a postdoc researcher at the Hong Kong University of Science and Technology, supported by the HK RGC Postdoctoral Fellowship Scheme (PDFS).

I obtained my Ph.D. degree supervised by Prof. Shuai Wang at the Department of Computer Science and Engineering, HKUST, in 2023. Before joining HKUST, I received my B.Eng. degree from Nankai University, Tianjin, China in 2019.

My research currently focuses on Reverse Engineering, my research interests include Computer Security and Software Engineering.

Work Experience

Postdoc, Hong Kong University of Science and Technology   Oct 2023 - now

Education

Ph.D., Hong Kong University of Science and Technology   Sept 2019 - Sept 2023

B.E. in Information Security, Nankai University           Sept 2015 - June 2019

Publications

(* corresponding author)

ICSE 2025

Preserving Privacy in Software Composition Analysis: A Study of Technical Solutions and Enhancements
Huaijin Wang, Zhibo Liu*, Yanbo Dai, Shuai Wang, Qiyi Tang, Sen Nie, and Shi Wu.

ICSE 2025

Testing and Understanding Deviation Behaviors in FHE-hardened Machine Learning Models
Yiteng Peng, Daoyuan Wu, Zhibo Liu, Dongwei Xiao, Zhenlan Ji, Juergen Rahmel, and Shuai Wang.

IEEE S&P 2025

CipherSteal: Stealing Input Data from TEE-Shielded Neural Networks with Ciphertext Side Channels
Yuanyuan Yuan, Zhibo Liu, Sen Deng, Ynazuo Chen, Shuai Wang, Yinqian Zhang, and Zhendong Su.
2025 IEEE Symposium on Security and Privacy (SP)

NDSS 2025

MTZK: Testing and Exploring Bugs in Zero-Knowledge (ZK) Compilers
Dongwei Xiao, Zhibo Liu*, Yiteng Peng, and Shuai Wang*
The Network and Distributed System Security Symposium, 2025.

NDSS 2025

Compiled Models, Built-In Exploits: Uncovering Pervasive Bit-Flip Attack Surfaces in DNN Executables
Yanzuo Chen, Zhibo Liu, Yuanyuan Yuan, Sihang Hu, Tianxiang Li, and Shuai Wang
The Network and Distributed System Security Symposium, 2025.

Blackhat Europe 2024

The Devil is in the (Micro-) Architectures: Uncovering New Side-Channel and Bit-Flip Attack Surfaces in DNN Executables
Yanzuo Chen, Zhibo Liu(co-speaker), Yuanyuan Yuan, Tianxiang Li, Sihang Hu, Zhihui Lin, and Shuai Wang

CCS 2024

DeepCache: Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables
Zhibo Liu, Yuanyuan Yuan, Yanzuo Chen, Sihang Hu, Tianxiang Li, and Shuai Wang
The ACM Conference on Computer and Communications Security, 2024.

CCS 2024

HyperTheft: Thieving Model Weights from TEE-Shielded Neural Networks via Ciphertext Side Channels
Yuanyuan Yuan, Zhibo Liu, Sen Deng, Yanzuo Chen, Shuai Wang, Yinqian Zhang, and Zhendong Su
The ACM Conference on Computer and Communications Security, 2024.

Euro S&P 2024

Are We There Yet? Filling the Gap Between ML-Based Binary Similarity Analysis and Binary Software Composition Analysis
Huaijin Wang, Zhibo Liu*, Shuai Wang*, Ying Wang, Qiyi Tang, Sen Nie, Shi Wu
The 9th IEEE European Symposium on Security and Privacy, 2024.

FSE 2024

DTD: Comprehensive and Scalable Testing for Debuggers
Hongyi Lu, Zhibo Liu*, Shuai Wang, and Fengwei Zhang*
The ACM International Conference on the Foundations of Software Engineering, 2024.

FSE 2024

Metamorphic Testing of Secure Multi-Party Computation (MPC) Compilers
Yichen Li, Dongwei Xiao, Zhibo Liu, Qi Pang, and Shuai Wang
The ACM International Conference on the Foundations of Software Engineering, 2024.

TDSC 2024

Evaluating C/C++ Vulnerability Detectability of Query-Based Static Application Security Testing Tools
Zongjie Li, Zhibo Liu, Wai Kin Wong, Pingchuan Ma, and Shuai Wang
IEEE Transactions on Dependable and Secure Computing, 2024.

ASE 2023

PHYFU: Fuzzing Modern Physics Simulation Engines
Dongwei Xiao, Zhibo Liu, Shuai Wang.
the 38th IEEE/ACM International Conference on Automated Software Engineering.
ACM Distinguished Paper Award

Blackhat USA 2023

BTD: Unleashing the Power of Decompilation for x86 Deep Neural Network Executables
Zhibo Liu, Yuanyuan Yuan, Xiaofei Xie, Tianxiang Li, Wenqiang Li, and Shuai Wang.

ISSTA 2023

Exploring Missed Optimizations in WebAssembly Optimizers [Paper]
Zhibo Liu, Dongwei Xiao, Zongjie Li, Shuai Wang, Wei Meng.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis.

ICSE 2023

Metamorphic Shader Fusion for Testing Graphics Shader Compilers
Dongwei Xiao, Zhibo Liu, Shuai Wang.
Proceedings of the 45th International Conference on Software Engineering.

ICSE 2023

CCTEST: Testing and Repairing Code Completion Systems
Zongjie Li, Chaozheng Wang, Zhibo Liu, Haoxuan Wang, Dong Chen, Shuai Wang, Cuiyun Gao.
Proceedings of the 45th International Conference on Software Engineering.

USENIX Sec’23

CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software [Code]
Yuanyuan Yuan, Zhibo Liu, Shuai Wang.
Proceedings of the 32nd USENIX Security Symposium.

USENIX Sec’23

Decompiling x86 Deep Neural Network Executables
[Extended Version] [Code]
Zhibo Liu, Yuanyuan Yuan, Shuai Wang, Xiaofei Xie, Lei Ma.
Proceedings of the 32nd USENIX Security Symposium.
🎉 Artifact Evaluated, Badges: Available, Functional, Reproduced.

TSE 2022

Enhancing DNN-Based Binary Code Function Search With Low-Cost Equivalence Checking [Code]
Huaijin Wang, Pingchuan Ma, Yuanyuan Yuan, Zhibo Liu, Shuai Wang, Qiyi Tang, Sen Nie, Shi Wu.
IEEE Transactions on Software Engineering, 2022.

IEEE T-IFS, 2022

NeuralD: Detecting Indistinguishability Violations of Oblivious RAM with Neural Distinguishers [Code]
Pingchuan Ma, Zhibo Liu, Yuanyuan Yuan, and Shuai Wang.
IEEE Transactions on Information Forensics and Security, 2022.

SIGMETRICS, 2022

Metamorphic Testing of Deep Learning Compilers [Code]
Dongwei Xiao, Zhibo Liu, Yuanyuan Yuan, Qi Pang, and Shuai Wang.
Proceedings of the ACM on Measurement and Analysis of Computing Systems, 2022.

IEEE S&P, 2022

SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications [Artifact]
Zhibo Liu, Yuanyuan Yuan, Shuai Wang, Yuyan Bao.
2022 IEEE Symposium on Security and Privacy (SP)

CCS, 2022

Cache Refinement Type for Side-channel Detection of Cryptographic Software
Ke Jiang, Yuyan Bao, Shuai Wang, Zhibo Liu, Tianwei Zhang.
the 29th ACM Conference on Computer and Communications Security (CCS), 2022

ISSTA, 2020

How far we have come: testing decompilation correctness of C decompilers [Code]
Zhibo Liu, Shuai Wang.
Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis
🎉 Artifact Evaluated, Badges: Functional.

Services

Reviewer:

  • 2023: T-IFS, TDSC

Artifact Evaluation Committee:

  • 2023: USENIX Security, ISSTA
  • 2022: ISSTA, OSDI, USENIX ATC, WiSec

External Reviewer:

  • 2023: IEEE S&P, USENIX Security, ISSTA, NeurIPS, SANER ERA Track
  • 2022: ASE, NDSS BAR, CCS, AsiaCCS
  • 2020: TIFS, ICICS, ICSE SEIP
  • 2019: ICICS

External Artifact Reviewer:

  • 2020: ICSE
  • 2019: SOSP

Teaching

  • Teaching Assistant for COMP 3632: Principles of Cybersecurity (HKUST, Spring 2023)

  • Teaching Assistant for COMP 3632: Principles of Cybersecurity (HKUST, Fall 2020)

  • Teaching Assistant for COMP 3632: Principles of Cybersecurity (HKUST, Spring 2020)

Awards & Honors

2023   HK RGC Postdoctoral Fellowship Scheme (HK$1.2 million over 36 months)

2023   HKUST CSE Best PhD Dissertation Award (2022-23) - Honorable Mention

2023   ACM SIGSOFT Distinguished Paper Award at ASE 2023

2023   Black Hat USA Briefing Speaker

2019-2023   HKUST Postgraduate Studentship

2022   HKUST Research Travel Grant

2022   HKUST RedBird Academic Excellence Award

2019   China National Cyber Security Scholarship

2019   China National College Information Security Contest (CISCN CTF Contest), group second class prize

2018   NKU Gongneng Scholarship

2018   CISCN CTF Contest, group second class prize

2017   ACM/ICPC Asia Regional Urumqi Site Bronze Medal

Misc

The Good, the Bad, and the Bye Bye by Yanick ‘reyammer’ Fratantonio

Latest Updated in November 2024