Xiaochen Zou

Ph.D. candidate at University of California, Riverside, wildly interest in system security and kernel exploit.

Bio

Xiaochen/笑尘 is a Ph.D. candidate at University of California, Riverside, advised by Professor Zhiyun Qian. Xiaochen earned his bachelor degree from University of Electronic Science and Technology of China.

He was a CTF player of CNSS, focusing on reverse engineering and pwn. During his Ph.D., Xiaochen mainly works on system security including bug discovery, program analysis, and kernel exploit.

Xiaochen’s research is primarily concentrated on Linux kernel fuzzing and program analysis, and he has a broad interest in AI-driven security and Android access control. Based on the program analysis techniques of symbolic execution and static taint analysis, Xiaochen has developed security tools that discovered multiple Linux kernel vulnerabilities. He also has a track record of successfully developing multiple Linux kernel exploits in the past, leading to local privilege escalation on the latest Ubuntu kernel.

Access Xiaochen’s CV.

Pubs

{SymBisect}: Accurate Bisection for {Fuzzer-Exposed} Vulnerabilities

Zheng Zhang, Yu Hao, Weiteng Chen, Xiaochen Zou, Xingyu Li, Haonan Li, Yizhuo Zhai, Billy Lau

USENIX Security 2024 [paper][code]

 

SyzBridge: Bridging the Gap in Exploitability Assessment of Linux Kernel Bugs in the Linux Ecosystem

Xiaochen Zou, Yu Hao, Zheng Zhang, Juefei Pu, Weiteng Chen, Zhiyun Qian

The Network and Distributed System Security Symposium (NDSS) 2024 [paper] [code]

 

K-LEAK: Towards Automating the Generation of Multi-Step Infoleak
Exploits against the Linux Kernel

Zhengchuan Liang, Xiaochen Zou, Chengyu Song, Zhiyun Qian

The Network and Distributed System Security Symposium (NDSS) 2024 [paper] [code]

 

SyzGen++: Dependency Inference for Augmenting Kernel Driver
Fuzzing

Weiteng Chen, Yu Hao, Zheng Zhang, Xiaochen Zou, Dhilung Kirat, Shachee Mishra, Douglas Schales, Jiyong Jang, Zhiyun Qian

IEEE Security and Privacy (Oakland) 2024 (To be appeared) [paper]

 

SyzDescribe: Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers 

Yu Hao, Guoren Li, Xiaochen Zou, Weiteng Chen, Shitong Zhu, Zhiyun Qian, and Ardalan Amiri Sani

IEEE Security and Privacy (Oakland) 2023 [paper][code]

 

SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel

Xiaochen Zou, Guoren Li, Weiteng Chen, Hang Zhang, Zhiyun Qian

USENIX Security 2022 [paper] [code]

 

Eluding ML-based Adblockers With Actionable Adversarial Examples

Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Keyu Man, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq, Yu Hao, Guoren Li, Zheng Zhang, Xiaochen Zou

ACSAC 2021 [paper]

 

Statically Discovering High-Order Taint Style Vulnerabilities in OS Kernels

Hang Zhang, Weiteng Chen, Yu Hao, Guoren Li, Yizhuo Zhai, Xiaochen Zou, and Zhiyun Qian

ACM CCS 2021 [paper]

 

{KOOBE}: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities

Weiteng Chen, Xiaochen Zou, Guoren Li, Zhiyun Qian

USENIX Security 2020 [paper] [slides] [code]

Credits

CVE-2022-27666

CVE-2022-27645

CVE-2021-42008

CVE-2021-33034

CVE-2021-33033

CVE-2020-36386

CVE-2019-25044

CVE-2020-36385

CVE-2018-25015

CVE-2020-36387

CVE-2019-25045

News

Pub: Our paper “SyzBridge: Bridging the Gap in Exploitability Assessment of Linux Kernel Bugs in the Linux Ecosystem” was accepted by NDSS 2024

NDSS 2024

November, 2024

 

Pub: Our paper “K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploit against Linux Kernel” was accepted by NDSS 2024

NDSS 2024

November, 2024

 

Pub: Our paper “INFUZE: Dependency Inference for Augmenting Kernel Driver Fuzzing” was accepted by S&P 2024

S&P (Oakland) 2024

October, 2024

 

Reward: Received Google Research Scholar Program Reward for my research paper “SyzScope”

Google Research Scholar Program Reward

April, 2023

 

Talk: SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs

USENIX Security 2022

Augest, 2022 [slides]

 

Post: Published a Linux 0-day exploit and the full walkthrough write-up

CVE-2022-27666

March, 2022 [tweet] [post] [code]

 

Contest: Exploiting the LAN interface of the NETGEAR R6700v3 router

Pwn2Own 2021 Austin

Nov, 2021 [video] [post]

 

Talk: Scrutinizing bugs found by syzbot

Linux Security Summit North America 2021

Oct, 2021 [slides] [video]

 

Milestone: Passed Ph.D. candidate qualifying exam

University of California, Riverside

Jun, 2021

 

Sub-reviewer: USENIX Security

USENIX Security ’21 Winter

Feb, 2021

 

Sub-reviewer: IEEE S&P

IEEE S&P ’21 Fall

Oct, 2020

 

Sub-reviewer: NDSS

NDSS ’21 Fall, NDSS ’20 Summer, NDSS ’20 Fall

 

Contest: Won 3th prize in the National Cyber Security Competition of college students

National Cyber Security Competition of college students

2018

 

Contest: Won 7th prize in 0ctf

Tencent

2017

 

Contest: Won 1st in Anheng National Security Competition in west-south district

DBAPPSecurity

2017, 2016

 

Contest: Won 5th in DDCTF

DiDi

2016

 

Contest: Won 1st prize in National Olympiad in Informatics of Provinces(NOIP) 

National Olympiad in Informatics of Provinces

2013