Table of Contents
Yutao Liu (刘宇涛)
I am a fourth year Ph.D student in the Software Engineering at Shanghai Jiaotong University. I work in the Security Group of Institute of Parallel And Distributed System (IPADS), adviced by Prof. Haibo Chen. My research interests are system/virtualization security and mobile security.
Long-term Research Goal
My primary research goal is to improve server and mobile security in system perspective. My current and prospective research projects have and may have been along two lines:
- leveraging potential architecture support to improve the dependability and security of current systems, specifically, using hardware features in different architectures to protect data privacy, enforce control flow integrity, actively monitor the whole system and timely detect potential attack, etc.
- building and optimizing reliable virtualization environment to benefit system security. Currently virtualization has been a tremendous success, especially in server consolidation and security enhancement. However there’re still some problems when considering security aspects, and my goal is to ameliorate virtualization architecture to adapt to increasing security requirement.
- Sep. 2012 - Current Ph.D Candidate, Institute of Parallel And Distributed System (IPADS), Shanghai Jiaotong University (SJTU), Supervisor: Haibo Chen
- Apr. 2014 - Sep. 2014 Exchange Ph.D Student, School of Computer (SoC), National University of Singapore (NUS), Supervisor: Ooi Beng Chin
- Jul. 2011 - Sep. 2011 Exchange Student, School of Computer Science and Informatics, University College Dublin (UCD), Supervisor: Keyun Ruan
- Sep. 2008 - Jun. 2012 B.S. Software School, Fudan University
- [TCC] Yubin Xia, Yutao Liu, Haibin Guan, Yunji Chen, Tianshi Chen, Binyu Zang, Haibo Chen. Secure Outsourcing of Virtual Appliance. IEEE Transactions on Cloud Computing, 2015.
- [CCS] Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia. Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation. In the 22nd ACM Conference on Computer and Communications Security, 2015.
- [EuroSys] Yubin Xia, Yutao Liu, Cheng Tan, Mingyang Ma, Haibing Guan, Binyu Zang, Haibo Chen. TinMan: Eliminating Confidential Mobile Data Exposure with Security-oriented Offloading. In Proceedings of the 10th European Conference on Computer Systems, 2015.
- [HPCA] Yutao Liu, Yubin Xia, Haibing Guan, Binyu Zang and Haobo Chen. Concurrent and Consistent Virtual Machine Introspection with Hardware Transactional Memory. In Proceedings of the 20th IEEE International Symposium On High Performance Computer Architecture (Best Paper Nominee), Orlando, Florida, 2014. [pdf, slide]
- [APSys] Yutao Liu, Yubin Xia and Haobo Chen. Component-based Decoupling of Mobile Applications using RemoteBinder. Poster in 4th Asia-Pacific Workshop on Systems, July, 2013. [pdf]
- [HPCA] Yubin Xia, Yutao Liu and Haibo Chen. Architecture Support for Guest-Transparent VM Protection from Untrusted Hypervisor and Physical Attacks. In Proceedings of 2013 Internal Symposium on High Performance Computer Architecture, February, 2013. [pdf]
- [DSN] Yubin Xia, Yutao Liu, Haibo Chen, and Binyu Zang. CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters. In Proceeding of Dependable Systems and Networks, Boston, US, 2012. [pdf]
- [DCDV] Yubin Xia, Yutao Liu, Haibo Chen, and Binyu Zang. Defending against VM Rollback Attack, in The Second International Workshop on Dependability of Clouds Data Centers and Virtual Machine Technology, Boston, US, 2012. [pdf]
- TinMan: A System Aiming at Protecting Confidential Data on Mobile Devices. An Android security system, which utilizes asymmetric taint, distributed share memory, and packet header switch, etc. techniques to ensure no exposure of plain text of Confidential Data (CoD, e.g., password) on mobile devices and thus can protect CoD even if the device is lost or stolen.
- TxIntro: Leveraging Hardware Transactional Memory for Virtual Machine Introspection. A system that leverages the Intel’s Restricted Transactional Memory (RTM) to build a timely, concurrent and consistent Virtual Machine Introspection (VMI) system, which can detect kernel module rootkit efficiently, and we also proposed two optimizations to reduce the conflict aborts.
- RemoteBinder: A Transparent Service Component-based Decoupling Approach for Mobile Security. An Android security extension, which provides component-based decoupling using the Android IPC mechanism, specifically, it transparently decouples suspicious Services from applications to the cloud with much stronger security protection.
- HyperCoffer: Architecture Support for Guest-Transparent VM Protection from Untrusted Hypervisor and Physical Attacks. A prototype of a hardware-software framework in a Qemu-based full-system emulator and VM-Shim mechanism in a Xen-based real machine, which leverages the Secure Processor to guard the privacy and integrity of virtual machine.
- CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters. A system that can detect and reason about a variety of attacks violating control flow integrity without any changes to applications. We combined static analysis and runtime training to collect legal control flow transfers, and leverages the branch tracing store mech- anism in commodity processors to collect and analyze runtime traces on-the-fly to detect violation of control flow integrity.
- Spring, 2015 Computer System Design and Implementation
- Autumn, 2013 Computer System Principle
- Spring, 2012 Computer System Engineering
- Autumn, 2015 Tang Lixin Scholarship（唐立新奖学金）
- Autumn, 2015 National Scholarship（国家奖学金）
- Autumn, 2014 Microsoft Research Asia Ph.D Fellowship
- Spring, 2014 HPCA Best Paper Nominee Award
- Summer, 2012 Outstanding Graduate Student Award of Shanghai
- Spring, 2011 Received the Title of Xiyuan Scholar
- Spring, 2010 Shamrock Software Competition Championship