Associate Professor at Tsinghua University
Office: Room 1-213, FIT building, Tsinghua University, Beijing, China
Email: jianjun [AT] tsinghua.edu.cn
jianjun [AT] icsi.berkeley.edu
cjj [AT] cs.uchicago.edu
I am an associate professor at the Institute for Network Sciences and Cyberspace at Tsinghua University. Before joining Tsinghua, I was a postdoctoral researcher at UC Berkeley (worked with Prof. Vern Paxson) and the University of Chicago (worked with Prof. Nick Feamster). I received my Ph.D. in Computer Science at Tsinghua University in 2018.
My research interest focus on network security, protocol security, and system security. I'm particularly interested in discovering and mitigating new security vulnerabilities in widely-used Internet protocols and systems, such as HTTP protocol, CDN system, email system, and web browsers.
My research has won multiple Distinguished Paper Awards on the top-tier security conferences (e.g., NDSS 2016 and USENIX security 2020), and led to many real-world security responses, such as patches in popular HTTP implementations (e.g., Squid, Chrome, Firefox), security advisories by industrial companies (e.g., Akamai, Cloudflare, Apple), web standard change, and a new IETF RFC (RFC 8586).
The Silent Danger in HTTP: Identifying HTTP Desync Vulnerabilities with Gray-box Testing
34th USENIX Conference on Security Symposium 2025 To appear bibtex |
USENIX Security'25 | |
Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability
34th USENIX Conference on Security Symposium 2025 To appear bibtex |
USENIX Security'25 | |
Cross-Origin Web Attacks via HTTP/2 Server Push and Signed HTTP Exchange
Proceedings 2025 Network and Distributed System Security Symposium 2025 paper bibtex |
NDSS'25 | |
Invade the Walled Garden: Evaluating GTP Security in Cellular Networks
2025 IEEE Symposium on Security and Privacy 2025 To appear bibtex |
S&P'25 | |
Internet’s Invisible Enemy: Detecting and Measuring Web Cache
Poisoning in the Wild
31th ACM Conference on Computer and Communications Security 2024 paper code bibtex |
CCS'24 | |
Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors
31th ACM Conference on Computer and Communications Security 2024 paper code bibtex |
CCS'24 | |
Where URLs Become Weapons: Automated Discovery of SSRF Vulnerabilities in Web Applications
2024 IEEE Symposium on Security and Privacy 2024 paper code bibtex |
S&P'24 | |
Break the Wall from Bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls
2024 IEEE Symposium on Security and Privacy 2024 paper code bibtex |
S&P'24 | |
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets
2024 IEEE Symposium on Security and Privacy 2024 paper bibtex |
S&P'24 | |
Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider
Proceedings of the 2024 ACM on Internet Measurement Conference 2024 paper bibtex |
IMC'24 | |
Demystifying the Security Implications in IoT Device Rental Services
33th USENIX Conference on Security Symposium 2024 paper bibtex |
USENIX Security'24 | |
CDN Cannon: Exploiting CDN Back-to-Origin Strategies for Amplification Attacks
33th USENIX Conference on Security Symposium 2024 paper bibtex |
USENIX Security'24 | |
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet
Proceedings 2024 Network and Distributed System Security Symposium 2024 paper bibtex |
NDSS'24 | |
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies with Differential Fuzzing
Proceedings 2024 Network and Distributed System Security Symposium 2024 paper code bibtex |
NDSS'24 | |
Faster and Better: Detecting Vulnerabilities in Linux-based IoT Firmware with Optimized Reaching Definition Analysis
Proceedings 2024 Network and Distributed System Security Symposium 2024 paper bibtex |
NDSS'24 | |
Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services
17th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2024 paper bibtex |
WiSec'24 | |
Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack
32th USENIX Conference on Security Symposium 2023 Presented at BlackHat Europe 2023 [talk abstract] paper slides bibtex |
USENIX Security'23 | |
TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers
30th ACM Conference on Computer and Communications Security 2023 paper bibtex |
CCS'23 | |
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild
30th ACM Conference on Computer and Communications Security 2023 paper bibtex |
CCS'23 | |
Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers
30th ACM Conference on Computer and Communications Security 2023 paper bibtex |
CCS'23 Distinguished Paper Award |
|
1dFuzz: Reproduce 1-day Vulnerabilities with Directed Differential Fuzzing
32nd ACM SIGSOFT International Symposium on Software Testing and Analysis 2023 paper bibtex |
ISSTA'23 | |
DareShark: Detecting and Measuring Security Risks of Hosting-Based Dangling Domains
ACM SIGMETRICS 2023 2023 paper bibtex |
SIGMETRICS'23 | |
A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities
Proceedings 2023 Network and Distributed System Security Symposium 2023 paper bibtex |
NDSS'23 | |
Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning
2023 IEEE Symposium on Security and Privacy 2023 paper bibtex |
S&P’23 | |
A Large-scale and Longitudinal Measurement Study of DKIM Deployment
31th USENIX Conference on Security Symposium 2022 paper bibtex |
USENIX Security'22 | |
HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations
52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks 2022 paper bibtex |
DSN'22 Best Paper Award Runners Up |
|
Composition Kills: A Case Study of Email Sender Authentication
29th USENIX Conference on Security Symposium 2020 Invited to appear in USENIX ;login: 2021[Invited Article] Presented at BlackHat USA 2020 [talk abstract] Coverage: Wired, CSO online, and Dark reading paper slides talk code bibtex |
USENIX Security'20 Distinguished Paper Award |
|
CDN Judo: Breaking the CDN DoS Protection with Itself
Proceedings 2020 Network and Distributed System Security Symposium 2020 paper slides bibtex |
NDSS'20 | |
We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS
27th USENIX Conference on Security Symposium 2018 Presented at DEFCON China 2018 [talk abstract] paper slides talk code bibtex |
USENIX Security'18 | |
Abusing CDNs for Fun and Profit: Security Issues in CDNs’ Origin Validation
IEEE 37th Symposium on Reliable Distributed Systems 2018 paper bibtex |
SRDS’18 | |
Forwarding Loop Attacks in Content Delivery Networks
Proceedings 2016 Network and Distributed System Security Symposium 2016 Real-world impact: [Cloudflare blog] [Fastly blog] [CERT/CC] [RFC 8586] paper slides bibtex |
NDSS'16 Distinguished Paper Award |
|
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations
23rd ACM SIGSAC Conference on Computer and Communications Security 2016 paper slides talk website bibtex |
CCS'16 Best Paper Nominee |
|
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search
2016 IEEE Symposium on Security and Privacy 2016 paper bibtex |
S&P'16 |
2024 | ||
2023 | ||
2022 | ||
2022 | ||
2020 | ||
2019 | ||
2016 |
Editorial Board |
|
|
2024 - present |
TPC Member |
|
|
2025 |
|
2025 |
|
2025 |
|
2024 |
|
2024 |
|
2024 |
|
2023 |
|
2023 |
|
2023 |
|
Fall 2023, Fall 2024 |
|
Fall 2022, Fall 2023, Fall 2024 |
|
Summer 2023 |
|
Jun 2024 - Present |
|
Oct 2021 - Jun 2024 |
|
Apr 2021 - Sep 2021 |
|
Aug 2018 - Apr 2021 |