Bio

I’m currently a second-year master student of cyberspace security at Xi’an Jiaotong University under the supervision of Prof.Haijun Wang. Previously, I received my Bachelor’s Degree in Automation from Xi’an Jiaotong University in 2023.

My current research interests are blockchain security, and program analysis.

If you are interested in what I’m learning recently, you can visit my personal website

Education

  • Xi’an Jiaotong University 2023.9-Present
    • Master in Cyberspace Security
    • Adivsor:Prof. Haijun Wang
  • Xi’an Jiaotong University 2019.9-2023.6
    • B.S. in Automation(GPA 92+/100)
    • Outstanding Undergraduate in ShannXi Province

Publications

  1. H. Wang, Y. Hu, H. Wu, D. Liu, C. Peng, Y. Wu, M. Fan, T. Liu. Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts (CCF-A ASE2024)

  2. Y. Wu, X. Xie, C. Peng, D. Liu, H. Wu, M. Fan, T. Liu, H. Wang. AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis (CCF-A ASE2024)

  3. Y. Wu, H. Wang, Y. Zhang, X. Li, H. Wu, M. Fan, T. Liu. Business Compliance Detection of Smart Contracts in Electricity and Carbon Trading Scenarios (AISTA2024)

Honors & Awards

Honors:

  • Outstanding graduates of Shaanxi Province XJTU 2023
  • Outstanding graduates of XJTU XJTU 2023
  • Xi an Jiaotong University first-class scholarship XJTU 2020,2021,2022(TOP 3%)
  • Merit student of Hefei High school 2019

Awards:

  • Second Price of National Mathematical Modeling Contest for Postgraduates at National Level XJTU 2023.11
  • Second Prize of National Mathematical Modeling Contest for Undergraduates at Provincial Level XJTU 2021.11
  • First Price of National Undergraduates Mathematics Competitions at Provincial Level XJTU 2021.11
  • First Price of National Undergraduates Mathematics Competitions at Provincial Level XJTU 2020.11

Skills

  • English: CET-6 551

  • Programming language:Python, Solidity, Matlab, Latex

  • django, vue, docker, redis

  • Data element circulation method and related device based on blockchain (Patent, position: second)
  • Smart Contract Vulnerability Detection Method and Related Devices Based on Key Parameter Identification (Patent, position: third)
  • Real-time Monitoring Method and Related Devices for Blockchain Malicious Attack Based on Supervised Comparative Learning (Patent, position: second)
  • Smart Contract Security Protection System (Software copyright, position: second)
  • Data Privacy Trusted Computing Platform (Software copyright, position: third)