Page Not Found
Page not found. Your pixels are in another canvas.
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Page not found. Your pixels are in another canvas.
This is a page not in th emain menu
This blog is about some tips to install tensorflow and python environment in Windows 10.
This blog is about to replay the process of this data mining competition.
This blog is about some learning experience of adversarial machine learning. Some details of introduction has been published in my CSDN blog.
Published in PRICAI (CCF-C), 2019
This paper is to use non-invertible data transformation to defend adversarial machine learning. Empirical results indicate that our framework provides better robustness compared to state-of-art solutions while having negligible degradation in generalization accuracy.
Recommended citation: Guo W, Mu D, Chen L, et al. Building Adversarial Defense with Non-invertible Data Transformations[C]//Pacific Rim International Conference on Artificial Intelligence. Springer, Cham, 2019: 593-606. http://chenligeng.github.io/files/PRICAI2019.pdf
Published in DSN (CCF-B), acceptance rate 16.5% (48/291), 2020
This paper leverages the context of assembly code to identify and infer the types of variables from stripped binaries, which achieves a high accuracy and beats state-of-art method.
Recommended citation: Chen L, He Z, Mao B. CATI: Context-Assisted Type Inference from Stripped Binaries[C]//2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2020: 88-98. http://chenligeng.github.io/files/DSN2020.pdf
Published in DSN-S (CCF-B), 2020
Closed-source programs lack crucial information vital for code analysis. We locates variables from stripped binaries and infers 19 types from variables. Experiments show that it infers variable type with 71.2% accuracy on unseen binaries.
Recommended citation: Chen L. What Exactly Determines the Type? Inferring Types with Context[C]//2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S). IEEE, 2020: 71-72. http://chenligeng.github.io/files/DSN-S2020.pdf
Published in TrustCom (CCF-C), acceptance rate 30%, 2021
In this paper, we address the problem mentioned above — reproducing the configuration-related vulnerability. We try to solve it by proposing a binary similarity-based method to infer the specific building configurations via the binary from crash report. The main challenges are as follows: precise compilation option inference, program configuration inference, and source-code-to binary matching.
Recommended citation: Chen, Ligeng, et al. "RoBin: Facilitating the Reproduction of Configuration-Related Vulnerability." arXiv preprint arXiv:2110.12989 (2021). http://chenligeng.github.io/files/ROBIN_TrustCom2021.pdf
Published in SANER (CCF-B), ORAL acceptance rate 24.1% (48/199), 2022
In this paper, we conduct a thorough empirical study on the binary’s appearance under various compilation settings and propose a lightweight binary analysis tool based on the simplest machine learning method, called DIComP to infer the compiler and optimization level via most relevant features according to the observation.
Recommended citation: To appear. http://chenligeng.github.io/files/SANER2022_DIComP.pdf
Published in TrustCom (CCF-C), acceptance rate 25% (101/404), 2022
In this paper, we present a fully automatic method for mining the vital tokens (e.g., family, format, behavior) from Anti-Virus labels. Compared with the previous methods,our method employed unsupervised learning and NLP re-ranking methods to extract the most related tokens for the target malware. To highlight, AVMiner can be easily adapted to new kinds of malware families.
Recommended citation: Chen, Ligeng, et al. "AVMiner: Expansible and Semantic-Preserving Anti-Virus Labels Mining Method." arXiv preprint arXiv:2208.14221 (2022). http://chenligeng.github.io/files/AVMiner_2022TrustCom.pdf
Published in QRS (CCF-C), acceptance rate 27.47% (75/273), 2022
In this paper, we propose a lightweight framework to recover function signature, i.e., parameter amount and parameter type, which benefits from input resizing and multi-task learning.
Recommended citation: Qian, Y., Chen, L., Wang, Y., & Mao, B. (2022). Nimbus: Toward Speed Up Function Signature Recovery via Input Resizing and Multi-Task Learning. arXiv preprint arXiv:2211.04219. http://chenligeng.github.io/files/QRS2022_camera_ready_version.pdf
Published in Computers & Security (CCF-B), 2023
In this work, we conduct an in-depth analysis to explore the severity of the malware mislabel issue, and try to rectify the description of malware generated from anti-virus engines. We first propose a malware label correction tool called RecMaL. It employs hybrid analyses for malware label rectifying. According to the thorough exploratory analysis, we figure out the core reasons for mislabeling issues and summarize them into 3 types.
Recommended citation: Yang, W., Gao, M., Chen, L., Liu, Z., & Ying, L. (2023). RecMaL: Rectify the malware family label via hybrid analysis. Computers & Security, 128, 103177. http://chenligeng.github.io/files/RECMAL-publishVersion.pdf
Graduate Student Course, Nanjing University, Department of Computer Science, 2019
I was a teaching assistant for Software Security, given by Professor Bing Mao.
Undergraduate Student Course, Nanjing University, Department of Computer Science, 2019
I was a teaching assistant for Artificial Intelligence, given by Professor Yubin Yang.