Office: Thomas M. Siebel Center
201 North Goodwin Avenue
MC 258, Room 4316
Urbana, IL 61801-2302
Phone: 217-244-1008
Email: gangw@illinois.edu

Google Scholar DBLP Twitter

CLASS

Fall 2022: CS463
Fall 2021: CS463
Spring 2021: CS463
Fall 2020: CS598
Spring 2020: CS463
Fall 2019: CS598
Spring 2019: CS4264
Fall 2018: CS4984
Spring 2018: CS4264
Fall 2017: CS6604
Fall 2016: CS4264

NEWS

(Archived news)

2 Jun. 2022:
I am co-organizing a Breakout Session at NSF SaTC meeting on AI for Security with Sagar, Anita, and Saptarshi. Please join us.

30 May 2022:
Giving a keynote at WORMA 2022

27 May 2022:
PhD Career day panel at The University of Chicago

26 May 2022:
Security panel at DLS 2022

13 Apr. 2022:
TPC of NDSS 2023

10 Apr. 2022:
Received extra funding from Jump ARCHES to support Undergraduate Summer Internship.

5 Apr. 2022:
Margie received the prestigious award from 2022 NSF Graduate Research Fellowship Program (GRFP). Congratulations!

24 Mar 2022:
Our proposal was funded by C3.ai (with Carl Gunter and Bo Li)!

10 Mar 2022:
TPC of USENIX Sec 2023

21 Feb 2022:
A New Scientist article introducing our study on deepfake based phishing

09 Feb 2022:
TPC of DIMVA 2022.

03 Feb 2022:
An APNIC article introducing our DNS-over-HTTPS measurement paper

03 Feb 2022:
Joining TPC of RAID 2022

18 Jan 2022:
IEEE SP TPC 2023.

13 Jan 2022:
Two papers accepted to the WebConf! Congrats to Nicholas and Jaron!

13 Jan 2022:
Our team received a grant from Jump ARCHES to work on "secure patient outreach"!

10 Dec 2021:
TPC CCS 2022.

2 Dec 2021:
Our study on deduplication of Linux bug reports is accepted to NDSS 2022! Congrats to everyone!

19 Nov 2021:
Our DeepPhish paper is accepted to USENIX Security 2022! Huge congrats to Jaron, Licheng and Olivia!

29 Sep 2021:
New paper accepted to IMC '21: we did a measurement on DoH performance around the world, and explored the reasons behind regional differences. Shout-out to Rishabh, Paul, and Deepak!

10 Sep 2021:
The Web Conf 2022 TPC (Security Track)

10 Aug 2021:
Exciting news! NSF funded our project "Towards Label Enrichment and Refinement to Harden Learning-based Security Defenses" (Small; Xinyu Xing as Co-PI). Looking forward to the exciting work in the next three years! Thank you, NSF!

10 Aug 2021:
More good news from NSF: another funded project (Medium; Adam Bates as PI): "Principled Foundations for the Design and Evaluation of Graph-Based Host Intrusion Detection Systems". Thank you, NSF!

12 July. 2021:
AISec 2021 TPC

(Archived News)

PRESS

2 Apr. 2020:
Interview with Vox on coronavirus scam and email phishing: article; video.

Recent press coverage on our GPS spoofing project
Forbes, The Wall Street Journal ACM TechNews, The Cyberwire podcast, The Register, Naked Security, BleepingComputer, Hackster, and more.

Recent press coverage on our spear phishing project
ACM TechNews, Science Daily, VT News, Digital Journal, The Cyberwire, The University Network, and more.

Press coverage on our joint project with Dashlane
Daily Express, The Sun, Daily Mail, Mirror, Security Magazine, Yahoo!, Darkreading, and more.

My recent interview with The Washington Times on Internet scam.

Press coverage on our password project:
New Scientist, Daily Express, The Sun, DailyMail

Interviewed by The New York Times on IoT and Smart devices.

Press coverage on our app collusioin project
ACM TechNews, phys.org, NewScientist, The Sun, Business Insider, Independent, Daily Mail, IBT, VT News and more.

Interview with WVTF Radio NPR on scam, fake content and more

Press coverage on our Waze/Sybil device project
Fusion (1, 2), CBS News, Recode/CNBC, The Telegraph, Times of Israel, i24 News, TechCrunch, PC Magazine, and many more.

Press coverage on Crowdturfing
MIT Tech Review, Boston Globe, SlashDot, MIT Technology Review, Consumerist, InfoWorld

LINKS

MyCS, Compass2g, CS Wiki
Gradudate Application
Clickstream Project
CACM, CRA, Computeroxy
Lab Cluster

SPONSORS





I am an Assistant Professor in the Department of Computer Science at University of Illinois at Urbana-Champaign (UIUC). I am also affiliated with the Department of Electrical and Computer Engineering (by courtesy), Security and Privacy Research at Illinois (SPRAI), and Informatics Programs of School of Information Sciences. My research aims to make it easier to build explainable and robust data-driven solutions to safeguard Internet systems and augment human’s ability to perform security-related tasks. I am interested in a range of topics in Security and Privacy, Internet Measurement, and Data Mining. My recent projects are focused on the security of social computing systems, cybercrime, adversarial machine learning, and machine learning explanation. I actively publish in conferences such as Usenix Security/CCS/NDSS/Oakland, IMC/WWW, and IMWUT/CHI. I am a recipient of the NSF CAREER Award (2018), Amazon Research Award (2021), Google Faculty Research Award (2017), IMWUT Distinguished Paper Award (2019), ACM CCS Outstanding Paper Award (2018), and SIGMETRICS Best Practical Paper Award (2013).

Before joining UIUC, I worked as an Assistant Professor at Virginia Tech for three years (2016 to 2019). I obtained my Ph.D. from UC Santa Barbara under the supervision of Ben Y. Zhao and Heather Zheng in 2016. I received my bachelor's degree from Tsinghua University in 2010. I spent two summers at Microsoft Research Redmond in 2011 and 2014.

Selected Publications (Full List)


  • DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks
    Jaron Mink, Licheng Luo, Natã M. Barbosa, Olivia Figueira, Yang Wang, Gang Wang
    Proceedings of The 31st USENIX Security Symposium (USENIX Security)
    Boston, MA, August 2022. PDF Website Artifacts Available, Artifacts Functional, Results Reproduced

  • Revisiting Email Forwarding Security under the Authenticated Received Chain Protocol
    Chenkai Wang, Gang Wang
    Proceedings of The ACM Web Conference (WWW)
    Lyon, France. April 2022. PDF

  • Beyond Bot Detection: Combating Fraudulent Online Survey Takers
    Ziyi Zhang, Shuofei Zhu, Jaron Mink, Aiping Xiong, Linhai Song, Gang Wang
    Proceedings of The ACM Web Conference (WWW)
    Lyon, France. April 2022. PDF

  • An In-depth Analysis of Duplicated Linux Kernel Bug Reports
    Dongliang Mu, Yuhang Wu, Yueqi Chen, Zhenpeng Lin, Chensheng Yu, Xinyu Xing, Gang Wang
    Proceedings of The Network and Distributed System Security Symposium (NDSS)
    San Diego, CA, February 2022. PDF

  • Measuring DNS-over-HTTPS Performance Around the World
    Rishabh Chhabra, Paul Murley, Deepak Kumar, Michael Bailey, Gang Wang
    Proceedings of The ACM Internet Measurement Conference (IMC)
    Virtual Event, November 2021. PDF

  • It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications
    Qingying Hao, Licheng Luo, Steve TK Jan, Gang Wang
    Proceedings of The ACM Conference on Computer and Communications Security (CCS)
    Seoul, South Korea, November 2021. PDF Video

  • Who Am I? A Design Probe Exploring Real-Time Transparency About Online and Offline User Profiling Underlying Targeted Ads
    Natã Miccael Barbosa, Gang Wang, Blase Ur, Yang Wang
    Proceedings of The ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT/UbiComp)
    September 2021. PDF

  • Double-Cross Attacks: Subverting Active Learning Systems
    Jose Rodrigo Sanchez Vicarte, Gang Wang, Christopher Fletcher
    Proceedings of The 30th USENIX Security Symposium (USENIX Security)
    Vancouver, BC, Canada, August 2021. PDF

  • CADE: Detecting and Explaining Concept Drift Samples for Security Applications
    Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, Gang Wang
    Proceedings of The 30th USENIX Security Symposium (USENIX Security)
    Vancouver, BC, Canada, August 2021. PDF Code Supplementary Artifact Evaluated

  • Assessing Browser-level Defense against IDN-based Phishing
    Hang Hu, Steve T.K. Jan, Yang Wang, Gang Wang
    Proceedings of The 30th USENIX Security Symposium (USENIX Security)
    Vancouver, BC, Canada, August 2021. PDF

  • Stars Can Tell: A Robust Method to Defend against GPS Spoofing using Off-the-shelf Chipset
    Shinan Liu, Xiang Cheng, Hanchao Yang, Yuanchao Shu, Xiaoran Weng, Ping Guo, Kexiong (Curtis) Zeng, Gang Wang, Yaling Yang
    Proceedings of The 30th USENIX Security Symposium (USENIX Security)
    Vancouver, BC, Canada, August 2021. PDF Website Code Data Artifact Evaluated

  • FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data
    Junjie Liang, Wenbo Guo, Tongbo Luo, Vasant Honavar, Gang Wang, Xinyu Xing
    Proceedings of The Network and Distributed System Security Symposium (NDSS)
    Virtual Conference, February 2021. PDF

  • VerHealth: Vetting Medical Voice Applications through Policy Enforcement
    Faysal Hossain Shezan, Hang Hu, Gang Wang, Yuan Tian
    Proceedings of The ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (UbiComp)
    December 2020. PDF

  • Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines
    Shuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, Gang Wang
    Proceedings of The 29th USENIX Security Symposium (USENIX Security)
    Boston, MA, August 2020. PDF Data Artifact Evaluated

  • Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation
    Steve T.K. Jan, Qingying Hao, Tianrui Hu, Jiameng Pu, Sonal Oswal, Gang Wang, Bimal Viswanath
    Proceedings of The 41st IEEE Symposium on Security and Privacy (IEEE SP)
    San Francisco, CA, May 2020. PDF Video

  • Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems
    Faysal Hossain Shezan, Hang Hu, Jiamin Wang, Gang Wang, Yuan Tian
    Proceedings of The Web Conference (WWW)
    Taipei, April 2020. PDF Data

  • Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations
    Sazzadur Rahaman, Gang Wang, Danfeng Yao
    Proceedings of The 26th ACM Conference on Computer and Communications Security (CCS)
    London, UK, November 2019. PDF Code CSAW ’20 Applied Research Competition Finalist

  • Errors, Misunderstandings, and Vulnerabilities: Analyzing the Crowdsourcing Process of Ad-blocking Systems
    Mshabab Alrizah, Sencun Zhu, Xinyu Xing, Gang Wang
    Proceedings of The ACM SIGCOMM Internet Measurement Conference (IMC)
    Amsterdam, Netherlands, October 2019. PDF

  • Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines
    Peng Peng, Limin Yang, Linhai Song, Gang Wang
    Proceedings of The ACM SIGCOMM Internet Measurement Conference (IMC)
    Amsterdam, Netherlands, October 2019. PDF

  • Towards the Detection of Inconsistencies in Public Security Vulnerability Reports
    Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang
    Proceedings of The 28th USENIX Security Symposium (USENIX Security)
    Santa Clara, CA, August 2019. PDF Data

  • Characterizing Pixel Tracking through the Lens of Disposable Email Services
    Hang Hu, Peng Peng, Gang Wang
    Proceedings of The 40th IEEE Symposium on Security and Privacy (IEEE SP)
    San Francisco, CA, May 2019. PDF Video

  • Modeling Spatio-Temporal App Usage for a Large User Population
    Huandong Wang, Yong Li, Sihan Zeng, Gang Wang, Pengyu Zhang, Pan Hui, Depeng Jin
    Proceedings of The ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (UbiComp)
    March 2019. PDF

  • Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks
    Steve T.K. Jan, Joseph Messou, Yen-Chen Lin, Jia-Bin Huang, Gang Wang
    Proceedings of The Thirty-Third AAAI Conference on Artificial Intelligence (AAAI)
    Honolulu, HI, January 2019. PDF Website Spotlight

  • Needle in a Haystack: Tracking Down Elite Phishing Domains in the Wild
    Ke Tian, Steve T.K. Jan, Hang Hu, Danfeng Yao, Gang Wang
    Proceedings of ACM Internet Measurement Conference (IMC)
    Boston, MA, October 2018. PDF Code

  • LEMNA: Explaining Deep Learning based Security Applications
    Wenbo Guo, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, Xinyu Xing
    Proceedings of The 25th ACM Conference on Computer and Communications Security (CCS)
    Toronto, Canada, October 2018. PDF Code Outstanding Paper Award

  • Your Apps Give You Away: Distinguishing Mobile Users by Their App Usage Fingerprints
    Zhen Tu, Runtong Li, Yong Li, Gang Wang, Di Wu, Pan Hui, Li Su, Depeng Jin
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (UbiComp)
    September 2018. PDF IMWUT Distinguished Paper Award

  • End-to-End Measurements of Email Spoofing Attacks
    Hang Hu, Gang Wang
    Proceedings of The 27th USENIX Security Symposium (USENIX Security)
    Baltimore, MD, August 2018. PDF

  • Understanding the Reproducibility of Crowd-reported Security Vulnerabilities
    Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, Gang Wang
    Proceedings of The 27th USENIX Security Symposium (USENIX Security)
    Baltimore, MD, August 2018. PDF Data

  • All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems
    Kexiong (Curtis) Zeng, Shinan Liu, Yuanchao Shu, Dong Wang, Haoyu Li, Yanzhi Dou, Gang Wang, Yaling Yang
    Proceedings of The 27th USENIX Security Symposium (USENIX Security)
    Baltimore, MD, August 2018. PDF

  • De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice
    Huandong Wang, Chen Gao, Yong Li, Gang Wang, Depeng Jin, Jingbo Sun
    Proceedings of The 25th Annual Network And Distributed System Security Symposium (NDSS)
    San Diego, CA, February 2018. PDF Slides Code

  • Measuring the Insecurity of Mobile Deep Links of Android
    Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang
    Proceedings of The 26th USENIX Security Symposium (USENIX Security)
    Vancouver, Canada, August 2017. PDF Slides Talk

  • Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments System
    Xinyi Zhang, Shiliang Tang, Yun Zhao, Gang Wang, Haitao Zheng, Ben Y. Zhao
    Proceedings of International AAAI Conference on Web and Social Media (ICWSM)
    Montreal, Canada, May 2017. PDF

  • Anatomy of a Personalized Livestreaming System
    Bolun Wang, Xinyi Zhang, Gang Wang, Haitao Zheng, Ben Y. Zhao
    Proceedings of ACM SIGCOMM Internet Measurement Conference (IMC)
    Santa Monica, CA, November 2016. PDF Dataset

  • Defending against Sybil Devices in Crowdsourced Mapping Services
    Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao
    Proceedings of ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
    Singapore, June 2016. PDF Video

  • "Will Check-in for Badges": Understanding Bias and Misbehavior on Location-based Social Networks
    Gang Wang, Sarita Y. Schoenebeck, Haitao Zheng, Ben Y. Zhao
    Proceedings of International AAAI Conference on Web and Social Media (ICWSM)
    Cologne, Germany, May 2016. PDF Slides

  • Unsupervised Clickstream Clustering For User Behavior Analysis
    Gang Wang, Xinyi Zhang, Shiliang Tang, Haitao Zheng, Ben Y. Zhao
    Proceedings of SIGCHI Conference on Human Factors in Computing Systems (CHI)
    San Jose, CA, May 2016. PDF Slides Video Website

  • Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms
    Gang Wang, Tianyi Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Haitao Zheng, Ben Y. Zhao
    Proceedings of ACM conference on Computer-Supported Cooperative Work and Social Computing (CSCW)
    Vancouver, BC, Canada, March 2015. PDF Slides

  • Whispers in the Dark: Analysis of an Anonymous Social Network 
    Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao 
    Proceedings of ACM SIGCOMM Internet Measurement Conference (IMC) 
    Vancouver, BC, Canada, November 2014. PDF Slides

  • Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers
    Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao 
    Proceedings of USENIX Security Symposium (USENIX Security)
    San Diego, CA, August 2014. PDF Slides Video

  • Follow the Green: Growth and Dynamics in Twitter Follower Markets 
    Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, Ben Y. Zhao 
    Proceedings of ACM SIGCOMM Internet Measurement Conference (IMC) 
    Barcelona, Spain, October 2013. PDF

  • You are How You Click: Clickstream Analysis for Sybil Detection 
    Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao 
    Proceedings of USENIX Security Symposium (USENIX Security)
    Washington, DC, August 2013. PDF Slides

  • Practical Conflict Graphs for Dynamic Spectrum Distribution
    Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng 
    Proceedings ofACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS)
    Pittsburgh, PA, June 2013. PDF Best Practical Paper Award

  • Wisdom in the Social Crowd: an Analysis of Quora 
    Gang Wang, Konark Gill, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao 
    Proceedings of International World Wide Web Conference (WWW) 
    Rio de Janeiro, Brazil, May 2013. PDF Slides

  • Social Turing Tests: Crowdsourcing Sybil Detection
    Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam Metzger, Haitao Zheng, Ben Y. Zhao
    Proceedings of Annual Network Distributed System Security Symposium (NDSS)
    San Diego, CA, February 2013. PDF Slides

  • Serf and Turf: Crowdturfing for Fun and Profit
    Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao
    Proceedings of International World Wide Web Conference (WWW)
    Lyon, France, April 2012. PDF Slides

  • I am the Antenna: Accurate Outdoor AP Location using Smartphone
    Zengbin Zhang, Xia Zhou, Weile Zhang, Yuanyang Zhang, Gang Wang, Ben Y. Zhao, Haitao Zheng
    Proceedings of Annual International Conference on Mobile Computing and Networking (MobiCom)
    Las Vegas, NV, September 2011. PDF