Shaoyin Cheng(程绍银) Ph.D.,  Associate Professor

Associate Professor, School of Cyber Science and Technology

University of Science and Technology of China


Contact Information

Address: Room 710, Dian San Building, West Campus of USTC, 443 HuangShan Road, Hefei, China, 230027
                Room C309, Discipline Building 1, High-tech Campus of USTC, 100 FuXing Road, Hefei, China, 230031

Phone: +86-551-63601611

E-mail: sycheng@ustc.edu.cn


Short Biography

I was born in Hefei, China, in 1981. I received Ph.D degree from Department of Computer Science and Technology, University of Science and Technology of China in 2009 and B.S. degree form Department of Information Security, University of Science and Technology of China in 2003. Now I works in the School of Cyber Science and Technology of USTC as a faculty(中文个人主页).

Research Interests

  • Software and System Security: Software vulnerability, binary analysis, intelligent system security, information security evaluation

  • Courses

  • Computer Security : Spring 2009 ~ Spring 2024
  • Software Security and Testing : Fall 2013 ~ Fall 2023

  • Selected Publications

  • Xiuwei Shang, Shaoyin Cheng*, Guoqiang Chen, Yanming Zhang, Li Hu, Xiao Yu, Gangyang Li, Weiming Zhang, Nenghai Yu, "How Far Have We Gone in Stripped Binary Code Understanding Using Large Language Models", the 40th IEEE International Conference on Software Maintenance and Evolution (ICSME 2024), Flagstaff, AZ, USA, October 6-11, 2024.
  • Guoqiang Chen, Xiuwei Shang, Shaoyin Cheng*, Yanming Zhang, Weiming Zhang, Nenghai Yu, "FoC: Figure out the Cryptographic Functions in Stripped Binaries with LLMs", arxiv.org/abs/2403.18403, March 2024.
  • Jiaqi Xiong, Guoqiang Chen, Kejiang Chen, Han Gao, Shaoyin Cheng*, Weiming Zhang, "HexT5: Unified Pre-training for Stripped Binary Code Information Inference", The 38th IEEE/ACM International Conference on Automated Software Engineering (ASE 2023), Kirchberg, Luxembourg, September 11-15, 2023.
  • Guoqiang Chen, Han Gao, Jie Zhang, Yanru He, Shaoyin Cheng*, Weiming Zhang, "Investigating Neural-based Function Name Reassignment from the Perspective of Binary Code Representation", The 20th Annual International Conference on Privacy, Security & Trust (PST 2023), Copenhagen, Denmark, August 21-23, 2023.
  • Jiaqi Xiong, Shaoyin Cheng*, Han Gao, Weiming Zhang, "Efficiently Identifying Binary Similarity Based on Deep Hashing and Contrastive Learning", The 8th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA 2023), Chengdu, China, April 26-28, 2023.
  • Zhaoying Wang, Jian Li, Kaiping Xue, Shaoyin Cheng, Nenghai Yu, Qibin Sun, Jun Lu, "An Asynchronous Entanglement Distribution Protocol for Quantum Networks", IEEE Network, vol. 36, no. 5, pp. 40-47, September/October 2022.
  • Han Gao, Shaoyin Cheng*, Yinxing Xue, Weiming Zhang, "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries", The 30th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'21), July 11-17, Online, 2021. Received the ACM SIGSOFT Distinguished Paper Award
  • Han Gao, Shaoyin Cheng*, Weiming Zhang, "GDroid: Android Malware Detection and Classification with Graph Convolutional Network", Computers & Security, Volume 106, July 2021.
  • Shangyu Gu, Shaoyin Cheng, Weiming Zhang, "From Image to Code: Executable Adversarial Examples of Android Applications", 6th International Conference on Computing and Artificial Intelligence (ICCAI'20), April 23-26, 261-268, Virtual, Online, China, 2020.
  • Jinjing Huang, Shaoyin Cheng, Songhao Lou, Fan Jiang, "Image steganography using texture features and GANs", 2019 International Joint Conference on Neural Networks (IJCNN'19) , July 14-19, Budapest, Hungary, 2019.
  • Songhao Lou, Shaoyin Cheng, Jingjing Huang, Fan Jiang, "TFDroid: Android Malware Detection by Topics and Sensitive Data Flows using Machine Learning Techniques", 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT'19), March 14-17, Kahului, HI, United states, 2019.
  • Chong Liu, Shaoyin Cheng, Yuxuan Luo, Fan Jiang, "Behavior Recognition Based on RBAC-Ensemble Model", 11th International Conference on Knowledge and Smart Technology (KST'19), Jan 23-26, Phuket, Thailand, 2019.
  • Yuxuan Luo, Shaoyin Cheng, Chong Liu, Fan Jiang, "PU Learning in Payload-based Web Anomaly Detection", Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC'18), Oct 18-19, Shanghai, China, 2018.
  • Fan Jiang, Cen Zhang, Shaoyin Cheng, "FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability", 22nd Australasian Conference on Information Security and Privacy (ACISP'17), July 3-5, Auckland, New Zealand, 2017.
  • Xin Xu, Jiajie Wang, Shaoyin Cheng, Tao Zhang, Fan Jiang, "Software backdoor analysis based on sensitive flow tracking and concolic execution", Wuhan University Journal of Natural Sciences, October 2016, Volume 21, Issue 5, pp 421–427.
  • Guoyou Sun, Shaoyin Cheng, Fan Jiang, "Strengthen Software-Defined Network in Cloud", 18th IEEE International Conference on High Performance Computing and Communications (HPCC'16), December 12-14, Sydney, Australia, 2016.
  • Liang Cheng, Shaoyin Cheng, Fan Jiang, "ADKAM: A-diversity k-anonymity model via microaggregation", the 11th International Conference on Information Security Practice and Experience (ISPEC'15), May 5-8, 533-547, Beijing, China, 2015.
  • Jiang Fan, Cheng Shaoyin, TTCN-3 Language and Application(TTCN-3语言及应用), Science Press, March 2014.
  • Hui Ye, Shaoyin Cheng, Lanbo Zhang, Fan Jiang, "DroidFuzzer: Fuzzing the Android Apps with Intent-Filter Tag", The 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM'13), Vienna, Austria, December 2-4, 2013.
  • Shaoyin Cheng, Shengmei Luo, Zifeng Li, Wei Wang, Yan Wu, Fan Jiang, "Static Detection of Dangerous Behaviors in Android Apps", The 5th International Symposium on Cyberspace Safety and Security (CSS'13), Zhangjiajie, China, November 13-15, 2013.
  • Xiang li, Shaoyin Cheng, Wenlong Chen, Fan Jiang, "Effective Method for Promoting Viral Marketing in Microblog", ASE/IEEE International Conference on Social Computing(SocialCom'13), Washington DC, USA, September 8-14, 2013.
  • Xiang Li, Shaoyin Cheng, Wenlong Chen, Fan Jiang, "Novel User Influence Measurement Based on User Interaction in Microblog", The 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM'13), Niagara Falls, Canada, August 25-28, 2013.
  • Xing He, Shaoyin Cheng, Wenlong Chen, Fan Jiang, "A Novel Measurement of the Activation Probabilities in Information Diffusion Model", International Conference on Information Society (i-Society'13), University of Toronto, Canada, June 24-26, 2013.
  • Wenlong Chen, Shaoyin Cheng, Xing He, Fan Jiang, "InfluenceRank: An Efficient Social Influence Measurement for Millions of Users in Microblog", The 2nd International Conference on Social Computing and Its Application (SCA'12), Xiangtan, Hunan, China, November 2012.
  • Guangyu Yin, Fan Jiang, Shaoyin Cheng, Xiang Li and Xing He, "AUTrust: A Practical Trust Measurement for Adjacent Users in Social Networks", The 2nd International Conference on Social Computing and Its Application (SCA'12), Xiangtan, Hunan, China, November 2012.
  • Ge Ziyi, CHENG Shaoyin, Jiang Fan, Deng Weifeng, "Research and Analysis of Parasitic Overlay on P2P Network", Journal of Computer Research and Development, Vol. 49, Suppl. 2, p 104-110, September 2012.
  • Shaoyin Cheng, Jun Yang, Jiajie Wang, Jinding Wang, Fan Jiang, "LoongChecker: Practical summary-based semi-simulation to detect vulnerability in binary code", Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'11), Changsha, China, November 2011. Received Best Paper Award
  • Ning Jing, Ming Yang, Shaoyin Cheng, Qunfeng Dong, Hui Xiong, "An Efficient SVM-based Method for Multi-Class Network Traffic Classification", Proceedings of the 30th IEEE International Performance Computing and Communications Conference (IPCCC'11), Orlando, Florida, USA, November 2011.
  • LI Zifeng,CHENG Shaoyin,DENG Weifeng,WANG Jinding,JIANG Fan, "Analysis of Application Layer Protocol Fingerprint Based on Program Invariants", the 4th Conference on Vulnerability Analysis and Risk Assessment (VARA'11), Beijing, China, October 2011.
  • WU Junchang, LUO Peijie, CHENG Shaoyin, WANG Jiajie, JIANG Fan, "Static Analysis of Android Apps Based on Permission classification", the 4th Conference on Vulnerability Analysis and Risk Assessment (VARA'11), Beijing, China, October 2011.
  • Shaoyin Cheng, Jinding Wang, Jiajie Wang, Jun Yang, Fan Jiang, "PDVDS: A Pattern-Driven Software Vulnerability Detection System", Proceedings of the 8th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC'10), Hong Kong SAR, China, December 2010.
  • Jun Xu, Shaoyin Cheng, Jiajie Wang, Zifeng Li, Fan Jiang, "Software Vulnerability Analysis Framework Based On Uniform Intermediate Representation", Proceedings of the 2nd International Conference on Software Technology and Engineering (ICSTE'10), Puerto Rico, USA, October 2010.
  • WANG Jinding,WANG Jiajie,CHENG Shaoyin,JIANG Fan, "Software Vulnerability Detection System Based on Uniform Intermediate Representation", Journal of Tsinghua University, v 50, n SUPPL. 1, p 1502-1507, October 2010.
  • WANG Jiajie, JIANG Fan, CHENG Shaoyin, ZHANG Xiaofei, LIN Jinbin, "Evolution driven on-demand automatic software testing", Journal of University of Science and Technology of China, Vol. 40, No. 5, p 505-512, May 2010.
  • CHENG Shaoyin, JIANG Fan, WANG Jiajie, ZHANG Xiao fei, "A method for automatically generating inputs of software bug", Journal of University of Science and Technology of China, Vol. 40, No. 2, p 191-196, February 2010.
  • CHENG Shaoyin, JIANG Fan, LIN Jinbin, TANG Yanwu, "Automatic verification of possible software doubtful defects", Journal of Tsinghua University, v 49, n SUPPL. 2, p 2222-2227, December 2009.
  • CHENG Shaoyin, Fan Jiang, Jiajie Wang, Tao Zhang, Xuezhi Xing, "DBTG: Demand-Driven Backtracking Test Generation", Proceedings of the 9th International Conference for Young Computer Scientists (ICYCS'08), Zhangjiajie, Hunan, China, November 2008.

  • Projects

  • Key research and development program "Research on evaluation method of quantum key distribution", Sponsored by MOST, 2020-2025, PI-USTC
  • Public Service Platform Project for Industrial Technology Foundation "Research on Data Security of Artificial Intelligence systems", Sponsored by MIIT, 2019-2021, PI-USTC
  • Key research and development program "Research on network Analysis Techniques", Sponsored by MOST, 2016-2019, PI-USTC
  • “Software Security and Testing”, Sponsored by the University Collaborative Research Fund of Intel Corporation, 2012.9-2014.8, PI
  • “Research on Reverse Analysis Method of Private Protocol”, Sponsored by the Specialized Research Fund for the Doctoral Program of Higher Education of China, 2013.1-2014.12, PI
  • “Research and Development of Automatic Analysis of Software Private Communication Protocol”, Sponsored by the Natural Science Foundation of Anhui Province, China, 2012.7-2014.6, PI
  • “Research of Behavior Semantics Analysis of Software Private Communication Protocol”, Sponsored by the Foundation for Young Talents in College of Anhui Province, China, 2012.1-2014.12, PI
  • “Research of Key Technologies for Security Detection of Smartphone Application Store”, Sponsored by the Research Fund of ZTE Corporation, 2011.11-2012.9, PI
  • “Research and Development of Security Analysis System for Binary Executables”, Sponsored by NSFOCUS Corporation, 2010.1-2011.12, PI

  • Honors and Awards

  • 2021, ACM SIGSOFT Distinguished Paper Award in ISSTA 2021
  • 2012, Hewlett-Packard Award for Outstanding Young Teachers of Information Science in USTC
  • 2012, Anhui Provincial Outstanding Young Talent Award
  • 2011, Best Paper Award in TrustCom 2011
  • 2010, Teaching Achievement Award in USTC "Theory teaching and Experiment teaching innovations of Network Security courses for Information Security Major"

  • Useful Links

  • Conferences: ACM; IEEE; USENIX; IACR
  • Most Recent Call for Papers by Grid@HUST
  • The List of International Academic Periodicals and Conferences by CCF
  • Computer Security Conference Ranking and Statistic by Guofei Gu
  • Collected Advice on Research and Writing by Mark Leone
  • Security Resources by Bruno Crispo

  • Last modified: April 5, 2024

    Copyright (C) 2004-2081 sycheng@ustc.edu.cn. All Rights Reserved.