kylebot.net - Kyle Zeng

Description: span.news { color: red; } span.my_name { font-weight: bold; text-decoration: underline; color: Turquoise; } a.paper_name { font-weight: bold; color: Khaki; } News! 10/2023 Pwned Wy

Example domain paragraphs

News! 03/2023 Exploited Ubuntu Desktop 22.10 at Pwn2Own Vancouver 2023. News! 12/2022 Pwned Synology NAS DiskStation 920+ at Pwn2Own Toronto 2022. News! 12/2022 Awarded bounty from kCTF VRP for the Linux kernel vulnerability: CVE-2022-2585. News! 08/2022 Reported (and exploited) CVE-2022-2585 that affects billions of Android devices. News! 08/2022 Awarded the first maximum bounty from Google kCTF VRP in its entire history. News! 06/2022 Won Linux Kernel LPE Category at TyphoonPWN. News! 05/2022 Exploited Go

I’m Yihui (Kyle) Zeng – a PhD student of School of Computing and Augmented Intelligence at Arizona State University (ASU). My primary advisor is Dr. Tiffany Bao , but I also actively work with Dr. Yan Shoshitaishvili , Dr. Ruoyu (Fish) Wang , and Dr. Adam Doupé . I currently work at SEFCOM with a group of amazing cybersecurity researchers. My research focuses on system security, especially on automated program analysis and vulnerability discovery. I was an intern at University of California, Santa Barbara (

I am a core member of the Shellphish CTF team, under the handle “kylebot”. I’m crazy about CTF. I do PWN, Reversing, and sometimes a little bit of Web and Crypto. I have participated DEF CON CTF and entered the finals every year since I joined the team in 2018. Every year, I organize iCTF , one of the largest attack-defense hacking competition in the world.

Links to kylebot.net (3)