Yinfang CHEN

Ph.D. student
Department of Computer Science
University of Illinois Urbana-Champaign
yinfang3 AT illinois DOT edu


Hi! I am Yinfang Chen (陈胤方), a second-year Computer Science Ph.D. student “watched” by my “cornfield-watchman-professor” Tianyin Xu at the University of Illinois Urbana-Champaign. I got my Master of Computing degree from the School of Computing of the National University of Singapore, and received my Bachelor’s degree in Computer Science at the Huazhong University of Science and Technology. My research interest is in system reliability and system security.


Feb 1, 2023 Currently, I am on leave due to an visa issue:( and expect to get back to UIUC in 2023 Fall..
Dec 24, 2022 Our work Rainmaker has been accepted by NSDI’23! Thanks everyone in the project group!

selected publications

  1. Empowering Practical Root Cause Analysis by Large Language Models for Cloud Incidents
    Yinfang Chen, Huaibing Xie, Minghua Ma, Yu Kang, Xin Gao, Liu Shi, Yunjie Cao, Xuedong Gao, Hao Fan, and 7 more authors
  2. Push-Button Reliability Testing for Cloud-Backed Applications with Rainmaker
    Yinfang Chen, Xudong Sun, Suman Nath, Ze Yang, and Tianyin Xu
    In Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, Apr 2023
  3. SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions
    Muhammad Adil Inam, Yinfang Chen, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, and Wajih Ul Hassan
    In Proceedings of the 44th IEEE Symposium on Security and Privacy, May 2022
  4. Shadewatcher: Recommendation-guided cyber threat analysis using system audit records
    Jun Zeng, Xiang Wang, Jiahao Liu, Yinfang Chen, Zhenkai Liang, Tat-Seng Chua, and Zheng Leong Chua
    In Proceedings of the 43th IEEE Symposium on Security and Privacy, May 2022
  5. WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics.
    Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang, and Jian Mao
    In Proceedings of the 28th Annual Network and Distributed System Security Symposium, Feb 2021