简介
洪赓博士的研究聚焦于网络黑灰产检测、网络犯罪治理、人工智能安全治理等,目前已在IEEE S&P、USENIX Security、ACM CCS、NDSS等国际顶级会议上发表十余篇高水平学术论文,担任ACM CCS 24、CCS 25程序委员会委员,并主持国家自然科学基金青年项目等重要研究课题。相关成果在执法机关、头部公司均有成功应用,曾获ACM SIGSAC China优博奖(全国共3位)、ACM CCS 2018亮点论文等;学生培养方面,指导本科生团队获得“挑战杯”全国大学生课外学术科技作品竞赛全国特等奖、全国大学生信息安全竞赛一等奖等荣誉。
个人主页:https://ghong.site/
研究领域:互联网地下产业检测、网络犯罪治理、移动应用隐私保护、区块链安全等
Biography
Hong Geng
I’m an Assistant Professor at Fudan Development Institute, Fudan University, also a faculty of System Software and Security Group in School of Computer Science. I received my Ph.D. in Computer Science at Fudan University in June 2022, advised by Prof. Min Yang. My research interests include Cybercrime, LLM Security and Safety, as well as Novel Cybersecurity Threats. I also serve as member of Program Committee of several top-tier conference, such ACM CCS 24, CCS 25, ACM WWW 25, etc.
开设课程
- 深度学习基础(25年春、26年秋,本科生课程,复旦大学AI-BEST序列课程);
- 高级移动安全(24年秋,研究生课程,专业选修课);
- 现代操作系统(23年秋,研究生课程,专业选修课);
- 网络黑灰产治理实践(Planning,预计27年秋季开课)
近期论文发表(详见个人主页)
- Beyond Exploit Scanning: A Functional Change-Driven Approach to Remote Software Version Identification
The 34th USENIX Security Symposium (USENIX Security’25, CCF-A) - Unveiling the (Ab)usage of Serverless Cloud Function in the Wild
(IMC’25, the Top-Tier Conference in Network Measurement) - NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines
The 34th USENIX Security Symposium (USENIX Security’25, CCF-A) - You Can’t Eat Your Cake and Have It Too: The Performance Degradation of LLMs with Jailbreak Defense
The Web Conference 2025 (ACM WWW 25, CCF-A) - Exposing the Hidden Layer: Software Repositories in the Service of SEO Manipulation
In Proceedings of the 47nd International Conference on Software Engineering (IEEE/ACM ICSE’25, CCF-A) - Revealing the black box of device search engine: scanning assets, strategies, and ethical consideration
the Network and Distributed System Security Symposium 2025 (NDSS’25, CCF-A) - HADES Attack: Understanding and Evaluating Manipulation Risks of Email Blocklists
the Network and Distributed System Security Symposium 2025 (NDSS’25, CCF-A) - Misdirection of Trust: Demystifying the Abuse of Dedicated URL Shortening Service
the Network and Distributed System Security Symposium 2025 (NDSS’25, CCF-A) - Interface Illusions: Uncovering the Rise of Visual Scams in Cryptocurrency Wallets
The Web Conference 2024 (ACM WWW 24, CCF-A) - Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild
30th ACM SIGSAC Conference on Computer and Communications Security (ACM CCS’23, CCF-A) - Understanding and Detecting Abused Image Hosting Modules as Malicious Services
30th ACM SIGSAC Conference on Computer and Communications Security (ACM CCS’23, CCF-A) - Analyzing Ground-Truth Data of Mobile Gambling Scams
43rd IEEE Symposium on Security and Privacy (IEEE S&P Oakland’22, CCF-A) - How Android Developers Handle Evolution-induced API Compatibility Issues: A Large-scale Study
In Proceedings of the 42nd International Conference on Software Engineering (ACM ICSE’20, CCF-A) - How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World
25th ACM SIGSAC Conference on Computer and Communications Security (ACM CCS’18, CCF-A) - Invetter: Locating Insecure Input Validations in Android Services
25th ACM SIGSAC Conference on Computer and Communications Security (ACM CCS’18, CCF-A)