热点话题人物,欢迎提交收录!
最优雅的名人百科,欢迎向我们提交收录。
孙聪
2023-05-14 17:31
  • 孙聪
  • 孙聪 - 副教授 博士生导师-西安电子科技大学-网络与信息安全学院-个人资料

近期热点

资料介绍

个人简历


个人简介
浙江大学计算机科学与技术工学学士2005
北京大学计算机软件与理论理学博士2011
ThePennsylvaniaStateUniversity,DepartmentofCSE,访问学者2018/08-2019/08
科学研究
主持以下科研项目
国家自然科学基金项目:自主无人系统高完整性理论及关键技术研究.2019/01-2022/12
国家自然科学基金项目:嵌入式软件可组合信息流安全验证机制研究.2014/01-2016/12
国家863计划课题子课题:智能终端应用的漏洞检测与挖掘技术研究.2015/01-2017/12
工信部某专项科研专题:×××××技术研究.2015/01-2017/12
装发预研项目子课题:×××××技术.2017/01-2019/12
装备预研基金重点项目子课题:×××××技术研究.2011/01-2013/12
陕西省自然科学基础研究计划项目:嵌入式软件可组合信息流安全验证理论与方法研究.2013/01-2014/12
陕西省自然科学基础研究计划项目:智能终端操作系统信息流安全证明方法研究.2016/01-2017/12
中央高校基本科研业务费项目:2012/01-2013/12,2014/01-2015/12
荣誉获奖
系统与网络一体化安全设计关键技术,陕西省科学技术奖,一等奖,2018,排名:6
×××技术研究,国防科学技术进步奖,二等奖,2016,排名:9
×××技术研究,中航工业集团科学技术奖,一等奖,2017,排名:9
“安飞”无人机安全组网系统,陕西省科技工作者创新创业大赛,金奖,2017,排名:3
科研团队
博士研究生
2019级
王梓宇
硕士研究生
2017级
马豫宛,许昕鹏,介银娟
2018级
阚啸,张玉梅,王禾,陈娟颖,刘镡稚
2019级
伍亚飞,乔新博,丁铎,潘建锋
共同指导
马晓欧(2017级,与王超老师),孙雄佳(2019级,与姚青松老师)
已毕业研究生(首次就业去向/学位论文题目)
2016级
刘佼(本校转博)
陈均(腾讯/调用路径驱动的Android应用程序恶意行为检测方法研究)
李占魁(华为/基于内存转储分析的代码注入攻击检测方法)
课程教学
本科生课程
计算机学院
Java程序设计(09,10,11,12,13,14级)
网络程序设计(12,13级)
网络与信息安全学院
高级语言程序设计(14,15,17,18级)
软件逆向工程(13,14,15,17级)
研究生课程
软件安全(2019)
教材
孙聪等,Java实用程序设计.西安电子科技大学出版社,2015-08,ISBN:978-7-5606-3753-2
孙聪等,软件逆向工程原理与实践.西安电子科技大学出版社,2018-02,ISBN:978-7-5606-2497-6
招生要求
1.招收系统安全、软件安全方向博士研究生
2.招收硕士研究生,要求:
1)学习积极主动,善于思考
2)具有一定的编程能力
3)具有较好的数学基础,或较好的英语能力

研究领域


信息流分析
可信软件
智能终端安全
程序分析与验证

近期论文


期刊论文
NingXi,JingLv,CongSun,JianfengMa,SecureServiceCompositionwithQuantitativeInformationFlowEvaluationinMobileComputingEnvironments.Entropy2019,21(8),753.
TengLi,JianfengMa,QingqiPei,HoubingSong,YulongShen,CongSun,DAPV:DiagnosingAnomaliesinMANETsRoutingWithProvenanceandVerification.IEEEAccess,2019,7:35302-35316.
TengLi,JianfengMa,CongSun,SRDPV:secureroutediscoveryandprivacy-preservingverificationinMANETs.WirelessNetworks25(4):1731-1747,Springer,2019.
CongSun,JiaoLiu,YinjuanJie,YuwanMa,JianfengMa.Ridra:ARigorousDecentralizedRandomizedAuthenticationinVANETs.IEEEAccess,2018,6:50358-50371.
NingXi,JianfengMa,CongSun,DiLu,YulongShen,Informationflowcontrolonencrypteddataforservicecompositionamongmultipleclouds,DistributedandParallelDatabases,Springer,2018,36(3):511-527.
PengbinFeng,JianfengMa,CongSun,XinpengXu,YuwanMa,ANovelDynamicAndroidMalwareDetectionSystemWithEnsembleLearning.IEEEAccess,2018,6:30996-31011.
TengLi,JianfengMa,CongSun,NingXi,PVad:Privacy-PreservingVerificationforSecureRoutinginAdHocNetworks.JournalofInformationScienceandEngineering,2018,34(4):943-960.
TengLi,JianfengMa,CongSun,Dlog:diagnosingroutereventswithsyslogsforanomalydetection.TheJournalofSupercomputing,Springer,2018,74(2):845-867.
CongSun,JiaoLiu,XinpengXu,JianfengMa,APrivacy-PreservingMutualAuthenticationResistingDoSAttacksinVANETs.IEEEAccess,2017,5:24012-24022.
DiLu,JianfengMa,CongSun,QixuanWu,ZhaochangSun,NingXi,BuildingaSecureSchemeforaTrustedHardwareSharingEnvironment.IEEEAccess,2017,5:20260-20271.
TengLi,JianfengMa,CongSun,NetPro:DetectingAttacksinMANETRoutingwithProvenanceandVerification.SCIENCECHINAInformationSciences,2017,60:118101:1-118001:3.
PengbinFeng,JianfengMa,CongSun,SelectingCriticalDataFlowsinAndroidApplicationsforAbnormalBehaviorDetection.MobileInformationSystems,2017,7397812:1-7397812:16.
NingXi,DiLu,CongSun,JianfengMa,YulongShen,DistributedSecureServiceCompositionwithDeclassificationinMobileClouds.MobileInformationSystems,2017,7469342:1-7469342:13.
DiLu,JianfengMa,CongSun,XindiMa,NingXi,Credit-BasedSchemeforSecurity-awareandFairness-awareResourceAllocationinCloudComputing.SCIENCECHINAInformationSciences,2017,60(5),52103:1-52103:17.
CongSun,JianfengMa,QingsongYao,Onthearchitectureanddevelopmentlifecycleofsecurecyber-physicalsystems.JournalofCommunicationsandInformationNetworks,Springer,2016,1(4):1-21(invited).
PengbinFeng,CongSun,JianfengMa,MeasuringtheRiskValueofSensitiveDataflowPathinAndroidApplications.SecurityandCommunicationNetworks,2016,9(18):5918-5933.
NingXi,CongSun,JianfengMa,XiaofengChen,YulongShen,DistributedInformationFlowVerificationforSecureServiceCompositioninSmartSensorNetwork.ChinaCommunications,April2016,13(4):119-130.
NingXi,CongSun,JianfengMa,YulongShen,Secureservicecompositionwithinformationflowcontrolinserviceclouds.FutureGenerationComputerSystems,Volume49,August2015:142-148.
CongSun,NingXi,ShengGao,ZhongChen,JianfengMa,Automatedenforcementforrelaxedinformationreleasewithreferencepoints.SCIENCECHINAInformationSciences,2014,57(11):1-19.
TaoZhang,JianfengMa,QiLi,NingXi,CongSun,Trust-basedservicecompositioninmulti-domainenvironmentsundertimeconstraint.SCIENCECHINAInformationSciences,2014,57(9):1-16.
ShengGao,JianfengMa,CongSun,XinghuaLi,Balancingtrajectoryprivacyanddatautilityusingapersonalizedanonymizationmodel.JournalofNetworkandComputerApplications,2014,38(2014):125-134.
ShengGao,JianfengMa,WeisongShi,GuoxingZhan,CongSun,TrPF:ATrajectoryPrivacy-PreservingFrameworkforParticipatorySensing.IEEETransactionsonInformationForensicsandSecurity,2013,8(6):874-887.
NingXi,JianfengMa,CongSun,YulongShen,TaoZhang,DistributedInformationFlowVerificationFrameworkfortheCompositionofServiceChaininWirelessSensorNetwork.InternationalJournalofDistributedSensorNetworks(IJDSN),2013:1-10.
会议论文
CongSun,JunChen,PengbinFeng,JianfengMa,CatraDroid:ACallTraceDrivenDetectionofMaliciousBehaiviorsinAndroidApplications.ML4CS'19:TheSecondInternationalConferenceonMachineLearningforCyberSecurity.Springer,2019,(inpress).
TengLi,JianfengMa,QingqiPei,ChengyanMa,DaweiWei,CongSun,Privacy-PreservingVerificationandRoot-CauseTracingTowardsUAVSocialNetworks.ICC2019:1-6.
TengLi,JianfengMa,CongSun,DaweiWei,andNingXi,PVad:Privacy-PreservingVerificationforSecureRoutinginAdHocNetworks.NaNA'17:2017InternationalConferenceonNetworkingandNetworkApplications.IEEE,2017,pp.5-10.
NingXi,CongSun,DiLu,YulongShen,DistributedInformationFlowVerificationonEncryptedDataForServiceCompositioninMultipleClouds.NaNA'17:2017InternationalConferenceonNetworkingandNetworkApplications.IEEE,2017,pp.286-291.
SiqiMa,FerdianThung,DavidLo,CongSun,RobertDeng,VuRLE:AutomaticVulnerabilityDetectionandRepairbyLearningfromExamples.ESORICS'17:theEuropeanSymposiumonResearchinComputerSecurity2017.Springer,2017,pp.229-246.
CongSun,NingXi,JianfengMa,EnforcingGeneralizedRefinement-basedNoninterferenceforSecureInterfaceComposition.COMPSAC'17:the41stAnnualComputerSoftwareandApplicationsConference(Vol.1).IEEE,2017,pp.586-595.
CongSun,PengbinFeng,TengLi,JianfengMa,Data-OrientedInstrumentationagainstInformationLeakagesofAndroidApplications.COMPSAC'17:the41stAnnualComputerSoftwareandApplicationsConference(Vol.2).IEEE,2017,pp.485-490.
CongSun,QingsongYao,JianfengMa,Certia:CertifyingInterfaceAutomataforCyber-PhysicalSystems(Demo).SMARTCOMP'17:the3rdIEEEInternationalConferenceonSmartComputing.IEEE,2017.
QingsongYao,JianfengMa,CongSun,XinghuaLi,JinkuLi,Attackgivesmepower:DoS-defendingconstant-timeprivacy-preservingauthenticationoflow-costdevicessuchasbackscatteringRFIDtags.MSCC'16:the3rdACMWorkshoponMobileSensing,ComputingandCommunication.ACM,2016,pp.23-28.
NingXi,CongSun,JianfengMa,YulongShen,DiLu,DistributedSecureServiceCompositionwithDeclassificationinMobileNetworks.NaNA'16:2016InternationalConferenceonNetworkingandNetworkApplications.IEEE,2016,pp.254-259.
TengLi,JianfengMa,CongSun,CRVad:ConfidentialReasoningandVerificationTowardsSecureRoutinginAdHocNetworks.ICA3PP'15:the15thInternationalConferenceonAlgorithmsandArchitecturesforParallelProcessing.LNCS9530Springer2015,pp.449-462.
SiqiMa,ShaoweiWang,DavidLo,RobertDeng,CongSun,ActiveSemi-SupervisedApproachforCheckingAppBehaviorAgainstItsDescription.COMPSAC'15:the39thAnnualInternationalComputers,SoftwareandApplicationsConference.IEEE,2015,pp.179-184.
CongSun,NingXi,JinkuLi,QingsongYao,JianfengMa,VerifyingSecureInterfaceCompositionforComponent-basedSystemDesigns.APSEC'14:the21stAsia-PacificSoftwareEngineeringConference.IEEE,2014,pp.359-366.
NingXi,JianfengMa,CongSun,TaoZhang,DecentralizedInformationFlowVerificationFrameworkfortheServiceChainCompositioninMobileComputingEnvironments.ICWS'13:IEEE20thInternationalConferenceonWebServices.IEEE,2013,pp.563-570.
TaoZhang,JianfengMa,CongSun,QiLi,NingXi,ServiceCompositioninMulti-DomainEnvironmentunderTimeConstraint.ICWS'13:IEEE20thInternationalConferenceonWebServices.IEEE,2013,pp.227-234.
CongSun,ShengGao,JianfengMa,VerifyingLocation-basedServiceswithDeclassificationEnforcement.APWeb'12:the14thAsia-PacificWebConference.LNCS7235Springer2012,pp.695-702.
CongSun,EnnanZhai,ZhongChen,JianfengMa,AMulti-CompositionalEnforcementonInformationFlowSecurity.ICICS'11:2011InternationalConferenceonInformationandCommunicationsSecurity.LNCS7043Springer2011,pp.345-359.
CongSun,LiyongTang,ZhongChen,ANewEnforcementonDeclassificationwithReachabilityAnalysis.ProceedingsofIEEEConferenceonComputerCommunicationsworkshops.IEEECommunicationSociety,2011,pp.1024-1029.
CongSun,LiyongTang,ZhongChen,EnforcingReactiveNoninterferencewithReachabilityAnalysis.ITNG'11:Proceedingsofthe8thInternationalConferenceonInformationTechnology:NewGenerations.IEEEComputerSociety,2011,pp.321-326.
CongSun,LiyongTang,ZhongChen,EnforcingRelaxedDeclassificationswithReferencePoints.ICIS'11:Proceedingsofthe10thIEEE/ACISInternationalConferenceonComputerandInformationScience.IEEEComputerSociety,2011,pp.76-81.
CongSun,LiyongTang,ZhongChen,SecureInformationFlowinJavaviaReachabilityAnalysisofPushdownSystem.QSIC'10:Proceedingsofthe10thInternationalConferenceonQualitySoftware.IEEEComputerSociety,2010,pp.142-150.
CongSun,LiyongTang,ZhongChen,SecureInformationFlowbyModelCheckingPushdownSystem.UIC-ATC'09:Proceedingsofthe2009SymposiaandWorkshopsonUbiquitous,AutonomicandTrustedComputing.IEEEComputerSociety,2009,pp.586-591.
中文期刊
吴奇烜,马建峰,孙聪,采用完整性威胁树的信息流完整性度量方法,网络与信息安全学报,2019,5(2):2019016
马卓然,马建峰,苗银宾,孙聪,无人机网络中基于状态迁移的访问控制模型,西安电子科技大学学报,2018,45(6):44-50
孙召昌,马建峰,孙聪,卢笛,基于嵌入式可信平台的运行时监控方法.网络与信息安全学报,2017,3(10):44-51.
吴奇烜,马建峰,孙聪,张帅,张双,郑涛,针对扩展动态故障树的约束分析方法.通信学报,2017,38(9):159-166.
刘佼,孙聪,马建峰,焦政达,采用可信平台度量的车辆远程诊断授权协议.西安电子科技大学学报,2017,44(3):49-54,119.
马勇,马建峰,孙聪,张双,崔西宁,李亚晖,飞行控制系统组件化故障模式与影响分析方法.西安电子科技大学学报,2016,43(2):174-179.
孙聪,习宁,高胜,张涛,李金库,马建峰,基于接口精化的广义无干扰性研究.计算机研究与发展,2015,52(7):1631-1641.
高胜,马建峰,姚青松,孙聪,LBS中面向协同位置隐私保护的群组最近邻查询.通信学报,2015,36(3):146-154.
习宁,马建峰,孙聪,卢笛,张涛,基于模型检测的服务链信息流安全可组合验证方法.通信学报,2014,35(11):23-31.
焦政达,马建峰,孙聪,姚青松,新的车辆远程诊断授权协议.通信学报,2014,35(11):146-153.
杨增印,马建峰,孙聪,黄德俊,叶春晓,陆地群,一种利用手指图像测量人体心率的方法.西安电子科技大学学报,2014,41(5):91-97.
孙聪,唐礼勇,陈钟,基于下推系统可达性分析的程序机密消去机制.软件学报,2012,23(8):2149-2162.
孙聪,唐礼勇,陈钟,马建峰,基于加权下推系统优化可达性分析的Java安全信息流研究.计算机研究与发展,2012,49(5):901-912.
孙聪,唐礼勇,陈钟,基于下推系统可达性分析的输出信道信息流检测.计算机科学,2011,38(7):103-107.

相关热点

扫码添加好友