Zhuo Zhang  张倬


Oops, your browser doesn't support this application.

I am a tenure-track Assistant Professor in the Department of Computer Science at Columbia University. I completed my Ph.D. at Purdue University under the supervision of Samuel Conte Professor Xiangyu Zhang. Prior to that, I earned my B.Sc. with Zhiyuan Honors from Shanghai Jiao Tong University (SJTU).

I study how to make software hard to break and easy to trust. My work treats security as a design discipline and a scientific question: engineering safety into development, expose defects with precise and scalable auditing, and use debugging to reach root-cause understanding and correctness. The aim is assurance and openness, with methods we can explain, check, and rely on.

Beyond academia, I have been was an avid capture-the-flag (CTF) player. I enjoy hardcore hacking, bug hunting, and contributing to open-source projects. I am actively maintaining EDB and RepoAudit , and have archived Web3Bugs . You can find more of my hobby projects on Github .

🎯 I'm actively looking for self-motivated students with a strong background in systems or program analysis to join my research group at Columbia CS. Additional experience in the following areas will be considered a strong plus:
      • Agentic system development at scale
      • CTF experience (especially RE/Pwn)
      • Kernel/Browser vulnerability research
      • Familiarity with Web3 infra (e.g., reth)

📬 If you're a potential Ph.D. student interested in working with me, please drop me an email with (1) your CV and (2) a brief overview of your research interests and relevant background.
🧩 For undergraduate and master's students at Columbia who want to work with me, please visit the Security Labyrinth to get started!

The best way to reach me is via email at [email protected].

Special Notes. Sometimes I might miss your email, due to the overwhelming volume of messages I receive daily. That said, I do have a small trick to help you craft your email in a way that will easily catch my attention. I've encrypted this tip using a customized script, mycipher.py. Below is the encrypted message (in hex format):

040fc29c860b901336eae5caaf6942d79591253e75716770e794a31b0643382099ab594d5a4a106348b91f1ea98a4286b664f899a1ad632503253d4c3c87e89b315f8180fe00765afb5c0f286c573b6dc36d408f809cc9a368d20793a6c8a6f65541bc5a5b04eb4c1bbcd8742f94f9a7616ce1f347775badeaf5ac4b80be8e4a7979ac88f170ba7f86a7ad379e4381ead39a7bc33a05ebe9b492fabbeb12f318aa1aef96a518f59d16da6daafd9e1f5c930e241894a558b5609fcfb5b4094adf3344188d58f68a9c4b5266816f547313163b62cfb314811ad7a30bad24cfaafc62a31abfba4f45b28bf8c57585a8e8fa30acf74d87804afa3e213c4ad1925570ae221dc5f440a3aa96d48d02c743de13fc878836571bfcb57cbab43316995c248bb649e78561c149545ababf35b0082fff118fb4b9addd888bb27b201395ee6839dfafe9601d948bafdb669087f0ea3b9a071f22e50b76795741fb163f13e4ca4c465838a29deb24db89fdb56729987a98df495375d813e3901a6ee2d19dcd5d179d7fd184938b37e5963a1c1889da013a1af9c5f6df86dbea83ffb85b85b861

Unfortunately, the secret encryption key in mycipher.py has been lost 😕, and all I have are a few known plaintext-ciphertext pairs in data. If you do manage to decrypt the instructions above 🕵️‍♂️, just follow what they say 🧩.

Academic Awards

Selected Capture-The-Flag (CTF)

  • 1st place at Paradigm CTF 2023 (w/ Offside Labs)
  • 1st place at DEFCON CTF 2020 (w/ A*0*E)
  • 1st place at the 40th IEEE S&P Celebration Scavenger Hunt (solo)
  • 4th place at DEFCON CTF 2018 (w/ A*0*E)
  • 3rd place at DEFCON CTF 2017 (w/ A*0*E)
  • "Advancing Security Red-Teaming through Probabilistic Binary Analysis" @ RIT, UT Arlington, TAMU, UH, Rice, WPI, Columbia, Duke, CityU HK, ASU, UNC Chapel Hill, HKUST, Cornell, Cornell Tech, CUHK, Georgia Tech, UT Austin, February - April 2025
  • "On Large Language Models' Resilience to Coercive Interrogation" @ Oakland'24, May 2024
  • "Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract" @ USENIX Security'23, August 2023
  • "Pelican: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis" @ USENIX Security'23, August 2023
  • Program Committee Member
  • USENIX Security Symposium, 2025
    The ACM Conference on Computer and Communications Security (CCS), 2024, 2025
    International Conference on Software Engineering (ICSE), 2025, 2026
    International Conference on Automated Software Engineering (ASE), 2024
    International Symposium on Software Testing and Analysis (ISSTA), 2024, 2025
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2024, 2025
    The ACM ASIA Conference on Computer and Communications Security (ASIACCS), 2024
    Workshop on Binary Analysis Research (BAR@NDSS), 2022
  • Reviewer
  • IEEE Transactions on Software Engineering
    IEEE Transactions on Information Forensics and Security
    IEEE/ACM Transactions on Networking
    The Association for Computational Linguistics (ACL) Rolling Review