I am a Ph.D student in computer science of Georgia Tech (2015 Spring ~ ?). My research intersts are System Security and Programming Language, I am advised by Wenke Lee and Bill Harris.

Before that, I received my Bachelor degree (2013) in software engineering from Nanjing University, and then I played around Android security in Computing Department of HongKong PolyU advised by Xiapu Luo.

 

Selected Papers

  • Hong Hu, Chenxiong Qian, Carter Yagemann, Simon Pak Ho Chung, William R Harris, Taesoo Kim, Wenke Lee, Enforcing Unique Code Target Property for Control-Flow Integrity, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, October, 2018.
  • Wei Meng, Chenxiong Qian, Shuang Hao, Kevin Borgolte, Giovanni Vigna, Christopher Kruegel and Wenke Lee, Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks, Proceedings of The 27th USENIX Security Symposium, August 2018.
  • Meng Xu, Chenxiong Qian, Kangjie Lu, Michael Backes, and Taesoo Kim, Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels, Proceedings of the 39th IEEE Symposium on Security and Privacy (Oakland). San Francisco, CA, May 2018.
  • Chenxiong Qian, Ren Ding, Chengyu Song, Bill Harris, Taesoo Kim, and Wenke Lee, Efficient Protection of Path-Sensitive Control Security, Proceedings of the USENIX Security Symposium (SEC) Vancouver, BC, Canada August, 2017.
  • Yanick Fratantonio, Chenxiong Qian, Pak Chung, and Wenke Lee, Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop, Black Hat USA Las Vegas, NV July, 2017.
  • Yanick Fratantonio, Chenxiong Qian, Pak Chung, and Wenke Lee, Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop, Proceedings of the IEEE Symposium on Security and Privacy (S&P) San Jose, CA May, 2017 (Distinguished Practical Paper Award).
  • Chenxiong Qian, Xiapu Luo, Yu Le, and Guofei Gu, VulHunter: Towards Discovering Vulnerabilities in Android Applications, IEEE Micro, 2014.
  • Yuru Shao, Xiapu Luo, Chenxiong Qian, Pengfei Zhu, and Lei Zhang, Towards a Scalable Resource-driven Approach for Detecting Repackaged Android Applications, Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC), New Orleans, USA, December 2014. [pdf]
  • Chenxiong Qian, Xiapu Luo, Yuru Shao, and Alvin T. S. Chan, On Tracking Information Flows through JNI in Android Apps, Proceedings of the 44th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Atlanta, USA, June, 2014. [pdf] [Source Code]