Contact

  • Pennsylvania State University
  • Email: zzw169@psu.edu

About

I am a researcher broadly focusing on program analysis, software and system security. In the past, I did some projects to secure software by customizing Linux Kernel, Compiler (GCC, LLVM). Recently, I was trying to solve security problems through program analysis and deep learning.


Education

Pennsylvania State University
Sep. 2019 - Present
Ph.D student in College of Information Science and Technology
Major: Informatics
Advisor: Peng Liu
Nanjing University
Sep. 2016 - Jul.2019
M.S. in Department of Computer Science and Technology, I was very lucky to work with nice professor and group. more
Major: Computer Science and Technology
Advisor: Bing Mao
Penn State University
Feb. 2018 - Sep. 2018
Visting Research Scholar(Research Assistant) in College of Information Science and Technology, Penn State University
 
Zhengzhou University
Sep. 2012 - Jul. 2016
Earned Dachelor's Degree of Computer Science and Technology
- GPA: 3.6/4.0    - Ranking: 1/240

Current Research Interests

-Protecting software by customizing compiler plugin, Linux kernel;
-Adopting program analysis to analyze software defects;
-Leveraging new techniques to facilitate security-oriented program analysis;

Publications

  1. Zhilong Wang, Peng Liu. "GPT Conjecture: Understanding the Trade-offs between Granularity, Performance and Timeliness in Control-Flow Integrity." Cybersecurity, 2021. download
  2. Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou and Qingtian Zou. "Using Deep Learning to Solve Computer Security Challenges: A Survey." Cybersecurity, 2020. download
  3. Zhilong Wang , Xuhua Ding, Chengbin Pang, Jian Guo, Jun Zhu and Bing Mao. "To Detect Stack Buffer Overflow With Polymorphic Canaries." In IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2018. download
  4. Jun Zhu, Weiping Zhou, Zhilong Wang , Dongliang Mu, and Bing Mao. "DiffGuard: Obscuring Sensitive Information in Canary based Protections." In EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 2017. download
  5. Dongliang Mu, Jia Guo, Wenbiao Ding, Zhilong Wang , Bing Mao, and Lei Shi. "ROPOB: Obfuscating Binary Code via Return Oriented Programming." In EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 2017. download

Arxiv Preprints

  1. Zhilong Wang, Haizhou Wang, Hong Hu, and Peng Liu. 2021. "Identifying Non-Control Security-Critical Data in Program Binaries with a Deep Neural Model." arXiv:2108.12071, 2021. download
  2. Zhilong Wang, Li Yu, Suhang Wang, and Peng Liu. 2021. "Spotting Silent Buffer Overflows in Execution Trace through Graph Neural Network Assisted Data Flow Analysis." arXiv:2102.10452, 2021. download

Service Experience

Shadow Program Committee Member

  1. The European Conference on Computer Systems (EuroSys)
    2022

Reviewer

  1. IEEE/IFIP International Conference on Dependable Systems and Networks
    2022
  2. The Journal of Computer Security
    2021

External Reviewer

  1. IEEE/IFIP International Conference on Dependable Systems and Networks
    2021, 2020