PhD - Computer Science
Purdue University - 2011
Professional Preparation
Research Areas
Research Interests
- Software Security (binary code analysis and its applications to vulnerability discovery, malicious code analysis, software hardening, and binary code reuses in new applications) [ICDCS13, ACSAC'12, CCS'12, DFRWS'12,NDSS'10, DSN'10, NDSS'09, NDSS'08, FSE'08, , SOCC'12, S&P'12,NDSS'11]
- Cloud Computing (and Virtualization) (enhancing cloud security and the virtual machine management in the cloud) [ISCA'13, VEE'13, SOCC'12, S&P'12, NDSS'11]
- Memory Data Analysis (for Introspection, Digital Forensics) (data structure guided memory as well as disk data analysis) [ISCA'13, DSN'13, SOCC'12, DFRWS'12, NDSS'12, NDSS'11, NDSS'10]
Publications
Scott Hand, Zhiqiang Lin, Guofei Gu, and Bhavani Thuraisingham. "Bin-Carver: Automatic Recovery of Binary Executable Files". To appear in Proceedings of the 12th Annual Digital Forensics Research Conference, Washington DC, August 2012 2012 - Publication
Yangchun Fu, and Zhiqiang Lin. "Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection". InProceedings of the 33rd IEEE Symposium on Security and Privacy, San Fransisco, CA, May 2012 2012 - Publication
Zhiqiang Lin, Junghwan Rhee, Chao Wu, Xiangyu Zhang, and Dongyan Xu. "DIMSUM: Discovering Semantic Data of Interest from Un-mappable Memory with Confidence". InProceedings of the 19th ISOC Network and Distributed System Security Symposium, San Diego, CA, February 2012 2012 - Publication
Junghwan Rhee, Zhiqiang Lin, and Dongyan Xu. "Characterizing Kernel Malware Behavior with Kernel Data Access Patterns". In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, March 2011 2011 - Publication
Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, and Xuxian Jiang. "SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures". In Proceedings of the 18th Network and Distributed System Security Symposium, San Diego, CA, February 2011 2011 - Publication
Tao Bao, Yunhui Zheng, Zhiqiang Lin, Xiangyu Zhang and Dongyan Xu. "Strict Control Dependence and its Effect on Dynamic Information Flow Analyses". In Proceedings of the 2010 International Symposium on Software Testing and Analysis,Trento, Italy. July 2010 2010 - Publication
Additional Information
Service
- Panelist: NSF proposal review panels, 2012
- Publication Chair: IEEE International Performance Computing and Communications Conference (IPCCC), 2012
-
TPC Member:
- IEEE International Conference on Distributed Computing Systems (ICDCS), 2014
- ACM Symposium on Information, Computer and Communications Security (AsiaCCS), 2013
- IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), 2013
- IEEE International Conference on Big Data (BigData), 2013
- International Conference on Privacy, Security and Trust (PST), 2013
- International Workshop on Security in Embedded Systems and Smartphones (SESP), 2013
- Annual Digital Forensics Research Conference (DFRWS), 2013
- International Conference on Availability, Reliability and Security (ARES), 2012
- IEEE International Performance Computing and Communications Conference (IPCCC), 2011, 2012
- IEEE Services Workshop on Security and Privacy Engineering (SPE), 2012, 2013
- Workshop on Hardware and Architectural Support for Security and Privacy (HASP), 2012, 2013
- IEEE Information Assurance Workshop (IAW), 2007
Teaching
Spring 2013 CS 4393: Computer and Network Security Fall 2012 CS 6324: Information Security Spring 2012 CS 6V81-005: Systems security and binary code analysis Fall 2011 CS 6V81-005: Advanced digital forensics and data reverse engineeringNews Articles
Researcher Seeks Ways to Keep Old Data Secure
![Researcher Seeks Ways to Keep Old Data Secure](https://profiles.utdallas.edu/storage/media/854/conversions/lin-zbiqiang-270-2011-11-medium.jpg)
Project Gives Computers a More Powerful Way to Detect Threats
![Project Gives Computers a More Powerful Way to Detect Threats](https://profiles.utdallas.edu/storage/media/855/conversions/lin-zhiquiang-200-2012-9-medium.jpg)
Computer Scientist Seeks Stronger Security Shroud for the Cloud
![Computer Scientist Seeks Stronger Security Shroud for the Cloud](https://profiles.utdallas.edu/storage/media/2014/conversions/Zhiqiang-Lin-800-2015-09-medium.jpg)
Lin’s research has earned the assistant professor of computer science a National Science Foundation Faculty Early Career Development (CAREER) Award, which provides him with $500,000 in funding for five years.
Professor to Develop Framework to Protect Computers' Cores
UT Dallas cybersecurity expert Dr. Zhiqiang Lin has received funding from the U.S. Air Force to develop a defense framework that burrows deep into a computer system to protect its core.The Young Investigator Research Program (YIP) award from the Air Force Office of Scientific Research (AFOSR) provides up to $360,000 over three years to support Lin in developing this framework. Lin is an assistant professor of computer science in the Erik Jonsson School of Engineering and Computer Science, and member of the Cyber Security Research and Education Institute (CSI) at UT Dallas.