Chen Cao, Ph.D.

Assistant Professor, Computer Science and Software Engineering
166 Burke

Mailing Address:
PENN STATE BEHREND
242 BURKE CENTER
ERIE PA 16563

I like to find novel and previously unknown ways to "white-hat"ly hack the system. WIth in-depth knowledge learned during the hacking, I also delve into securing systems that I hacked.

Systems security, mainly on Linux/Android/IoT systems.

How Does Naming Affect LLMs on Code Analysis Tasks?, Journal of Software Engineering and Applications - November, 2024
Collaborators: Zhilong Wang, Author; Lan Zhang, Co-Author; Nanqing Luo, Co-Author; Xinzhi Luo, Co-Author; Peng Liu, Co-Author

Which Features are Learned by CodeBert: An Empirical Study of the BERT-based Source Code Representation Learning, arXiv preprint arXiv:2301.08427v2 - August, 2023
Collaborators: Lan Zhang, Author; Zhilong Wang, Co-Author; Peng Liu, Co-Author

Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems, IEEE Internet of Things Journal - July 15, 2021
Collaborators: Wei Zhou, Co-Author; Dongdong Huo, Co-Author; Kai Cheng, Co-Author; Lan Zhang, Co-Author; Le Guan, Co-Author; Tao Liu, Co-Author; Yan Jia, Co-Author; Yaowen Zheng, Co-Author; Yuqing Zhang, Co-Author; Limin Sun, Co-Author; Yazhe Wang, Co-Author; Peng Liu, Co-Author

Commercial Hypervisor-Based Task Sandboxing Mechanisms Are Unsecured? But We Can Fix it!, Journal of Systems Architecture - June, 2021
Collaborators: Dongdong Huo, Co-Author; Peng Liu, Co-Author; Yazhe Wang, Co-Author; Mingxuan Li, Co-Author; Zhen Xu, Co-Author

Device-Agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation, Proceedings of the 36th Annual Computer Security Applications Conference - December, 2020
Collaborators: Le Guan, Co-Author; Jiang Ming, Co-Author; Peng Liu, Co-Author

Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation, IEEE Transactions on Mobile Computing - 2019
Collaborators: Lannan Luo, Co-Author; Qiang Zeng, Co-Author; Kai Chen, Co-Author; Jian Liu, Co-Author; Limin Liu, Co-Author; Neng Gao, Co-Author; Min Yang, Co-Author; Xinyu Xing, Co-Author; Peng Liu, Co-Author

Protecting Mobile Devices from Physical Memory Attacks with Targeted Encryption, Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks - May, 2019
Collaborators: Le Guan, Co-Author; Sencun Zhu, Co-Author; Jingqiang Lin, Co-Author; Peng Liu, Co-Author; Yubin Xia, Co-Author; Bo Luo, Co-Author

CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices, International Symposium on Research in Attacks, Intrusions, and Defenses - 2018
Collaborators: Le Guan, Co-Author; Ning Zhang, Co-Author; Neng Gao, Co-Author; Jingqiang Lin, Co-Author; Bo Luo, Co-Author; Peng Liu, Co-Author; Ji Xiang, Co-Author; Wenjing Lou, Co-Author

Building a Trustworthy Execution Environment to Defeat Exploits from Both Cyber Space and Physical Space for ARM, IEEE Transactions on Dependable and Secure Computing - 2018
Collaborators: Le Guan, Co-Author; Peng Liu, Co-Author; Xinyu Xing, Co-Author; Xinyang Ge, Co-Author; Shengzhi Zhang, Co-Author; Meng Yu, Co-Author; Trent Jaeger, Co-Author

Assessing the Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs, IFIP International Conference on Database and Application Security and Privacy (DBSEC 2018) - July, 2018
Collaborators: Lunpin Yuan, Co-Author; Anoop Singhal, Co-Author; Peng Liu, Co-Author; Xiaoyan Sun, Co-Author; Sencun Zhu, Co-Author

Hey, You, Keep Away from My Device: Remotely Implanting a Virus Expeller to Defeat Mirai on IoT Devices, arXiv preprint arXiv:1706.05779 - 2017
Collaborators: Le Guan, Co-Author; Peng Liu, Co-Author; Neng Gao, Co-Author; Jingqiang Lin, Co-Author; Ji Xiang, Co-Author

System Service Call-Oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation, Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services - June, 2017
Collaborators: Lannan Luo, Co-Author; Qiang Zeng, Co-Author; Kai Chen, Co-Author; Jian Liu, Co-Author; Limin Liu, Co-Author; Neng Gao, Co-Author; Min Yang, Co-Author; Xinyu Xing, Co-Author; Peng Liu, Co-Author

Context-Aware System Service Call-Oriented Symbolic Execution of Android Framework with Application to Exploit Generation, arXiv preprint arXiv:1611.00837 - November, 2016
Collaborators: Lannan Luo, Co-Author; Qiang Zeng, Co-Author; Kai Chen, Co-Author; Jian Liu, Co-Author; Limin Liu, Co-Author; Neng Gao, Co-Author; Min Yang, Co-Author; Xinyu Xing, Co-Author; Peng Liu, Co-Author

Towards Analyzing the Input Validation Vulnerabilities Associated with Android System Services, Proceedings of the 31st Annual Computer Security Applications Conference - December, 2015
Collaborators: Neng Gao, Co-Author; Peng Liu, Co-Author; Ji Xiang, Co-Author

Function Escalation Attack, International Conference on Security and Privacy in Communication Networks - 2014
Collaborators: Yuqing Zhang, Co-Author; Qixu Liu, Co-Author; Kai Wang, Co-Author

Design of the Password-Authenticated Protocol Based on Mosaic Image Test, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010) - 2010
Collaborators: Tao He, Co-Author; Tianjie Cao, Co-Author

Improved Three-Party Password-authenticated Key Exchange Protocol, Jisuanji Gongcheng yu Yingyong(Computer Engineering and Applications) - 2010
Collaborator: Yu-Hang Gao, Co-Author

Ph D, Computer Science and Technology Information Security, The University of Chinese Academy of Sciences

BE, Information Security, China University of Mining and Technology