Chengbin Pang

Chengbin Pang

PhD Candidate

Nanjing University

Chengbin Pang is a PhD candidate of computer science and technology at Nanjing University. His researcch interests include system and software security.

Chengbin Pang是南京大学计算机科学与技术系的在读博士生。他的研究方向包括系统与软件安全。


  • Reverse Engineering
  • Fuzzing
  • Software analysis
  • Software hardening


  • PhD in Nanjing University, 2017 - 2023

    Computer Science and Technology

  • BSc in Shandong University, 2013 - 2017

    Computer Science and Technology


  • [08/2023] - Received several CVEs related to PDF fuzzing ( CVE-2021-25786, CVE-2020-36023, CVE-2020-36024)
  • [05/2023] - Our work about obfuscating call frame information (CFI) was accepted to ISSTA'23.
  • [05/2022] - Our work about ground truth of binary disassembly was accepted to Usenix Security'22.
  • [03/2021] - $5000 bug bounty from Google.
  • [03/2021] - Our work on finding function starts was accepted to DSN'21.
  • [06/2020] - $2000 bug bounty from Google.
  • [04/2020] - Our work on SoK about x86/x64 binary disassembling was accepted to S&P'21.



Senior Research Engineer


Aug 2023 – Present Shanghai

Visiting Scholar

Stevens Institute of Technology

Apr 2019 – Aug 2020 New Jersey

Responsibilities include:

  • Reverse engineering
  • Binary analysis


Generation-based fuzzing? Don’t build a new generator, reuse! (Computers & Security)
OCFI: Make Function Entry Identification Hard Again (ISSTA 2023)
Profile-guided System Optimizations for Accelerated Greybox Fuzzing (CCS 2023)
Debloating Address Sanitizer (Usenix Security 2022)
Ground Truth for Binary Disassembly is Not Easy (Usenix Security 2022)
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask (SP 2021)
Towards Optimal Use of Exception Handling Information for Function Detection (DSN 2021)
Mapping to bits: Efficiently detecting type confusion errors (ACSAC 2018)
To detect stack buffer overflow with polymorphic canaries (DSN 2018)