Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Lingyun Ying is active.

Publication


Featured researches published by Lingyun Ying.


computer and communications security | 2013

Bind your phone number with caution: automated user profiling through address book matching on smartphone

Yao Cheng; Lingyun Ying; Sibei Jiao; Purui Su; Dengguo Feng

Due to the cost-efficient communicating manner and attractive user experience, messenger applications have dominated every smartphone in recent years. Nowadays, Address Book Matching, a new feature that helps people keep in touch with real world contacts, has been loaded in many popular messenger applications, which unfortunately as well brings severe privacy issues to users. In this paper, we propose a novel method to abuse such feature to automatically collect user profiles. This method can be applied to any application equipped with Address Book Matching independent of mobile platforms. We also build a prototype on Android to verify the effectiveness of our method. Moreover, we integrate profiles gathered from different messenger applications and provide insights by performing a consistency and authenticity analysis on user profile fields. As our experiments show, the abuse of Address Book Matching can cause severe user privacy leakage. Finally, we provide some countermeasures for developers to avoid this issue when designing messenger applications.


network and system security | 2014

Revisiting Node Injection of P2P Botnet

Jia Yan; Lingyun Ying; Yi Yang; Purui Su; Qi Li; Hui Kong; Dengguo Feng

Botnet armed with P2P protocol is especially robust against various attacks used to be very effective against centralized network. It’s especially significant to enhance our understanding of unstructured P2P Botnets which prove to be resilient against various dismantle efforts. Node injection technique is quite effective in enumerating infected hosts from P2P Botnets, but no previous work has investigated the effectiveness of this method in a quantitative manner. In this paper, we propose a peer popularity boosting algorithm to put the popularity of injected peer under control, and a method to tune the node injection rate to achieve better compromise between consumed bandwidth and completeness of node enumeration. Furthermore, we evaluate our methods with varied level of node injections on three live P2P Botnets, the result shows that our method is quite effective in boosting and manipulating injected peer’s popularity. In contrast to other methods without manipulation of injected peer’s magnitude of dispersion in network, our method not only unlock the full potential of node injections, but also could be adapted to measurements of various needs.


international conference on security and privacy in communication systems | 2013

Automatic Polymorphic Exploit Generation for Software Vulnerabilities

Minghua Wang; Purui Su; Qi Li; Lingyun Ying; Yi Yang; Dengguo Feng

Generating exploits from the perspective of attackers is an effective approach towards severity analysis of known vulnerabilities. However, it remains an open problem to generate even one exploit using a program binary and a known abnormal input that crashes the program, not to mention multiple exploits. To address this issue, in this paper, we propose PolyAEG, a system that automatically generates multiple exploits for a vulnerable program using one corresponding abnormal input. To generate polymorphic exploits, we fully leverage different trampoline instructions to hijack control flow and redirect it to malicious code in the execution context. We demonstrate that, given a vulnerable program and one of its abnormal inputs, our system can generate polymorphic exploits for the program. We have successfully generated control flow hijacking exploits for 8 programs in our experiment. Particularly, we have generated 4,724 exploits using only one abnormal input for IrfanView, a widely used picture viewer.


secure software integration and reliability improvement | 2009

ReconBin: Reconstructing Binary File from Execution for Software Analysis

Lingyun Ying; Purui Su; Dengguo Feng; Xianggen Wang; Yi Yang; Yu Liu

Static analysis is one of the most popular approaches of software analysis. As more and more software protects their code by transformation or encryption, then releases them at runtime dynamically, it is hard to statically analyze these protected executables because of the failure of disassembling. In this paper, we propose a novel and general technique to reconstruct binary files for static analysis by monitoring the executions of protected executables. Our approach can identify and extract the dynamically released code at runtime, and at the same time record the control transfers information, and then reconstruct a binary file based on the original executable. The whole process does not depend on any prior knowledge on the protection methods. Experiments on our prototype ReconBin show that our approach can properly reconstruct the executables protected by SMC and packers, and the reconstructed binary files can be successfully analyzed by static analysis tools such as IDA Pro. We show that it also can be used to analyze the code dynamically generated by virtual machines, emulators, and buffer overflow attacks, which also dynamically inject attack code into stack and direct execution flow to it.


international conference on information security | 2015

A Rapid and Scalable Method for Android Application Repackaging Detection

Sibei Jiao; Yao Cheng; Lingyun Ying; Purui Su; Dengguo Feng

Nowadays the security issues of Android applications (apps) are more and more serious. One of the main security threats come from repackaged apps. There already are some researches detecting repackaged apps using similarity measurement. However, so far, all the existing techniques for repackaging detection are based on code similarity or feature (e.g., permission set) similarity evaluation. In this paper, we propose a novel approach called ImageStruct that applies image similarity technique to locate and detect the changes coming from repackaging effectively. ImageStruct performs a quick repackaging detection by considering the similarity of images in target apps. The intuition behind our approach is that the repackaged apps still need to maintain the ”look and feel” of the original apps by including the original images, even they might have their additional code included or some of the original code removed. To prove the effectiveness and evaluate the reliability of our approach, we carry out the compare experiments between ImageStruct and the code based similarity scores of AndroGuard. The results demonstrate that ImageStruct is not only with good performance and scalability, but also able to resistant to code obfuscation.


trust security and privacy in computing and communications | 2014

Long Term Tracking and Characterization of P2P Botnet

Jia Yan; Lingyun Ying; Yi Yang; Purui Su; Dengguo Feng

P2P Botnet is quite robust against various attacks once very effective against centralized network. In this paper, we concentrate on the tracking of P2P botnets, investigate botnet victims which are routable on the Internet, also known as super peers. The super peers are the backbone of the botnet to disseminate its commands and payload updates. Through tracking of three typical live P2P botnets over 6 months and analysis of their network dynamics, we outline a number of descriptive and statistical characterization of super peers, such as geo-location, peer session time and intersession time, in-degree and out-degree distribution, pattern of arrival and departure. In addition, based on the assumption that IP dynamic allocation will not cross the AS (Autonomous System) border, we give out a lower bound estimate of total infected super peers in a conservative manner. We also propose several guidelines on disrupting P2P botnets concerning its various features we have characterized which could be helpful to the security community.


computational intelligence and security | 2008

Exploring Malware Behaviors Based on Environment Constitution

Purui Su; Lingyun Ying; Dengguo Feng

Executing malware in a controlled environment is one of the most popular and effective methods of extracting the behavior characters of malware. In this paper, we propose a dynamic analysis technique to explore the different behaviors of malware. We utilized environment constitution to create comprehensive reports on malware. This allowed us to extract common paths and identify what seems to be typical malware behavior. We likewise used static analysis to document interactions between malware and environment, after which, based on environment constitution, we dynamically triggered different path selections that we observed have been pursued by malware. Different malware inputs were generated based on the reverse analysis of path selection conditions, a method that allowed for the exploration of all possible malware paths, and thereby permitted us to generate a relatively comprehensive report for this study. The method also allowed us to filter invalid data that we were unable to identify in the earlier process. The method became even more helpful when we implemented vulnerability analysis among the different types of commercial software; here, a prototype of the system was set up, and we have finished experiments to evaluate the system. The result showed that the system could identify typical behaviors of malware without exploring all its possible paths.


computer and communications security | 2016

Attacks and Defence on Android Free Floating Windows

Lingyun Ying; Yao Cheng; Yemian Lu; Yacong Gu; Purui Su; Dengguo Feng

Nowadays, the popular Android is so closely involved in peoples daily lives that people rely on Android to perform critical operations and trust Android with sensitive information. It is of great importance to guarantee the usability and security of Android which, however, is such a huge system that a potential threat may arise from any part of it. In this paper, we focus on the Free Floating window (FF window) which is a category of windows that can appear freely above any other applications. It can share the screen space with other FF windows, dialogs, and activities. An FF window is flexible in both its appearance and behaviour features. We analyse the behaviour features of FF windows, including the priority in display layer and the capability of processing user-generated events. Three types of attacks via FF windows with delicate design in their appearance and behaviour features are demonstrated, i.e., DoS attack against Android system, GUI hijacking by targeting overlap, and input inference using FF windows as a side channel. To address the threat caused by FF windows, we design a priority framework for FF windows, which protects a sensitive activity/FF window declared by developers from being attacked by any malicious FF windows. A complementary solution is proposed to mitigate the confusion attack from malicious activities. Finally, we provide Android with suggestions on how to manage FF windows.


international conference on security and privacy in communication systems | 2016

Exploiting Android System Services Through Bypassing Service Helpers

Yacong Gu; Yao Cheng; Lingyun Ying; Yemian Lu; Qi Li; Purui Su

Android allows applications to communicate with system service via system service helper so that applications can use various functions wrapped in the system services. Meanwhile, system services leverage the service helpers to enforce security mechanisms, e.g. input parameter validation, to protect themselves against attacks. However, service helpers can be easily bypassed, which poses severe security and privacy threats to system services, e.g., privilege escalation, function execution without users’ interactions, system service crash, and DoS attacks. In this paper, we perform the first systematic study on such vulnerabilities and investigate their impacts. We develop a tool to analyze all system services in the newly released Android system. Among the 104 system services and over 3,400 system service methods in the system, we discover 22 vulnerable service interfaces that can be exploited to launch real-world attacks. Furthermore, we implement and construct attacks to demonstrate the impacts of these vulnerabilities. In particular, by utilizing these vulnerabilities, these attacks result in implicit user fingerprint authentication in background, NFC data retrieval in background, Bluetooth service crash, and Android system crash.


recent advances in intrusion detection | 2015

Xede: Practical Exploit Early Detection

Meining Nie; Purui Su; Qi Li; Zhi Wang; Lingyun Ying; Jinlong Hu; Dengguo Feng

Code reuse and code injection attacks have become the popular techniques for advanced persistent threat APT to bypass exploit-mitigation mechanisms deployed in modern operating systems. Meanwhile, complex, benign programs such as Microsoft Office employ many advanced techniques to improve the performance. Code execution patterns generated by these techniques are surprisingly similar to exploits. This makes the practical exploit detection very challenging, especially on the Windows platform. In this paper, we propose a practical exploit early detection system called Xede to comprehensively detect code reuse and code injection attacks. Xede can effectively reduce false positives and false negatives in the exploit detection. We demonstrate the effectiveness of Xede by experimenting with exploit samples and deploying Xede on the Internet. Xede can accurately detect all types of exploits. In particular, it can capture many exploits that cannot be captured by mainstream anti-virus software and detect exploits that fail to compromise the systems due to variations in the system configurations.

Collaboration


Dive into the Lingyun Ying's collaboration.

Top Co-Authors

Avatar

Purui Su

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Dengguo Feng

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Yi Yang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Yao Cheng

Singapore Management University

View shared research outputs
Top Co-Authors

Avatar

Qi Li

Tsinghua University

View shared research outputs
Top Co-Authors

Avatar

Yacong Gu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Yemian Lu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Jia Yan

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Sibei Jiao

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Qi Li

Tsinghua University

View shared research outputs
Researchain Logo
Decentralizing Knowledge