Skip to main content

Contact

Office Location

805 Columbus Avenue
Interdisciplinary Science & Engineering Complex (ISEC)
Boston, MA 02120

Biography

Yaohui Chen is a PhD student in the Computer System Security program at Northeastern University’s College of Computer and Information Science, advised by Professor Long Lu. Originally from Sanya, China, Chen earned his bachelor’s degree at Tongji University in Shanghai before coming to Northeastern, where he now works in Professor Lu’s Research in Software and Systems Security (RiS3) lab. Chen’s research centers on security in Android and Linux systems. One of Chen’s primary takeaways from his research thus far is the massive vulnerability that exists in cyberspace. By developing defense systems that help to prevent cyberattack, he hopes to address complex issues in system security and help to combat this vulnerability.

Education

  • BSc, Tongji University – China

About Me

  • Hometown: Sanya, China
  • Field of Study: Computer System Security
  • PhD Advisor: Long Lu

What are the specifics of your graduate education (thus far)?

I gained in-depth knowledge about computer systems by building 32-bit SPARC v8 processor; full-fledge 64-bit OS; compiler to translate Java-like language into MIPS assembly that can be directly assembled, linked and execute.

I also gained in-depth security domain knowledge by hacking around. The Information Assurance program prepares us with a variety of backgrounds in reliability and security to address global threats to cyberspace.

What are your research interests?

I conduct researches in Android system security, Linux kernel, binary attacks and mitigations and bug finding automation.

What’s one problem you’d like to solve with your research/work?

Build practical defense systems that can be truly applied to real-world devices and scalable vulnerability analysis systems that beat the state-of-the-art.

What aspect of what you do is most interesting?

After gaining more and more insights into the security problems I realize computing systems/devices are more vulnerable than I thought.