Ziyi Guo(Roland Guo) [Gallery] Northwestern University, Evanston, IL, USA. |
[2025.01] PatchAgent is accepted by USENIX Security 2025.
[2024.08] Our Team 42-b3yond-6ug won DARPA's AIxCC SemiFinal at DEFCON 32, awarded $2 million. [link]
[2024.07] Awarded Student Grant from USENIX Security'24
[2024.06] Page Spray is accepted by USENIX Security 2024. [link]
I'm a 2nd year Ph.D. Student at Northwestern University, Computer Science. I work with Prof.Yan Chen, Prof.Xinyu Xing. Before joining in Northwestern, I had a great research experience with Prof.Qi Li at NISL (Tsinghua University).
I'm broadly interested in those realworld security problems, hidden in various software and systems. I'm also a CTFer @r3kapig, focus on vulnerability exploitation & reverse engineering.
Design, implement, and evaluate LLM agents for software/system security is also what I'm currently working on.
PatchAgent: A Practical Program Repair Agent Mimicking Human Expertise. [Link]
Zheng Yu, Ziyi Guo, Yuhang Wu, Jiahao Yu, Meng Xu, Dongliang Mu, Yan Chen, Xinyu Xing
USENIX Security '25
DARPA's AIxCC Finalist
Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation. [Link]
Ziyi Guo, Dang K Le, Zhenpeng Lin, Kyle Zeng, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé, Xinyu Xing
USENIX Security '24
CAMP: Compiler and Allocator-based Heap Memory Protection. [Link]
Zhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter Dinda, Xinyu Xing
USENIX Security '24
Cross Container Attacks: The Bewildered eBPF on Clouds. [Link]
Yi He* and Roland Guo*, Yunlong Xing, Xijia Che, Kun Sun, Zhuotao Liu, Ke Xu, Qi Li
USENIX Security '23
* indicates co-first author
Acknowledged and included into eBPF Security Threat Model by Linux Foundation.
Finalist (top 7 worldwide), DARPA AI Cyber Challenge(AIxCC)
- Winner of Semi-Final.
- Core member of Northwestern 42-b3yond-6ug.
- Won $3 million price in team level.
- DARPA News: "DARPA AI Cyber Challenge Proves Promise of AI-Driven Cybersecurity"
Finalist, DEFCON 30 CTF in 2022.
- Team r3kapig
Finalist, DEFCON 29 CTF in 2021.
- Team r3kapig
1st Prize, WMCTF 2020.
- Team 0x401
UNIQLO Scholarship Awardee in 2021. (0.05% in Sichuan University)
Tencent Security Xuanwu Lab
Security Researcher. Linux Kernel Vulnerability Exploitation & Container Attacks.
Tsinghua University, Network and Information Security Lab
Research Intern, with Prof. Qi Li
Northwestern University
CS PhD student, 2023 ~ Present.
Sichuan University
Bachelor in Cybersecurity, 2019 ~ 2023
Artifact Evaluation Program Committee(AEC): USENIX Security 2024, ISSTA 2024, USENIX Security 2025
External Reviewer: IEEE S&P 2024, IEEE S&P 2025
Department Of The Navy: DARPA AI Cyber Challenge Proves Promise of AI-Driven Cybersecurity
Northwestern University News: Safeguarding Critical Software Infrastructure through Novel AI Systems
Northwestern University News: Advancing Compiler Technology
News reports cover 42-b3yond-6ug: UWaterloo , DARPA , InfoSecurity Magazine , MeriTalk , Cyberscoop , Dark Reading , ExecutiveGov , The Readable , Science of Security , The Register
I wrote some tech blogs for people who want to learn vulnerability exploitation in Kanxue
I discovered and reported many realworld vulnerabilities, such as:
[WebAssembly] CVE-2024-25431: Understanding and Mitigating the Wasm-Micro-Runtime Vulnerability
[WebAssembly] CVE-2024-27527: GitHub Advisory
[WebAssembly] CVE-2024-27528: Snyk Security Report
[WebAssembly] CVE-2024-27529: Snyk Security Report
[WebAssembly] CVE-2024-27530: Synk Security Report
[WebAssembly] CVE-2024-27532: Addressing NULL Pointer Dereference Vulnerability in Wasm-Micro-Runtime
[CI/CD] GHSA-7q92-pph9-5686: GitHub Actions expression injection vulnerability