Home page

Zhichun “ZL” Li, PhD
Department Head
Computer Security Department
NEC Research Labs, USA
Phone: 609-951-2650
Email:
Mail:   4 Independence Way, Suite 200, Princeton, NJ 08540


Ph.D. in Computer Science, Northwestern University (2009)
M.S. in Computer Science and Technology, Tsinghua University (2003)
B.S. in Applied Physics, Tsinghua University (2000)

Research

I have board research interests in security, system, networking, big-data, and AI related areas. In recent years, I lead a group of researchers in NEC Labs, and focus on the Automated Security Intelligence (ASI) project with the goals of using ubiquitous endpoint monitoring, big-data and AI technologies to bring full visibility to the enterprise, to ease the security and system management, and to track down the sophisticated Advanced Persistent Threats (APT). Previously, I also worked on smartphone security, network security, web security, cloud security, social network security, network measurement and distributed system diagnosis.

What’s new

  • We have intern positions for fighting APT with big-data oriented enterprise security for Summer 2017!
  • Our ASI project has won CEATEC 2016 award
  • My patent application “Differential Dependency Tracking for Attack Forensics” has won NEC Excellent Invention Award 2016
  • Our SUPOR paper in USENIX Security 2015 has been selected as top 10 finalists for CSAW Best Paper Award!
  • Won NEC Labs Spot Recognition Award 2012 for the contribution on design and implementation of Dalysis (security vulnerability analysis for mobile apps) as an internal development tool for NEC and subsidiary companies.
  • Our research on social network spam analysis has been featured in Wall Street Journal, MIT Technology Review, and ACM Tech News.
  • I spent the summer of 2008 studying performance bottleneck diagnosis of web services with Ming Zhang, Albert Greenberg and Yi-min Wang at Microsoft Research.
  • I spent the summer of 2006 studying network situational awareness with Vern Paxson at ICSI/UC Berkeley.

Selected Publications – (Click here for full publications)

  • Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, Guofei Jiang, “High Fidelity Data Reduction for Big Data Security Dependency Analyses,” ACM CCS 2016
  • Bo Zong, Xusheng Xiao, Zhichun Li, Zhenyu Wu, Zhiyun Qian, Xifeng Yan, Ambuj K. Singh, and Guofei Jiang, “Behavior Query Discovery in System-Generated Temporal Graphs,” VLDB 2016
  • Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, Guofei Jiang, “SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps,” Usenix Security 2015
  • Kangjie Lu, Zhichun Li, Vasileios Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang, “Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting,” NDSS 2015
  • Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, and Guofei Jiang, “CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities,” ACM CCS 2012
  • Zhichun Li, Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen and Bin Liu, “WebShield: Enabling Various Web Defense Techniques without Client Side Modifications,” NDSS 2011
  • Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, and Ben Y. Zhao, “Detecting and Characterizing Social Spam Campaigns”, ACM IMC 2010
  • Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen, Bin Liu, Junchen Jiang and Yuezhou Lv,”NetShield: Matching with a Large Vulnerability Signature Ruleset for High Performance Network Defense,” ACM SIGCOMM 2010
  • Zhichun Li, Ming Zhang, Zhaosheng Zhu, Yan Chen, Albert Greenberg and Yi-Min Wang, “WebProphet: Automating Performance Prediction for Web Services,” USENIX NSDI 2010
  • Zhichun Li, Manan Sanghi, Yan Chen, Ming-Yang Kao and Brian Chavez, “Hamsa: Fast Signature Generation for Zero-day Polymorphic Worms with Provable Attack Resilience,” IEEE Symposium on Security and Privacy 2006 (Oakland 2006)
  • Yan Gao, Zhichun Li and Yan Chen, “Reverse Hashing for High-speed Network Monitoring: Algorithms, Evaluation, and Applications,” IEEE INFOCOM2006
  • More……

Software (prior joining NEC Labs)

Interns/Students

  • Markus Kusano, Viginia Tech, Summer/2015, Summer/2014
  • Bo Zong, UCSB, Summer/2014
  • Zhang Xu, William & Mary, Summer/2014
  • Terry Ching-Hsiang Hsu, Purdue, Summer/2014
  • Jaewoo Lee, Purdue, Fall 2013
  • Hayawardh Vijayakumar, PSU, Summer/2013
  • Kangjie Lu, Gatech, Summer/2013
  • Masoud Akhoondi, UCR, Summer/2013
  • Jun Wang, the Pennsylvania State University, Fall/2012 (Co-advised with Zhiyun Qian and Zhenyu Wu)
  • Vasileios Kermerlis, Columbia University, Summer/2012
  • Qiang Nguyen, University of Illinois at Urbana-Champaign, Summer/2012
  • Long Lu, Georgia Tech. Intern, Summer/Fall 2011
  • Zhenyu Wu, William & Mary.Intern, Fall 2011 and Spring 2012
  • Hongyu Gao, Northwestern University. Collaborate since 2009
  • Yinzhi Cao, Northwestern University. Collaborate since 2009
  • Vaibhav Rastogi, Northwestern University. Collaborate since 2010

Teaching

Professional Activities

  • Program Committee, 2017 ACM Conference on Computer and Communication Security (CCS)
  • Program Committee, 2015 Network & Distributed System Security Symposium (NDSS)
  • Program Committee, 2015 IEEE INFOCOM
  • Program Committee, 2014 ACM Conference on Computer and Communication Security (CCS)
  • Program Committee, 2014 IEEE CNS (IEEE Conference on Communications and Network Security)
  • Program Committee, 2014 IEEE INFOCOM
  • Program Committee, 2014 ACM Symposium on Information, Computer Communications Security (ASIACCS)
  • Program Committee, 2014 MoST (Mobile Security Technologies Workshop)
  • Program Committee, 2013 International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2013)
  • Program Committee, 2013 IEEE/ACM International Symposium on Quality of Service (IWQoS)
  • Program Committee, 2013 ACM Symposium on Information, Computer Communications Security (ASIACCS)
  • Program Committee, 2013 Network & Distributed System Security Symposium (NDSS)
  • Program Committee, 2013 IEEE INFOCOM
  • Program Committee, 2012 International Conference on Availability, Reliability and Security (AReS)
  • Program Committee, 2012 ACM Symposium on Information, Computer Communications Security (ASIACCS)
  • Program Committee, 2012 WWW (World Wide Web Conference), the “Security, Privacy, Trust, and Abuse” track
  • Program Committee, 2012 IEEE INFOCOM
  • Program Committee, 2012 IEEE International Conference on Computing, Networking and Communications, Cloud Computing and Networking Symposium (ICNC-CLD)
  • Poster Program Committee, 2011 ACM Conference on Computer and Communication Security (CCS)
  • Web Chair, 2011 ACM Conference on Computer and Communication Security (CCS)
  • Program Committee, 2011 IEEE GLOBECOM Next-Generation Networking (NGN) Symposium
  • Program Committee, 2011 IEEE International Workshop on Security in Computers, Networking and Communications (SCNC)
  • Program Committee, 2011 IEEE ICC Next-Generation Networking and Internet Symposium (ICC NGNI 2011)
  • Program Committee, 2010 IEEE International Workshop on Quality of Service (IWQoS 2010)
  • Program Committee, 2010 IEEE GLOBECOM Next-Generation Networking (NGN) Symposium
  • Program Committee, 2010 IEEE Vehicular Technology Conference: VTC2010-Fall
  • Program Committee, 2009 International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2009)

Last Update: Feb 25, 2017