网络科学与网络空间研究院

Institute for Network Sciences and Cyberspace

姓名:张超

职称:副教授

电话:+86 10 62603015

邮箱:chaoz@tsinghua.edu.cn

个人主页:http://netsec.ccert.edu.cn/people/chaoz

教育背景

理学学士(数学),北京大学,中国,2004.9-2008.7

理学博士(计算机),北京大学,中国,2008.9-2013.7


工作履历

博士后,UC Berkeley,美国,2013.9-2016.9

副教授,清华大学,中国,2016.11-今

社会兼职

清华大学副教授,博士生导师;
中国科学院·信息工程研究所·客座研究员(客座博导);
中国科学院·软件所·客座研究员;
中国科学院·网络测评技术重点实验室·学术委员会委员;
计算机学会·YOCSEF·委员;
人工智能学会·人工智能与安全专委会·常务委员;
Cybersecurity(Springer)期刊编委;
IEEE S&P,CCS,RAID,ASIACCS等学术会议TPC;

研究领域

软件与系统安全
漏洞、攻防、恶意代码
AI与安全
物联网及区块链等应用安全
软件分析、虚拟化等技术

奖励与荣誉

中国区35岁以下科技创新35人(MIT TR35 China,2018)
求是杰出青年学者(2018)
中国科协“青年人才托举工程”( 2016-2018)
中国计算机学会“青年人才发展计划”(2017)
DARPA CGC 自动化攻防初赛防护第一名(2015),决赛攻击第二名(2016)
Defcon CTF夺旗攻防赛第二名(2016)第五名(2015,2017)
Microsoft BlueHat Prize Contest 特别提名奖(2012)

学术成果

代表性论文:
(1). Yan Wang; Chao Zhang; Xiaobo Xiang; Zixuan Zhao; Wenjie Li; Xiaorui Gong; Bingchang Liu; Kaixiang Chen; Wei Zou, Revery: from Proof-of-Concept to Exploitable (One Step towards Automatic Exploit Generation), ACM Conference on Computer and Communications Security (CCS’18), 2018.10.15-2018.10.19

(2). Binchang Liu; Wei Huo; Chao Zhang; Wenchao Li; Feng Li; Aihua Piao; Wei Zou, αDiff: Cross-Version Binary Code Similarity Detection with DNN, IEEE/ACM Automated Software Engineering (ASE’18), 2018.09.3-2018.9.7

(3). Shuitao Gan; Chao Zhang; Xiaojun Qin; Xuwen Tu; Kang Li; Zhongyu Pei; Zuoning Chen, CollAFL: Coverage Sensitive Fuzzing, IEEE Security & Privacy 2018 (IEEE S&P’18), 2018.5.21-2018.5.23

(4). Xiangkun Jia, Chao Zhang*, Purui Su*, Yi Yang, Huafeng Huang, Dengguo Feng. Towards Efficient Heap Overflow Discovery. In USENIX Security Symposium 2017 (Security’17) 2017.8.16-2017.8.18

(5). Chao Zhang; Scott A. Carr; Tongxin Li; Yu Ding; Chengyu Song; Mathias Payer; Dawn Song, VTrust: Regaining Trust on Virtual Calls, Network and Distributed System Security Symposium (NDSS’16), San Diego, CA, 2016.2.21-2016.2.24

(6). Chao Zhang; Chengyu Song; Kevin Zhijie Chen; Zhaofeng Chen; Dawn Song, VTint: Protecting Virtual Function Tables' Integrity., Network and Distributed System Security (NDSS’15), San Diego, CA, 2015.2.8-2015.2.11

(7). Chengyu Song, Chao Zhang, Tielei Wang, Wenke Lee, David Melski. Exploiting and Protecting Dynamic Code Generation. In the Network and Distributed System Security Symposium (NDSS’15), San Diego, CA, Feb 2015

(8). Chao Zhang, Mehrdad Niknami, Kevin Zhijie Chen, Chengyu Song, Zhaofeng Chen, Dawn Song. JITScope: Protecting Web Users from Control-Flow Hijacking Attacks. In the IEEE Conference on Computer Communications (InfoCom’15), Hong Kong, China, April 2015

(9). Chao Zhang; Tao Wei; Zhaofeng Chen; Lei Duan; Laszlo Szekeres; Stephen McCamant; Dawn Song; Wei Zou, Practical control flow integrity and randomization for binary executables, IEEE Symposium on Security and Privacy (IEEE S&P’13), San Francisco, 2013.5.19-2013.5.22

(10). Shuaifu Dai, Tao Wei, Chao Zhang, Tielei Wang, Yu Ding, Wei Zou, Zhenkai Liang. A Framework to Eliminate Backdoors from Response Computable Authentication. In the 33rd IEEE Symposium on Security and Privacy (IEEE S&P’12), San Francisco, CA, May 2012.