Siqi Ma

Lecturer (equals to the US Assistant Professor)

School of Information Technology and Electrical Engineering, The University of Queensland
slivia.ma [at] uq.edu.au @Google Scholar @DBLP

About Me
I am currently a lecturer in the Cyber Software Security Discipline at the University of Queensland. I received my PhD from Singapore Management University, supervised by Prof. Robert H. Deng and Prof. David Lo. Then I joined Data61, CSIRO in Sydney, working with Prof. Elisa Bertino (Purdue University) and Dr. Surya Nepal. I work on a series of topics relevant to cybersecurity and software engineering.

Research interests:
Automated vulnerability detection and Repair
Mobile security: Mobile apps analysis.
IoT security: IoT firmware analysis.
Network security: Authentication & network protocol analysis

Collaborators:

Elisa Bertino Purdue University

Juanru Li Shanghai Jiao Tong University

Surya Nepal CSIRO Data61

Robert H. Deng Singapore Management University

David Lo Singapore Management University

I am looking for motivated masters and PhDs. My research topics require programming basic knowledges. You are not required to learn all the programming languages, but you are required to be familar with at least one (e.g., C/C++, java). Please send me your resume and transcript if you are interested in software security.

Publications

S&P-22 Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK
Xuancheng Jin, Xuangan Xiao, Songlin Jia, Wang Gao, Dawu Gu, Hang Zhang, Siqi Ma, Zhiyun Qian, Juanru Li
In the proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022.

IEEE IoT-21 Smart Applications in Edge Computing: Overview on Authentication and Data Security.
Xinghua Li, Ting Chen, Qingfeng Cheng, Siqi Ma, Jianfeng Ma.
In the IEEE Internet of Things Journal, 2021.

ICSE-21 Fine with ``1234''? An Analysis of SMS One-Time Password Randomness in Android Apps
Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diet Ostry, Cong Sun
In the proceedings of the 43rd Internetional Conference on Software Engineering, 2021.

TDSC-20 Orchestration or Automation: Authentication Flaw Detection in Android Apps
Siqi Ma, Juanru Li, Surya Nepal, Diethelm Ostry, David Lo, Sanjay Jha, Robert H. Deng, Elisa Bertino
In the journal of IEEE Transactions on Dependable and Secure Computing, 2020.

IEEE IoT-20 PAPU: Pseudonym Swap with Provable Unlinkability Based on Differential Privacy in VANETs
Xinghua Li, Huijuan Zhang, Yanbing Ren, Siqi Ma, Bin Luo, Jian Weng, Jianfeng Ma.
In the IEEE Internet of Things Journal, 2020.

ACSAC-20 Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services
Siqi Ma, Hehao Li, Wenbo Yang, Juanru Li, Surya Nepal, Elisa Bertino
In the proceedings of the 37th Annual Computer Security Applications Conference, 2020.

ICDCS-20 Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing
Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert H. Deng, Kui Ren.
In the proceedings of the 40th IEEE Internaional Conference on Distributed Computing Systems, 2020.

IEEE TII-20 Emlr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid
Zhuo Ma, Yilong Yang, Ximeng Liu, Yang Liu, Siqi Ma, Kui Ren, Chang Yao
In the journal of IEEE Transactions on Industrial Informatics, 2020.

IEEE Wireless Communication-20 Are Android Apps Being Protected Well Against Attacks
Siqi Ma, Yang Liu, Surya Nepal
In the magazine of IEEE wireless Communication, 2020.

IWQoS-20 PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication
Yang Liu, Yilong Yang, Zhuo Ma, Ximeng Liu, Zhuzhu Wang, Siqi Ma
In the proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2020.

IFIP SEC-20 IMShell-Dec: Pay More Attention to External Links in PowerShell
Ruidong Han, Chao Yang, Jianfeng Ma, Siqi Ma, Yunbo Wang, Feng Li
In the proceedings of the 35th International Conference on ICT Systems Security and Privacy Protection, 2020.

SANER-20 SmartShield: Automatic Smart Contract Protection Made Easy
Yuyao Zhang, Siqi Ma, Juanru Li, Kailai Li, Surya Nepal, Dawu Gu.
In the proceedings of the 27th IEEE International Conference on Software Analysis, Evolution and Reengineering, 2020.

SANER-20 EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts
Qingzhao Zhang, Yizhuo Wang, Juanru Li, Siqi Ma.
In the proceedings of the 27th IEEE International Conference on Software Analysis, Evolution and Reengineering, 2020.

ICICS-19 Accelerating SM2 Digital Signature Algorithm using Modern Processor Features
Long Mai, Yuan Yan, Songlin Jia, Shuran Wang, Jianqiang Wang, Juanru Li, Siqi Ma, Dawu Gu.
In the proceedings of the 21st International Conference on Information and Communications Security, 2019.

ACSAC-19 An Empirical Study of the SMS One-Time Password Authentication in Android Apps
Siqi Ma, Runhan Feng, Juanru Li, Surya Nepal, Diethelm Ostry, Yang Liu, Elisa Bertino, Robert Deng, Sanjay Jha, Zhou Ma.
In the proceedings of the 2019 Annual Computer Security Applications Conference.

ESORICS-19 Finding Flaws from Password Authentication Code in Android Apps
Siqi Ma, Elisa Bertino, Robert Deng, Juanru Li, Diet Ostry, Surya Nepal, Sanjay Jha.
In the proceedings of the 24th European Symposium on Research in Computer Security, 2019.

RAID-19 NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification
Jianqiang Wang, Siqi Ma, Yuanyuan Zhang, Zheyu Ma, Long Mai, Tiancheng Chen, Juanru Li, Dawu Gu.
In the proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses, 2019.

ESORICS-17 VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples
Siqi Ma, Ferdian Thung, David Lo, Cong Sun, Robert H. Deng.
In the proceedings of the 22nd European Symposium on Research in Computer Security, 2017.

AsiaCCS-16 CDRep: Automatic Repair of Cryptographic Misuses in Android Applications
Siqi Ma, David Lo, Teng Li, Robert H. Deng.
In the proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016.

COMPSAC-15 Active Semi-supervised Approach for Checking App Behavior against Its Description
Siqi Ma, Shaowei Wang, David Lo, Robert Huijie Deng, Cong Sun.
In the proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

TIFS Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
Baodong Qin, Robert H. Deng, Shengli Liu, Siqi Ma.
IEEE Trans. Information Forensics and Security 10(7): 1384-1393 (2015).

PhD Thesis Automatic Vulnerability Detection and Repair
Siqi Ma, 2018.

Teaching Courses