Long Cheng

alt text 

Long Cheng, Ph.D.
Assistant Professor

School of Computing
Clemson University
Clemson, SC 29634

Email: lcheng2@clemson.edu
Office: McAdams 219
Google Scholar

News

  • [Paper] 05/2021: One paper on Privacy Policy Analysis of Voice Assistant Applications was accepted by the IEEE Security & Privacy Magazine (invited), 2021.

  • [Grant] 05/2021: NSF grant from SaTC-EDU program (as PI).

  • [Paper] 04/2021: One paper on Memory Corruption Attacks and Defenses was accepted by the ACM Transactions on Privacy and Security, 2021.

  • [Service] 03/2021: Serve as a Publicy Chair for IEEE Secure Development Conference (SecDev 2021). Please submit your work!

  • [Paper] 03/2021: One paper on Deep Learning-based Binary Code Similarity Detection was accepted by IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2021.

  • [Paper] 02/2021: One survey paper on Deep Learning-Based Anomaly Detection in Cyber-Physical Systems was accepted by the ACM Computing Surveys, 2021.

  • [Paper] 12/2020: One paper on Visual Cyberbullying Detection was accepted by the Network and Distributed System Security Symposium (NDSS) 2021.

  • [Paper] 12/2020: One paper on IoT Cyber-Physical Security was accepted by the Network and Distributed System Security Symposium (NDSS) 2021.

  • [Award] 12/2020: Our paper received Distinguished Paper Award at the Annual Computer Security Applications Conference (ACSAC) 2020.

  • [Award] 12/2020: Google awarded us an Abuse Research Grant to support our research in abuse risks in Google products.

  • [Paper] 10/2020: One paper on Secure LoRa Communications was accepted by ACM Conference on Embedded Networked Sensor Systems (SenSys) 2020.

  • [Paper] 09/2020: One paper on analyzing COVID-19-related hate speech was accepted by IEEE International Conference on Machine Learning and Applications (ICMLA) 2020.

  • [Paper] 09/2020: One paper on Trustworthiness of Skill Certification in Voice Personal Assistant Platforms was accepted by ACM Conference on Computer and Communications Security (CCS), 2020.

  • [Paper] 08/2020: One paper on Privacy Policy Analysis for Voice Assistant Applications was accepted by The Annual Computer Security Applications Conference (ACSAC) 2020.

  • [Award] 08/2020: Google awarded us another bug bounty for discovering abuse risks of Google Actions.

  • [Paper] 07/2020: One paper on IoT Traffic Privacy Leakage Analysis was accepted by IEEE Internet of Things Journal, 2020.

  • [Media] 07/2020: The Register and some others reported our work on measuring the ineffectiveness of privacy policies for voice-apps.

  • [Award] 07/2020: Google awarded us $5,000 bug bounty for discovering vulnerabilities of Google Actions.

  • [Media] 07/2020: The Register, Washington Internet Daily, ZDNet and some others reported our work on measuring the trustworthiness of Alexa's skills certification.

  • [Service] 06/2020: Serve on the TPC of IEEE International Conference on Computer Communications (INFOCOM 2021).

  • [Paper] 06/2020: One paper on Network Attack Surface was accepted by IEEE SecDev 2020.

  • [Grant] 06/2020: NSF grant from RAPID program (as Co-PI).

  • [Paper] 02/2020: Two papers on IoT Security were accepted by ACM ASIACCS 2020.

  • [Service] Serve on the TPC of Annual Computer Security Applications Conference (ACSAC 2020).

  • [Service] Serve on the TPC of IEEE Conference on Communications and Network Security (IEEE CNS 2020).

  • [Paper] One paper was accepted by IEEE Transactions on Wireless Communications (TWC).

  • [Paper] One paper on Data-Oriented Attacks was accepted by IEEE SecDev 2019.

  • [Paper] One paper on Edge Computing was accepted by IEEE/ACM IWQoS 2019.

  • [Paper] One paper on Blockchain was accepted by IEEE ICDCS 2019.

  • [Paper] One paper on CPS Security was accepted by IEEE Transactions on Dependable and Secure Computing (TDSC).

  • [Media] TechXplore's report on our work on data-oriented attacks and defenses.

  • [Service] Serve on the TPC of IEEE International Conference on Computer Communications and Networks (ICCCN 2019).

  • [Service] Elsevier Physical Communication (IF: 1.522), Special Issue on Big Data Driven Millimeter Wave Systems. Submission deadline: September 1, 2019.

Bio

I received my second PhD in Computer Science (with a focus on cyber security) from Virginia Tech USA in 2018, and the first PhD (with a focus on wireless networking) from Beijing University of Posts and Telecommunications China in 2012. During the period from 02/2012 to 08/2015, I worked as a Research Fellow at Singapore University of Technology and Design, and then a Research Scientist at A*STAR Institute for Infocomm Research (I²R), Singapore. From 06/2009 to 10/2011, I was a research assistant at Hong Kong Polytechnic University and University of Texas at Arlington, respectively. I received the Best Paper Award from IEEE Wireless Communications and Networking Conference (WCNC) in 2013, the Erasmus Mundus Scholar Award in 2014, and the Pratt Fellowship at Virginia Tech in 2017.

Research Interests

  • System and Software Security

  • Network Security

  • Security and Privacy in Cyber-Physical Systems (CPS) and Internet-of-Things (IoT)

  • Mobile Computing and Wireless Networks

Teaching

  • CPSC-8580 Security in Emerging Computing and Networking Systems (Graduate Level, Fall 2021)

  • CPSC-8810 Selected Topics: Advanced Software and System Security (Graduate Level, Spring 2021)

  • CPSC-4200/6200 Computer Security Principles (Undergraduate/Graduate Level, Spring 2021)

  • CPSC9500 Computer Science Seminar (Graduate Level, Fall 2020)

  • CPSC-4200/6200 Computer Security Principles (Undergraduate/Graduate Level, Fall 2020)

  • CPSC-3600 Network and Network Programming (Undergraduate Level, Spring 2020)

  • CPSC-4200/6200 Computer Security Principles (Undergraduate/Graduate Level, Fall 2019)

  • CPSC9500 Computer Science Seminar (Graduate Level, Fall 2019)

  • CPSC-3600 Network and Network Programming (Undergraduate Level, Spring 2019)

  • CPSC-8810 Selected Topics: Software Security (Graduate Level, Fall 2018)

Selected Publications (More…)

Since 2018

  • Long Cheng, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, N. Asokan, Danfeng (Daphne) Yao, “Exploitation Techniques for Data-Oriented Attacks with Existing and Potential Defense Approaches”, ACM Transactions on Privacy and Security (TOPS), April 2021.

  • Shouguo Yang, Long Cheng, Yicheng Zeng, Zhe Lang, Hongsong Zhu, Zhiqiang Shi, “Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection”, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2021.

  • Yuan Luo, Ya Xiao, Long Cheng, Guojun Peng, Danfeng (Daphne) Yao, “Deep Learning-Based Anomaly Detection in Cyber-Physical Systems: Progress and Opportunities”, ACM Computing Surveys (CSUR), 2021.

  • Nishant Vishwamitra, Hongxin Hu, Feng Luo, Long Cheng, “Towards Understanding and Detecting Cyberbullying in Real-world Images”, Proceedings of the 28th Network and Distributed System Security Symposium (NDSS), 2021. (Acceptance rate: 87/573 = 15.2%).

  • Wenbo Ding, Hongxin Hu, Long Cheng, “IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery”, Proceedings of the 28th Network and Distributed System Security Symposium (NDSS), 2021. (Acceptance rate: 87/573 = 15.2%).

  • Long Cheng, Christin Wilson, Song Liao, Jeffrey Young, Daniel Dong, Hongxin Hu, “Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms”, ACM Conference on Computer and Communications Security (CCS), 2020. (Acceptance rate: 121/715 = 16.9%).

  • Song Liao, Christin Wilson, Long Cheng, Hongxin Hu and Huixing Deng, “Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications”, Annual Computer Security Applications Conference, (ACSAC), Dec 7-11, 2020. (Acceptance rate: 23%), (Distinguished Paper Award).

  • Nishant Vishwamitra, Ruijia Roger Hu, Feng Luo, Long Cheng, Matthew Costello, Yin Yang, “On Analyzing COVID-19-related Hate Speech Using BERT Attention”, IEEE International Conference on Machine Learning and Applications (ICMLA), 2020.

  • Yuan Luo, Long Cheng, Hongxin Hu, Guojun Peng, Danfeng (Daphne) Yao, “Context-rich Privacy Leakage Analysis through Inferring Apps in Smart Home IoT”, in IEEE Internet of Things Journal (IoTJ), 2020

  • Douglas Everson, Long Cheng, “Network Attack Surface Simplification for Red and Blue Teams”, IEEE Secure Development Conference (SecDev), Sept, 2020.

  • Sihan Yu, Xiaonan Zhang, Pei Huang, Linke Guo, Long Cheng and Kuangching Wang, “AuthCTC: Defending Against Waveform Emulation Attack in Heterogeneous IoT Environments”, 15th ACM ASIA Conference on Computer and Communications Security (ASIACCS), Taipei, Taiwan, June 1-5, 2020. (Acceptance rate: 21.7%).

  • Fei Ding, Hongda Li, Feng Luo, Hongxin Hu, Long Cheng, Hai Xiao and Rong Ge, “DeepPower: Early Detection of IoT Malware through Fine-grained Activity Recognition using Power Side Channels”, 15th ACM ASIA Conference on Computer and Communications Security (ASIACCS), Taipei, Taiwan, June 1-5, 2020. (Acceptance rate: 21.7%).

  • Long Cheng, Linghe Kong, Yongjia Song, Jianwei Niu, Chengwen Luo, Yu Gu, Shahid Mumtaz, Tian He, “Adaptive Forwarding with Probabilistic Delay Guarantee in Low-Duty-Cycle Wireless Sensor Networks”, in IEEE Transactions on Wireless Communications (TWC), 2020

  • Long Cheng, Hans Liljestrand, Md Salman Ahmed, Thomas Nyman, Danfeng (Daphne) Yao, Trent Jaeger, N. Asokan, “Exploitation Techniques and Defenses for Data-Oriented Attacks”, IEEE Secure Development 2019 (SecDev) , McLean, VA, 2019

  • Yutong Liu, Linghe Kong and Muhammad Hassan, Long Cheng, Guangtao Xue, Guihai Chen, “Litedge: Towards Light-weight Edge Computing for Efficient Wireless Surveillance System”, IEEE/ACM International Symposium on Quality of Service (IWQoS), Phoenix, Arizona, USA, 2019, (Best Paper Runner-up)

  • Junqin Huang, Linghe Kong, Guihai Chen, Long Cheng, Kaishun Wu, Xue Liu. “B-IoT: Blockchain Driven Internet of Things with Credit-Based Consensus Mechanism”. The 39th IEEE International Conference on Distributed Computing Systems (ICDCS), Dallas, Texas, USA, 2019. (Acceptance rate: 19.6%).

  • Long Cheng, Ke Tian, Danfeng (Daphne) Yao, Lui Sha, Raheem A. Beyah, “Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems”, in IEEE Transactions on Dependable and Secure Computing (TDSC), 2019

  • Yutong Liu, Linghe Kong, Yifeng Cao, Vahan Sarafian, Long Cheng, Guihai Chen, “Stop Unauthorized Access to Your Smart Devices”, The 24th International Conference on Parallel and Distributed Systems (ICPADS), Singapore, December 2018

Before 2018

  • Long Cheng, Ke Tian, Danfeng Yao. “Enforcing Cyber-Physical Execution Semantics to Defend Against Data- Oriented Attacks”, in Annual Computer Security Applications Conference (ACSAC). Puerto Rico, US. Dec. 2017. (Acceptance rate: 19.7%).

  • Sazzadur Rahaman, Long Cheng, Danfeng Yao, He Li, and Jung-Min Park. “Provably Secure Anonymous-yet- Accountable Crowdsensing with Scalable Sublinear Revocation”, in The 17th Privacy Enhancing Technologies Symposium (PETS). Minneapolis, MN. Jul. 2017 (Acceptance rate: 21.7%)

  • Long Cheng, Yu Gu, Jianwei Niu, Ting Zhu, Cong Liu, Qingquan Zhang, Tian He. “Taming Collisions for Delay Reduction in Low-Duty-Cycle Wireless Sensor Networks”, In IEEE International Conference on Computer Communications (INFOCOM), San Francisco, CA, USA, 2016. (Acceptance rate: 18%)

  • Long Cheng, Jianwei Niu, Yu Gu, Tian He and Qingquan Zhang, “Energ Efficient Statistical Delay Guarantee for Low-Duty-Cycle Wireless Sensor Networks”, in IEEE International Conference on Sensing, Communication, and Networking (SECON), Seattle, WA, USA, 2015. (Acceptance rate: 27%)

  • Long Cheng, Linghe Kong, Chengwen Luo, Jianwei Niu, Yu Gu, Wenbo He. “Short: False Data Detection and Correction Framework for Participatory Sensing”, in IEEE/ACM International Symposium on Quality of Service (IWQoS), Portland, Oregon, USA, 2015

  • Junghyun Jun, Long Cheng, Liang He, Yu Gu, Ting Zhu, “Exploiting Sender-Based Link Correlation in Wireless Sensor Networks”, IEEE International Conference on Network Protocols (ICNP), North Carolina, USA, (Oct 2014). (Acceptance rate: 20%)

  • Long Cheng, Yu Gu, Tian He and Jianwei Niu, “Dynamic Switching-based Reliable Flooding in Low-Duty-Cycle Wireless Sensor Networks”, In IEEE International Conference on Computer Communications (INFOCOM), Turin, Italy, April, 2013. (Acceptance rate: 17%)

  • Jianwei Niu, Long Cheng*, Yu Gu, Junghyun Jun and Qingquan Zhang, “Minimum-Delay and Energy-E icient Flooding Tree in Asynchronous Low-Duty-Cycle Wireless Sensor Networks”, In IEEE Wireless Communications and Networking Conference (WCNC’13), Shanghai, China, April, 2013. Best Paper Award (*Corresponding author)

  • JunghyunJun, Yu Gu, Long Cheng, Banghui Lu, Jun Sun, Ting Zhu and Jianwei Niu, “Social-Loc:ImprovingIndoor Localization with Social Sensing”, In ACM Conference on Embedded Networked Sensor System (SenSys), Rome, Italy, November, 2013. (Acceptance rate: 17%)

  • Long Cheng, Fang Liu, Danfeng (Daphne) Yao, “Enterprise Data Breach: Causes, Challenges, Prevention, and Future Directions”, in WIREs Data Mining and Knowledge Discovery, 2017

  • Long Cheng, Jianwei Niu, Chengwen Luo, Linghe Kong, Zhiwei Zhao, Yu Gu, “Towards Minimum-Delay and Energy-Efficient Flooding in Low-Duty-Cycle Wireless Sensor Networks”, in Elsevier Computer Networks, 2017

  • Long Cheng, Dinil Mon Divakaran, Aloysius Ang, Wee Yong Lim, Vrizlynn L. L. Thing, “FACT: A Framework for Authentication in Cloud-based IP Traceback”, in IEEE Transactions on Information Forensics and Security (TIFS), 2017

  • Long Cheng, Jianwei Niu, Linghe Kong, Chengwen Luo, Yu Gu, Wenbo He, Sajal K. Das, “Compressive Sensing based Data Quality Improvement for Crowd-Sensing Applications”, in Journal of Network and Computer Applications (JNCA), 2017

  • Chengwen Luo, Long Cheng*, Mun Choon Chan, Yu Gu, “Self-bootstrapping Fine-grained Passive Indoor Localization Using WiFi Monitors”, in IEEE Transactions on Mobile Computing (TMC), 2016. (*Corresponding author)

  • Long Cheng, Jianwei Niu, Yu Gu, Tian He. “Achieving Efficient Reliable Flooding in Low-Duty-Cycle Wireless Sensor Networks”, in IEEE/ACM Transactions on Networking (ToN), 2016.

  • Long Cheng, Dinil Mon Divakaran, Wee Yong Lim, Vrizlynn L. L. Thing, “Opportunistic Piggyback Marking for IP Traceback”, in IEEE Transactions on Information Forensics and Security (TIFS), 2016.

  • Long Cheng, Jianwei Niu, Mario Di Francesco, Sajal K. Das, and Yu Gu, “Seamless Streaming Data Delivery in Cluster-based Wireless Sensor Networks with Mobile Elements”, in IEEE Systems Journal (IJS), 2016

  • Long Cheng, Jianwei Niu, Jiannong Cao and Sajal K. Das and Yu Gu, “QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks”, in IEEE Transactions on Parallel and Distributed Systems (TPDS), 25(7), 1864-1875, 2014.

  • Jianwei Niu, Long Cheng*, Yu Gu, Lei Shu and Sajal K. Das, “R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Networks”, in IEEE Transaction on Industrial Informatics (TII), 10(1), 784-794, 2014. (*Corresponding author)

  • Yu Gu, Long Cheng*, Jianwei Niu, Tian He, and David Hung-Chang Du, “Achieving Asymmetric Sensing Coverage for Duty Cycled Wireless Sensor Networks”, in IEEE Transactions on Parallel and Distributed Systems (TPDS), 25(12), 3076-3087, 2014. (*Corresponding author)