中文
Share to
Faculty
photo
Name: Yuanyuan Yuan
Title: Assistant Professor
Email: yyyuan@mail.tsinghua.edu.cn
Research Fields: Systems Security, AI Security

Education Background

Ph.D. at The Hong Kong University of Science and Technology, 2024

B.S. at Fudan University, 2020

Working Experience

Assistant Professor, School of Software, Tsinghua University, 2025-Now

Post-doc researcher, Department of Computer Science, ETH Zurich, 2024-2025

Academic Services

PC, USENIX Security Symposium (USENIX Security), 2026

PC, ACM Conference on Computer and Communications Security (CCS), 2026

PC, International Conference on Software Engineering (ICSE), 2026

Honors And Awards

IEEE S&P Distinguished Paper Award, 2025

HKUST CSE Best PhD Dissertation Award, 2024

Publications and Reports

Selected Research Papers:

- Yanzuo Chen, Yuanyuan Yuan*, Zhibo Liu, Sihang Hu, Tianxiang Li, and Shuai Wang. "BitShield: Defending Against Bit-Flip Attacks on DNN Executables". Network and Distributed System Security Symposium (NDSS), 2025.

- Yuanyuan Yuan, Zhibo Liu, Sen Deng, Yanzuo Chen, Shuai Wang, Yinqian Zhang, and Zhendong Su. "CipherSteal: Stealing Input Data from TEE-Shielded Neural Networks with Ciphertext Side Channels". IEEE Symposium on Security and Privacy (IEEE S&P, Distinguished Paper Award), 2025.

- Yanzuo Chen, Zhibo Liu, Yuanyuan Yuan*, Sihang Hu, Tianxiang Li, and Shuai Wang. "Compiled Models, Built-In Exploits: Uncovering Pervasive Bit-Flip Attack Surfaces in DNN Executables". Network and Distributed System Security Symposium (NDSS), 2025.

- Zhibo Liu, Yuanyuan Yuan, Yanzuo Chen, Sihang Hu, Tianxiang Li, and Shuai Wang. "DeepCache: Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables". ACM Conference on Computer and Communications Security (CCS), 2024.

- Yuanyuan Yuan, Zhibo Liu, Sen Deng, Yanzuo Chen, Shuai Wang, Yinqian Zhang, and Zhendong Su. "HyperTheft: Thieving Model Weights from TEE-Shielded Neural Networks via Ciphertext Side Channels". ACM Conference on Computer and Communications Security (CCS), 2024.

- Yuanyuan Yuan, Shuai Wang, and Zhendong Su. "See the Forest, not Trees: Unveiling and Escaping the Pitfalls of Error-Triggering Inputs in Neural Network Testing". International Symposium on Software Testing and Analysis (ISSTA), 2024.

- Yuanyuan Yuan, Qi Pang, and Shuai Wang. "Provably Valid and Diverse Mutations of Real-World Media Data for DNN Testing". IEEE Transactions on Software Engineering (TSE), 2024.

- Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, and Xiangqun Chen. "No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition Defenses". IEEE Symposium on Security and Privacy (IEEE S&P), 2024.

- Qi Pang, Yuanyuan Yuan, and Shuai Wang. "MPCDiff: Testing and Repairing MPC-Hardened Deep Learning Models". Network and Distributed System Security Symposium (NDSS), 2024.

- Ao Sun, Pingchuan Ma, Yuanyuan Yuan, and Shuai Wang. "Explain Any Concept: Segment Anything Meets Concept-Based Explanation". Annual Conference on Neural Information Processing Systems (NeurIPS), 2023.

- Qi Pang, Yuanyuan Yuan, Shuai Wang, and Wenting Zheng. "ADI: Adversarial Dominating Inputs in Vertical Federated Learning Systems". IEEE Symposium on Security and Privacy (IEEE S&P), 2023.

- Yanzuo Chen, Yuanyuan Yuan*, and Shuai Wang. "OBSan: An Out-Of-Bound Sanitizer to Harden DNN Executables". Network and Distributed System Security Symposium (NDSS), 2023.

- Yuanyuan Yuan, Shuai Wang, and Zhendong Su. "Precise and Generalized Robustness Certification for Neural Networks". USENIX Security Symposium (USENIX Security), 2023.

- Yuanyuan Yuan, Zhibo Liu, and Shuai Wang. "CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software". USENIX Security Symposium (USENIX Security), 2023.

- Zhibo Liu, Yuanyuan Yuan, Shuai Wang, Xiaofei Xie, and Lei Ma. "Decompiling x86 Deep Neural Network Executables". USENIX Security Symposium (USENIX Security), 2023.

- Zhenlan Ji, Pingchuan Ma, Yuanyuan Yuan*, and Shuai Wang. "CC: Causality-Aware Coverage Criterion for Deep Neural Networks". IEEE/ACM International Conference on Software Engineering (ICSE), 2023.

- Yuanyuan Yuan, Qi Pang, and Shuai Wang. "Revisiting Neuron Coverage for DNN Testing: A Layer-Wise and Distribution-Aware Criterion". IEEE/ACM International Conference on Software Engineering (ICSE), 2023.

- Yuanyuan Yuan, Qi Pang, and Shuai Wang. "Unveiling Hidden DNN Defects with Decision-Based Metamorphic Testing". IEEE/ACM International Conference on Automated Software Engineering (ASE), 2022.

- Qi Pang, Yuanyuan Yuan, and Shuai Wang. "MDPFuzz: Testing Models Solving Markov Decision Processes". International Symposium on Software Testing and Analysis (ISSTA), 2022.

- Pingchuan Ma, Zhibo Liu, Yuanyuan Yuan, and Shuai Wang. "NeuralD: Detecting Indistinguishability Violations of Oblivious RAM with Neural Distinguishers". IEEE Transactions on Information Forensics and Security (TIFS), 2022.

- Huaijin Wang, Pingchuan Ma, Yuanyuan Yuan, Zhibo Liu, Shuai Wang, Qiyi Tang, Sen Nie, and Shi Wu. "Enhancing DNN-Based Binary Code Function Search With Low-Cost Equivalence Checking". IEEE Transactions on Software Engineering (TSE), 2022.

- Yuanyuan Yuan, Qi Pang, and Shuai Wang. "Automated Side Channel Analysis of Media Software with Manifold Learning". USENIX Security Symposium (USENIX Security), 2022.

- Zhibo Liu, Yuanyuan Yuan, Shuai Wang, and Yuyan Bao. "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications". IEEE Symposium on Security and Privacy (IEEE S&P), 2022.

- Yuanyuan Yuan, Shuai Wang, Mingyue Jiang, and Tsong Yueh Chen. "Perception Matters: Detecting Perception Failures of VQA Models Using Metamorphic Testing". IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2021.

- Yuanyuan Yuan, Shuai Wang, and Junping Zhang. "Private Image Reconstruction from System Side Channels Using Generative Models". International Conference on Learning Representations (ICLR), 2021.

Selected Industrial Reports:

- Yanzuo Chen, Zhibo Liu, Yuanyuan Yuan, Sihang Hu, Tianxiang Li, and Shuai Wang. "The Devil is in the (Micro-) Architectures: Uncovering New Side-Channel and Bit-Flip Attack Surfaces in DNN Executables". Black Hat Europe, 2024.

- Zhibo Liu, Yuanyuan Yuan, Xiaofei Xie, Tianxiang Li, Wenqiang Li, and Shuai Wang. "BTD: Unleashing the Power of Decompilation for x86 Deep Neural Network Executables". Black Hat USA, 2023.