(Full version: PDF)

Zhichun "ZL" Li


http://www.zhichunli.org

 
   

Research Interests

My research interests span the areas of security, networking and networked systems with an emphasis on network security, smartphone security, web security, enterprise security with a big-data approach, cloud security, social network security, network measurement and distributed system diagnosis.


Education

2004.08 ― Present Northwestern University, Evanston, IL 60201, USA
Ph.D. in Computer Science (Dec 2009)
Dissertation topic: Router-based Anomaly/Intrusion Detection and Mitigation
Advisor: Prof. Yan Chen
GPA: 4.0/4.0
 
2000.09 ― 2003.07 Tsinghua University, Beijing, P.R. China
M.S. in Computer Science
 
1997.09 ― 2000.07 Tsinghua University, Beijing, P.R. China
B.S. in Applied Physics
Finished the four-year undergraduate program in three years
 

Professional Experience

2010.08 ― Present NEC Research Labs, Princeton, NJ 08536, USA
Research Staff Member in the Robust and Secure Systems group at NEC Research Labs, Princeton
  • Propose and lead the Mobile Application Security project with the goals of designing highly accurate and scalable cloud solutions for filtering the malicious or vulnerable Android apps in different Android markets to improve the security management of smartphone carriers. As the first step, design and build DALYSIS a static analysis framework for off-the-shelf Android apps. Furthermore, design and implement a component hijacking vulnerability checker on top of DALYSIS.
  • Lead the Automated Security Intelligence project, inspired by Sun Tzu’s Military Principles “If you know your enemies and yourself, you can win a hundred battles without a single loss.” Design and Build monitoring agents for hosts in enterprise, which report detailed events related to apps in a light-weight manner. Leverage a big-data back-end to infer the dependencies among apps and derive attack provenance.
2004.08 ― 2010.07 Northwestern University, Evanston, IL 60201, USA
   2009.12 2010.07  Research Associate for Yan Chen, Department of EECS
   2004.08
2009.12 Research Assistant for Yan Chen, Department of EECS

I have worked on many different security and networking projects – all motivated by the need to improve security and robustness of network services on the Internet.

  • Designed the WebShield system, a secure proxy that prevents JavaScript related attacks.
  • Designed the NetShield system which is the first system capable of efficiently matching a large number of vulnerability signatures at high speed.
  • Discovered that P2P address misconfiguration is highly prevalent, and further developed the P2PScope system to diagnose the root causes of such misconfiguration.
  • Designed LESG, a network-based signature generation algorithm for zero-day polymorphic buffer overflow worms with provable attack resilience.
  • Designed Hamsa, a fast content-based signature generator, which has provable attack resilience under reasonable assumptions.
  • Designed reversible sketch, a compact streaming data structure, which is able to record hundreds of thousands of flows while recovering the heavy hitters or heavy changes offline even after temporal/spatial linear aggregation.
  • Designed a sketch-based DoS resilient high-speed intrusion detection system.
2008.06 ― 2008.09 Microsoft Research, Redmond, WA98052, USA
Research Intern mentored by Ming Zhang, Albert Greenberg and Yi-min Wang
  • Designed a timing-perturbation based approach to generate the dependency graphs of complex web 2.0 applications.
  • Proposed a browser model for identifying performance bottlenecks in complex web 2.0 applications, such as Google Map, based on their dependency graphs.
2006.06 ― 2006.09 ICSI Center for Internet Research, Berkeley, CA94704, USA
Research Intern mentored by Vern Paxson (ICSI & UC Berkeley)
  • Investigated the significance of large-scale “botnet probes.” Proposed statistical tests for checking the scan strategies used by botmasters and further designed schemes to extrapolate the global properties of botnet events (e.g., total population and target scope) as inferred from the limited local view of a honeynet.
2003.08 ― 2004.08 Tsinghua University, Beijing P.R. China
Researcher in IP Monitoring and Accounting Group, National Network Center of CERNET
  • Analyzed many real-world anomaly/intrusion cases observed on the national backbone of CERNET.
  • Designed the high speed MonAgent (Monitoring Agent) based on Intel IXP network processors.
2000.3 ― 2003.07 Tsinghua University, Beijing P.R. China
Graduate Research Assistant in IP Monitoring and Accounting Group, CERNET
  • Designed and implemented Linuxflow, a high-performance passive network measurement facility.
  • Designed and implemented the CERNET backbone IP MONitoring system (IPMON) for network monitoring and anomaly detection, which has been used to detect unknown worms and DDoS attacks.

Publications

Book Chapters:
[1] Zhichun Li, Anup Goyal, and Yan Chen, "Honeynet-based Botnet Scan Traffic Analysis," invited book chapter for "Botnet Detection: Countering the Largest Security Threats," Springer-Verlag, 2007.

Papers:
[2] Long Lu (my intern), Zhichun Li, Zhenyu Wu, Wenke Lee, Geoff Jiang, "CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities ," in the proceedings of the ACM CCS, 2012 (80/423=18.9%)

[3] Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Xitan Wen and Yan Chen, " Virtual Browser: a Virtualized Browser to Sandbox Third-party JavaScripts with Enhanced Security," in the proceedings of the ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS), 2012 (35/159=22.0%)

[4] Zhichun Li, Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen and Bin Liu, "WebShield: Enabling Various Web Defense Techniques without Client Side Modifications," in the proceedings of the Annual Network and Distributed System Security Symposium (NDSS), 2011 (28/139=20.1%)

[5] Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, and Ben Y. Zhao, "Detecting and Characterizing Social Spam Campaigns", in the Proceedings of ACM SIGCOMM IMC 2010 (47/211=22.3%).

[6] Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen, Bin Liu, Junchen Jiang and Yuezhou Lv, "NetShield: Matching with a Large Vulnerability Signature Ruleset for High Performance Network Defense," in the Proceedings of ACM SIGCOMM 2010. (33/276=12.0%).

[7] Zhichun Li, Ming Zhang, Zhaosheng Zhu, Yan Chen, Albert Greenberg and Yi-Min Wang, "WebProphet: Automating Performance Prediction for Web Services ," in the Proceedings of USENIX Symposium on Networked Systems Design and Implementation (NSDI) 2010, April 2010 (29/175=16.6%).

[8] Zhichun Li, Anup Goyal, Yan Chen and Aleksandar Kuzmanovic, "Measurement and Diagnosis of Misconfigured Peer-to-Peer Traffic," in the Proceedings of IEEE INFOCOM 2010, March 2010 (276/1575=17.5%).

[9] Zhichun Li, Anup Goyal, Yan Chen and Vern Paxson, "Automating Analysis of Large-Scale Botnet Probing Events," in the Proceedings of the ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS’09), March 2009 (33/147=22.4%).

[10] Zhichun Li, Lanjia Wang, Yan Chen, and Judy Fu, "Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms," in the Proceedings of the IEEE ICNP 2007, October 2007 (32/220=14.5%).

[11] Zhichun Li, Manan Sanghi, Yan Chen, Ming-Yang Kao, and Brian Chavez, "Hamsa: Fast Signature Generation for Zero-day Polymorphic Worms with Provable Attack Resilience," full paper in Proceedings of the IEEE Symposium on Security and Privacy (Oakland), May 2006 (23/251=9.2%).

[12] Zhichun Li, Yan Chen, and Aaron Beach, "Towards Scalable and Robust Distributed Intrusion Alert Fusion with Good Load Balancing," in the Proceedings of ACM SIGCOMM Workshop on Large-Scale Attack Defense (LSAD), September 2006 (11/33=33.3%).

[13] Robert Schweller, Zhichun Li, Yan Chen, Yan Gao, Ashish Gupta, Yin Zhang, Peter Dinda, Ming-Yang Kao, and Gokhan Memik, "Reverse Hashing for High-speed Network Monitoring: Algorithms, Evaluation, and Applications," in the Proceedings of IEEE INFOCOM 2006, April 2006 (252/1400=18.0%).

[14] Yan Gao, Zhichun Li, and Yan Chen, "A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks," in the Proceedings of the 26th International Conference on Distributed Computing Systems (ICDCS), July 2006 (75/536=14.0%).

[15] Pin Ren, Yan Gao, Zhichun Li, Yan Chen and Ben Watson, "IDGraphs: Intrusion Detection and Analysis Using Histographs," in the Proceedings of the IEEE Workshop on Visualization for Computer Security (VizSEC), in conjunction with Visualization 2005 and InfoVis 2005 conferences.

[16] Zhichun Li, Hui Zhang, Yue You, Tao He "Linuxflow: A High Speed Backbone Measurement Facility," in the Proceedings of Passive and Active Measurement Workshop 2003 (PAM2003), La Jolla, California, USA, April, 2003.

[17] Tao He, Xing Li, Jian Qiu, Hui Zhang, Zhichun Li, "Statistical Characteristics of Multicast Traffic on a Nationwide Backbone Network", in the Proceedings of Asia-Pasific Advanced Network, Busan, Korea, August 2003

[18] Tao He, Hui Zhang, Xing Li, Zhichun Li, "A Methodology for Analyzing Backbone Network Traffic at Stream-Level", in the Proceedings of IEEE International Conference on Communication Technology(ICCT2003), Beijing, China, Apr. 2003

Journal Papers:
[19] Zhichun Li, Anup Goyal, Yan Chen and Aleksandar Kuzmanovic, "Measurement and Diagnosis of Address Misconfigured P2P Traffic," in IEEE Network Magazine, Volume. 25, no. 3, May 2011.

[20] Zhichun Li, Anup Goyal, Yan Chen and Vern Paxson, "Towards Situational Awareness of Large-scale Botnet Probing Events," in IEEE Transactions on Information Forensics and Security, volume 6. Issue 1, March 2011.

[21] Zhichun Li, Yan Gao and Yan Chen, "HiFIND, a High-speed Flow-level Intrusion Detection Approach with DoS Resiliency," in Journal of Computer Networks, Volume 54, Issue 8, June 2010 .

[22] Lanjia Wang, Zhichun Li, Yan Chen and Judy Fu, "Thwarting Zero-Day Polymorphic Worms With Network-Level Length-Based Signature Generation," in IEEE/ACM Transactions on Networking, Volume 18, Issue 1, 2010.

[23] Robert Schweller, Zhichun Li, Yan Chen, Yan Gao, Ashish Gupta, Yin Zhang, Peter Dinda, Ming-Yang Kao, and Gokhan Memik, "Reversible sketches: Enabling monitoring and analysis over high-speed data streams," in IEEE/ACM Transactions on Networking, Volume 15, Issue 5, Oct. 2007.

[24] Pin Ren, Yan Gao, Zhichun Li, Yan Chen, and Benjamin Watson, "IDGraphs: Intrusion Detection and Analysis Using Stream Compositing," in IEEE Computer Graphics and Applications, vol. 26, no. 2, pp. 28-39, Mar/Apr, 2006.

[25] Zhichun Li, Hui Zhang, Yue You, Zimu Li, "Design and Implementation of A High Speed Backbone Measurement System" (in Chinese), Journal of Computer Engineering (Chinese) 2002 Vol.29 pp.53-56

Patents:
Zhichun Li, Long Lu, Zhenyu Wu, Guofei Jiang, "Android App Analytics: A Scalable App Vetting Service," filed on Feb 16, 2012, Invention Record No. 11102.

Zhichun Li, Lanjia Wang, Yan Chen, and Zhi Fu, “Method and Apparatus to Facilitate Generating Worm-Detection Signatures Using Data Packet Field Lengths”, filed on December 18, 2007. U.S. Patent Application No. 11/985,760.

Yan Chen, Zhichun Li, Gao Xia and Bin Liu, “Matching with a Large Vulnerability Signature Ruleset for High Performance Network Defense,” provisional patent filed on Aug 20, 2009, U.S. Patent Application No. 12/547,704.

Ming Zhang, Yi-min Wang, Albert Greenberg, and Zhichun Li, “Automating Performance Prediction for Cloud Services,” filed on Sep 17, 2009, U.S. Patent Application No. 12/846,541


Software

NetShield. A software prototype of the NetShield vulnerability signature based intrusion detection system. We intend to build the software prototype of NetShield as a better alternative to the popular open source tool Snort.
(http://www.nshield.org)

Hamsa. A C++ implementation of the Hamsa polymorphic worm signature generator that includes a fast token extraction library and the Hamsa core engine. When given suspicious traffic as input and normal traffic as reference, Hamsa generates the token conjunction signatures for possible worms in the suspicious traffic. Upon the requests from various institutions such as Columbia Univ., UT Austin, Purdue Univ., Georgia Tech and UC Davis, I released the Hamsa system and its related testing polymorphic worms in 2006.
(http://www.zhichunli.org/software/download.php?file=CHamsa-1.0.tar.gz)

RevSketch. A C++ implementation of the k-ary reversible sketch data structure and its heavy key recovery algorithm. RevSketch is capable of recording a large number of flows. It has APIs to combine multiple reversible sketches linearly and then to recover the heavy keys.  (http://www.zhichunli.org/software/download.php?file=RevSketch-1.0.tar.gz)

Linuxflow. A passive network measurement facility which is faster than the standard AF_PACKET in the Linux kernel. It includes a set of Linux kernel modules designed for high-speed networks such as gigabit networks. It provides APIs for users to write packet-filter code and to manipulate packets in Linux kernel space, and also provides capability to send packet information to user-space applications by a socket interface. This tool has been used in the IP Accounting System of CERNET (China Education and Research Network), and has stably run for more than five years.  (http://www.zhichunli.org/linuxflow)


Teaching and Advising Experience


Honors


Professional Activities