Zhuo Zhang  张倬


Oops, your browser doesn't support this application.

I will be joining the Department of Computer Science at Columbia University as an Assistant Professor in Spring 2026. I completed my Ph.D. at Purdue University under the supervision of Samuel Conte Professor Xiangyu Zhang. Prior to that, I earned my B.Sc. with Zhiyuan Honors from Shanghai Jiao Tong University (SJTU).

I study how to make software hard to break and easy to trust. My work treats security as a design discipline and a scientific question: engineering safety into development, expose defects with precise and scalable auditing, and use debugging to reach root-cause understanding and correctness. The aim is assurance and openness, with methods we can explain, check, and rely on.

Beyond academia, I have been was an avid capture-the-flag (CTF) player. I enjoy hardcore hacking, bug hunting, and contributing to open-source projects. I am actively maintaining EDB and RepoAudit , and have archived Web3Bugs . You can find more of my hobby projects on Github .

🎯 I'm actively looking for self-motivated students with a strong background in systems or program analysis to join my research group at Columbia CS. Additional experience in the following areas will be considered a strong plus:
      • CTF experience (especially RE/Pwn)
      • C/Rust software development at scale
      • Familiarity with Web3 infra (e.g., reth)
      • Kernel/Browser vulnerability research

📬 If you're interested in working with me, please drop me an email with (1) your CV and (2) a brief overview of your research interests and relevant background.

The best way to reach me is via email. If you're specifically interested in topics related to binary analysis or Web3, feel free to reach out to [email protected] or [email protected], respectively. For other general inquiries, please contact [email protected].

Special Notes. Sometimes I might miss your email, so don't hesitate to follow up if you don't hear back for a while.

That said, I do have a small trick to help you craft your email in a way that will easily catch my attention. I've encrypted this tip using a customized script, mycipher.py. Below is the encrypted message (in hex format):

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

Unfortunately, the secret encryption key in mycipher.py has been lost 😕, and all I have are a few known plaintext-ciphertext pairs in data. If you do manage to decrypt the instructions above 🕵️‍♂️, just follow what they say 🧩.

Academic Awards

Selected Capture-The-Flag (CTF)

  • 1st place at Paradigm CTF 2023 (w/ Offside Labs)
  • 1st place at DEFCON CTF 2020 (w/ A*0*E)
  • 1st place at the 40th IEEE S&P Celebration Scavenger Hunt (solo)
  • 4th place at DEFCON CTF 2018 (w/ A*0*E)
  • 3rd place at DEFCON CTF 2017 (w/ A*0*E)
  • "Advancing Security Red-Teaming through Probabilistic Binary Analysis" @ RIT, UT Arlington, TAMU, UH, Rice, WPI, Columbia, Duke, CityU HK, ASU, UNC Chapel Hill, HKUST, Cornell, Cornell Tech, CUHK, Georgia Tech, UT Austin, February - April 2025
  • "On Large Language Models' Resilience to Coercive Interrogation" @ Oakland'24, May 2024
  • "Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract" @ USENIX Security'23, August 2023
  • "Pelican: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis" @ USENIX Security'23, August 2023
  • Program Committee Member
  • USENIX Security Symposium, 2025
    The ACM Conference on Computer and Communications Security (CCS), 2024, 2025
    International Conference on Software Engineering (ICSE), 2025, 2026
    International Conference on Automated Software Engineering (ASE), 2024
    International Symposium on Software Testing and Analysis (ISSTA), 2024, 2025
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2024, 2025
    The ACM ASIA Conference on Computer and Communications Security (ASIACCS), 2024
    Workshop on Binary Analysis Research (BAR@NDSS), 2022
  • Reviewer
  • IEEE Transactions on Software Engineering
    IEEE Transactions on Information Forensics and Security
    IEEE/ACM Transactions on Networking
    The Association for Computational Linguistics (ACL) Rolling Review