ABOUT ME

I am a senior lecturer of the Cyber Security team in the School of Engineering and Information System (SEIT) at the University of New South Wales (UNSW) Canberra. Before joining UNSW, I was a lectuer in the School of Information Technology and Electrical Engineering (ITEE) at the University of Queensland (UQ). I received my Ph.D. degree in the School of Information System (SIS) from Singapore Management University (SMU) in 2018 and became a postdoctoral research fellow in Data61, CSIRO. I visited Carnegie Mellon University (CMU) in 2015.

OUR TEAM

I work closely with

Dr. Juanru Li from Shanghai Jiao Tong University

. Moreover, I collaborate with the excellent researchers from different universities and research centres.

Prof. Elisa Bertino Purdue University

Juanru Li Shanghai Jiao Tong University

Robert H. Deng Singapore Management University

David Lo Singapore Management University

Surya Nepal CSIRO Data61

Research Interest


Automated vulnerability detection and Repair
Mobile security: Mobile apps analysis.
IoT security: IoT firmware analysis.
Network security: Authentication & network protocol analysis

Selected Publications

S&P-22 Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.
Yunlong Lyu, Yi Fang, Yiwei Zhang, Qibin Sun, Siqi Ma, Elisa Bertino, Kangjie Lu, Juanru Li.
In the proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022.

S&P-22 Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK
Xuancheng Jin, Xuangan Xiao, Songlin Jia, Wang Gao, Dawu Gu, Hang Zhang, Siqi Ma, Zhiyun Qian, Juanru Li
In the proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022.

CVPR-22 DeepFake Disrupter: The Detector of DeepFake Is My Friend.
Xueyu Wang, Jiajun Huang, Siqi Ma, Surya Nepal, Chang Xu.
In the proceedings of the 31st Computer Vision and Pattern Recognition, 2022.

ICSE-22 Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search.
Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino.
In the proceedings of the 44th International Conference of Software Engineering, 2022

TKDE-22 Consensus Clustering-Based Automatic Distribution Matching for Cross-Domain Image Steganalysis.
Ju Jia, Meng Luo, Siqi Ma, Lina Wang, Yang Liu.
IEEE Transactions on Knowledge and Data Engineering, 2022.

TDSC-22 μDep: Mutation-based Dependency Generation for Precise Taint Analysis on Android Native Code.
Cong Sun, Yuwan Ma, Dongrui Zeng, Gang Tan, Siqi Ma, Yafei Wu.
IEEE Transactions on Dependable and Secure Computing, 2022.

TIFS-22 Privacy-Preserving Object Detection for Medical Images With Faster R-NN.
Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Kui Ren.
IEEE Transactions on Information Forensics Security, 2022.

IEEE IoT-21 Smart Applications in Edge Computing: Overview on Authentication and Data Security.
Xinghua Li, Ting Chen, Qingfeng Cheng, Siqi Ma, Jianfeng Ma.
In the IEEE Internet of Things Journal, 2021.

ICSE-21 Fine with ``1234''? An Analysis of SMS One-Time Password Randomness in Android Apps
Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diet Ostry, Cong Sun.
In the proceedings of the 43rd Internetional Conference on Software Engineering, 2021.

ACSAC-21 ReCFA: Resilient Control-Flow Attestation.
Yumei Zhang, Xinzhi Liu, Cong Sun, Dongrui Zeng, Gang Tan, Xiao Kan, Siqi Ma.
In the proceedings of the 37th Annual Computer Security Applications Conference, 2021.

Inscrypt-21 SparrowHawk: Memory Safety Flaw Detection via Data-Driven Source Code Annotation.
Yunlong Lyu, Wang Gao, Siqi Ma, Qibin Sun, Juanru Li.
In the proceedings of the 17th International Conference on Information Security and Cryptology.

TDSC-20 Orchestration or Automation: Authentication Flaw Detection in Android Apps
Siqi Ma, Juanru Li, Surya Nepal, Diethelm Ostry, David Lo, Sanjay Jha, Robert H. Deng, Elisa Bertino.
IEEE Transactions on Dependable and Secure Computing, 2020.

IEEE IoT-20 PAPU: Pseudonym Swap with Provable Unlinkability Based on Differential Privacy in VANETs
Xinghua Li, Huijuan Zhang, Yanbing Ren, Siqi Ma, Bin Luo, Jian Weng, Jianfeng Ma.
IEEE Internet of Things Journal, 2020.

ACSAC-20 Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services
Siqi Ma, Hehao Li, Wenbo Yang, Juanru Li, Surya Nepal, Elisa Bertino.
In the proceedings of the 37th Annual Computer Security Applications Conference, 2020.

ICDCS-20 Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing
Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert H. Deng, Kui Ren.
In the proceedings of the 40th IEEE Internaional Conference on Distributed Computing Systems, 2020.

IEEE TII-20 Emlr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid
Zhuo Ma, Yilong Yang, Ximeng Liu, Yang Liu, Siqi Ma, Kui Ren, Chang Yao.
IEEE Transactions on Industrial Informatics, 2020.

IEEE Wireless Communication-20 Are Android Apps Being Protected Well Against Attacks
Siqi Ma, Yang Liu, Surya Nepal,
In the magazine of IEEE wireless Communication, 2020.

IWQoS-20 PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication
Yang Liu, Yilong Yang, Zhuo Ma, Ximeng Liu, Zhuzhu Wang, Siqi Ma
In the proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2020.

IFIP SEC-20 IMShell-Dec: Pay More Attention to External Links in PowerShell
Ruidong Han, Chao Yang, Jianfeng Ma, Siqi Ma, Yunbo Wang, Feng Li
In the proceedings of the 35th International Conference on ICT Systems Security and Privacy Protection, 2020.

SANER-20 SmartShield: Automatic Smart Contract Protection Made Easy
Yuyao Zhang, Siqi Ma, Juanru Li, Kailai Li, Surya Nepal, Dawu Gu.
In the proceedings of the 27th IEEE International Conference on Software Analysis, Evolution and Reengineering, 2020.

SANER-20 EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts
Qingzhao Zhang, Yizhuo Wang, Juanru Li, Siqi Ma.
In the proceedings of the 27th IEEE International Conference on Software Analysis, Evolution and Reengineering, 2020.

ICICS-19 Accelerating SM2 Digital Signature Algorithm using Modern Processor Features
Long Mai, Yuan Yan, Songlin Jia, Shuran Wang, Jianqiang Wang, Juanru Li, Siqi Ma, Dawu Gu.
In the proceedings of the 21st International Conference on Information and Communications Security, 2019.

ACSAC-19 An Empirical Study of the SMS One-Time Password Authentication in Android Apps
Siqi Ma, Runhan Feng, Juanru Li, Surya Nepal, Diethelm Ostry, Yang Liu, Elisa Bertino, Robert Deng, Sanjay Jha, Zhou Ma.
In the proceedings of the 2019 Annual Computer Security Applications Conference.

ESORICS-19 Finding Flaws from Password Authentication Code in Android Apps
Siqi Ma, Elisa Bertino, Robert Deng, Juanru Li, Diet Ostry, Surya Nepal, Sanjay Jha.
In the proceedings of the 24th European Symposium on Research in Computer Security, 2019.

RAID-19 NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification
Jianqiang Wang, Siqi Ma, Yuanyuan Zhang, Zheyu Ma, Long Mai, Tiancheng Chen, Juanru Li, Dawu Gu.
In the proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses, 2019.

ESORICS-17 VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples
Siqi Ma, Ferdian Thung, David Lo, Cong Sun, Robert H. Deng.
In the proceedings of the 22nd European Symposium on Research in Computer Security, 2017.

AsiaCCS-16 CDRep: Automatic Repair of Cryptographic Misuses in Android Applications
Siqi Ma, David Lo, Teng Li, Robert H. Deng.
In the proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016.

COMPSAC-15 Active Semi-supervised Approach for Checking App Behavior against Its Description
Siqi Ma, Shaowei Wang, David Lo, Robert Huijie Deng, Cong Sun.
In the proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

TIFS Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
Baodong Qin, Robert H. Deng, Shengli Liu, Siqi Ma.
IEEE Trans. Information Forensics and Security 10(7): 1384-1393 (2015).

PhD Thesis Automatic Vulnerability Detection and Repair
Siqi Ma, 2018.

  • CSSE 7610 Concurrency: Theory and Practice
  • CYBR 7901 Cyber Security Capstone Project
  • COMP 7711 Cyber Incident Response
  • COMP 2310 Computer System Principles and Programming