General

Dr. Lingguang Lei

Associate Researcher

Institute of Information Engineering, CAS




Research Areas

mobile security, container security, network security

Education

2007/09--2013/07 Ph.D., Institute of Information Engineering, Chinese Academy of Sciences

2003/09--2007/07 Bachelor's degree, University of Science and Technology of China


Publications

[CCS 2020]Jie Wang, Kun Sun, Lingguang Lei, Shengye Wan, Yuewu Wang, Jiwu Jing:

Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive Data in Isolated Execution Environments.CCS 2020: 1001-1015

[ISC 2020]Yifei Wu, Lingguang Lei, Yuewu Wang, Kun Sun, Jingzi Meng:

Evaluation on the Security of Commercial Cloud Container Services. ISC 2020: 160-177

[MSN 2020]Yingjiao Niu, Lingguang Lei, Yuewu Wang, Jiang Chang, Shijie Jia, Chunjing Kou:

SASAK: Shrinking the Attack Surface for Android Kernel with Stricter "seccomp" Restrictions. MSN 2020: 387-394

[SenSys 2020]Jie Wang, Yuewu Wang, Lingguang Lei, Kun Sun, Jiwu Jing, Quan Zhou:

TrustICT: an efficient trusted interaction interface between isolated execution domains on ARM multi-core processors. SenSys 2020: 271-284

[TrustCom 2020]Shan Liang, Yuewu Wang, Lingguang Lei, Jiwu Jing, Quan Zhou:

SecureESFS: Sharing Android External Storage Files in A Securer Way. TrustCom 2020: 1339-1347

[TDSC 2019]​Huan Chang, Lingguang Lei, Kun Sun, Yuewu Wang, Yi He, Pingjian Wang. Vulnerable Service Invocation and Countermeasures. IEEE Transactions on Dependable and Secure Computing. (2019)

[Computers&Security 2019]Chong Guan, Kun Sun, Lingguang Lei, Pingjian Wang, Yuewu Wang, Wei Chen:

DangerNeighbor attack: Information leakage via postMessage mechanism in HTML5. Comput. Secur. 80: 291-305 (2019)

[ESORICS 2019]Dawei Chu, Yuewu Wang, Lingguang Lei, Yanchu Li, Jiwu Jing, Kun Sun:

OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform. ESORICS (2) 2019: 412-438

[ICC 2019]Yang Cai, Yuewu Wang, Lingguang Lei, Quan Zhou, Jun Li:

SuiT: Secure User Interface Based on TrustZone. ICC 2019: 1-7

[ISCC 2019]Yang Cai, Yuewu Wang, Lingguang Lei, Quan Zhou:

ALTEE: Constructing Trustworthy Execution Environment for Mobile App Dynamically. ISCC 2019: 1-7

[ACSAC 2018]Xin Lin, Lingguang Lei, Yuewu Wang, Jiwu Jing, Kun Sun, Quan Zhou:

A Measurement Study on Linux Container Security: Attacks and Countermeasures. ACSAC 2018: 418-429

[INSCRYPT 2018]Yafei Ji, Luning Xia, Jingqiang Lin, Qiongxiao Wang, Lingguang Lei, Li Song:

Chord: Thwarting Relay Attacks Among Near Field Communications. Inscrypt 2018: 329-348

[ICISC 2018]Sisi Yuan, Yuewu Wang, Pingjian Wang, Lingguang Lei, Quan Zhou, Jun Li:

How to Block the Malicious Access to Android External Storage. ICISC 2018: 287-303

[CCS 2017]Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, Jian Weng:

Vulnerable Implicit Service: A Revisit. CCS 2017: 1051-1063

[DIMVA 2017]Lingguang Lei, Jianhua Sun, Kun Sun, Chris Shenefiel, Rui Ma, Yuewu Wang, Qi Li:

SPEAKER: Split-Phase Execution of Application Containers. DIMVA 2017: 230-251

[CODASPY 2015]Zhongwen Zhang, Peng Liu, Ji Xiang, Jiwu Jing, Lingguang Lei:

How Your Phone Camera Can Be Used to Stealthily Spy on You: Transplantation Attacks against Android Camera Service. CODASPY 2015: 99-110

[ACISP 2014]Zhongwen Zhang, Yuewu Wang, Jiwu Jing, Qiongxiao Wang, Lingguang Lei:

Once Root Always a Threat: Analyzing the Security Threats of Android Permission System. ACISP 2014: 354-369

[ICISC 2014]Xueqiang Wang, Yuewu Wang, Limin Liu, Lingguang Lei, Jiwu Jing:

WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps. ICISC 2014: 255-268

[Secure Comm 2014]Zhongwen Zhang, Ji Xiang, Lei Wang, Lingguang Lei:

Transplantation Attack: Analysis and Prediction. SecureComm (2) 2014: 367-374

[Journal of Computer Research and Development 2014]Lingguang Lei, Jiwu Jing, Yuewu Wang, Zhongwen Zhang:

A behavior-based system resources access control scheme for Android.Journal of Computer Research and Development. 2014, 51(5):1028-1038. 

[TrustCom 2013]Lingguang Lei, Yuewu Wang, Jian Zhou, Lei Wang, Zhongwen Zhang:

A Threat to Mobile Cyber-Physical Systems: Sensor-Based Privacy Theft Attacks on Android Smartphones. TrustCom/ISPA/IUCC 2013: 126-133

[ICISC 2012]Lingguang Lei, Yuewu Wang, Jiwu Jing, Zhongwen Zhang, Xingjie Yu:

MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring. ICISC 2012: 78-91

Conferences

Professional Services

[1] TPC Member: SciSec 2021

[2] Travel Co-Chair: CNS 2021

Students

已指导学生

常江  硕士研究生  085211-计算机技术  

冯晓娟  硕士研究生  085412-网络与信息安全  

现指导学生

杨慧  硕士研究生  085412-网络与信息安全  

魏来  硕士研究生  085412-网络与信息安全  

马文涛  硕士研究生  085412-网络与信息安全  

叶钰莹  硕士研究生  085412-网络与信息安全  

吴则平  硕士研究生  083900-网络空间安全  

Honors & Distinctions

[1] Excellent Cryptographic Evaluation Staff, 2019

[2] Secure Software Implementation of Domestic Commercial Cryptographic Algorithm and its Application in Important Fields, First Prize, Provincial and Ministerial Level, 2015

[3] Outstanding Graduate Award by the University of Chinese Academy of Sciences, 2013