Zichuan Li 李子川


lizic AT iu DOT edu
OR zichuan DOT li AT outlook DOT com

Welcome! I am a 2nd-year Computer Science Ph.D. student at Indiana University Bloomington, advised by Prof. Luyi Xing. Previously, I received my B.Eng. and M.Eng. degree(advised by Prof. Guojun Peng ) from Wuhan University in 2020 and 2023, respectively.

In general, my research area is system and software security. I mainly focus on vulnerability discovery and exploitation, with a broad interest in machine learning security and program analysis techniques. I have done a lot of hacking on IoT devices.

Recently, I am learning programming languages and deep learning :)

GithubTwitterMailTelegramBlogCVCalendar

 

News

[2024-08-23] Spent a wonderful summer with Binja folks! Check out our blog on Binja's UEFI plugin! [2024-05-14] Phoenix acknowledged my report and published a vulnerability fix [link] [2024-04-11] Accepted an offer from Vector 35, and will be working in beautiful Florida this summer! [2023-10-11] Lenovo fixed 16 vulnerabilities I reported. [link] [2023-08-14] Asus acknowledged my name on their product hall of fame :) [link] [2023-08-08] Lenovo patched the vulnerabilities I reported early this year. [link]

Show More

 

Industry Experience

2024.05 ~ 2024.08 Vector35 Inc. Summer Intern
Built and imporved UEFI plugin for Binary Ninja.
Advanced UEFI Analysis with Binary Ninja, The Fallback Type Library
2022.06 ~ 2022.08 OPPO Telecom. Summer Intern
Researched on Android clipboard privacy protection method.

 

Publications

[5] Research on Firmware Vulnerability Discovery Technology Based on Reaching Definition Analysis Runyuan Mei, Yanhao Wang, Zichuan Li, Guojun Peng Journal of Cyber Security, (Accepted)

[4] A Survey on the Evolution of Bootkits Attack and Defense Techniques [pdf] Yilin Zhou, Guojun Peng, Zichuan Li, Side Liu China Communication, 2024, Vol. 21, Issue: (1): 102-130

[3] A Unicorn-Based UEFI DXE Driver Emulation Method [pdf] Fangtao Cao, Jianming Fu, Zichuan Li Journal of Wuhan University (Natural Science Edition), 2023, 69(6): 690-698

[2] EN-Bypass: a security assessment method on e-mail user interface notification [pdf] Jingyi Yuan, Zichuan Li, Guojun Peng Chinese Journal of Network and Information Security, 2023, 9(3): 90-101

[1] Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF [pdf] Xiuzhang Yang, Guojun Peng, Zichuan Li, Yangqi Lv, Side Liu, Chenguang Li Journal on Communications, 2022, Vol. 43 Issue (6)

 

Vulnerability Credits

 

Honors & Awards

05/2023, Outstanding Graduate Student, Wuhan University. 12/2022, 7th at Datacon Data Security Analytics Competition: IoT security Track. ($700) 09/2022, 1st rank scholarship for graduate students at Wuhan University. ($600) 12/2021, 1st at Datacon Data Security Analytics Competition: Email Security Track. ($7000) 09/2021, 1st rank scholarship for graduate students at Wuhan University. ($600) 05/2021, 1st rank scholarship for research excellent at Wuhan University 11/2020, 3rd Prize at Coremail Email Security Competition. ($1500) 09/2019, 3rd Prize at Chinese Information Hiding Competition.

 

Teaching & Services

 

 

 

Copyright © 2024 Built by river-li | Last updated on 2024-09-06.