|
Limin Yang (杨利民)
I am a fifth-year Ph.D. candidate of Computer Science at UIUC.
I focus on machine learning security and explainable AI.
My advisor is Prof. Gang Wang.
I'm on the industry job market! Please email me if you think I'd be a good fit for your team.
Contact: liminy2@illinois.edu
Office: Room 4111, Thomas M. Siebel Center, Urbana, IL 61801.
|
03/10/2023
|
Our Jigsaw Puzzle backdoor attack paper got accepted in IEEE S&P'23 (Oakland).
Another paper also got conditionally accepted. Big thanks to everyone and see you at San Francisco!
|
02/21/2023
|
Just passed my preliminary exam. Thanks all my committee members!
|
08/19/2022
|
Submitted a paper to IEEE S&P (Oakland) 2023! Thanks a lot to my advisor and collaborators!
|
05/23/2022
|
First day at IBM Research (New York) as a visiting scholar.
I work with Muhammed Fatih Bulut and Constantin Adam on network intrusion detection.
|
05/17/2021 |
First day at TikTok (ByteDance) as a Security Engineering Intern (focus: spam detection).
Thanks for the opportunity, Dr. Yu Ding and Dr. Hui Cao!
|
04/09/2021 |
Just passed my qualifier exam. Now I'm officially a Ph.D. candidate!
|
02/24/2021 |
Our paper got accepted to the DLS workshop. We release a new PE malware dataset for ML research [download link].
|
11/30/2020 |
I will be serving as a Shadow PC at Oakland 2021.
|
09/30/2020 |
Our USENIX Security'21 paper got accepted! Thanks for everyone who helped me!
|
Publications
Conference Papers
|
[IEEE S&P'23]
|
Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifier
Limin Yang, Zhi Chen, Jacopo Cortellazzi, Feargus Pendlebury, Kevin Tu, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang
TL;DR: Jigsaw Puzzle backdoor attack can selectively protect one specific malware family but not other malware, leaving smaller footprints and thus bypassing many existing backdoor defense methods.
|
[USENIX Security'21]
|
CADE: Detecting and Explaining Concept Drift Samples for Security Applications
Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, Gang Wang
PDF /
Supplementary PDF /
Code /
Slides /
Video /
Artifact Evaluated
TL;DR: Contrastive learning can help detect drifting samples from previously unseen classes and distance-based explanation can find out why such drifting samples are different from existing classes.
|
[USENIX Security'20]
|
Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines
Shuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, Gang Wang
PDF /
Data /
Artifact Evaluated
TL;DR: How to aggregate VirusTotal labels more properly?
|
[IMC'19]
|
Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines
Peng Peng, Limin Yang, Linhai Song, Gang Wang
PDF /
Data
TL;DR: Control simple phishing sites to see how bad and inconsistent of the URL detection provided by VirusTotal and security vendors' own APIs.
|
[USENIX Security'18]
|
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities
Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, Gang Wang
PDF /
Data
TL;DR: Provide quantitive evidence on the prevalence of missing information in vulnerability reports
and low reproducibility by manually reproduce 368 memory corruption bugs.
|
[GLOBECOM'17]
|
VulDigger: A Just-in-Time and Cost-Aware Tool for Digging Vulnerability-Contributing Changes
Limin Yang, et al.
PDF
TL;DR: Use metadata and heuristics to predict whether a git commit introduced a vulnerability.
|
Journal / Workshop Papers
|
[DLS'21]
|
BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware
Limin Yang, Arridhana Ciptadi, Ihar Laziuk, Ali Ahmadzadeh, Gang Wang
PDF /
Slides /
Data /
Code
TL;DR: We collaborate with Blue Hexagon
to release an open Windows PE malware dataset with timestamped metadata as well as curated malware family labels.
|
[SafeThings'20]
|
A Case Study of the Security Vetting Process of Smart-home Assistant Applications
Hang Hu, Limin Yang, Shihan Lin, Gang Wang
PDF
TL;DR: Verify that replay attack and SQL injection are feasible in Amazon Alexa / Google Home apps.
|
[PPNA'17]
|
Characterizing User Behaviors in Location-based Find-and-Flirt Services: Anonymity and Demographics
Minhui Xue, Limin Yang, Keith W. Ross, Haifeng Qian
PDF
TL;DR: Who used the WeChat "People Nearby" feature more often?
|
IBM Research
|
Visiting Scholar (Research Intern) , New York, US, 05/2022 – 08/2022
Mentors: Dr. Muhammed Fatih Bulut and Dr. Constantin Adam
|
TikTok
|
Security Engineering Intern, California, US, 05/2021 – 08/2021
Mentors: Dr. Dazhuo Li, Dr. Hamed Ashouri, and Dr. Hui Cao
|
Penn State
|
Research Intern, Pennsylvania, US, 09/2017 – 02/2018
Mentors: Dr. Xinyu Xing and Dr. Gang Wang
|
Peking University
|
Exploit Intern, Beijing, China, 07/2015 – 08/2015
Mentors: Dr. Yu Ding and Dr. Xinhui Han.
|
2021 |
CCS Student Conference Grant
|
2017 |
ECNU Graduate Student Overseas Research Scholarship
|
2013-2015 |
ECNU Top-notch Innovative Personnel Training Plan
|
2022 Fall |
CS-463 Computer Security II, UIUC, Teaching Assistant
|
2019 Spring |
CS-4264 Principles of Computer Security, Virginia Tech, Teaching Assistant
|
2018 Fall |
CS-3114 Data Structures and Algorithms, Virginia Tech, Teaching Assistant
|
Oakland'24
|
April 13, August 3, December 6, 2023. San Francisco, CA.
|
USENIX Sec'24
|
June 6, October 17, 2023; February 8, 2024. Philadelphia, PA.
|
CCS'23
|
January 19, May 4, 2023. Copenhagen, Denmark.
|
NDSS'24
|
April 19, June 28, 2023. San Diego, CA.
|
Feel free to steal this website's source code, just add a link back to my website and credit Jon Barron and me. Please remove any code that contains "UA-45384067-2" and "GTM-N2T82H2" as they are my Google Analytic tracking ID and you do not want on your own website.
|
|