Adrian (Shuai) Li

Email: li3944@purdue.edu
Address: The Lawson Computer Science Building
Github: github.com/gloryer
IPA for my first name: [ʂu̯aɪ̯]

I am a computer science Ph.D. student at Purdue University, currently under the advisory of Prof. Elisa Bertino. My research is at the intersection of cyber security and AI. Prior to that, I was a research assistant at UCalgary and Telus. I worked with Prof. Reihaneh Safavi-Naini to build distributed authorization systems that help domain experts explore and address complex authorization scenarios in DevOps and smart homes. I obtained my MSc degree in computer science from the University of Calgary under the advisory of Prof. Reihaneh Safavi-Naini.

Publications

A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences
  • Adrian Shuai Li, Reihaneh Safavi-Naini, Philip W. L. Fong
  • The 27th ACM Symposium on Access Control Models and Technologies (SACMAT ’22), June 8–10, 2022
  • Slides, presentation
A Capability-based System to Enforce Context-aware Permission Sequence
  • Shuai Li
  • Master's thesis, University of Calgary, January 2020
Secure Logging with Security against Adaptive Crash Attack
  • Sepideh Avizheh, Reihaneh Safavi-Naini, Shuai Li
  • The 12th International Symposium on Foundations & Practice of Security (FPS 2019), October 2019
Towards a Resilient Smart Home
  • Tam Thanh Doan, Reihaneh Safavi-Naini, Shuai Li, Sepideh Avizheh, Muni Venkateswarlu K.,Philip W. L. Fong
  • ACM SIGCOMM 2018 Workshop on IoT Security and Privacy (IoT S&P), August 2018
  • Best Paper Award
 

Projects

Modbus over QUIC Protocol

We designed and implemented a full-blown Modbus protocol running over QUIC. QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides lower-latency connection establishment than TCP/TLS. Our implementation is based on pymodbus and aioquic. We evaluated the connection latency for QUIC and TCP/TLS on a mininet virtual network, where we can easily change the network conditions (delay, percentages of packet loss).

A Techincal Look into Flotera Ransomware

Ransomware has been wreaking havoc since the mid-2000s. Improved ransomware variants continue to be seen since then, often with devastating results. This report will cover one of the samples of Flotera, which was available through HybridAnalysis. We present the static and dynamic behavior analysis of the Flotera ransomware.

Griffin System

We proposed a capability-based system that provides efficient refined (conditional) access to resources. It allows a sequence of permissions to be enforced, each with their own specific context. We implemented the system as an extension to the OAuth framework. To achieve high usability, Griffin provides two reusable components, an authorization server and a Middleware. The authorization server is reusable, policy-content independent which can be easily configured to different application scenarios. The Middleware can be added into any resource server restful API to enable Griffin compliant resource server.

 

Teaching

Principles of Computer Security [CPSC 525]
Teaching Asistant, University of Calgary, Winter 2019
 
Information Theory and Security [CPSC 530]
Teaching Asistant, University of Calgary, Fall 2018
 
Explorations in Information Security and Privacy [CPSC 329]
Teaching Asistant, University of Calgary, Winter 2018
 
Introduction to Problem Solving using Application Software [CPSC 203]
Teaching Asistant, University of Calgary, Fall 2017
 

University Service

Vice President Communication of Computer Science Graduate Society, University of Calgary, May 2018 - July 2019

 
 
Local Arrangement Co-Chair of the SecRETs2018, May 2018