
Jun ZENG (曾俊)
Security Researcher at ByteDance
Email: junzeng@u.nus.edu
About Me
Hi, I am Jun ZENG, a security researcher at ByteDance specializing in AI for security. My recent work focuses on automating vulnerability detection and repair using large language models (LLMs).
Outside of work, I enjoy playing DOTA2 (Ranking: Divine), traveling and watching movies.
We are hiring interns (including JinDouYun talent program) in Hangzhou, Beijing, and Singapore! Please feel free to reach out if you are interested — I would love to chat.
Education: I hold a Ph.D. in Computer Science from the National University of Singapore (2023), advised by Prof. Zhenkai LIANG, and a B.E. in Computer Science from the Huazhong University of Science and Technology (2018).
Featured Publications
[Preprint] Unraveling the Key of Machine Learning Solutions for Android Malware Detection
- Jiahao Liu, Jun Zeng, Fabio Pierazzi, Lorenzo Cavallaro, Zhenkai Liang
Paper
[NDSS 2025] ProvGuard: Detecting SDN Control Policy Manipulation via Contextual Semantics of Provenance Graphs.
- Ziwen Liu, Jian Mao, Jun Zeng, Jiawei Li, Qixiao Lin, Jiahao Liu, Jianwei Zhuge, Zhenkai Liang
In Proceedings of the 32nd Annual Network and Distributed System Security Symposium
Paper
[NDSS 2025] UI-CTX: Understanding UI Behaviors with Code Contexts for Mobile Applications.
- Jiawei Li*, Jiahao Liu*, Jian Mao, Jun Zeng, Zhenkai Liang *Co-Primary Author
In Proceedings of the 32nd Annual Network and Distributed System Security Symposium
Paper
[CCS 2024] The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches
- Chuqi Zhang, Jun Zeng, Yiming Zhang, Adil Ahmad, Fengwei Zhang, Zhenkai Liang, Hai Jin
In Proceedings of the 31st ACM Conference on Computer and Communications Security
Paper
Code
[Usenix Security 2024] UIHASH: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation
- Jiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, Shaowen Feng, Zhenkai Liang
In Proceedings of the 33rd USENIX Security Symposium
Paper |
Code
[EuroSys 2024] Automatic Root Cause Analysis via Large Language Models for Cloud Incidents.
- Yinfang Chen, Huaibing Xie, Minghua Ma, Yu Kang, Xin Gao, Liu Shi, Yunjie Cao, Xuedong Gao, Hao Fan, Ming Wen, Jun Zeng, Supriyo Ghosh, Xuchao Zhang, Qingwei Lin, Saravan Rajmohan, Dongmei Zhang, and Tianyin Xu
In Proceedings of the 19th European Conference on Computer Systems
Paper
[ICSE 2023] Learning Graph-based Code Representations for Source-level Functional Similarity Detection. (To Appear)
- Jiahao Liu*, Jun Zeng*, Xiang Wang and Zhenkai Liang. *Co-Primary Author
In Proceedings of the 45th International Conference on Software Engineering [Acceptance Rate: 26.1%]
Paper |
Slides |
Code |
Artifact Evaluation
[CCS 2022] PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability.
- Jun Zeng*, Chuqi Zhang*, and Zhenkai Liang. *Co-Primary Author
In Proceedings of the 29th ACM Conference on Computer and Communications Security [Acceptance Rate: 22.5%]
Paper |
Slides |
Code
[ESORICS 2022] AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports.
- Zhenyuan Li, Jun Zeng, Yan Chen, and Zhenkai Liang.
In Proceedings of the 27th European Symposium on Research in Computer Security [Acceptance Rate: 18.5%]
Paper |
Slides |
Code
[Usenix Security 2022] FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation
- Kaihang Ji, Jun Zeng, Yuancheng Jiang, Zhenkai Liang, Zheng Leong Chua, Prateek Saxena, and Abhik Roychoudhury.
In Proceedings of the 31st USENIX Security Symposium [Acceptance Rate: 18.1%]
Paper |
Slides |
Code
[ISSTA 2022] Tell: Log Level Suggestions via Modeling Multi-level Code Block Information.
- Jiahao Liu, Jun Zeng, Xiang Wang, Kaihang Ji, and Zhenkai Liang.
In Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis [Acceptance Rate: 24.4%]
Paper |
Slides |
Code
[S&P 2022] ShadeWatcher: Recommendation-guided Cyber Threat Analysis using System Audit Records
- Jun Zeng, Xiang Wang, Jiahao Liu, Yinfang Chen, Zhenkai Liang, Tat-Seng Chua, and Zheng Leong Chua.
In Proceedings of the 43rd IEEE Symposium on Security and Privacy [Acceptance Rate: 14.5%]
Paper |
Slides |
Demo |
Code |
Talk
[NDSS 2021] Watson: Abstracting Behaviors from Audit logs via Aggregation of Contextual Semantics
- Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang, and Jian Mao.
In Proceedings of the 28th Annual Network and Distributed System Security Symposium [Acceptance Rate: 15.2%]
Paper |
Slides |
Talk
Invited Talks
- Practice of Security Agents in SOC
   - Volcano Engine Force Conference 2024, Shanghai, China , December 2024
- Investigating Security Incidents with System Auditing and Analysis
   - Huawei, Munich, Munich , March2023
   - Zhejiang University, Zhejiang, China, February 2023
- AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports
   - ESORICS 2022, Copenhagen, Denmark, September, 2022
- ShadeWatcher: Recommendation-guided Cyber Threat Analysis using System Audit Records
   - S&P 2022, San Francisco, CA, May, 2022
- Watson: Abstracting Behaviors from Audit logs via Aggregation of Contextual Semantics
   - NDSS 2021, Virtually, February, 2021
Work Experience
- Summer Intern [March - July 2018]
   - Apple, Shanghai, China
- Security Researcher [August 2023 - September 2024]
   - Huawei, Hangzhou, China
- Security Researcher [Present]
   - ByteDance, Hangzhou, China
Teaching Assistant
- CS2107 Introduction for Information Security with CHANG Ee Chien and Sufatrio
   - Semester 2, 2018
   - Semester 1, 2019
   - Semester 1, 2020
- CS5331 Web Security with Zhenkai Liang
   - Semester 1, 2018
   - Semester 2, 2019
   - Semester 2, 2020