Hello, my name is Yuanyi Sun (Screen name is HKHK) who is the owner of this site.
Currently, I am a 5th (final) year Computer Science Ph.D. Candidate at Penn state university.
I am focused on security and privacy, computer vision, machine learning, and deep learning. I like coding. Most of my past projects written by C/C++, assembly, Python, Matlab, Java, JS, Go.
Y. Sun, S. Zhu and Y. Chen. ZoomP^3: Privacy-Preserving Publishing of Online Video Conference Recordings. Proceedings of the 22nd Privacy Enhancing Technologies Symposium (PoPETS), 2022. [paper]
Y. Sun, S. Chen, S. Zhu and Y. Chen. iRyP: A Purely Edge-based Visual Privacy-Respecting System for Mobile Cameras. Proceedings of the 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2020. [paper] [slides]
Y. Sun, S. Zhu, Y. Zhao, and P. Sun. PhotoAuth: Camera based Two-Factor Authentication against Real-Time Phishing Attacks (Under review)
Z. Xie, Y. Sun and S. Zhu AutoP3: A Privacy-by-Design Automatic Photo Privacy Protection System for Mobile Cameras (Under review)
T. Xia, Y. Sun, S. Zhu, Z. Rasheed and K. Hassan-Shafique. Toward A Network-Assisted Approach for Effective Ransomware Detection. EAI Transactions on Security and Safety, 2021. [paper]
Photo Authentication Techniques Resistant to Real-time Phishing (Filed 2020)
SciSec 2018, ICICS 2018, ESORICS 2019, CNS 2020, ESORICS 2020, EAI Endorsed Transactions on Security and Safety 2020, EAI Endorsed Transactions on Security and Safety 2021, AsiaCCS 2022
Research/Teaching Assistant (Penn state university, June 2016 - Present)
Research Intern (Shape security, May 2019 - August 2019)
Software Engineer (FalconStor Software, May 2016 - May 2016)
Research/Teaching Assistant (Stevens Institute of Technology, January 2015 - December 2015)
Languages: Assembly, C, C++, Python, Matlab, C#, Pascal, Basic, E, Java, JS (Vue), Go
Database: MySQL, MS SQL Server, MS Access, PostgreSQL, MongoDB, NoSQL
Networks: Nginx, IIS, Apache, XML, Html, Load-Balance, Socks proxy, Reverse proxy, VPN, CDN, Intelligent DNS, Network attack analysis
Others: Reverse engineering/Cracking, Unity3D, UDK, MFC, WPF, Win 32 API, COM, Socket programming, Multithread programming, GDI/Html layout User Interface
HK2.IO Cloud Disk: A URL shorten, file sharing, online preview, and cloud download services provider.
The system is based on the asynchronous technique. Frontend: JS+Vue+element. Backend: FastAPI+Go. To improve efficiency, backend python is compiled to binary code. To support big file uploading, the frontend divides a big file into chunks. Nginx uses revere proxy to assign works to different applications. Demo
x86 Memory Codes Injection and SSDT API Inline Hook
Written in C++ and assembly. Memory codes injection is for the case when we need to inject our codes to another process for running. First, open the target process. Virtual allocate appropriate space for codes to be running. Write process memory into space and create a remote thread to run it. Source code: hk2.io/d SSDT inline hook is usually for Ring0 level security. Get the original address from Service Descriptor Table. Calculate target function (e.g., NtOpenProcess) offset. Save the original function address and jump to the handler function by the unconditional branch instruction. When finishing, jump back to the original address.
Lightweight high-efficiency memory NoSQL database.
The goal of this project is to build a high-efficiency NoSQL database. The core hash function is written by assembly language to achieve high efficiency. The hash function can be inlined into other projects.
Lightweight intelligent DNS server:
Currently, the widely used DNS service only returns random IP from load balance. It does not consider location, connection information between users and servers. In this project, the goal is making the DNS service more intelligent. When a user queries our DNS, considering connection and location, the intelligent DNS will return the best IP between the user and server to achieve better performance. Another improvment is using dynamic TTL, based on delay, delay jitter, speed, etc.
English input method: Intelligent complete words and adjust the position of a comma.
This project is improving English inputting efficiency in a computer. The system can auto-complete the word you input and auto adjust the position of a comma or number in a sentence. This project relates to multithread programming and database querying. Demo
Hobby: The following videos are clips of me playing Transcendental Etude Mazeppa (S.139 No.4) and Grandes Etudes de Paganini La Campanella (S.141 No.3) by Franz Liszt.
Security and Privacy
Penn State University
5th (final) year Ph.D. Candidate
Security and Privacy
System security and privacy analysis. Build a robust system.
Working with computer vision library like OpenCV, PIL.
Working with object detection like Yolo, Mask RCNN, DeepLab, etc.
New services will be released soon. Thanks for your patience.Will be released soon
Here is the gallery of my past software.
- App Development
- Computer Vision
- Machine/Deep Learning