I'm Wei Wu.

Ph.D. Candidate at University of Chinese Academy of Sciences(中国科学院大学)

Wei Wu 吴炜 ww9210

Email: ww9210 [AT] gmail [DOT] com

Blog: ww9210.cn Github: ww9210

About Me

I am a fifth-year Ph.D candidate at University of Chinese Academy of Sciences(UCAS), my advisor is Prof. Wei Zou, my co-advisor is Xiaorui Gong. I was a Research Scientist at Pennsylvania State University, under supervision of Dr. Xinyu Xing. I received Bachelor degree from Department of Information Security, University of Science and Technology of China(USTC) in 2014.

My research direction is system security, including vulnerability exploitability, program analysis for exploitability evaluation, exploit generation for OS kernels and knowledge driven approaches for vulnerability analysis.

I started participating various CTF competitions since 2015. I enjoy constructing weird machines and programming with them. here is my blog about CTF games and research experience. I am a co-founder of CTF team Never Stop Exploiting (NeSE). I help organize and craft challenges for X-NUCA(全国高校网安联赛) since 2016.

Awards:

National Cyber Security Award 2016.

National Scholarship for graduate student 2015.

Publications:

System Security

  • KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities

Wei Wu, Yueqi Chen, Xinyu Xing, Wei Zou.

In Proceedings of the 28th USENIX Security Symposium 2019 (accepted).

  • FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities

Wei Wu, Yueqi Chen, Jun Xu, Xinyu Xing, Xiaorui Gong and Wei Zou.

In Proceedings of the 27th USENIX Security Symposium 2018 .

  • 面向动态代码生成的攻防技术综述

Wei Wu, Wei Huo and Wei Zou.

信息安全学报, 2016, vol4.

Video coding

  • Motion blur compensation in HEVC using fixed-length adaptive filter.

Yiqun Liu, Wei Wu, and Jörn Ostermann.

In proceedings of Picture Coding Symposium, PCS 2015.

Machine Learning

  • Rating Correlated Topic Model: An Improved Latent Semantic Model for Collaborative Filtering.

Xiang Qi, Wei Wu, Yu Huang, et al.

Journal of Computational Information Systems, 2014.

Invited talk:

  • From Thousands of Hours to a Couple of Minutes: Towards Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities [link|slides]

Wei Wu, Xinyu Xing and Jimmy Su.

Black Hat USA 2018.


Part of the CTFs I played:

6th place, DEF CON CTF final 2018 (with Tea Delivers)

9th place, Tencent CTF final 2018

7th place, RCTF 2018

6th place, QWB 2018

3rd place, RCTF 2017

4th place, Codebreaker 2017

4th place, NJCTF 2017

6th place, 0CTF 2017

6th place, CISCN CTF final 2016


2nd place, CISCN CTF quals 2016

10th place, TCTF 2017

13th place, 34C3 CTF 2017

17th place, HITCON CTF 2017

20th place, DEFCON quals 2017

21st place, Plaid CTF 2017

1st place XCTF team in AliCTF 2016.

1st place in ISCC2016.

Professional services:

1. CCS 2018 external reviewer

2. ASIACCS 2018 external reviewer

3. ICICS 2018 external reviewer

4.XNUCA-2016 Reverse, Pwn, AI and Final co-organizer and challenge designer

5.XNUCA-2017 final co-organizer and challenge designer