avatar

Jiang Ming

[Jiang Ming]

Assistant Professor, Computer Science and Engineering
Last Updated: June 14, 2021
about me

Research Interests

Research Interests
Binary Code Analysis and Verification for Security Issues; Software Virtualization Security;
Hardware-Assisted Malware Analysis;
Mobile Systems Security

Research Keywords

Research Keywords
Software and Systems Security

Teaching Interests

Teaching Interests
Information Security; Advance Software Security Analysis; Practical Malware Analysis

Biography

Biography

Jiang Ming is an assistant professor of Department of Computer Science and Engineering at the University of Texas at Arlington. His research focuses on security, especially software security and malware defense, including secure information flow analysis, software plagiarism detection, malicious binary code analysis, and software analysis for security issues. Jiang Ming has extensive academic and industry experience in computer security. His work has been published in prestigious security and software engineering conferences (IEEE S&P, Usenix Security, CCS, MobiSys, FSE, and ASE). He is among the first to work on symbolic execution based methods for semantics-based binary code diffing. More recently he has been working on automated symbolic security analysis of malicious binary code.

Education

Education

    • 2016 PhD in Computer Science
      Pennsylvania State University
    • 2009 ME in Computer Science
      Peking University
    • 2006 BS in Computer Science
      Wuhan University

Appointments

Appointments

    • 2016 to Present Assistant Professor
      Computer Science and Engineering , University of Texas at Arlington
    • 2008 to Present Intern
      Google China
    • 2008 to Present Intern
      Extreme Blue Program , IBM
    • 2007 to Present Intern
      Intel China Research Center
    • 2007 to Present Intern
      Microsoft Research Asia
    • 2009 to 2011 Research Engineer
      School of Information System, Singapore Management University

Memberships

    • Jan 2016 to Present Association for Computing Machinery
    • Jan 2016 to Present Institute of Electrical and Electronics Engineers

Awards and Honors

    • Apr  2020 UTA Cyber Security Club Won the First Place in Annual ISACA North Texas Case Competition sponsored by Information Systems Audit and Control Association
    • Oct  2017 CSAW 2017 Applied Research Competition Top 10 Finalists sponsored by NYU Tandon School of Engineering
    • Aug  2016 Student Travel Grant sponsored by 32nd International Conference on Software Maintenance and Evolution
    • Sep  2015 Graduate Student Travel Grant sponsored by Penn State College of Information Sciences and Technology
    • Aug  2015 Student Travel Award sponsored by 22nd ACM Conference on Computer and Communications Security
    • Jul  2015 Student Travel Grant sponsored by 24th USENIX Security Symposium
    • May  2015 Student Travel Grant sponsored by 13th International Conference on Applied Cryptography and Network Security
    • Nov  2014 Distinguished Paper Award Nomination sponsored by 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering
    • Sep  2011 Jordan H. Rednor Graduate Fellowship sponsored by Penn State College of Information Sciences and Technology

News Articles

News Articles

    • Nov 2018 University of Texas at Arlington News Center
      UTA computer scientist publishes paper demonstrating highly effective method for detecting packed malware.
    • Aug 2018
      UTA Magazine
      Cyber Superheroes – Recognizing a growing need in Texas and beyond. UTA is working on all fronts to prevent cybersecurity breaches and protect data.
    • May 2018 Rice University News
      With Texas poised to soon receive $23.3 million in federal funding earmarked specifically for improving election security, Rice University computer scientist Dan Wallach and eight academic colleagues in Texas have outlined in a letter to Texas Secretary of State Rolando Pablos and Keith Ingram, director of the Elections Division in the secretary’s office, “reasonable, but critical, measures that Texas must undertake to make its elections more secure and reliable.”
    • Apr 2017
      The Shorthorn
      Trump repeals regulations on internet service providers

Support & Funding

Support & Funding

This data is entered manually by the author of the profile and may duplicate data in the Sponsored Projects section.
    • May 2019 to Apr 2022 CRII: SaTC: Towards Paving the Way for Large-Scale Malware Analysis: New Directions in Generic Binary Unpacking sponsored by  -  $174998
      Jiang Ming (Funded)

Publications


      2020
      • Journal Article
        Layered Obfuscation: A Taxonomy of Software Obfuscation Techniques for Layered Security, Journal of Cybersecurity, Volume 3, Article number 9
        Journal of Cybersecurity, Volume 3, Article number 9
        [Xu, Hui , Zhou, Yangfan , Ming, Jiang , Lyu, Michael].

      2018
      • Journal Article
        Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device
        Wireless Communications and Mobile Computing
        [Wang, Dong , Zhang, Xiaosong, Ming, Jiang, Chen, Ting , Wang, Chao , Niu, Weina, ]. Wireless Communications and Mobile Computing.

      2017
      • Journal Article
        Impeding behavior-based malware analysis via replacement attacks to malware specifications
        Journal of Computer Virology and Hacking Techniques
        [Ming, Jiang, Xin, Zhi, Lan, Pengwei, Wu, Dinghao, Liu, Peng, Mao, Bing]. Journal of Computer Virology and Hacking Techniques. 13(3), 193-207. DOI: http://dx.doi.org/10.1007/s11416-016-0281-3
      • Journal Article
        MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization
        Journal of Computer Virology and Hacking Techniques
        [Ming, Jiang, Xu, Dongpeng, Wu, Dinghao]. Journal of Computer Virology and Hacking Techniques. 13(3), 167-178. DOI: http://dx.doi.org/10.1007/s11416-016-0279-x
      • Journal Article
        Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection
        IEEE Transactions on Software Engineering
        [Luo, Lannan, Ming, Jiang, Wu, Dinghao, Liu, Peng, Zhu, Sencun]. IEEE Transactions on Software Engineering. DOI: http://dx.doi.org/10.1109/tse.2017.2655046

      2016
      • Journal Article
        Deviation-based obfuscation-resilient program equivalence checking with application to software plagiarism detection
        IEEE Transactions on Reliability
        [Ming, Jiang, Zhang, Fangfang, Wu, Dinghao, Liu, Peng, Zhu, Sencun]. IEEE Transactions on Reliability / Professional Technical Group on Reliability. 65(4), 1647-1664. DOI: http://dx.doi.org/10.1109/tr.2016.2570554

      2015
      • Journal Article
        Automatic building information model query generation
        Journal of Information Technology in Construction
        [Jiang, Yufei, Yu, Nan, Ming, Jiang, Lee, Sanghoon, DeGraw, Jason, Yen, John, Messner, JohnI., Wu, Dinghao].

      2020
      • Conference Proceeding
        Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation
        In Proceedings of the 36th Annual Computer Security Applications Conference (ACSAC'20) (Acceptance ratio 23.2%=70/302)
        [Cao, Chen , Guan, Le, Ming, Jiang, Liu, Peng ].
      • Conference Proceeding
        PatchScope: Memory Object Centric Patch Diffing
        In Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS'20) (Acceptance ratio 16.9%=121/715)
        [Zhao, Lei , Zhu, Yuncong, Ming, Jiang, Zhang, Yichen, Zhang, Haotian, Yin, Heng].
      • Conference Proceeding
        VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization’s Clothing
        In Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS'20) (Acceptance ratio 16.9%=121/715)
        [Shi, Luman , Ming, Jiang, Fu, Jianming, Peng, Guojun, Xu, Dongpeng, Gao, Kun, Pan, Xuanchen].

      In Process
      • Conference Proceeding
        LuaHunt: Generic Reverse Engineering of Obfuscated Lua Bytecode via Interpreter Semantics Testing
        [Luo, Chengke, Ming, Jiang, Fu, Jianming, Peng, Guojun ]. Submitted.
      • Conference Proceeding
        One Size Does Not Fit All: Shared Library Static Debloating for MIPS Firmware
        [Zhan, Haotian , Lei, Yu , Ming, Jiang]. Submitted.
      • Conference Proceeding
        Security Risk Assessment for High Performance Computing Systems
        [Leal, Erika, Ming, Jiang]. Submitted.
      • Conference Proceeding
        Testing and Boosting SMT Solver Performance on Mixed-Bitwise-Arithmetic Expressions
        [Liu , Binbin , Feng, Weijie , Ming, Jiang , Yu , Qiaoyan , Zheng, Qilong , Li, Jing , Xu, Dongpeng ]. Submitted.
      • Conference Proceeding
        Unleashing the Hidden Power of Compiler Optimization on Binary Code Difference: An Empirical Study
        [Ren, Xiaolei , Ho, Michael, Ming, Jiang , Lei, Yu ]. Submitted.
      • Conference Proceeding
        Extracting Executable Payloads From Packed Malware: Import Table Reconstruction via Hardware-Assisted API Micro Execution
        To appear in the 30th USENIX Security Symposium (USENIX Security'21)
        [Cheng, Binlin , Ming, Jiang , Leal, Erika, Zhang, Haotian, Fu, Jianming , Peng, Guojun , Marion, Jean-Yves ]. Accepted.
      • Conference Proceeding
        MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation
        To appear in the 30th USENIX Security Symposium (USENIX Security'21)
        [Liu, Binbin , Shen, Junfu , Ming, Jiang , Zheng, Qilong , Li, Jing, Xu, Dongpeng ]. Accepted.
      • Conference Proceeding
        Toward Anti-Evasion OS-Level Android Sandboxing via Container-Based Virtualization
        [Song, Wenna , Ming, Jiang , Jiang, Lin , Xiang, Yi , Fu, Jianming , Peng, Guojun ]. Submitted.
      • Conference Proceeding
        A Device-agnostic Zigbee Protocol Simulation Platform with Applications to Fuzzing
        [Ren, Mengfei , Ren, Xiaolei , Feng, Huadong , Ming, Jiang , Lei, Yu ]. Submitted.
      • Conference Proceeding
        App's Auto-Login Function Security Testing via Android OS-Level Virtualization
        [Song, Wenna , Ming, Jiang , Jiang, Lin , Yan, Han , Xiang, Yi , Chen, Yuan , Fu , Jianming , Peng, Guojun ]. Submitted.
      • Conference Proceeding
        Capturing Invalid Input Manipulations for Memory Corruption Diagnosis
        [Zhao, Lei , Jiang, Keyang , Zhu, Yuncong , Zhao, Yiru , Ming, Jiang ]. Submitted.

      2019
      • Conference Proceeding
        Capturing the Persistence of Facial Expression Features for Deepfake Video Detection
        In Proceedings of the 21st International Conference on Information and Communications Security (ICICS'19) (Acceptance ratio 24%=48/199)
        [Zhao, Yiru, Ge, Wanfeng, Li, Wenxin, Wang, Run, Zhao, Lei , Ming, Jiang].
      • Conference Proceeding
        Towards Taming Malware Mutation via Studying the Evolution of Metamorphic Virus
        3rd International Workshop on Software PROtection
        [Wang, Li, Xu, Dongpeng, Ming, Jiang, Fu, Yu, Wu, Dinghao].
      • Conference Proceeding
        "Jekyll and Hyde" is Risky: Shared-Everything Threat Mitigation in Dual-Instance Apps
        In Proceedings of the 17th ACM International Conference on Mobile Systems, Applications, and Services
        [Shi, Luman , Fu, Jianming, Guo, Zhengwei , Ming, Jiang, ].

      2018
      • Conference Proceeding
        StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification
        In Proceedings of the 34th Annual Computer Security Applications Conference
        [Junaid, Mohsin , Ming, Jiang, Kung, DavidC, ].
      • Conference Proceeding
        Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost
        In Proceedings of the 25th ACM Conference on Computer and Communications Security
        [Cheng, Binlin, Ming, Jiang, Fu, Jianming , Peng, Guojun, Chen, Ting, Zhang, Xiaosong , Marion, Jean-Yves, ].
      • Conference Proceeding
        VMHunt: A Verifiable Approach to Partial-Virtualized Binary Code Simplification
        In Proceedings of the 25th ACM Conference on Computer and Communications Security
        [Xu, Dongpeng, Ming, Jiang, Fu, Yu, Wu, Dinghao , ].
      • Conference Proceeding
        Towards Predicting Efficient and Anonymous Tor Circuits
        In Proceedings of the 27th USENIX Security Symposium
        [Barton, Armon, Imani, Mohsen, Ming, Jiang, Wright, Matthew, ].
      • Conference Proceeding
        Cracking IoT Device User Account via Brute-force Attack to SMS Authentication Code
        In 1st Radical and Experiential Security Workshop
        [Wang, Dong, Ming, Jiang, Chen, Ting, Wang, Chao , Zhang, Xiaosong , ].

      2017
      • Conference Proceeding
        BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking
        In Proceedings of the 26th USENIX Security Symposium
        [Ming, Jiang, Xu, Dongpeng, Jiang, Yufei, Wu, Dinghao].
      • Conference Proceeding
        Countering Double-Spend Attacks on Bitcoin Fast-Pay Transactions
        In Workshop on Technology and Consumer Protection
        [Podolanko, JohnP., Ming, Jiang, Wright, Matthew].
      • Conference Proceeding
        Cryptographic function detection in obfuscated binaries via bit-precise symbolic loop mapping
        2017 IEEE Symposium on Security and Privacy
        [Xu, Dongpeng, Ming, Jiang, Wu, Dinghao]. 921-937. "IEEE". DOI: http://dx.doi.org/10.1109/sp.2017.56

      2016
      • Conference Proceeding
        BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling
        Source Code Analysis and Manipulation (SCAM), 2016 IEEE 16th International Working Conference on
        [Ming, Jiang, Wu, Dinghao]. 61-66. "IEEE". DOI: http://dx.doi.org/10.1109/SCAM.2016.21
      • Conference Proceeding
        Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method
        International Conference on Information Security
        [Xu, Dongpeng, Ming, Jiang, Wu, Dinghao]. 323-342. "Springer". DOI: http://dx.doi.org/10.1007/978-3-319-45871-7_20
      • Conference Proceeding
        StraightTaint: Decoupled offline symbolic taint analysis
        Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering
        [Ming, Jiang, Wu, Dinghao, Wang, Jun, Xiao, Gaoyao, Liu, Peng]. 308-319. "ACM". DOI: http://dx.doi.org/10.1145/2970276.2970299
      • Conference Proceeding
        Translingual obfuscation
        Security and Privacy (EuroS&P), 2016 IEEE European Symposium on
        [Wang, Pei, Wang, Shuai, Ming, Jiang, Jiang, Yufei, Wu, Dinghao]. 128-144. "IEEE". DOI: http://dx.doi.org/10.1109/eurosp.2016.21
      • Conference Proceeding
        Program-object level data flow analysis with applications to data leakage and contamination forensics
        Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy
        [Xiao, Gaoyao, Wang, Jun, Liu, Peng, Ming, Jiang, Wu, Dinghao]. 277-284. "ACM". DOI: http://dx.doi.org/10.1145/2857705.2857747

      2015
      • Conference Proceeding
        LOOP: Logic-oriented opaque predicate detection in obfuscated binary code
        Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
        [Ming, Jiang, Xu, Dongpeng, Li Wang, Wu, Dinghao]. 757-768. "ACM". DOI: http://dx.doi.org/10.1145/2810103.2813617
      • Conference Proceeding
        TaintPipe: Pipelined Symbolic Taint Analysis.
        USENIX Security Symposium
        [Ming, Jiang, Wu, Dinghao, Xiao, Gaoyao, Wang, Jun, Liu, Peng]. 65-80.
      • Conference Proceeding
        Replacement attacks: automatically impeding behavior-based malware specifications
        International Conference on Applied Cryptography and Network Security
        [Ming, Jiang, Xin, Zhi, Lan, Pengwei, Wu, Dinghao, Liu, Peng, Mao, Bing]. 497-517. "Springer". DOI: http://dx.doi.org/10.1007/978-3-319-28166-7_24
      • Conference Proceeding
        Memoized semantics-based binary diffing with application to malware lineage inference
        IFIP International Information Security Conference
        [Ming, Jiang, Xu, Dongpeng, Wu, Dinghao]. 416-430. "Springer". DOI: http://dx.doi.org/10.1007/978-3-319-18467-8_28

      2014
      • Conference Proceeding
        Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection
        Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering
        [Luo, Lannan, Ming, Jiang, Wu, Dinghao, Liu, Peng, Zhu, Sencun]. 389-400. "ACM". DOI: http://dx.doi.org/10.1109/tse.2017.2655046

      2012
      • Conference Proceeding
        iBinHunt: Binary hunting with inter-procedural control flow
        International Conference on Information Security and Cryptology
        [Ming, Jiang, Pan, Meng, Gao, Debin]. 92-109. "Springer". DOI: http://dx.doi.org/10.1007/978-3-642-37682-5_8
      • Conference Proceeding
        BIM server requirements to support the energy efficient building lifecycle
        In Proceedings of the 2012 ASCE International Conference on Computing in Civil Engineering
        [Jiang, Yufei, Ming, Jiang, Wu, Dinghao, Yen, John, Mitra, Prasenjit, Messner, JohnI., Leicht, Robert]. 365-372. DOI: http://dx.doi.org/10.1061/9780784412343.0046

      2011
      • Conference Proceeding
        Linear obfuscation to combat symbolic execution
        In Proceedings of the 16th European Symposium on Research in Computer Security
        [Wang, Zhi, Ming, Jiang, Jia, Chunfu, Gao, Debin]. 210-226. DOI: http://dx.doi.org/10.1007/978-3-642-23822-2_12
      • Conference Proceeding
        Towards ground truthing observations in gray-box anomaly detection
        Network and System Security (NSS), 2011 5th International Conference on
        [Ming, Jiang, Zhang, Haibin, Gao, Debin]. 25-32. "IEEE". DOI: http://dx.doi.org/10.1109/icnss.2011.6059956

      2009
      • Conference Proceeding
        Denial-of-Service Attacks on Host-Based Generic Unpackers.
        In Proceedings of the 11th International Conference on Information and Communications Security
        [Liu, Limin, Ming, Jiang, Wang, Zhi, Gao, Debin, Jia, Chunfu]. 241-253. "Springer". DOI: http://dx.doi.org/10.1007/978-3-642-11145-7_19

Students Supervised

    • Present
      Dissertation Committee Chair
      (Computer Science and Engineer)
    • Present
      Dissertation Committee Co-Chair
      (Computer Science and Engineer)
    • May 2020
      Undergraduate Supervised Research
      Silvia Chapa,
      Code Obfuscation Study Using Obfuscator-LLVM
    • Apr 2020
      Doctoral Comprehensive Exam Committee Member
      Rodrigo Augusto Silva Dos Santos, (Computer Science and Engineer)
    • Aug 2019
      Dissertation Committee Member
      (Computer Science and Engineer)
    • May 2019
      Master's Thesis Committee Chair
      John Podolanko , (Computer Science and Engineer)
      Effective Crypto Ransomware Detection Using Hardware Performance Counters
    • Dec 2018
      Master's Thesis Committee Chair
      Jay Mayank Patel, (Computer Science and Engineer)
      On the feasibility of binary unpacking with hardware performance counters
    • Dec 2018
      Dissertation Committee Chair
      Armon Barton , (Computer Science and Engineer)
      Defending Neural Networks Against Adversarial Examples
    • July 2018
      Master's Thesis Committee Chair
      Anchal Raheja, (Computer Science and Engineer)
      Malware Early-stage Detection Using Machine learning on Hardware Performance Counters
    • Dec 2017
      Master's Thesis Committee Chair
      Ashwini Balkrushna Kardile, (Computer Science and Engineer)
      Crypto-ransomware Analysis and Detection using Process Monitor
    • July 2017
      Dissertation Committee Co-Chair
      Mohsin Junaid, (Computer Science and Engineer)
      Stateful Detection of Malicious Behaviors in Android Apps

Courses

      • CSE 4380-001 INFORMATION SECURITY
        (Course Id: 111686)
        Spring - Regular Academic Session - 2021 Download Syllabus
      • CSE 4380-002 INFORMATION SECURITY
        (Course Id: 111686)
        Spring - Regular Academic Session - 2021
      • CSE 4380-003 INFORMATION SECURITY
        (Course Id: 111686)
        Spring - Regular Academic Session - 2021
      • CSE 5380-001 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2021
      • CSE 5380-002 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2021
      • CSE 5380-003 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2021
      • CSE 6397-006 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102609)
        Spring - Regular Academic Session - 2021
      • CSE 6997-006 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102618)
        Spring - Regular Academic Session - 2021
      • CSE 5380-001 INFORMATION SECURITY 1
        (Course Id: 111054)
        Fall - Regular Academic Session - 2020 Download Syllabus
      • CSE 5380-002 INFORMATION SECURITY 1
        (Course Id: 111054)
        Fall - Regular Academic Session - 2020
      • CSE 6397-006 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102609)
        Fall - Regular Academic Session - 2020
      • CSE 6697-006 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102614)
        Fall - Regular Academic Session - 2020
      • CSE 6997-006 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102618)
        Fall - Regular Academic Session - 2020
      • CSE 4380-001 INFORMATION SECURITY
        (Course Id: 111686)
        Spring - Regular Academic Session - 2020 Download Syllabus
      • CSE 4380-002 INFORMATION SECURITY
        (Course Id: 111686)
        Spring - Regular Academic Session - 2020
      • CSE 4380-003 INFORMATION SECURITY
        (Course Id: 111686)
        Spring - Regular Academic Session - 2020
      • CSE 5380-001 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2020 Download Syllabus
      • CSE 5380-002 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2020
      • CSE 5380-003 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2020
      • CSE 6397-006 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102609)
        Spring - Regular Academic Session - 2020
      • CSE 6997-006 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102618)
        Spring - Regular Academic Session - 2020
      • CSE 5380-001 INFORMATION SECURITY 1
        (Course Id: 111054)
        Fall - Regular Academic Session - 2019 Download Syllabus
      • CSE 5380-002 INFORMATION SECURITY 1
        (Course Id: 111054)
        Fall - Regular Academic Session - 2019
      • CSE 6397-006 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102609)
        Fall - Regular Academic Session - 2019
      • CSE 6997-006 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102618)
        Fall - Regular Academic Session - 2019
      • CSE 4380-001 INFORMATION SECURITY
        (Course Id: 111686)
        Spring - Regular Academic Session - 2019 Download Syllabus
      • CSE 4380-002 INFORMATION SECURITY
        (Course Id: 111686)
        Spring - Regular Academic Session - 2019
      • CSE 4380-003 INFORMATION SECURITY
        (Course Id: 111686)
        Spring - Regular Academic Session - 2019
      • CSE 4380-004 INFORMATION SECURITY
        (Course Id: 111686)
        Spring - Regular Academic Session - 2019
      • CSE 5380-001 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2019 Download Syllabus
      • CSE 5380-002 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2019
      • CSE 5380-003 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2019
      • CSE 5380-004 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2019
      • CSE 5698-006 MASTER'S THESIS II
        (Course Id: 102571)
        Spring - Regular Academic Session - 2019
      • CSE 6397-006 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102609)
        Spring - Regular Academic Session - 2019
      • CSE 6388-001 SPEC TOPS ADV INFO SECURITY
        (Topic: Practical Malware Analysis | Course Id: 110981)
        Spring - Regular Academic Session - 2019 Download Syllabus
      • CSE 6699-006 DISSERTATION
        (Course Id: 102615)
        Fall - Regular Academic Session - 2018
      • CSE 5380-001 INFORMATION SECURITY 1
        (Course Id: 111054)
        Fall - Regular Academic Session - 2018
      • CSE 5380-002 INFORMATION SECURITY 1
        (Course Id: 111054)
        Fall - Regular Academic Session - 2018
      • CSE 5698-006 MASTER'S THESIS II
        (Course Id: 102571)
        Fall - Regular Academic Session - 2018
      • CSE 6397-006 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102609)
        Fall - Regular Academic Session - 2018
      • CSE 6699-006 DISSERTATION
        (Course Id: 102615)
        Summer - Eleven Week - 2018
      • CSE 4391-007 INDIVIDUAL PROJECTS
        (Course Id: 102488)
        Summer - Eleven Week - 2018
      • CSE 5698-006 MASTER'S THESIS II
        (Course Id: 102571)
        Summer - Eleven Week - 2018
      • CSE 6699-006 DISSERTATION
        (Course Id: 102615)
        Spring - Regular Academic Session - 2018
      • CSE 4391-007 INDIVIDUAL PROJECTS
        (Course Id: 102488)
        Spring - Regular Academic Session - 2018
      • CSE 5380-001 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2018 Download Syllabus
      • CSE 5380-002 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2018 Download Syllabus
      • CSE 5380-003 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2018 Download Syllabus
      • CSE 5380-004 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2018 Download Syllabus
      • CSE 5398-006 MASTER'S THESIS I
        (Course Id: 102566)
        Spring - Regular Academic Session - 2018
      • CSE 5698-006 MASTER'S THESIS II
        (Course Id: 102571)
        Spring - Regular Academic Session - 2018
      • CSE 6397-006 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102609)
        Spring - Regular Academic Session - 2018
      • CSE 6388-001 SPEC TOPS ADV INFO SECURITY
        (Topic: Practical Malware Analysis | Course Id: 110981)
        Spring - Regular Academic Session - 2018 Download Syllabus
      • CSE 6699-006 DISSERTATION
        (Course Id: 102615)
        Fall - Regular Academic Session - 2017
      • CSE 5380-001 INFORMATION SECURITY 1
        (Course Id: 111054)
        Fall - Regular Academic Session - 2017 Download Syllabus
      • CSE 5380-002 INFORMATION SECURITY 1
        (Course Id: 111054)
        Fall - Regular Academic Session - 2017 Download Syllabus
      • CSE 5398-006 MASTER'S THESIS I
        (Course Id: 102566)
        Fall - Regular Academic Session - 2017
      • CSE 5698-006 MASTER'S THESIS II
        (Course Id: 102571)
        Fall - Regular Academic Session - 2017
      • CSE 6397-006 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102609)
        Fall - Regular Academic Session - 2017
      • CSE 6699-006 DISSERTATION
        (Course Id: 102615)
        Summer - Eleven Week - 2017
      • CSE 6699-006 DISSERTATION
        (Course Id: 102615)
        Spring - Regular Academic Session - 2017
      • CSE 5380-001 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2017 Download Syllabus
      • CSE 5380-002 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2017 Download Syllabus
      • CSE 5380-003 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2017 Download Syllabus
      • CSE 5380-004 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2017 Download Syllabus
      • CSE 5398-006 MASTER'S THESIS I
        (Course Id: 102566)
        Spring - Regular Academic Session - 2017
      • CSE 5380-001 INFORMATION SECURITY 1
        (Course Id: 111054)
        Fall - Regular Academic Session - 2016 Download Syllabus
      • CSE 5380-002 INFORMATION SECURITY 1
        (Course Id: 111054)
        Fall - Regular Academic Session - 2016 Download Syllabus
      • CSE 6697-006 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102614)
        Fall - Regular Academic Session - 2016

Service to the University

    • Sept 2020 to  Present Committee Member
      CSE Broadening Participation in Computing
    • Oct 2018 to  Present Committee Member
      CSE Publicity
    • Sept 2016 to  Present Faculty Advisor
      UTA Cyber Security Club
      UTA Cyber Security Club is an officially 501(c) non-profit organization with about 100 student members. We regularly offer lectures(e.g., penetration testing and practical malware analysis), invite industry speakers from the DFW metroplex, and run Capture-the-Flag (CTF) competitions for students to apply cybersecurity concepts. Each year, UTA Cyber Security Club sends talented student teams to attend TexSAW Capture-the-Flag Competition that has broad outreach in the Dallas/Fort Worth metropolitan area.
    • Oct 2017 to  May 2019 Committee Member
      CSE Faculty Search
    • May 2018 to  Aug 2018 Faculty Mentor
      McNair scholars program

Service to the Profession

    • 2019 to  2020
      Committee Member
      ACM Conference on Computer and Communications Security
    • 2019 to  2020
      Committee Member
      International Conference on Information and Communications Security
    • 2018 to  2020
      Committee Member
      2018 Workshop on Forming an Ecosystem Around Software Transformation 
    • 2018 to  2020
      Reviewer, Journal Article
      IEEE Transactions on Dependable and Secure Computing
    • 2018 to  2020
      Reviewer, Journal Article
      IEEE Transactions on Software Engineering
    • Mar 2020 to  Mar 2020
      Reviewer, Grant Proposal
      National Science Foundation
    • 2019 to  2019
      Reviewer, Journal Article
      ACM Transactions on Software Engineering and Methodology
    • 2019 to  2019
      Reviewer, Journal Article
      IEEE Transactions on Network Science and Engineering
    • 2019 to  2019
      Reviewer, Journal Article
      Security and Communication Networks
    • 2018 to  2018
      Reviewer, Conference Paper
      14th EAI International Conference on Security and Privacy in Communication Networks
    • 2018 to  2018
      Reviewer, Journal Article
      Concurrency and Computation: Practice and Experience
    • 2017 to  2018
      Reviewer, Journal Article
      ACM Computing Surveys
    • 2017 to  2017
      Reviewer, Journal Article
      IEEE Transactions on Knowledge and Data Engineering