组织介绍

Trusted Software and Intelligent System Lab.

TSIS Lab aims to tap the potentials of students, cultivate outstanding talents, and contribute to serving the society.

Our goal: Software systems are artifacts of people and should be friends of people. Therefore, they should be as correct, secure, reliable and intelligent as possible. Compared with the upper applications, the above characteristics of the fundamental software systems for modern computing and communication are particularly important.

Professors

Liang hongliang hliang@bupt.edu.cn

Professor, Doctoral Supervisor and Master Supervisor of Beijing University of Posts and Telecommunications. In 2002, he obtained Ph.D from Software Institute of Chinese Academy of Sciences. He was a winner of the Beijing Science and Technology Progress Awards (2005), an excellent graduate tutor in ISCAS (2007), and an excellent tutor of innovation and entrepreneurship in BUPT (2016). He supervised more than 70 graduate students and more than 50 undergraduate students, 3 of whom won the national graduate scholarship, 10 of whom won the honors of excellent graduates at the Beijing municipal or university level, and more than 10 of whom won the honors of national DaChuang project. His research interests include: intelligence system & reinforcement learning, and trusted software & cybersecurity.

Yi qiuping yiqiuping@bupt.edu.cn

Associate Professor, Doctoral supervisor and Master supervisor of Beijing University of Posts and Telecommunications. In 2016, she obtained a Ph.D from Software Institute of the Chinese Academy of Sciences; From 2016 to 2017, she worked as a postdoctoral fellow at Texas A&M University in the United States; From 2018 to 2019, she worked as a postdoctoral fellow at Texas State University in the United States; Since 2020, he has been a distinguished associate researcher of Beijing University of Posts and Telecommunications. Her research interests include: program analysis, trusted software, and artificial intelligence security.

Current Students

Liu jie

doctoral student. In 2020, he obtained a master degree from China University of Petroleum (East China); His research interests include vulnerability detection and exploitabiliy analysis.

Wu guohao

doctoral student. In 2021, he obtained a master degree from Chongqing University; His research interests include: embedded system simulation, embedded firmware vulnerability mining.

Li zhuang

doctoral student. In 2022, he studied in the School of Computer Science, Beijing University of Posts and Telecommunications; His research interests include: black box and gray box fuzzing, symbolic execution and CSA.

Cai jinyan

doctoral student. In 2023, he obtained a master degree from Jiangsu University of Science and Technology; His research interests include: AI security.

Du pengbo

master student. In 2023, he obtained a bachelor degree from Harbin Engineering University; Research interests include symbolic execution and fuzzing.

Zou shun

master student. In 2022, he obtained a bachelor degree from China University of Petroleum; Research interests include: embedded system simulation and vulnerability mining.

Li yuxiang

master student. In 2023, he obtained a bachelor degree from Jimei University; Research interests include: program analysis.

Jiang liuyang

master student. In 2023, he obtained a bachelor degree from Henan University; Research interests include: system simulation, program analysis.

Zhao weihao

master student. In 2022, he obtained a bachelor degree from Yanshan University; Research interests include: system simulation, program analysis.

Wei qianyue

master student. In 2023, she obtained a bachelor degree from North China Electric Power University; her research interests include: program analysis, penetration testing.

Dong zirui

master student. In 2023, she obtained a bachelor degree from Beijing Foreign Studies University; her research interests include system simulation and program analysis.

Li zhen

master student. In 2023, he obtained a bachelor degree from North China Electric Power University; Research interests include: program analysis, fuzzy testing.

Li yanqi

master student. In 2023, he obtained a bachelor degree from Beijing University of Chemical Technology; Research interests include: real-time operating system.

Yu tianhao

master student. In 2023, he obtained a bachelor degree from Dongbei University of Finance and Economics; Research interests include: computer vision and deep learning.

Meng yangtao

master student. In 2024, he obtained a bachelor degree from Guangxi University; Research interests include: program analysis.

Yang chaoyi

master student. In 2024, he obtained a bachelor degree from Guangxi University; Research interests include: program analysis.

Yang jinxin

master student. In 2024, he obtained a bachelor degree from Nankai University; Research interests include: embedded system simulation.

Zhang liangzheng

master student. In 2024, he obtained a bachelor degree from Northwestern Polytechnical University; Research interests include: program analysis, symbol execution

Zhao yuhang

master student. In 2024, he obtained a bachelor degree from Shandong University of Science and Technology; Research interests include: program analysis.

Graduated Fellows

Pan Xuejian, Master, Microsoft (USA)

Luo Yuxiang, Master, Google (USA)

Tian Shuo, PhD, GWY

Hu Xiaochang, Master, Ali

Zhou Peng, Master, Ali

Yi Qiuping, PhD, Beijing University of Posts and Telecommunications

Yang Xiaoyu, Master, CEO of start-up company

Dong Yu, Master, GWY

Gao Lei, Master, NISAC

Xu Jian, Master, Bank of Nanjing

Han Changyao, Master, Huawei

Wang Lei, Master, CTO of start-up company

Wu Dongyang, master, ShenXinFu

Li Mingyu, PhD, ISCAS

Hu Wenying, Master, Micro-Strategy Technology

Pei Xiaoxiao, Master, IBM

Liu Shirun, Master, Institute of Information Engineering, Chinese Academy of Sciences

Li Zhengyu, Master, China Merchants Bank

Zhang Yini, Master, China Merchants Bank

Yang Yuxing, Master, JD

Chen Yixiu, Master, ByteDance

Jiang Lin, Master, State Grid

An Hang, Master, 360

Zhou Yanjie, Master, QiAnxin

Hao Xiantong, Master, Xiaomi

Wei JinYi, Master, Bank of Nanjing

Guo Zihui, Master, Huawei

Li Xiangyu, Master, ICBC

(Part of) Publications

  • Jie Liu, Yanqi Li, Rui Yao, Yang Zhang, Hongliang Liang: Detecting vulnerabilities in IoT firmware via keyword identification and path optimization. Internet Things 34: 101808 (2025)
  • Dongyu Ma, Zeyu Liang, Luming Yin, Hongliang Liang: Symbolic testing of floating-point bugs and exceptions. J. Syst. Softw. 219: 112226 (2025)
  • Weihao Zhao, Jinyan Cai, Hongliang Liang, Qiuping Yi: Data-independent generation of targeted universal adversarial perturbations. Knowl. Based Syst. 330: 114684 (2025)
  • Jie Liu, Lianda Yao, Yanqi Li, Hongliang Liang: Toward Automatic Heap Exploit Generation by Using Heap Layout Constraints on Binary Programs. IEEE Trans. Inf. Forensics Secur. 20: 11623-11635 (2025)
  • Hongliang Liang, Luming Yin, Wenying Hu, Yuxiang Li, Wuwei Shen: Unified and Split Symbolic Execution for Exposing Semantic Differences. ACM Trans. Softw. Eng. Methodol. 34(6): 168:1-168:27 (2025)
  • Ruikang Ni, Da Xiao, Qingye Meng, Xiangyu Li, Shihui Zheng, Hongliang Liang: Benchmarking and Understanding Compositional Relational Reasoning of LLMs. AAAI 2025: 19703-19711
  • Hongliang Liang, Xiangyu Li, Da Xiao, Jie Liu, Yanjie Zhou, Aibo Wang, Jin Li: Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls. IEEE TDSC 21(1): 309-324 (2024)
  • Hongliang Liang, Xinglin Yu, Xianglin Cheng, Jie Liu, Jin Li: Multiple Targets Directed Greybox Fuzzing. IEEE TDSC 21(1): 325-339 (2024)
  • Chunlin Wang, Hongliang Liang: Value Peripheral Register Values for Fuzzing MCU Firmware. ISSRE 2023: 718-729
  • Da Xiao, Dengji Hang, Lu Ai, Shengping Li, Hongliang Liang: Path context augmented statement and network for learning programs. ESE 27(2): 37 (2022)
  • Hongliang Liang, Dengji Hang, Xiangyu Li: Modeling function-level interactions for file-level bug localization. ESE 27(7): 186 (2022)
  • Hongliang Liang, Mingyu Li, Yixiu Chen, Tianqi Yang, Zhuosi Xie, Lin Jiang: Architectural Protection of Trusted System Services for SGX Enclaves in Cloud Computing. IEEE TCC 9(3): 910-922 (2021)
  • Hongliang Liang, Lu Ai: AST-path Based Compare-Aggregate Network for Code Clone Detection. IJCNN 2021: 1-8
  • Hongliang Liang, Zhuosi Xie, Yixiu Chen, Hua Ning, Jianli Wang: FIT: Inspect vulnerabilities in cross-architecture firmware by deep learning and bipartite matching. COSE 99: 102032 (2020)
  • Hongliang Liang, Mingyu Li, Yixiu Chen, Lin Jiang, Zhuosi Xie, Tianqi Yang: Establishing Trusted I/O Paths for SGX Client Systems With Aurora. IEEE TIFS 15: 1589-1600 (2020)
  • Hongliang Liang, Wenqing Yu, Lu Ai, Lin Jiang: A Practical Concolic Execution Technique for Large Scale Software Systems. EASE 2020: 312-317
  • Hongliang Liang, Yixiu Chen, Zhuosi Xie, Zhiyi Liang: X-AFL: a kernel fuzzer combining passive and active fuzzing. EuroSec@EuroSys 2020: 13-18
  • Hongliang Liang, Mingyue Li, Jianli Wang: Automated data race bugs addition. EuroSec@EuroSys 2020: 37-42
  • Rundong Li, Hongliang Liang, Liming Liu, Xutong Ma, Rong Qu, Jun Yan, Jian Zhang: GTFuzz: Guard Token Directed Grey-Box Fuzzing. PRDC 2020: 160-170
  • Hongliang Liang, Lin Jiang, Lu Ai, Jinyi Wei: Sequence Directed Hybrid Fuzzing. SANER 2020: 127-137
  • Hongliang Liang, Yue Yu, Lin Jiang, Zhuosi Xie: Seml: A Semantic LSTM Model for Software Defect Prediction. IEEE Access 7: 83812-83824 (2019)
  • Hongliang Liang, Lu Sun, Meilin Wang, Yuxing Yang: Deep Learning With Customized Abstract Syntax Tree for Bug Localization. IEEE Access 7: 116309-116320 (2019)
  • Hongliang Liang, Tianqi Yang, Lin Jiang, Yixiu Chen, Zhuosi Xie: Witness: Detecting Vulnerabilities in Android Apps Extensively and Verifiably. APSEC 2019: 434-441
  • Hongliang Liang, Yuxing Yang, Lu Sun, Lin Jiang: JSAC: A Novel Framework to Detect Malicious JavaScript via CNNs over AST and CFG. IJCNN 2019: 1-8
  • Hongliang Liang, Qiong Zhang, Mingyu Li, Jianqiang Li: Toward Migration of SGX-Enabled Containers. ISCC 2019: 1-6
  • Hongliang Liang, Yini Zhang, Yue Yu, Zhuosi Xie, Lin Jiang: Sequence coverage directed greybox fuzzing. ICPC 2019: 249-259
  • Qiuping Yi, Guowei Yang: Feedback-Driven Incremental Symbolic Execution. ISSRE 2022: 505-516
  • Jian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi: LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution. USENIX Security Symposium 2022: 125-142
  • Qiuping Yi, Junye Wen, Guowei Yang: Summary-guided incremental symbolic execution. ICSE (Companion Volume) 2020: 310-311
  • Qiuping Yi, Zijiang Yang, Shengjian Guo, Chao Wang, Jian Liu, Chen Zhao: Eliminating Path Redundancy via Postconditioned Symbolic Execution. IEEE Trans. Software Eng. 44(1): 25-43 (2018)
  • Qiuping Yi, Jeff Huang: Concurrency verification with maximal path causality. ESEC/SIGSOFT FSE 2018: 366-376
  • Qiuping Yi, Zijiang Yang, Jian Liu, Chen Zhao, Chao Wang: Explaining Software Failures by Cascade Fault Localization. ACM Trans. Design Autom. Electr. Syst. 20(3): 41:1-41:28 (2015)
  • Qiuping Yi, Zijiang Yang, Jian Liu, Chen Zhao, Chao Wang: A Synergistic Analysis Method for Explaining Failed Regression Tests. ICSE (1) 2015: 257-267
  • Qiuping Yi, Zijiang Yang, Shengjian Guo, Chao Wang, Jian Liu, Chen Zhao: Postconditioned Symbolic Execution. ICST 2015: 1-10
  • Qiuping Yi, Jian Liu, Wuwei Shen: Efficient Loop-Extended Model Checking of Data Structure Methods. FGIT-ASEA/DRBC/EL 2011: 237-24
成就
0
Star
0
Fork
成员(32)
jerryly
李舒丹
自由的风
lhl-bupt
lsh
7485213 chulin wang 1619531275
chunlin
mryu12
wangshi
ledendary
大雷
Calajv
9330136 siruiyao 1730378812
siruiYao
TTTCoder
9453338 ma dongyu 1703511236
马冬雨
zhangsifan
ma
魏千越
10827393 lz1971671842 1650611352
bupt_lz
廖哥
kingsdom

搜索帮助