I am a Ph.D. student in Department of Computer Science at Purdue University, co-advised by Professor Xiangyu Zhang and Professor Dongyan Xu. I obtained my B.E. from Shanghai Jiao Tong University (SJTU) in 2013.

$ echo bWEyMjlAcHVyZHVlLmVkdQ== | base64 --decode
Department of Computer Science
Purdue University
305 N. University Street
West Lafayette, Indiana, 47907-2107
  • HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware (short)
    Chonghua Wang, Shiqing Ma, Xiangyu Zhang, Junghwan Rhee, Xiaochun Yun, Zhiyu Hao
    Proceedings of the 13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2017)
    Niagara Falls, Canada, October, 2017

  • LAMP: Data Provenance for Graph Based Machine Learning Algorithms Through Derivative Computation
    Shiqing Ma, Yousra Aafer, Zhaogui Xu, Wen-Chuan Lee, Juan Zhai, Yingqi Liu, Xiangyu Zhang
    Proceedings of the 11th Joint Meeting of the European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2017)
    Paderborn, Germany, September 2017
     PDF    Slides    Poster  

  • MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning  
    Shiqing Ma, Juan Zhai, Fei Wang, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu.
    Distinguished Paper Award
    Proceedings of the 26th USENIX Security Symposium (Security 2017)
    Vancouver, BC, Canada, August 2017
     PDF    Slides 

  • HERCULE: Attack Story Reconstruction via Community Discovery on Correlated Log Graph  
    Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang, Zhiwei Zhang, Luo Si, Xiangyu Zhang, Dongyan Xu.
    Proceedings of the 32nd Annual Computer Security Applications Conference (ACSAC 2016)
    Los Angeles, CA, December 2016
     PDF  

  • Automatic Model Generation from Documentation for Java API Functions  
    Juan Zhai, Jianjun Huang, Shiqing Ma, Xiangyu Zhang, Lin Tan, Jianhua Zhao, Feng Qin
    Proceedings of the 38th International Conference on Software Engineering (ICSE 2016)
    Austin, TX, May 2016
     PDF    Slides  

  • ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting  
    Shiqing Ma, Xiangyu Zhang, Dongyan Xu
    Distinguished Paper Award
    Proceedings of the 23rd Network and Distributed System Security Symposium (NDSS 2016)
    San Diego, CA, February 2016
     PDF     Slides  

  • Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows  
    Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu
    Proceedings of the 31st Annual Computer Security Applications Conference (ACSAC 2015)
    Los Angeles, CA, December 2015
     PDF    Slides 

  • COLO: COarse-grained LOck-stepping Virtual Machines for Non-stop Service  
    Yaozu Dong, Wei Ye, Yunhong Jiang, Ian Pratt, Shiqing Ma, Jian Li, Haibing Guan.
    Proceedings of the 2013 ACM Symposium on Cloud Computing (SoCC 2013)
    Santa Clara, CA, October 2013
     PDF    COLO on Xen 

  • Log-centric analytics for advanced persistent threat detection
    Shiqing Ma, Xiangyu Zhang, Dongyan Xu
    Proceedings of the 15th Annual Information Security Symposium (CERIAS 2014)
    West Lafayette, IN, March 2014

  • Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows  
    Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu
    The Midwest PL Summit (MWPLS 2015)
    West Lafayette, IN, December 2015
  • LAMP: Data Provenance for Graph Based Machine Learning Algorithms Through Derivative Computation
    ESEC/FSE 2017, Paderborn, Germany, September 2017

  • MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning
    SRI International, Menlo Park, CA, May 2017
    Security 2017, Vancouver, BC, Canada, August 2017
    CERIAS Security Seminar Series, West Lafayette, IN, August 2017

  • ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting
    NDSS 2016, San Diego, CA, February 2016

  • Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows
    ACSAC 2015, Los Angeles, CA, December 2015
    NEC Lab, Princeton, NJ, June 2016
  • External reviewer: ACM Conference on Computer and Communications Security (CCS), 2015, 2016
  • External reviewer: International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), 2016
  • External reviewer: International Symposium on the Foundations of Software Engineering (FSE), 2016
  • External reviewer: ISOC Network and Distributed System Security Symposium (NDSS), 2017, 2018
  • External reviewer: International Conference on Software Engineering (ICSE), 2017
  • External reviewer: International Symposium on Software Testing and Analysis (ISSTA), 2016, 2017
  • External reviewer: Programming Language Design and Implementation (PLDI), 2017
  • External reviewer: IEEE Cybersecurity Development (SecDev), 2017

May 2015 - August 2015

Mentor: Junghwan Rhee
Research Intern: NEC Labs America, Princeton, NJ.

December 2012 - June 2013

Mentor: Yaozu Dong
Research Intern: Intel Asia-Pacific Research and Development Ltd., Shanghai, China.