Portrait of Sen Chen

Sen Chen

Professor, College of Cryptology and Cyber Science, Nankai University, China
Office: Room 563, The Building of Computer Science, Jinnan Campus Email: senchen@nankai.edu.cn

About

I am a full professor at Nankai University and lead NKSSecLab (Nankai Software Security Laboratory). I am also a member of the research group led by Prof. Zheli Liu.

I was a postdoc and research assistant professor at Nanyang Technological University, Singapore, working with Prof. Yang Liu.

My research focuses on software security, with an emphasis on software supply chain security. I have received the ACM SIGSOFT Early Career Researcher Award and 7 Distinguished Paper Awards.

Research

  • Software Supply Chain Security (SSCS)
  • Open Source Software (OSS)
  • Software Composition Analysis (SCA)
  • Static Analysis and Security Testing (SAST)
  • Vulnerablity, Malware, and PoC
  • LLM, AI Agents

News

March 2026: Received one Distinguished Paper Award (ICSE 2026).
December 2025: Received the ACM SIGSOFT Early Career Researcher Award (2026) for outstanding contributions to advancing software supply chain security through pioneering techniques and tools in Software Composition Analysis (SCA) and Static Application Security Testing (SAST).
July 2025: One paper accepted by CCS 2025.

Service

  • 2027 Program Committee: ICSE
  • 2026 Program Committee: USENIX Security
  • 2025 Program Committee: USENIX Security, IEEE S&P, CCS, ISSTA, OOPSLA
  • 2024 Program Committee: USENIX Security, IEEE S&P, CCS, ISSTA, OOPSLA
  • 2023 Program Committee: FSE, ASE
  • 2022 Program Committee: ASE

Selected Publications

  • CCS 2025 [Malware] ForeDroid: Scenario-Aware Analysis for Android Malware Detection and Explanation
  • TOSEM 25 [Malware] Malware Description Generation through Profiling Malicious Behavior Trajectory
  • FSE 2024 [Vuln] Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We? [Award]
  • TSE 2023 [Vuln] Automatically Distilling Storyboard with Rich Features for Android Apps
  • ASE 2023 [Vuln] EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software [Award]
  • ICSE 2023 [Vuln] Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects [Award]
  • ICSE 2022 [Vuln] Demystifying the Vulnerability Propagation and Its Evolution in the NPM Ecosystem
  • TOSEM 22 [Malware] Why an App is Classified as Malware? Towards Malware Classification Interpretation
  • TIFS 2022 [Malware] A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices
  • TDSC 2021 [Malware] GUI-Squatting Attack: Automated Generation of Android Phishing Apps
  • ICSE 2020 [Vuln] An Empirical Assessment of Security Risks of Global Android Banking Apps

View full publications →