lin-jingqiang.github.io

View My GitHub Profile

Welcome to Jingqiang Lin’s Pages

Applied cryptography in the real world, information security in different views

Career

Study

Research Interest

Applied Cryptography, Network Security, and System Security

Funding and Project

Award

Service

Selected Publication

  1. Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Wei Wang, Qi Li, Guangshen Cheng, Jiwu Jing, Congli Wang, “The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild”, IEEE/ACM Transactions on Networking (TON), Vol. 30, No. 2, pp. 749-765, 2022.
  2. Ze Wang, Jingqiang Lin, Quanwei Cai, Qiongxiao Wang, Daren Zha, Jiwu Jing, “Blockchain-based Certificate Transparency and Revocation Transparency”, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 19. No. 1, pp. 681-697, 2022.
  3. Wenqiang Li, Jiameng Shi, Fengjun Li, Jingqiang Lin, Wei Wang, Le Guan, “𝜇AFL: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware”, 44th ACM/IEEE International Conference on Software Engineering (ICSE), 2022.
  4. Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao, Yuewu Wang, Jingqiang Lin, Jiankuo Dong, “A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator”, 27th European Symposium on Research in Computer Security (ESORICS), 2022.
  5. Jiankuo Dong, Fangyu Zheng, Jingqiang Lin, Zhe Liu, Fu Xiao, Guang Fan, “EC-ECC: Accelerating Elliptic Curve Cryptography for Edge Computing on Embedded GPU TX2”, ACM Transactions on Embedded Computing Systems (TECS), Vol. 21, No. 2, pp. 16:1-16:25, 2022.
  6. Rong Wei, Fangyu Zheng, Lili Gao, Jiankuo Dong, Guang Fan, Lipeng Wan, Jingqiang Lin, Yuewu Wang, “Heterogeneous-PAKE: Bridging the Gap between PAKE Protocols and their Real-World Deployment”, 37th Annual Computer Security Applications Conference (ACSAC), 2021.
  7. Lili Gao, Fangyu Zheng, Rong Wei, Jinakuo Dong, Niall Emmart, Yuan Ma, Jingqiang Lin, Charles Weems, “DPF-ECC: A Framework for Efficient ECC with Double Precision Floating-Point Computing Power”, IEEE Transactions on Information Forensics and Security (TIFS), 2021.
  8. Tianyu Chen, Yuan Ma, Jingqiang Lin, Yuan Cao, Na Lv, Jiwu Jing, “A Lightweight Full Entropy TRNG with On-chip Entropy Assurance”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Vol. 40, No. 12, pp. 2431-2444, 2021.
  9. Jingqiang Lin, Fangyu Zheng, Wei Wang, Zhe Liu, Qiongxiao Wang, “Cryptographic Software Implementation and Cryptographic Key Security / 密码软件实现与密钥安全”, China Machine Press / 机械工业出版社, ISBN 9787111679578, 2021.
  10. Congwu Li, Le Guan (co-first author), Jingqiang Lin, Bo Luo, Quanwei Cai, Jiwu Jing, Jing Wang, “Mimosa: Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory”, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 18, No. 3, pp. 1196-1213, 2021.
  11. Wenqiang Li, Le Guan, Jingqiang Lin, Jiameng Shi, Fengjun Li, “From Library Portability to Para-rehosting: Natively Executing Open-source Microcontroller OSs on Commodity Hardware”, 28th ISOC Network and Distributed System Security Symposium (NDSS), 2021.
  12. Bingyu Li, Jingqiang Lin, Qiongxiao Wang, Ze Wang, Jiwu Jing, “Locally-centralized Certificate Validation and Its Application in Desktop Virtualization Systems”, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 16, pp. 1380-1395, 2021.
  13. Abdulmalik Humayed, Fengjun Li, Jingqiang Lin, Bo Luo, “CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks”, 25th European Symposium on Research in Computer Security (ESORICS), pp. 153-173, 2020.
  14. Shuangyi Zhu, Yuan Ma, Xusheng Li, Jing Yang, Jingqiang Lin, Jiwu Jing, “On the Analysis and Improvement of Min-entropy Estimation on Time-varying Data”, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 15, pp. 1696-1708, 2020.
  15. Lili Gao, Fangyu Zheng, Niall Emmart, Jiankuo Dong, Jingqiang Lin, Charles Weems, “DPF-ECC: Accelerating Elliptic Curve Cryptography with Floating-point Computing Power of GPUs”, 34th IEEE International Parallel and Distributed Processing Symposium (IPDPS), pp. 494-504, 2020.
  16. Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jing, Congli Wang, “Certificate Transparency in the Wild: Exploring the Reliability of Monitors”, 26th ACM Conference on Computer and Communications Security (CCS), pp. 2505-2520, 2019.
  17. Fangjie Jiang, Quanwei Cai, Jingqiang Lin, Bo Luo, Le Guan, Ziqiang Ma, “TF-BIV: Transparent and Fine-grained Binary Integrity Verification in the Cloud”, 35th Annual Computer Security Applications Conference (ACSAC), pp. 57-69, 2019.
  18. Yuan Ma, Tianyu Chen, Jingqiang Lin, Jing Yang, Jiwu Jing, “Entropy Estimation for ADC Sampling based True Random Number Generators”, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 14, No. 11, pp. 2887-2900, 2019.
  19. Ziqiang Ma, Quanwei Cai, Jingqiang Lin, Bo Luo, Jiwu Jing, “Towards the Optimal Performance of Integrating Warm and Delay against Remote Cache Timing Side Channels on Block Ciphers”, Journal of Computer Security (JCS), Vol. 27, No. 5, pp. 547-580, 2019.
  20. Xin Xu, Quanwei Cai, Jingqiang Lin, Shiran Pan, Liangqin Ren, “Enforcing Access Control in Distributed Version Control Systems”, IEEE International Conference on Multimedia and Expo (ICME), pp. 772-777, 2019.
  21. Le Guan, Jingqiang Lin, Ziqiang Ma, Bo Luo, Luning Xia, Jiwu Jing, “Copker: A Cryptographic Engine against Cold-Boot Attacks”, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 15, No. 5, pp. 742-754, 2018.
  22. Jiankuo Dong, Fangyu Zheng, Niall Emmart, Jingqiang Lin, Charles C. Weems, “sDPF-RSA: Utilizing Floating-point Computing Power of GPUs for Massive Digital Signature Computations”, 32nd IEEE International Parallel and Distributed Processing Symposium (IPDPS), pp. 599-609, 2018.
  23. Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo, Peng Liu, Ji Xiang, Wenjing Lou, “CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices”, 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID), pp. 380-400, 2018.
  24. Shuangyi Zhu, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing, “Analysis and Improvement of the Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources”, 25th International Conference on Fast Software Encryption (FSE), 2018.
  25. Peng Xu, Jingqiang Lin, Hai Jin, Wei Wang, Qiongxiao Wang, “Cloud Data Security / 云数据安全”, China Machine Press / 机械工业出版社, ISBN 9787111605096, 2018.
  26. Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia, “Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices”, 33rd Annual Computer Security Applications Conference (ACSAC), Outstanding Paper Award, pp. 339-349, 2017.
  27. Shuangyi Zhu, Yuan Ma, Jingqiang Lin, Jia Zhuang, Jiwu Jing, “More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22”, 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (AsiaCrypt), pp. 307-329, 2016.
  28. Wen-Tao Zhu, Jingqiang Lin, “Generating Correlated Digital Certificates: Framework and Applications”, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 11, No. 6, pp. 1117-1127, 2016.
  29. Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing, Jing Wang, “Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory”, 36th IEEE Symposium on Security and Privacy (Oakland), pp. 3-19, 2015.
  30. Manogna Thimma, Fang Liu, Jingqiang Lin, Bo Luo, “HyXAC: Hybrid XML Access Control Integrating View-based and Query-rewriting Approaches”, IEEE Transactions on Knowledge and Data Engineering (TKDE), Vol. 27, No. 8, pp. 2190-2202, 2015.
  31. Wei Wang, Jingqiang Lin, Zhan Wang, Ze Wang, Luning Xia, “vBox: Proactively Establishing Secure Channels between Wireless Devices without Prior Knowledge”, 20th European Symposium on Research in Computer Security (ESORICS), pp. 332-351, 2015.
  32. Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing, “Copker: Computing with Private Keys without RAM”, 21st ISOC Network and Distributed System Security Symposium (NDSS), 2014.
  33. Yuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, Jiwu Jing, “Entropy Evaluation for Oscillator-based True Random Number Generators”, 16th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 544-561, 2014.
  34. Jingqiang Lin, Bo Luo, Jiwu Jing, Xiaokun Zhang, “GRADE: Graceful Degradation in Byzantine Quorum Systems”, 31st IEEE Symposium on Reliable Distributed Systems (SRDS), pp. 171-180, 2012.
  35. Jiwu Jing, Jingqiang Lin, Dengguo Feng, “PKI Technology / PKI技术”, Science Press of China / 科学出版社, ISBN 9787030219060, 2008.
  36. Jingqiang Lin, Jiwu Jing, Peng Liu, “A Framework for Intrusion Tolerant Certification Authority System Evaluation”, 26th IEEE Symposium on Reliable Distributed Systems (SRDS), pp. 231-241, 2007.

Full Publication

Student

Contact