Yu Ding (丁羽)

6th Year Ph.D Candidate
Institute of Computer Science and Technology
Peking University

About

  • I am a 6th year Ph.D candidate of EECS at PKU. Advised by Lenx. My Ph.D supervisor is Prof. Jianguo Xiao.
  • I received my Bachelor degree in Computer Science from Peking University in July 2010.

    Research Interests

    My research interests include software security and system protection.

    Open Source Projects

  • dftwin: high performance dynamic data flow tracking on windows
  • Publications

    1. Accurate and Efficient Exploit Capture and Classification
      Yu Ding, Tao Wei, Hui Xue, Yulong Zhang, Chao Zhang, Xinhui Han
      To appear in Science China Information Science (SCI Journal)
    2. VTrust: Regaining Trust on Virtual Calls
      Chao Zhang, Scott Carr, Tongxin Li, Yu Ding, Chengyu Song, Mathias Payer, Dawn Song
      To appear in the 2016 Network and Distributed System Security Symposium (NDSS)
    3. Classifying Downloaders
      Yu Ding, Liang Guo,Chao Zhang, Yulong Zhang, Hui Xue, Tao Wei, Yuan Zhou, Xinhui Han
      In Proceedings of 36th IEEE Symposium on Security and Privacy (Poster)
    4. SIPD: a practical SDN-based IP spoofing defense method
      Chen Li, Yu Ding, Tongxin Li, Jun Li, Xinhui Han
      In 2016 Distributed Systems Security Symposium (NDSS) (Poster)
    5. PHPGate: A Practical White-Delimiter-Tracking Protection against SQL-Injection for PHP
      Lihua Zhang, Yu Ding, Chao Zhang, Lei Duan, Zhaofeng Chen, Tao Wei, Xinhui Han,
      In Proceedings of 24th USENIX Security Symposium (Poster)
    6. AdHoneyDroid: Capture Malicious Android Advertisements [PDF]
      Dongqi Wang, Shuaifu Dai, Yu Ding, Tongxin Li, Xinhui Han,
      In Proceedings of 21st ACM Conference on Computer and Communications Security (Poster)
    7. Unider: Exploit Attack Emulator Armed with State-of-Art Exploit Techniques (Poster Session) [PDF]
      Yu Ding, Chao Zhang, Tao Wei
      In the Network and Distributed System Security Symposium (NDSS) , San Deigo, CA, Feb 2014.
    8. Android Low Entropy Demystified [PDF]
      Yu Ding, Zhuo Peng, Yuanyuan Zhou, Chao Zhang
      In IEEE International Conference on Communications (ICC) , Sydney, Australia, June 2014.
    9. A Framework to Eliminate Backdoors from Response Computable Authentication. [PDF]
      Shuaifu Dai, Tao Wei, Chao Zhang, Tielei Wang, Yu Ding, Wei Zou, Zhenkai Liang.
      In the 33rd IEEE Symposium on Security and Privacy (Oakland), San Francisco, CA, May 2012.
    10. Heap Taichi: Exploiting Memory Allocation Granularity in Heap-Spraying Attacks. [PDF]
      Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei Zou.
      In the 25th Annual Computer Security Applications Conference (ACSAC), Austin, TX, Dec. 2010.
    11. A Summary of Software Classification/Taxonomy Techniques [PDF]
      Yu Ding, Wei Zou, Tao Wei
      In The 5th Conference on Vulnerability Analysis and Risk Assessment (VARA), Shanghai , China, Dec. 2012
    12. Applying Cloud Computing Techniques in Information Security Research [PDF]
      Wei Zou, Yu Ding, Xinhui Han, Wenhan Yang
      In Communications of the CCF, Vol 8, No. 7, July 2012

    Resources

  • Computer Security Conference Ranking List maintained by Prof. Guofei Gu.
  • Computer Security & Privacy Journal List by Microsoft Academic Search.

    Experience

  • NDSS'13 external reviewer
  • S&P'13 external reviewer
  • AsiaCCS'13 external reviewer
  • Science China Volume F reviewer
  • S&P'16 external reviewer
  • AsiaCCS'16 external reviewer
  • IEEE Transactions on Information Forensics and Security (TIFS) external reviewer
  • IEEE Transactions on Knowledge and Data Engineering (TKDE) external reviewer
  • Software: Practice and Experience (SPE) external reviewer

  • Last update, Dec 29 2015.