Zhiniang Peng

Work

    I am a security researcher at Qihoo 360 Core Security. My main research area is cyber security. My work focuses on applied cryptography, software security and threat hunting. In the meantime, I am also interested in finding and researching on new security threats and directions. 

Background

    I started learning cybersecurity when I was a middle school student (Since 2003) and started taking part-time job on cybersecurity when I was a high school student. I did B.E. in material science in South China University of Technology (SCUT) from 2009 to 2013. After spending 4 years in material science, I decided to return to cybersecurity. I get my Ph.D degree in Post-Quantum Cryptography in SCUT from 2013 to 2017. After that, I joined Qihoo 360 Core Security.

Contact: 

Twitter: @edwardzpeng

Github: edwardz246003



Papers:
  Qin Wang, Jiangshan Yu, Zhiniang Peng , Vancuong Bui , Shiping Chen, Yong Ding : Security Analysis on dBFT protocol of NEO.  FC2020 (2020)
    Yiming Wu, Shaohua Tang, Bowen Zhao, Zhiniang Peng: BPTM: Blockchain-Based Privacy-Preserving Task Matching in Crowdsourcing. IEEE Access 7: 45605-45617 (2019)
    Shibin Zhao, Yuanhao Deng, Zhiniang Peng*Improved Meet-in-the-Middle Attacks on Generic Feistel Constructions. IEEE Access 7: 34416-34424 (2019)   
    Bo LvZhiniang PengShaohua TangPrecomputation Methods for UOV Signature on Energy-Harvesting Sensors. IEEE Access 656924-56933 (2018)
    Zhiniang PengShaohua TangCirculant UOV: a new UOV variant with shorter private key and faster signature generation. TIIS 12(3)1376-1395 (2018)
    Zhiniang PengYuki ChenAll roads lead to Rome: Many ways to double spend your cryptocurrency. CoRR abs/1811.06751 (2018)
    Zhiniang PengShaohua TangCirculant Rainbow: A New Rainbow Variant With Shorter Private Key and Faster Signature Generation. IEEE Access 511877-11886 (2017)
    Zhiniang PengShaohua TangLinzhi JiangA Symmetric Authenticated Proxy Re-encryption Scheme with Provable Security. ICCCS (2) 201786-99
    Bo LvZhiniang PengShaohua TangA Secure Variant of the SRP Encryption Scheme with Shorter Private Key. ISPEC 2017156-167
    Zhiniang PengShaohua TangJu ChenChen WuXinglin ZhangFast Implementation of Simple Matrix Encryption Scheme on Modern x64 CPU. ISPEC 2016151-166
    Shaohua TangBo LvGuomin ChenZhiniang PengAdama DieneXiaofeng ChenEfficient hardware implementation of PMI+ for low-resource devices in mobile cloud computing. Future Generation Comp. Syst. 52116-124 (2015)
    Shaohua TangBo LvGuomin ChenZhiniang PengEfficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs. ISPEC 2014187-201
    Shaohua TangBo LvGuomin ChenZhiniang PengEfficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs. IACR Cryptology ePrint Archive 2013878 (2013)
     , .  2017
     FPGA认证设计 . 2013

Patents:
     
    ()2018.
    ()2018.
    线线()2017.
    ()2016.
    认证()2016


Talks and Articles:

    Zhiniang Peng, Attacks on shadowsocks ciphers, Article. 2019 

    Zhiniang Peng, Yuki Chen, All roads lead to Rome: Many ways to double spend your cryptocurrency, Article. 2018 

    Zhiniang PengNot A Fair Game – Fairness Analysis of Dice2win, Article. 2018

    Zhiniang PengAnalysis and Improvement of NEO dBFT Consensus Mechanism ,Article. 2018 

    Zhiniang PengNEO Smart Contract Platform Runtime Serialize Calls DoS, Article. 2018 

    Yuki Chen, Zhiniang PengEOS Node Remote Code Execution Vulnerability — EOS WASM Contract Function Table Array Out of Bounds , Article. 2018 

    Zhiniang PengAttackers Fake Computational Power to Steal Cryptocurrencies from Mining Pools, Article. 2018 

    Zhiniang PengBitpie Key Recovery vulnerability, Article. 2018 

    Zhiniang Peng, Yi Zhang, Proposal for suggested texts for ITU-T X.stov Security threats to online voting using distributed ledger technology,Draft Standard. 2018

    Zhiniang Peng, Yi Zhang, Proposal for suggested texts for Security framework for Distributed Ledger Technology, Draft Standard. 2018

    Zhiniang Peng, Yi Zhang, Proposal for suggested texts for the X.sct-dlt Security capabilities of and threats to Distributed Ledger Technology,Draft Standard. 2018

    Zhiniang Peng, Yi Zhang, Proposal for suggested texts for X.strdlt The security threats and requirements for digital payment services based on distributed ledger technology, Draft Standard. 2018

    Zhiniang Peng, Security Risks in Zero Knowledge Proof Cryptocurrencies, Presentation in PacSec 2019.

    Zhiniang Pengdanger of using fully homomorphic encryption, a look at microsoft seal, Presentation in Cansecwest, Opcde, Overdrive 2019.

    Zhiniang PengMany way to double spend your cryptocurrency, Presentation, NEO devcon 2019.  

    Zhiniang PengSome Security Risks for DLT, Presentation, ITU-SG17. 2018

    Zhiniang PengSome Mining Related Attacks, Presentation, Monero village, Defcon26. 2018 

    Zhiniang PengEOS Node Remote Code Execution Vulnerability, Presentation, EOS devcon 2018. 

    , Presentation, 360放日2018 

    , Presentation, BCcon2018.

     BCHOp-code, Presentation, BCH meetup Beijing 2018.

    Zhiniang Peng. Chen Wu, IIS remote code execution, Article. 2017 

     linux, Presentation, VSRC. 2017 

     方教, Article. 2012 

     , Article. 2012 

      Struts2, Code. 2012 

     , Article. 2011 


Softwares:
    WhiteBox crypto library, https://jiagu.360.cn
    SDK for secure communicationhttps://jiagu.360.cn
    Secure data exchange platfromhttps://jiagu.360.cn
    Bitcoin cash forkhttps://github.com/bitcoincandyofficial
    Caichuang Sha,an open source Sanguosha game with addtional heroes, https://github.com/edwardz246003/-Three-Kingdoms-Kill-sanguosha-
    DAA simulatorhttps://github.com/edwardz246003/DAA_simulator