lin-jingqiang

View My GitHub Profile

Welcome to Jingqiang Lin’s Pages

Applied cryptography in the real world, information security in different views.

林璟锵,中国科学技术大学 网络空间安全学院

Career

Study

Research Interest

Applied Cryptography, Network Security, and System Security

I serve for ACNS Workshop on Secure Cryptographic Implementation (SCI Workshop).

The aim of the SCI workshop is to provide an international forum of scientific research and development to explore the security issues in the implementation and deployment of cryptographic solutions. We are interested in these main aspects: (1) vulnerabilities and defenses in the implementation of cryptographic algorithms; (2) vulnerabilities and defenses in the implementation of cryptographic protocols; (3) defective cryptographic algorithms and protocols deployed in the wild; (4) weak cryptographic keys and random numbers in the cryptographic implementation; (5) runtime cryptographic key attacks and protections; (6) certificates and key management; (7) misuse or abuse of cryptographic functions and services; and (8) any other topics on secure cryptographic implementations.

Funding and Project

Award

Service

Selected Publication

  1. Shushang Wen, Yiming Zhang, Yuxiang Shen, Bingyu Li, Haixin Duan, Jingqiang Lin, “Automatic Insecurity: Exploring Email Auto-configuration in the Wild”, 32nd ISOC Network and Distributed System Security Symposium (NDSS), 2025.
  2. Wenxu Tang, Fangyu Zheng, Guang Fan, Tian Zhou, Jingqiang Lin, Jiwu Jing, “DPad-HE: Towards Hardware-friendly Homomorphic Evaluation using 4-Directional Manipulation”, 31st ACM Conference on Computer and Communications Security (CCS), 2024.
  3. Aozhuo Sun, Jingqiang Lin, Wei Wang, Zeyan Liu, Bingyu Li, Shushang Wen, Qiongxiao Wang, Fengjun Li, “Certificate Transparency Revisited: The Public Inspections on Third-party Monitors”, 31st ISOC Network and Distributed System Security Symposium (NDSS), 2024.
  4. Xiangxin Guo, Shijie Jia, Jingqiang Lin, Yuan Ma, Fangyu Zheng, Guangzheng Li, Bowen Xu, Yueqiang Cheng, Kailiang Ji, “CryptoPyt: Unraveling Python Cryptographic APIs Misuse With Precise Static Taint Analysis”, 40th Annual Computer Security Applications Conference (ACSAC), 2024.
  5. Yuexi Zhang, Bingyu Li, Jingqiang Lin, Linghui Li, Jiaju Bai, Shijie Jia, Qianhong Wu, “Gopher: High-Precision and Deep-Dive Detection of Cryptographic API Misuse in the Go Ecosystem”, 31st ACM Conference on Computer and Communications Security (CCS), 2024.
  6. Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, Jingqiang Lin, “ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches”, 26th International Conference on Cryptographic Hardware and Embedded Systems (CHES), 2024.
  7. Mingyu Wang, Fangyu Zheng, Jingqiang Lin, Fangjie Jiang, Yuan Ma, “ZeroShield: Transparently Mitigating Code Page Sharing Attacks with Zero-cost Stand-by”, IEEE Transactions on Information Forensics and Security (TIFS), 2024.
  8. Jiankuo Dong, Yusheng Fu, Xusheng Qin, Zhenjiang Dong, Fu Xiao, Jingqiang Lin, “ECO-BIKE: Bridging the Gap between PQC BIKE and GPU Acceleration”, IEEE Transactions on Information Forensics and Security (TIFS), 2024.
  9. Xinyi Ji, Jiankuo Dong, Junhao Huang, Zhijian Yuan, Wangchen Dai, Fu Xiao, Jingqiang Lin, “ECO-CRYSTALS: Efficient Cryptography CRYSTALS on Standard RISC-V ISA”, IEEE Transactions on Computers (TC), 2024.
  10. Ruixuan Li, Xiaofeng Jia, Zhenyong Zhang, Jun Shao, Rongxing Lu, Jingqiang Lin, Xiaoqi Jia, Guiyi Wei, “A Longitudinal and Comprehensive Measurement of DNS Strict Privacy”, IEEE/ACM Transactions on Networking (TON), Vol. 31, No. 6, pp. 2793-2808, 2023.
  11. Yu Fu, Jingqiang Lin, Dengguo Feng, Wei Wang, Mingyu Wang, Wenjie Wang, “RegKey: A Register-based Implementation of ECC Signature Algorithms against One-shot Memory Disclosure”, ACM Transactions on Embedded Computing Systems (TECS), Vol. 22, No. 6, pp. 1-12, 2023.
  12. Yajun Teng, Wei Wang, Jun Shao, Huiqing Wan, Heqing Huang, Yong Liu, Jingqiang Lin, “Curveball+: Exploring Curveball-like Vulnerabilities of Implicit Certificate Validation”, 28th European Symposium on Research in Computer Security (ESORICS), 2023.
  13. Bowen Xu, Shijie Jia, Jingqiang Lin, Fangyu Zheng, Yuan Ma, Limin Liu, Xiaozhuo Gu, Li Song, “JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications”, 28th European Symposium on Research in Computer Security (ESORICS), 2023.
  14. Guang Fan, Fangyu Zheng, Lipeng Wan, Lili Gao, Yuan Zhao, Jiankuo Dong, Yixuan Song, Yuewu Wang, Jingqiang Lin, “Towards Faster Fully Homomorphic Encryption Implementation with Integer and Floating-point Computing Power of GPUs”, 37th IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2023.
  15. Tianyu Chen, Shijie Jia, Yuan Ma, Yuan Cao, Na Lv, Wei Wang, Jing Yang, Jingqiang Lin, “A Design of High-Efficiency Coherent Sampling based TRNG with On-Chip Entropy Assurance”, IEEE Transactions on Circuits and Systems I: Regular Papers (TCAS-I), Vol. 70, No. 12, pp. 5060-5073, 2023.
  16. Jiankuo Dong, Pinchang Zhang, Kaisheng Sun, Fu Xiao, Fangyu Zheng, Jingqiang Lin, “EG-FourQ: An Embedded GPU based Efficient ECC Cryptography Accelerator for Edge Computing”, IEEE Transactions on Industrial Informatics (TII), Vol. 19, No. 6, pp. 7291-7300, 2023.
  17. Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Wei Wang, Qi Li, Guangshen Cheng, Jiwu Jing, Congli Wang, “The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild”, IEEE/ACM Transactions on Networking (TON), Vol. 30, No. 2, pp. 749-765, 2022.
  18. Ze Wang, Jingqiang Lin, Quanwei Cai, Qiongxiao Wang, Daren Zha, Jiwu Jing, “Blockchain-based Certificate Transparency and Revocation Transparency”, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 19. No. 1, pp. 681-697, 2022.
  19. Wenqiang Li, Jiameng Shi, Fengjun Li, Jingqiang Lin, Wei Wang, Le Guan, “𝜇AFL: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware”, 44th ACM/IEEE International Conference on Software Engineering (ICSE), 2022.
  20. Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao, Yuewu Wang, Jingqiang Lin, Jiankuo Dong, “A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator”, 27th European Symposium on Research in Computer Security (ESORICS), 2022.
  21. Fan Lang, Wei Wang, Lingjia Meng, Jingqiang Lin, Qiongxiao Wang, Linli Lu, “MoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location Escape”, 38th Annual Computer Security Applications Conference (ACSAC), 2022.
  22. Wenqing Li, Shijie Jia, Limin Liu, Fangyu Zheng, Yuan Ma, Jingqiang Lin, “CryptoGo: Automatic Detection of Go Cryptographic API Misuses”, 38th Annual Computer Security Applications Conference (ACSAC), 2022.
  23. Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo, “Hide and Seek: On the Stealthiness of Attacks against Deep Learning Systems”, 27th European Symposium on Research in Computer Security (ESORICS), 2022.
  24. Jiankuo Dong, Fangyu Zheng, Jingqiang Lin, Zhe Liu, Fu Xiao, Guang Fan, “EC-ECC: Accelerating Elliptic Curve Cryptography for Edge Computing on Embedded GPU TX2”, ACM Transactions on Embedded Computing Systems (TECS), Vol. 21, No. 2, pp. 16:1-16:25, 2022.
  25. Rong Wei, Fangyu Zheng, Lili Gao, Jiankuo Dong, Guang Fan, Lipeng Wan, Jingqiang Lin, Yuewu Wang, “Heterogeneous-PAKE: Bridging the Gap between PAKE Protocols and their Real-World Deployment”, 37th Annual Computer Security Applications Conference (ACSAC), 2021.
  26. Lili Gao, Fangyu Zheng, Rong Wei, Jinakuo Dong, Niall Emmart, Yuan Ma, Jingqiang Lin, Charles Weems, “DPF-ECC: A Framework for Efficient ECC with Double Precision Floating-Point Computing Power”, IEEE Transactions on Information Forensics and Security (TIFS), 2021.
  27. Tianyu Chen, Yuan Ma, Jingqiang Lin, Yuan Cao, Na Lv, Jiwu Jing, “A Lightweight Full Entropy TRNG with On-chip Entropy Assurance”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Vol. 40, No. 12, pp. 2431-2444, 2021.
  28. Jingqiang Lin, Fangyu Zheng, Wei Wang, Zhe Liu, Qiongxiao Wang, “Cryptographic Software Implementation and Cryptographic Key Security / 密码软件实现与密钥安全”, China Machine Press / 机械工业出版社, ISBN 9787111679578, 2021.
  29. Congwu Li, Le Guan (co-first author), Jingqiang Lin, Bo Luo, Quanwei Cai, Jiwu Jing, Jing Wang, “Mimosa: Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory”, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 18, No. 3, pp. 1196-1213, 2021.
  30. Wenqiang Li, Le Guan, Jingqiang Lin, Jiameng Shi, Fengjun Li, “From Library Portability to Para-rehosting: Natively Executing Open-source Microcontroller OSs on Commodity Hardware”, 28th ISOC Network and Distributed System Security Symposium (NDSS), 2021.
  31. Bingyu Li, Jingqiang Lin, Qiongxiao Wang, Ze Wang, Jiwu Jing, “Locally-centralized Certificate Validation and Its Application in Desktop Virtualization Systems”, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 16, pp. 1380-1395, 2021.
  32. Abdulmalik Humayed, Fengjun Li, Jingqiang Lin, Bo Luo, “CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks”, 25th European Symposium on Research in Computer Security (ESORICS), pp. 153-173, 2020.
  33. Shuangyi Zhu, Yuan Ma, Xusheng Li, Jing Yang, Jingqiang Lin, Jiwu Jing, “On the Analysis and Improvement of Min-entropy Estimation on Time-varying Data”, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 15, pp. 1696-1708, 2020.
  34. Lili Gao, Fangyu Zheng, Niall Emmart, Jiankuo Dong, Jingqiang Lin, Charles Weems, “DPF-ECC: Accelerating Elliptic Curve Cryptography with Floating-point Computing Power of GPUs”, 34th IEEE International Parallel and Distributed Processing Symposium (IPDPS), pp. 494-504, 2020.
  35. Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jing, Congli Wang, “Certificate Transparency in the Wild: Exploring the Reliability of Monitors”, 26th ACM Conference on Computer and Communications Security (CCS), pp. 2505-2520, 2019.
  36. Fangjie Jiang, Quanwei Cai, Jingqiang Lin, Bo Luo, Le Guan, Ziqiang Ma, “TF-BIV: Transparent and Fine-grained Binary Integrity Verification in the Cloud”, 35th Annual Computer Security Applications Conference (ACSAC), pp. 57-69, 2019.
  37. Yuan Ma, Tianyu Chen, Jingqiang Lin, Jing Yang, Jiwu Jing, “Entropy Estimation for ADC Sampling based True Random Number Generators”, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 14, No. 11, pp. 2887-2900, 2019.
  38. Ziqiang Ma, Quanwei Cai, Jingqiang Lin, Bo Luo, Jiwu Jing, “Towards the Optimal Performance of Integrating Warm and Delay against Remote Cache Timing Side Channels on Block Ciphers”, Journal of Computer Security (JCS), Vol. 27, No. 5, pp. 547-580, 2019.
  39. Xin Xu, Quanwei Cai, Jingqiang Lin, Shiran Pan, Liangqin Ren, “Enforcing Access Control in Distributed Version Control Systems”, IEEE International Conference on Multimedia and Expo (ICME), pp. 772-777, 2019.
  40. Le Guan, Jingqiang Lin, Ziqiang Ma, Bo Luo, Luning Xia, Jiwu Jing, “Copker: A Cryptographic Engine against Cold-Boot Attacks”, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 15, No. 5, pp. 742-754, 2018.
  41. Jiankuo Dong, Fangyu Zheng, Niall Emmart, Jingqiang Lin, Charles C. Weems, “sDPF-RSA: Utilizing Floating-point Computing Power of GPUs for Massive Digital Signature Computations”, 32nd IEEE International Parallel and Distributed Processing Symposium (IPDPS), pp. 599-609, 2018.
  42. Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo, Peng Liu, Ji Xiang, Wenjing Lou, “CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices”, 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID), pp. 380-400, 2018.
  43. Shuangyi Zhu, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing, “Analysis and Improvement of the Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources”, 25th International Conference on Fast Software Encryption (FSE), 2018.
  44. Peng Xu, Jingqiang Lin, Hai Jin, Wei Wang, Qiongxiao Wang, “Cloud Data Security / 云数据安全”, China Machine Press / 机械工业出版社, ISBN 9787111605096, 2018.
  45. Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia, “Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices”, 33rd Annual Computer Security Applications Conference (ACSAC), Outstanding Paper Award, pp. 339-349, 2017.
  46. Shuangyi Zhu, Yuan Ma, Jingqiang Lin, Jia Zhuang, Jiwu Jing, “More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22”, 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (AsiaCrypt), pp. 307-329, 2016.
  47. Wen-Tao Zhu, Jingqiang Lin, “Generating Correlated Digital Certificates: Framework and Applications”, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 11, No. 6, pp. 1117-1127, 2016.
  48. Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing, Jing Wang, “Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory”, 36th IEEE Symposium on Security and Privacy (Oakland), pp. 3-19, 2015.
  49. Manogna Thimma, Fang Liu, Jingqiang Lin, Bo Luo, “HyXAC: Hybrid XML Access Control Integrating View-based and Query-rewriting Approaches”, IEEE Transactions on Knowledge and Data Engineering (TKDE), Vol. 27, No. 8, pp. 2190-2202, 2015.
  50. Wei Wang, Jingqiang Lin, Zhan Wang, Ze Wang, Luning Xia, “vBox: Proactively Establishing Secure Channels between Wireless Devices without Prior Knowledge”, 20th European Symposium on Research in Computer Security (ESORICS), pp. 332-351, 2015.
  51. Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing, “Copker: Computing with Private Keys without RAM”, 21st ISOC Network and Distributed System Security Symposium (NDSS), 2014.
  52. Yuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, Jiwu Jing, “Entropy Evaluation for Oscillator-based True Random Number Generators”, 16th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 544-561, 2014.
  53. Jingqiang Lin, Bo Luo, Jiwu Jing, Xiaokun Zhang, “GRADE: Graceful Degradation in Byzantine Quorum Systems”, 31st IEEE Symposium on Reliable Distributed Systems (SRDS), pp. 171-180, 2012.
  54. Jiwu Jing, Jingqiang Lin, Dengguo Feng, “PKI Technology / PKI技术”, Science Press of China / 科学出版社, ISBN 9787030219060, 2008.
  55. Jingqiang Lin, Jiwu Jing, Peng Liu, “A Framework for Intrusion Tolerant Certification Authority System Evaluation”, 26th IEEE Symposium on Reliable Distributed Systems (SRDS), pp. 231-241, 2007.

Full Publication

Technical Standard

Student

课程开设

Contact