
I am an independent security researcher now. I also am a member of Terminal OS Architecture & Security Team (TOAST) . Previously, I was a research assistant at Zhejiang University, advised by Prof. Wenbo Shen. Prior to this, I was a visiting scholar at the University of Colorado Boulder, advised by Prof. Yueqi Chen. I also worked closely with Prof. Mingxue Zhang at Zhejiang University. I obtained my bachelor’s degree from Jiangxi Normal University at 2022.
Back in college, I was a devoted CTF enthusiast. I founded our university’s first CTF club JXNUSEC and was the primary solver for reverse-engineering challenges. I loved picking apart closed-source binaries in a debugger and figuring out how they worked. For a while I was fascinated by mobile-game cracking and even entered Tencent’s Game Security Competition 2022, where I solved every problem in both the preliminary and final rounds. Those contests also honed my self-learning skills—especially my “Google-fu.” After graduating, I entered CTF events far less frequently, and my technical focus gradually shifted toward vulnerability finding and exploit development :).
My current research focuses on system/software security. I am interested in the security of AI system/software (GPU stack, Mlsys, etc) and apply AI techniques in security scenario (LLM for sec). I also like exploring new things like web3.
I still love hacking. I have founded many bugs and received 60 CVEs from many famous vendors (Apple, Microsoft, Amazon, etc). My personal thought: Understand target-> Hack it😄
Experiences
2024.06 - Now Independent researcher
2023.09 - 2024.06 Research Assistant, Zhejiang University, advised by Prof. Wenbo Shen
2023.01 - 2023.08 Visiting Scholar, The University of Colorado Boulder, advised by Prof. Yueqi Chen
2022.01 - 2023.01 Senior Security Engineer, Embedded and Mobile Security Group, NIO Inc, Full time.
2021.10 – 2022.01 Reverse Engineer, Game Security Center, Tencent Inc, Intern
2021.02 – 2021.09 Mobile Security Researcher, Xuanwu Lab and Keen Lab, Tencent Inc, Intern
Academic Publications
* indicates equal contribution
Other Publications
Talks
- Unveiling macOS GPU Attack Surfaces: From N-Day Exploits to Novel Fuzzing Techniques | 07/04/ 2025 JD.com (京东) online
Bugs
Well-known Operate Systems (macOS/iOS/Windows/Android)
- CVE-2025-43195, CVE-2025-43187, CVE-2025-30448, Analytics Bug, CVE-2025-24170, CVE-2025-31182, CVE-2025-24249, CVE-2025-24205, CVE-2025-24207, CVE-2025-24248, CVE-2025-24127, CVE-2024-20116, CVE-2024-49107, CVE-2024-40788, CVE-2024-27826, Multiple Apple Neural Engine Compiler Errors, CVE-2024-43533, CVE-2024-20136, CVE-2024-20116, CVE-2024-20107, CVE-2024-20097, CVE-2024-20096, CVE-2024-20095, CVE-2024-20093, CVE-2024-20092, CVE-2024-20091, CVE-2024-20090, CVE-2024-20088, CVE-2024-20083, CVE-2024-20013, CVE-2023-32876, CVE-2023-32875, CVE-2023-32873, CVE-2023-32872, CVE-2023-32821, CVE-2023-32819, CVE-2023-32818, CVE-2023-20833, CVE-2023-20823, CVE-2023-20780
IOT Devices (FreeRTOS/TP-Link/D-Link/Tenda/Fast/MERCURY/SonicWall/Cisco/AMD)
- CVE-2024-54905, CVE-2024-54904, CVE-2024-28115, CVE-2022-30472, CVE-2022-30473, CVE-2022-30474, CVE-2022-30475, CVE-2022-30476, CVE-2022-30477, CVE-2022-20842, CVE-2021-31755, CVE-2021-31757, CVE-2020-19667, CVE-2020-19668, CVE-2020-28877, CVE-2020-28373, CVE-2020-19662, CVE-2020-19664, CVE-2020-19663, CVE-2020-14993, CVE-2020-15415
Open source Projects
Credits: Jiaxun Zhu, Xilong Zhang@Resery, Mas0n, peanuts, Cylin, who collaborated with me to find some of these bugs.
Main Awards as A Core Member
• 2024 Geekcon AVSS Contest International Final, 1st, $3000
• 2023 DataCon Big Data Vulnerability Analysis Track, 2st, $4000
• 2022 DataCon Big Data IOT Security Track Online, 1st, $2500
• 2022 Tencent Game Security CTF Final, 6th
• 2021 National Industrial Internet CTF Student Group, 1st, $4000
• 2021 Jiangxi Industrial Internet Provincial CTF, 1st, $3000
• 2021 Jiangxi College Student Network Security Competition, 1st, $700
• 2021 National offensive and defensive drills (with Tencent attack team), 1st