About Me

I am a Ph.D. candidate ( ABD ) have successfully defended my thesis! I am affiliated with The Pennsylvania State University, College of Information Sciences and Technology, Software Systems Security Lab. My research interests are mainly in software security and malware defense, including program analysis and verification for security issues, binary diffing, secure information flow analysis, and malicious binary code analysis.  I am currently working under the supervision of Dr. Dinghao Wu.  I received BS from School of Computer Science, Wuhan University and MEng from School of Software and Microelectronics, Peking University.

s3

I am excited to join CSE Department at The University of Texas at Arlington (UTA), as an assistant professor in the Fall of 2016! I am looking for motivated students who would like to carry on top-notch research while enjoying the life in Texas.  

Please visit my new website.

Publications

Research Papers

  1. [SCAM’16]  Jiang Ming and Dinghao Wu. BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling. In Proceedings of the 16th IEEE International Working Conference on Source Code Analysis and Manipulation, Engineering Track, Raleigh, NC, October 2-3, 2016. (Accepted)  [Code release]
  2. [ASE’16]  Jiang Ming, Dinghao Wu, Jun Wang, Gaoyao Xiao, and Peng Liu. StraightTaint: Decoupled Offline Symbolic Taint Analysis.  In Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, Technical Research Paper, Singapore, Singapore, September 3-7, 2016. (Accepted) (Acceptance ratio 19.1%=57/298)
  3. [ISC’16]  Dongpeng Xu, Jiang Ming, and Dinghao Wu. Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method. In Proceedings of the 19th Information Security Conference, Honolulu, Hawaii, September 7-9, 2016. (Accepted) [Code release]
  4. [JICV] Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, and Bing Mao. Impeding Behavior-based Malware Analysis via Replacement Attacks to Malware Specifications.  Journal of Computer Virology and Hacking Techniques, 2016, DOI: 10.1007/s11416-016-0281-3.
  5. [JICV] Jiang Ming, Dongpeng Xu, and Dinghao Wu. MalwareHunt: Semantics-Based Malware Diffing Speedup by Normalized Basic Block Memoization. Journal of Computer Virology and Hacking Techniques, 2016, DOI: 10.1007/s11416-016-0279-x.
  6. [IEEE TRE] Jiang Ming, Fangfang Zhang, Dinghao Wu, Peng Liu, and Sencun Zhu. Deviation-Based Obfuscation-Resilient Program Equivalence Checking with Application to Software Plagiarism DetectionIEEE Transactions on Reliability, Volume 65 , Issue 4, 2016.
  7. [Euro S&P‘16] Pei Wang, Shuai Wang, Jiang Ming, Yufei Jiang, and Dinghao Wu. Translingual Obfuscation. In Proceedings of the 1st IEEE European Symposium on Security and Privacy, Saarbrücken, GERMANY, March 21-24, 2016. (Acceptance ratio 17.3%=29/168)  [Long version in arXiv]
  8. [CODASPY’16] Gaoyao Xiao, Jun Wang, Peng Liu, Jiang Ming, and Dinghao Wu. Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics. In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy, New Orleans, LA, March 9-11, 2016. (Apcceptance rate 19.1%=22/115)
  9. [ITCon] Yufei Jiang, Nan Yu, Jiang Ming, Sanghoon Lee, Jason DeGraw, John Yen, John I. Messner, and Dinghao Wu. Automatic Building Information Model Query GenerationJournal of Information Technology in Construction (ITCon), Vol. 20, pp. 518-535, 2015.
  10. [ACM CCS’15] Jiang Ming, Dongpeng Xu, Li Wang, Dinghao Wu. LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code.  In Proceedings of the 22nd ACM Conference on Computer and Communications Security, Denver, Colorado, October 12-16, 2015. (Acceptance ratio 19.3%=128/660) [Code release]
  11. [USENIX Security’15] Jiang Ming, DinghaoWu, Gaoyao Xiao, Jun Wang, and Peng Liu. TaintPipe: Pipelined Symbolic Taint Analysis. In Proceedings of the 24th USENIX Security Symposium, Washington, D.C., August 12-14, 2015. (Acceptance ratio 15.7%=67/426)
  12. [ACNS’15] Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, and Bing Mao. Replacement Attacks: Automatically Impeding Behavior-based Malware Specifications. In Proceedings of the 13th International Conference on Applied Cryptography and Network Security, New York, June 2-5, 2015. (Acceptance ratio 21.0%=33/157)
  13. [IFIP SEC’15] Jiang Ming, Dongpeng Xu, and Dinghao Wu. Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference. In Proceedings of the 30th IFIP TC-11 SEC International Information Security and Privacy Conference, Hamburg, Germany, May 26-28, 2015. (Acceptance ratio 19.8%=42/212)
  14. [FSE’14] Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu, and Sencun Zhu. Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software Plagiarism Detection. In Proceedings of the 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering, Hong Kong, China, November 16-22, 2014. (Acceptance ratio 21.8%=61/280) (Distinguished Paper Award Nomination)
  15. [ICISC’12] Jiang Ming, Meng Pan, and Debin Gao. iBinHunt: Binary Hunting with Inter-Procedural Control Flow. In Proceedings of the 15th Annual International Conference on Information Security and Cryptology, Seoul, Korea, November 28-30, 2012. (Acceptance ratio 25.4%=32/126)
  16. [ASCE’12 ] Yufei Jiang, Jiang Ming, Dinghao Wu, John Yen, Prasenjit Mitra, John I. Messner, and Robert Leicht. BIM Server Requirements to Support the Energy Efficient Building Lifecycle. In Proceedings of the 2012 ASCE International Conference on Computing in Civil Engineering, Clearwater Beach, FL, June 17-20, 2012.
  17. [ESORICS’11] Zhi Wang, Jiang Ming, Chunfu Jia, and Debin Gao. Linear Obfuscation to Combat Symbolic Execution. In Proceedings of the 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. (Acceptance ratio 23.2%=36/155) [Test cases]
  18. [NSS’11] Jiang Ming, Haibin Zhang, and Debin Gao. Towards Ground Truthing Observations in Gray-Box Anomaly Detection. In Proceedings of the 5th International Conference on Network and System Security, Milan, Italy, September 6-8, 2011. (Acceptance ratio 22.0%=28/127) [Code release]
  19. [ICICS’09] Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, and Chunfu Jia. Denial-of-Service Attacks on Host-Based Generic Unpackers. In Proceedings of the 11th International Conference on Information and Communications Security, Beijing, China, December 14-17, 2009. (Acceptance ratio 19.1%=31/162) [Code release]

Miscellaneous (Photography)

BstCollegePhoto16 Best of Photography 2015

  1. Jiang Ming, Sunset at lower basin area, Yellowstone NP, Best of Photography 2016, Santa Barbara, CA: Photographer’s Forum, to appear.
  2. Jiang Ming, Sunset Beach After a Rainstorm (photo), Best of College & High School Photography 2016 (page 126), Santa Barbara, CA: Photographer’s Forum, June 2016.
  3. Jiang Ming, Cherry Blossom at Potomac Riverside (photo), Best of Photography 2015 (page 125), Santa Barbara, CA: Photographer’s Forum, December 2015.
  4. Jiang Ming, Penn State Old Main Sunrise (photo), PSU CSSA Homepage Picture, March 2015.
  5. Jiang Ming, Under the Milky Way (photo), Pennsylvania Magazine, Vol. 37, No. 4, Page 31, July 2014.
  6. Jiang Ming, Looking up at the Starry Sky (photo), 2014 Environmental Chemistry and Microbiology Student Symposium Poster Abstracts, Page 9, March 2014.