Hi, I’m a fourth-year PhD student at the School of Cyber Science and Engineering, Wuhan University, supervised by Prof. Guojun Peng. I also work closely with Prof. Jiang Ming and am currently a visiting PhD student at the Department of Computer Science, Tulane University, working under his supervision.
E-mail: sideliu@outlook.com | sidelau@whu.edu.cn
📝 Publications
-
Analyzing PDFs like Binaries: Adversarially Robust PDF Malware Analysis via Intermediate Representation and Language Model
Side Liu, Jiang Ming, Guodong Zhou, Xinyi Liu, Jianming Fu, Guojun Peng
CCS 2025 (Accepted to appear) -
VAPD: An Anomaly Detection Model for PDF Malware Forensics with Adversarial Robustness
Side Liu, Jiang Ming, Yilin Zhou, Jianming Fu, Guojun Peng
USENIX Security 2025 -
A Survey on Android Dynamic Evasive Malware: Taxonomy, Countermeasures and Open Challenges
Dongni Zhang, Xiuzhang Yang, Side Liu, Yilin Zhou, Jianming Fu, Guojun Peng
Computers & Security, Volume 159, December 2025 -
MODFuzz: A Multi-Objective Directed Fuzzer for USB Drivers
Yilin Zhou, Guojun Peng, Xingliang Wang, Chenyang Wang, Zichuan Li, Side Liu, Yanhao Wang, Xiuzhang Yang, Jianming Fu
IEEE Internet of Things Journal, 2025 -
A Survey on the Evolution of Fileless Attacks and Detection Techniques
Side Liu, Guojun Peng, Haitao Zeng, Jianming Fu
Computers & Security, Volume 137, February 2024
🎖 Honors and Awards
- 2023 - Individual Funding from Qi An Xin’s Cyber Security Innovation Project ($7000)
- 2022 - 2nd at Datacon Data Security Analytics Competition: Cybercrime Analysis Track.
- 2021 - 4th at Datacon Data Security Analytics Competition: Email Security Track.
- 2019 - Outstanding Bachelor’s Degree Thesis of Wuhan University.
🎈 Services
-
Program Committee / Conference Reviewer
- WWW 2025
-
Conference External Reviewer
- USENIX Secuity 2025, USENIX Secuity 2024
-
Journal Reviewer
- Cybersecurity
-
Teaching Assistant
- Software Security@Wuhan University, 2019 Fall, 2021 Fall
💻 Internships
- 2024.06 - 2024.08, Tencent Keen Lab, China
- Security research on intrusion detection and analysis, conducting comprehensive analysis of audit logs using provenance graphs and LLMs.