Lannan Luo

I am an Assistant Professor in the Department of Computer Science and Engineering at University of South Carolina. I received my PhD in the College of Information Sciences and Technology from Penn State University in August, 2017, working under the supervision of Dr. Peng Liu. The easiest way to contact me is through email at lluo (at)

My research mainly focuses on software and systems security. My reserach interests include mobile security, IoT security, malware analysis, vulnerability analysis, programming languages, software engineering, and deep learning. My research approaches are mainly empirical in tandem with formal methods, combining symbolic execution, theorem proving, taint analysis, control flow analysis, data flow analysis, reverse engineering, data mining, and deep learning.

To prospective students:
I am looking for self-motivated Ph.D. students, master students, undergraduate students, and visiting scholars. For more details, please visit here.





03/07/19 I will serve on the program committee of ACSAC'19.

03/04/19 Our work that patches ALL heap vulnerabilities without changing the binary code is accepted at DSN'19.

03/04/19 Our work that detects audio adversarial examples at accuracies over 99% is accepted at DSN'19.

02/13/19 I will serve on the program committee of MASS'19.

01/25/19 Our paper "A Cross-Architecture Instruction Embedding Model for Natural Language Processing-Inspired Binary Code Analysis" is accepted at the NDSS Workshop on Binary Analysis Research.

11/28/18 Our paper "A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples" is accepted at the AAAI Workshop on Artificial Intelligence for Cyber Security.

11/06/18 Our paper "Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs" is accepted at NDSS'19, see you in San Diego!

11/05/18 I will serve on the program committee of ICME'19.

09/04/18 Our SaTC proposal is funded by NSF. Thank you NSF!

04/30/18 I received the ASPIRE I award.

04/17/18 I will serve on the program committee of MASS'18.

10/31/17 Our work that builds resilient repackaging-detection capability into mobile apps through binary code instrumentation is accepted at CGO'18.

10/18/17 I will serve on the publicity co-chair of CNS'18.

06/19/17 We have opensourced our tool for Symbolic Execution of Android Framework (presented in MobiSys'17).

02/25/17 Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation is accepted at MobiSys'17.

12/22/16 Our paper "Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection" is accepted at TSE'17.

02/29/16 SSN, which builds a reliable and stealthy repackage-proofing capability into Android apps, is accepted at DSN'16.

01/22/16 SolMiner, which automatically mines distinct solutions from programs, is accepted at ICSE'16.

11/21/14 Best Paper Award Nomination: Our FSE ’14 paper was nominated for the best paper award. FSE is one of two finest conferences in the field of software engineering.

06/16/14 CoP, a binary-oriented, obfuscation-resilient software plagiarism detection method, is accepted at FSE'14.


Contact Information

Rm 2245
Storey Innovation Center
Computer Science and Engineering
University of South Carolina
Email: lluo (at) cse (dot) sc (dot) edu