Skip to content
View cxxsheng's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report cxxsheng

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
cxxsheng/README.md

Abount Me

Hi there 👋 I'm Sheng Cao. I'm currently a PhD candidate in Cyberspace Security at Huazhong University of Science and Technology, working under the supervision of Prof. Haoyu Wang's team. I received my Bachelor's degree in Computer Science and Technology from Southwest Minzu University in 2018, and my Master's degree in Cyberspace Security from Guilin University of Electronic Technology in 2024. As of July 16th, 2025, my global rankings on the Google Bug Hunters Platform are 135th overall and 36th in the Android Project.

CVE Discoveries

  • Android: CVE-2024-49744, CVE-2025-32312, CVE-2025-26456
  • Huawei: CVE-2025-31175

Research Interests

  • Android Framework Vulnerability Discovery
  • Android Reverse Engineering

Pinned Loading

  1. profiler profiler Public

    A tool to trace java method dynamically for android application.

    Java 38 14

  2. SecurePatchedEmulator SecurePatchedEmulator Public

    Android Emulator with Newest Security Patch

    27 5

  3. CVE-2022-20474 CVE-2022-20474 Public

    PoC of CVE-2022-20474

    Java 17

  4. ParcelTaint ParcelTaint Public

    Artifact for CCS2025b#96: Parcel Mismatch Demystified: Addressing a Decade-Old Security Challenge in Android

    HTML