Biography
I am currently pursuing a Ph.D. degree at Zhejiang University, under the supervision of Prof. Qinming He.. My research interests include Blockchain and smart contract security, vulnerability mining, fuzzing techniques, and LLM security. Various parts of my work have been published in top-tier journals and conferences such as TSE, TIFS, TKDE, TDSC, ISSTA, WWW, and IJCAI, with more than 10 papers as first/corresponding/co-first author in CCF Class-A ranks, receiving multiple high-citation paper awards and best paper nominations. Google Scholar citations exceed 1,000. Invited reviewer for journals and conferences including TIFS, TOSEM, TNSM, TNSE, and IJCAI.
Publication
Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment. ISSTA 2024
Mufuzz: Sequence-aware mutation and seed mask guidance for blockchain smart contract fuzzing. ICDE 2024
Cross-modality mutual learning for enhancing smart contract vulnerability detection on bytecode. WWW 2023
Demystifying random number in ethereum smart contract: taxonomy, vulnerability identification, and attack detection. TSE 2023
Demystifying Bitcoin address behavior via graph neural networks. ICDE 2023
Rethinking smart contract fuzzing: Fuzzing with invocation ordering and important branch revisiting. TIFS 2023
Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion. IJCAI 2021
Combining Graph Neural Networks with Expert Knowledge for Smart Contract Vulnerability Detection. TKDE 2021
Smart Contract Vulnerability Detection Technique: A Survey. Journal of Software 2021
Smart Contract Vulnerability Detection Using Graph Neural Networks. IJCAI 2020
Intern
Sep, 2023 - Sep, 2024: Research Intern, Ant Group.
Sep - Dec, 2019: Visiting Student, School of Computing, National University of Singapore (NUS).
Awards & Honors
* Dec, 2019: The 6th international conference on cloud computing and intelligence systems (CCIS), IEEE, Best Paper Runner-Up Award
* Dec, 2019: The 16th China Post-Graduate Mathematical Contest in Modeling, Chinese Ministry of Education, Second Prize.
* Nov, 2018: The 8th Asia and Pacific Mathematical Contest in Modeling, APMCM Organizing Committee, Second Prize.
Selected Publications
Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion
Smart contracts hold digital coins worth billions of dollars, their security issues have drawn extensive attention in the past years. Towards smart contract vulnerability detection, conventional methods heavily rely on fixed expert rules, leading to low accuracy and poor scalability. Recent deep learning approaches alleviate this issue but fail to encode useful expert knowledge. In this paper, we explore combining deep learning with expert patterns in an explainable fashion. Specifically, we develop automatic tools to extract expert patterns from the source code. We then cast the code into a semantic graph to extract deep graph features. Thereafter, the global graph feature and local expert patterns are fused to cooperate and approach the final prediction, while yielding their interpretable weights. Experiments are conducted on all available smart contracts with source code in two platforms, Ethereum and VNT Chain. Empirically, our system significantly outperforms state-of-the-art methods. Our code is released.
PDF Code PresentationCombining Graph Neural Networks with Expert Knowledge for Smart Contract Vulnerability Detection
Smart contract vulnerability detection draws extensive attention in recent years due to the substantial losses caused by hacker attacks. Existing efforts for contract security analysis heavily rely on rigid rules defined by experts, which are labor-intensive and non-scalable. More importantly, expert-defined rules tend to be error-prone and suffer the inherent risk of being cheated by crafty attackers. Recent researches focus on the symbolic execution and formal analysis of smart contracts for vulnerability detection, yet to achieve a precise and scalable solution. Although several methods have been proposed to detect vulnerabilities in smart contracts, there is still a lack of effort that considers combining expert-defined security patterns with deep neural networks. In this paper, we explore using graph neural networks and expert knowledge for smart contract vulnerability detection. Specifically, we cast the rich control- and data- flow semantics of the source code into a contract graph. To highlight the critical nodes in the graph, we further design a node elimination phase to normalize the graph. Then, we propose a novel temporal message propagation network to extract the graph feature from the normalized graph, and combine the graph feature with designed expert patterns to yield a final detection system. Extensive experiments are conducted on all the smart contracts that have source code in Ethereum and VNT Chain platforms. Empirical results show significant accuracy improvements over the state-of-the-art methods on three types of vulnerabilities, where the detection accuracy of our method reaches 89.15%, 89.02%, and 83.21% for reentrancy, timestamp dependence, and infinite loop vulnerabilities, respectively.
PDF CodeSmart Contract Vulnerability Detection Using Graph Neural Networks
The security problems of smart contracts have drawn extensive attention due to the enormous financial losses caused by vulnerabilities. Existing methods on smart contract vulnerability detection heavily rely on fixed expert rules, leading to low detection accuracy. In this paper, we explore using graph neural networks (GNNs) for smart contract vulnerability detection. Particularly, we construct a contract graph to represent both syntactic and semantic structures of a smart contract function. To highlight the major nodes, we design an elimination phase to normalize the graph. Then, we propose a degree-free graph convolutional neural network (DR-GCN) and a novel temporal message propagation network (TMP) to learn from the normalized graphs for vulnerability detection. Extensive experiments show that our proposed approach significantly outperforms state-of-the-art methods in detecting three different types of vulnerabilities.
PDF Code Presentation