Jingqiang Lin

ORCID: 0000-0003-1508-4879
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Security and Verification in Computing
  • Cryptographic Implementations and Security
  • Advanced Malware Detection Techniques
  • Cryptography and Residue Arithmetic
  • Chaos-based Image/Signal Encryption
  • Cloud Data Security Solutions
  • Internet Traffic Analysis and Secure E-voting
  • Coding theory and cryptography
  • Network Security and Intrusion Detection
  • Access Control and Trust
  • Advanced Authentication Protocols Security
  • Privacy-Preserving Technologies in Data
  • Parallel Computing and Optimization Techniques
  • Cellular Automata and Applications
  • Advanced Data Storage Technologies
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Information and Cyber Security
  • User Authentication and Security Systems
  • Distributed systems and fault tolerance
  • Digital and Cyber Forensics
  • Computational Physics and Python Applications
  • Anomaly Detection Techniques and Applications
  • Neural Networks and Applications
  • Adversarial Robustness in Machine Learning

University of Science and Technology of China
2020-2025

Chinese Academy of Sciences
2009-2024

University of Science and Technology Beijing
2021-2024

Academy of Mathematics and Systems Science
2024

University of Georgia
2021

Institute of Information Engineering
2012-2020

Data Assurance and Communication Security
2014-2020

University of Chinese Academy of Sciences
2010-2020

State Key Laboratory of Information Security
2017

Institute of Software
2014

With the exponential growth of cyber-physical systems (CPSs), new security challenges have emerged. Various vulnerabilities, threats, attacks, and controls been introduced for generation CPS. However, there lacks a systematic review CPS literature. In particular, heterogeneity components diversity made it difficult to study problem with one generalized model. this paper, we systematize existing research on under unified framework. The framework consists three orthogonal coordinates: 1) from...

10.1109/jiot.2017.2703172 article EN publisher-specific-oa IEEE Internet of Things Journal 2017-05-12

Cryptography plays an important role in computer and communication security. In practical implementations of cryptosystems, the cryptographic keys are usually loaded into memory as plaintext, then used algorithms. Therefore, private subject to disclosure attacks that read unauthorized data from RAM. Such could be performed through software methods (e.g., Open SSL Heart bleed) even when integrity victim system's executable binaries is maintained. They also physical Cold-boot on RAM chips)...

10.1109/sp.2015.8 article EN IEEE Symposium on Security and Privacy 2015-05-01

Cryptographic systems are essential for computer and communication security, instance, RSA is used in PGP Email clients AES employed full disk encryption. In practice, the cryptographic keys loaded stored RAM as plain-text, therefore vulnerable to physical memory attacks (e.g., cold-boot attacks). To tackle this problem, we propose Copker, which implements asymmetric cryptosystems entirely within CPU, without storing plain-text private RAM. its active mode, Copker stores kilobytes of...

10.14722/ndss.2014.23125 article EN 2014-01-01

To detect fraudulent TLS server certificates and improve the accountability of certification authorities (CAs), certificate transparency (CT) is proposed to record in publicly-visible logs, from which monitors fetch all watch for suspicious ones. However, if monitors, either domain owners themselves or third-party services, fail return a complete set issued interest, potentially may not be detected then CT framework becomes less reliable. This paper presents first systematic study on...

10.1145/3319535.3345653 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2019-11-06

Kyber is a promising candidate in post-quantum cryptography standardization process. In this paper, we propose targeted optimization strategy and implement processor for on FPGAs. By merging the operations, cut off 29.4% clock cycles Kyber512 33.3% Kyber1024 compared with textbook implementations. We utilize Gentlemen-Sande (GS) butterfly to optimize Number-Theoretic Transform (NTT) implementation. The bottleneck of memory access broken taking advantage dual-column sequential scheme. further...

10.1109/asp-dac47756.2020.9045459 article EN 2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC) 2020-01-01

True random number generators (TRNGs) are widely used in cryptographic systems, and their security is the base of many algorithms protocols. At present, entropy estimation based on a stochastic model well-recommended approach to evaluate specific TRNG structure. Besides, generation speed also an important property for TRNGs. For this purpose, analog-to-digital converter (ADC) can be employed sample noisy signal achieve high bit rate. However, no research focuses basis toward ADC sampling. In...

10.1109/tifs.2019.2908798 article EN IEEE Transactions on Information Forensics and Security 2019-04-01

Driven by artificial intelligence and computer vision industries, Graphics Processing Units (GPUs) are now rapidly achieving extraordinary computing power. In particular, the NVIDIA Tegra K1/X1/X2 embedded GPU platforms, which also treated as edge devices, widely used in environments such mobile phones, game consoles, vehicle-mounted systems to support high-dimension display, auto-pilot, so on. Meanwhile, with rise of Internet Things (IoT), demand for cryptographic operations secure...

10.1145/3492734 article EN ACM Transactions on Embedded Computing Systems 2022-02-08

Fuzzing is one of the most effective approaches to finding software flaws. However, applying it microcontroller firmware incurs many challenges. For example, rehosting-based solutions cannot accurately model peripheral behaviors and thus be used fuzz corresponding driver code. In this work, we present $\mu$AFL, a hardware-in-the-loop approach fuzzing firmware. It leverages debugging tools in existing embedded system development construct an AFL-compatible framework. Specifically, use debug...

10.1145/3510003.3510208 article EN Proceedings of the 44th International Conference on Software Engineering 2022-05-21

The DNS privacy protection mechanisms, over TLS (DoT) and HTTPS (DoH), only work correctly if both the server client support Strict Privacy profile no vulnerability exists in implemented TLS/HTTPS. A natural question then arises: what is landscape of Privacy? To this end, we provide first longitudinal comprehensive measurement DoT/DoH deployments recursive resolvers, authoritative servers, browsers. With collected data, find number servers increased substantially during our ten-month-long...

10.1109/tnet.2023.3262651 article EN IEEE/ACM Transactions on Networking 2023-04-03

The remarkable performance capabilities of AI accelerators offer promising opportunities for accelerating cryptographic algorithms, particularly in the context lattice-based cryptography. However, current approaches to leveraging often remain at a rudimentary level implementation, overlooking intricate internal mechanisms these devices. Consequently, significant number computational resources is underutilized.In this paper, we present comprehensive exploration NVIDIA Tensor Cores and...

10.46586/tches.v2024.i2.25-63 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2024-03-12

Widely used as fundamental security components in most cryptographic applications, random number generators (RNGs) rely mainly on randomness provided by entropy sources. If the is less than expected, RNGs may be compromised and thus impair of whole applications. However, common assumptions (e.g., outputs are independent identically distributed, i.e., IID) not always hold. For example, many sources based some physical phenomena that fragile sensitive to external factors temperature), which...

10.1109/tifs.2019.2947871 article EN IEEE Transactions on Information Forensics and Security 2019-10-16

Driven by artificial intelligence (AI) and computer vision industries, Graphics Processing Units (GPUs) are now rapidly achieving extraordinary computing power. In particular, the floating-point power, which is heavily relied on graphics rendering AI computation workload, developing much faster in GPUs. Meanwhile, many fields such as ecommerce online finance, demand for cryptographic operations secure communications authentication also expanding.In this contribution, targeting important...

10.1109/ipdps47924.2020.00058 article EN 2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS) 2020-05-01

True random number generator (TRNG) as one essential hardware primitive is widely used in cryptography, Monte Carlo simulation, and gambling. To evaluate the security of TRNG, entropy TRNG's output usually estimated by stochastic model theory or measured off-chip after fabrication. However, sufficiency difficult to be guaranteed practice due facts: 1) inaccuracy model-based jitter measurement method; 2) variations chip manufacturing process operating environments (such supply voltage...

10.1109/tcad.2021.3096464 article EN publisher-specific-oa IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2021-07-12

Finding bugs in microcontroller (MCU) firmware is challenging, even for device manufacturers who own the source code. The MCU runs different instruction sets than x86 and exposes a very development environment. This invalidates many existing sophisticated software testing tools on x86. To maintain unified developing environment, straightforward way to re-compile code into native executable commodity machine (called rehosting). However, ad-hoc re-hosting daunting tedious task subject issues...

10.14722/ndss.2021.24308 preprint EN 2021-01-01

With the wide deployment of RFID applications, security issues are drawing more and attention. The grouping proof aims to provide a verifiable evidence that two or tags were scanned simultaneously. It extends yoking for tags, prove coexistence set (e.g., some drugs can only be sold in existence prescription). In many scenarios, time when was generated is critical judge whether transaction legal not, protocol usually should work offline mode. Although lots protocols with various features have...

10.1109/trustcom.2012.212 article EN 2012-06-01

The increasing growth of cybercrimes targeting mobile devices urges an efficient malware analysis platform. With the emergence evasive malware, which is capable detecting that it being analyzed in virtualized environments, bare-metal has become definitive resort. Existing works mainly focus on extracting malicious behaviors exposed during analysis. However, after analysis, equally important to quickly restore system a clean state examine next sample. Unfortunately, state-of-the-art solutions...

10.1145/3134600.3134647 article EN 2017-12-04
Coming Soon ...