Zhuo Zhang  张倬


Oops, your browser doesn't support this application.

Assistant Professor
Department of Computer Science
Columbia University
500 West 120 Street, 457 CSB
New York, NY 10027
Phone: (212) 853-8499

My research focuses on security for software systems, including both traditional software and AI-driven systems. I received my B.Sc. with Zhiyuan Honors from Shanghai Jiao Tong University (SJTU), and my Ph.D. from Purdue University, advised by Samuel Conte Professor Xiangyu Zhang. Outside academia, I have been was an avid capture-the-flag (CTF) player and remain active in hard-core hacking, bug hunting, and open-source development. You can find my open-source work on Github .

🎯 I'm actively looking for self-motivated students with a strong background in AI or program analysis to join my research group at Columbia CS. Additional experience in the following areas will be considered a strong plus:
      • Agentic system development at scale
      • CTF experience (especially RE/Pwn)
      • Kernel/Browser vulnerability research

📬 If you're a potential Ph.D. student interested in working with me, please drop me an email with (1) your CV and (2) a brief overview of your research interests and relevant background.
🧩 For undergraduate and master's students at Columbia who want to work with me, please visit the Security Labyrinth to get started! You are also welcome to drop me an email with subject line "Research Internship Application - [Your Name]" to discuss potential research opportunities.

The best way to reach me is via email at [email protected].

Special Notes. Sometimes I might miss your email, due to the overwhelming volume of messages I receive daily. That said, I do have a small trick to help you craft your email in a way that will easily catch my attention. I've encrypted this tip using a customized script, mycipher.py. Below is the encrypted message (in hex format):

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

Unfortunately, the secret encryption key in mycipher.py has been lost 😕, and all I have are a few known plaintext-ciphertext pairs in data. If you do manage to decrypt the instructions above 🕵️‍♂️, just follow what they say 🧩.

Academic Awards

Selected Capture-The-Flag (CTF)

  • 1st place at Paradigm CTF 2023 (w/ Offside Labs)
  • 1st place at DEFCON CTF 2020 (w/ A*0*E)
  • 1st place at the 40th IEEE S&P Celebration Scavenger Hunt (solo)
  • 4th place at DEFCON CTF 2018 (w/ A*0*E)
  • 3rd place at DEFCON CTF 2017 (w/ A*0*E)
  • "Advancing Security Red-Teaming through Probabilistic Binary Analysis" @ RIT, UT Arlington, TAMU, UH, Rice, WPI, Columbia, Duke, CityU HK, ASU, UNC Chapel Hill, HKUST, Cornell, Cornell Tech, CUHK, Georgia Tech, UT Austin, February - April 2025
  • "On Large Language Models' Resilience to Coercive Interrogation" @ Oakland'24, May 2024
  • "Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract" @ USENIX Security'23, August 2023
  • "Pelican: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis" @ USENIX Security'23, August 2023
  • Program Committee Member
  • USENIX Security Symposium, 2025
    The ACM Conference on Computer and Communications Security (CCS), 2024, 2025
    International Conference on Software Engineering (ICSE), 2025, 2026
    International Conference on Automated Software Engineering (ASE), 2024
    International Symposium on Software Testing and Analysis (ISSTA), 2024, 2025
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2024, 2025
    The ACM ASIA Conference on Computer and Communications Security (ASIACCS), 2024
    Workshop on Binary Analysis Research (BAR@NDSS), 2022
  • Reviewer
  • IEEE Transactions on Software Engineering
    IEEE Transactions on Information Forensics and Security
    IEEE/ACM Transactions on Networking
    The Association for Computational Linguistics (ACL) Rolling Review