I am a ZJU100 Young Professor at Zhejiang University. My research interests are system security and software security, including OS kernel security, binary security, container security, program analysis using LLVM/clang.

Previously, I spent about 4 years at Samsung Research America in Silicon Valley (Mountain View, California), as a Research Engineer and the tech lead of Linux Real-time kernel protection. I have designed, implemented and commercialized multiple kernel security features, including Linux kernel page table protection, control flow protection, and critical data protection, protecting hundreds of millions of flagship smartphones.

Before joining Samsung Research America, I got my Ph.D. degree in 2015 from the Computer Science Department of North Carolina State University, Raleigh, North Carolina, USA. My PhD advisors are Dr. Peng Ning and Dr. Huaiyu Dai. I got my bachelor degree in Software Engineering in 2010 from Harbin Institute of Technology, Harbin, China, advised by Dr. Weizhe Zhang.

I’m always looking for postdoc, PhD, master or undergraduate students. If you like “moving fast and breaking things”, please contact me at shenwenbo AT zju.edu.cn. Experiences with CTF contest, Linux kernel, LLVM, Docker or RISC-V are desired. Resources

Publications

2020

  • PESC: A Per System-Call Stack Canary Design for Linux Kernel
    Jiadong Sun, Xia Zhou, Wenbo Shen, Yajin Zhou, Kui Ren
    In CODASPY 20 [PDF]

2019

  • PeX: A Permission Check Analysis Framework for Linux Kernel
    Tong Zhang, Wenbo Shen, Dongyoon Lee, Changhee Jung, Ahmed Azab, Ruowen Wang
    In USENIX Security 19 [PDF]

  • KALD: Detecting Direct Pointer Disclosure Vulnerabilities
    Brian Belleville, Wenbo Shen, Stijn Volckaert, Ahmed M. Azab, and Michael Franz
    In the Transactions on Dependable and Secure Computing (TDSC) [PDF]

  • PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary
    Yaohui Chen, Dongliang Mu, Jun Xu, Zhichuang Sun, Wenbo Shen, Xinyu Xing, Long Lu, Bing Mao
    In AsiaCCS 19 [PDF]

2017

  • Norax: Enabling Execute-Only Memory for COTS Binaries on AArch64
    Yaohui Chen, Dongli Zhang, Ruowen Wang, Rui Qiao, Ahmed M. Azab, Long Lu, Hayawardh Vijayakumar, Wenbo Shen
    In the IEEE Symposium on Security and Privacy (S&P’17), 2017 [PDF]

  • SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android
    Ruowen Wang, Ahmed M. Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen, Wenbo Shen, Yueqiang Cheng
    ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017 [PDF] Distinguished Award

2016

  • SKEE: A lightweight Secure Kernel-level Execution Environment for ARM
    Ahmed Azab, Kirk Swidowski, Rohan Bhutkar, Jia Ma, Wenbo Shen, Ruowen Wang and Peng Ning
    Network and Distributed System Security Symposium (NDSS), 2016 [PDF] Distinguished Award

  • Towards Proper Guard Zones for Link Signature
    Xiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning, Rudra Dutta
    IEEE Transactions on Wireless Communications, 2016 [PDF]

  • Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks
    Song Fang, Yao Liu, Wenbo Shen, Haojin Zhu, and Tao Wang
    IEEE Transactions on Mobile Computing (TMC), 2017 [PDF]

2015

  • No Time to Demodulate: Fast Physical Layer Verification of Friendly Jamming
    Wenbo Shen, Yao Liu, Xiaofan He, Huaiyu Dai, and Peng Ning
    International conference for military communications (MILCOM) 2015, [PDF]

2014

  • Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World
    Ahmed Azab, Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Guruprasad Ganesh, Jia Ma, Wenbo Shen
    In ACM Conference on Computer and Communications Security (CCS), 2014 [PDF]

  • The Security of Link Signature: A View from Channel Models
    Xiaofan He, Huaiyu Dai, Yufan Huang, Dong Wang, Wenbo Shen, and Peng Ning
    In 2014 IEEE Conference on Communications and Network Security Workshop on Physical-layer Methods for Wireless Security, [PDF]

  • MCR Decoding: A MIMO Approach for Defending Against Wireless Jamming Attacks
    Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai, and Yao Liu
    In 2014 IEEE Conference on Communications and Network Security Workshop on Physical-layer Methods for Wireless Security, 2014 [PDF]

  • An Open Source Web-Mapping System for Tourism Planning and Marketing
    Stacy Supak, Hugh Devine, Gene Brothers, Samantha Rich and Wenbo Shen
    The Journal of Travel and Tourism Marketing, 2014

  • Where Are You From? Confusing Location Distinction Using Virtual Multipath Camouflage
    Song Fang, Yao Liu, Wenbo Shen, and Haojin Zhu
    In Annual International Conference on Mobile Computing and Networking (MobiCom’14), 2014, [PDF]

2013

  • Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time
    Wenbo Shen, Peng Ning, Xiaofan He, and Huaiyu Dai
    In the IEEE Symposium on Security and Privacy (S&P ‘13), San Francisco, CA, 2013 [PDF]

  • Is Link Signature Dependable for Wireless Security?
    Xiaofan He, Huaiyu Dai, Wenbo Shen, and Peng Ning
    In IEEE International Conference on Computer Communications (INFOCOM) Mini-Conference, 2013 [PDF]

Patents

  • Method and apparatus for protecting kernel control-flow integrity using static binary instrumentation, US 2017/0140148, 2017 [PDF]
  • Apparatus and method for protection of critical embedded system components via hardware-isolated secure element-based monitor,US 2017/0098070, 2017 [[PDF]
  • Apparatus and method for transparent, secure element-based mediation of on-board diagnostic operations,US 2017/0041290 A1, 2017 [PDF]
  • Methods and apparatus to enable runtime checksum verification of block device images,US 2016/0092701, 2016 [PDF]

Education

2010 - 2015 PhD, Computer Science, North Carolina State University

  • GPA: 4/4, Focus on system and wireless security

2006 - 2010 BE, Software Engineering, Harbin Institute of Technology

  • GPA: 3.8/4, Rank: Top 2%

Awards

  • RKP Team Award, Samsung Research America B2B Lab, 2018
  • Linux On Galaxy Team Award, Samsung Research America B2B Lab, 2017
  • Distinguished Paper Award by ACM Asia Conference on Computer and Communications Security (ASIACCS), ACM SIGSAC, 2017/04 [Link]
  • Distinguished Paper Award by Network and Distributed System Security Symposium (NDSS), 2016/02 [Link]
  • Star Award, Samsung Research America B2B Lab, 2016
  • RKP Team Award, Samsung Research America B2B Lab, 2015
  • First Prize, National College Student Information Security Contest of China (全国大学生信息安全竞赛一等奖) [Link], 2009