孙聪
近期热点
资料介绍
个人简历
个人简介浙江大学计算机科学与技术工学学士2005北京大学计算机软件与理论理学博士2011ThePennsylvaniaStateUniversity,DepartmentofCSE,访问学者2018/08-2019/08科学研究主持以下科研项目国家自然科学基金项目:自主无人系统高完整性理论及关键技术研究.2019/01-2022/12国家自然科学基金项目:嵌入式软件可组合信息流安全验证机制研究.2014/01-2016/12国家863计划课题子课题:智能终端应用的漏洞检测与挖掘技术研究.2015/01-2017/12工信部某专项科研专题:×××××技术研究.2015/01-2017/12装发预研项目子课题:×××××技术.2017/01-2019/12装备预研基金重点项目子课题:×××××技术研究.2011/01-2013/12陕西省自然科学基础研究计划项目:嵌入式软件可组合信息流安全验证理论与方法研究.2013/01-2014/12陕西省自然科学基础研究计划项目:智能终端操作系统信息流安全证明方法研究.2016/01-2017/12中央高校基本科研业务费项目:2012/01-2013/12,2014/01-2015/12荣誉获奖系统与网络一体化安全设计关键技术,陕西省科学技术奖,一等奖,2018,排名:6×××技术研究,国防科学技术进步奖,二等奖,2016,排名:9×××技术研究,中航工业集团科学技术奖,一等奖,2017,排名:9“安飞”无人机安全组网系统,陕西省科技工作者创新创业大赛,金奖,2017,排名:3科研团队博士研究生2019级王梓宇硕士研究生2017级马豫宛,许昕鹏,介银娟2018级阚啸,张玉梅,王禾,陈娟颖,刘镡稚2019级伍亚飞,乔新博,丁铎,潘建锋共同指导马晓欧(2017级,与王超老师),孙雄佳(2019级,与姚青松老师)已毕业研究生(首次就业去向/学位论文题目)2016级刘佼(本校转博)陈均(腾讯/调用路径驱动的Android应用程序恶意行为检测方法研究)李占魁(华为/基于内存转储分析的代码注入攻击检测方法)课程教学本科生课程计算机学院Java程序设计(09,10,11,12,13,14级)网络程序设计(12,13级)网络与信息安全学院高级语言程序设计(14,15,17,18级)软件逆向工程(13,14,15,17级)研究生课程软件安全(2019)教材孙聪等,Java实用程序设计.西安电子科技大学出版社,2015-08,ISBN:978-7-5606-3753-2孙聪等,软件逆向工程原理与实践.西安电子科技大学出版社,2018-02,ISBN:978-7-5606-2497-6招生要求1.招收系统安全、软件安全方向博士研究生2.招收硕士研究生,要求:1)学习积极主动,善于思考2)具有一定的编程能力3)具有较好的数学基础,或较好的英语能力研究领域
信息流分析可信软件智能终端安全程序分析与验证近期论文
期刊论文NingXi,JingLv,CongSun,JianfengMa,SecureServiceCompositionwithQuantitativeInformationFlowEvaluationinMobileComputingEnvironments.Entropy2019,21(8),753.TengLi,JianfengMa,QingqiPei,HoubingSong,YulongShen,CongSun,DAPV:DiagnosingAnomaliesinMANETsRoutingWithProvenanceandVerification.IEEEAccess,2019,7:35302-35316.TengLi,JianfengMa,CongSun,SRDPV:secureroutediscoveryandprivacy-preservingverificationinMANETs.WirelessNetworks25(4):1731-1747,Springer,2019.CongSun,JiaoLiu,YinjuanJie,YuwanMa,JianfengMa.Ridra:ARigorousDecentralizedRandomizedAuthenticationinVANETs.IEEEAccess,2018,6:50358-50371.NingXi,JianfengMa,CongSun,DiLu,YulongShen,Informationflowcontrolonencrypteddataforservicecompositionamongmultipleclouds,DistributedandParallelDatabases,Springer,2018,36(3):511-527.PengbinFeng,JianfengMa,CongSun,XinpengXu,YuwanMa,ANovelDynamicAndroidMalwareDetectionSystemWithEnsembleLearning.IEEEAccess,2018,6:30996-31011.TengLi,JianfengMa,CongSun,NingXi,PVad:Privacy-PreservingVerificationforSecureRoutinginAdHocNetworks.JournalofInformationScienceandEngineering,2018,34(4):943-960.TengLi,JianfengMa,CongSun,Dlog:diagnosingroutereventswithsyslogsforanomalydetection.TheJournalofSupercomputing,Springer,2018,74(2):845-867.CongSun,JiaoLiu,XinpengXu,JianfengMa,APrivacy-PreservingMutualAuthenticationResistingDoSAttacksinVANETs.IEEEAccess,2017,5:24012-24022.DiLu,JianfengMa,CongSun,QixuanWu,ZhaochangSun,NingXi,BuildingaSecureSchemeforaTrustedHardwareSharingEnvironment.IEEEAccess,2017,5:20260-20271.TengLi,JianfengMa,CongSun,NetPro:DetectingAttacksinMANETRoutingwithProvenanceandVerification.SCIENCECHINAInformationSciences,2017,60:118101:1-118001:3.PengbinFeng,JianfengMa,CongSun,SelectingCriticalDataFlowsinAndroidApplicationsforAbnormalBehaviorDetection.MobileInformationSystems,2017,7397812:1-7397812:16.NingXi,DiLu,CongSun,JianfengMa,YulongShen,DistributedSecureServiceCompositionwithDeclassificationinMobileClouds.MobileInformationSystems,2017,7469342:1-7469342:13.DiLu,JianfengMa,CongSun,XindiMa,NingXi,Credit-BasedSchemeforSecurity-awareandFairness-awareResourceAllocationinCloudComputing.SCIENCECHINAInformationSciences,2017,60(5),52103:1-52103:17.CongSun,JianfengMa,QingsongYao,Onthearchitectureanddevelopmentlifecycleofsecurecyber-physicalsystems.JournalofCommunicationsandInformationNetworks,Springer,2016,1(4):1-21(invited).PengbinFeng,CongSun,JianfengMa,MeasuringtheRiskValueofSensitiveDataflowPathinAndroidApplications.SecurityandCommunicationNetworks,2016,9(18):5918-5933.NingXi,CongSun,JianfengMa,XiaofengChen,YulongShen,DistributedInformationFlowVerificationforSecureServiceCompositioninSmartSensorNetwork.ChinaCommunications,April2016,13(4):119-130.NingXi,CongSun,JianfengMa,YulongShen,Secureservicecompositionwithinformationflowcontrolinserviceclouds.FutureGenerationComputerSystems,Volume49,August2015:142-148.CongSun,NingXi,ShengGao,ZhongChen,JianfengMa,Automatedenforcementforrelaxedinformationreleasewithreferencepoints.SCIENCECHINAInformationSciences,2014,57(11):1-19.TaoZhang,JianfengMa,QiLi,NingXi,CongSun,Trust-basedservicecompositioninmulti-domainenvironmentsundertimeconstraint.SCIENCECHINAInformationSciences,2014,57(9):1-16.ShengGao,JianfengMa,CongSun,XinghuaLi,Balancingtrajectoryprivacyanddatautilityusingapersonalizedanonymizationmodel.JournalofNetworkandComputerApplications,2014,38(2014):125-134.ShengGao,JianfengMa,WeisongShi,GuoxingZhan,CongSun,TrPF:ATrajectoryPrivacy-PreservingFrameworkforParticipatorySensing.IEEETransactionsonInformationForensicsandSecurity,2013,8(6):874-887.NingXi,JianfengMa,CongSun,YulongShen,TaoZhang,DistributedInformationFlowVerificationFrameworkfortheCompositionofServiceChaininWirelessSensorNetwork.InternationalJournalofDistributedSensorNetworks(IJDSN),2013:1-10.会议论文CongSun,JunChen,PengbinFeng,JianfengMa,CatraDroid:ACallTraceDrivenDetectionofMaliciousBehaiviorsinAndroidApplications.ML4CS'19:TheSecondInternationalConferenceonMachineLearningforCyberSecurity.Springer,2019,(inpress).TengLi,JianfengMa,QingqiPei,ChengyanMa,DaweiWei,CongSun,Privacy-PreservingVerificationandRoot-CauseTracingTowardsUAVSocialNetworks.ICC2019:1-6.TengLi,JianfengMa,CongSun,DaweiWei,andNingXi,PVad:Privacy-PreservingVerificationforSecureRoutinginAdHocNetworks.NaNA'17:2017InternationalConferenceonNetworkingandNetworkApplications.IEEE,2017,pp.5-10.NingXi,CongSun,DiLu,YulongShen,DistributedInformationFlowVerificationonEncryptedDataForServiceCompositioninMultipleClouds.NaNA'17:2017InternationalConferenceonNetworkingandNetworkApplications.IEEE,2017,pp.286-291.SiqiMa,FerdianThung,DavidLo,CongSun,RobertDeng,VuRLE:AutomaticVulnerabilityDetectionandRepairbyLearningfromExamples.ESORICS'17:theEuropeanSymposiumonResearchinComputerSecurity2017.Springer,2017,pp.229-246.CongSun,NingXi,JianfengMa,EnforcingGeneralizedRefinement-basedNoninterferenceforSecureInterfaceComposition.COMPSAC'17:the41stAnnualComputerSoftwareandApplicationsConference(Vol.1).IEEE,2017,pp.586-595.CongSun,PengbinFeng,TengLi,JianfengMa,Data-OrientedInstrumentationagainstInformationLeakagesofAndroidApplications.COMPSAC'17:the41stAnnualComputerSoftwareandApplicationsConference(Vol.2).IEEE,2017,pp.485-490.CongSun,QingsongYao,JianfengMa,Certia:CertifyingInterfaceAutomataforCyber-PhysicalSystems(Demo).SMARTCOMP'17:the3rdIEEEInternationalConferenceonSmartComputing.IEEE,2017.QingsongYao,JianfengMa,CongSun,XinghuaLi,JinkuLi,Attackgivesmepower:DoS-defendingconstant-timeprivacy-preservingauthenticationoflow-costdevicessuchasbackscatteringRFIDtags.MSCC'16:the3rdACMWorkshoponMobileSensing,ComputingandCommunication.ACM,2016,pp.23-28.NingXi,CongSun,JianfengMa,YulongShen,DiLu,DistributedSecureServiceCompositionwithDeclassificationinMobileNetworks.NaNA'16:2016InternationalConferenceonNetworkingandNetworkApplications.IEEE,2016,pp.254-259.TengLi,JianfengMa,CongSun,CRVad:ConfidentialReasoningandVerificationTowardsSecureRoutinginAdHocNetworks.ICA3PP'15:the15thInternationalConferenceonAlgorithmsandArchitecturesforParallelProcessing.LNCS9530Springer2015,pp.449-462.SiqiMa,ShaoweiWang,DavidLo,RobertDeng,CongSun,ActiveSemi-SupervisedApproachforCheckingAppBehaviorAgainstItsDescription.COMPSAC'15:the39thAnnualInternationalComputers,SoftwareandApplicationsConference.IEEE,2015,pp.179-184.CongSun,NingXi,JinkuLi,QingsongYao,JianfengMa,VerifyingSecureInterfaceCompositionforComponent-basedSystemDesigns.APSEC'14:the21stAsia-PacificSoftwareEngineeringConference.IEEE,2014,pp.359-366.NingXi,JianfengMa,CongSun,TaoZhang,DecentralizedInformationFlowVerificationFrameworkfortheServiceChainCompositioninMobileComputingEnvironments.ICWS'13:IEEE20thInternationalConferenceonWebServices.IEEE,2013,pp.563-570.TaoZhang,JianfengMa,CongSun,QiLi,NingXi,ServiceCompositioninMulti-DomainEnvironmentunderTimeConstraint.ICWS'13:IEEE20thInternationalConferenceonWebServices.IEEE,2013,pp.227-234.CongSun,ShengGao,JianfengMa,VerifyingLocation-basedServiceswithDeclassificationEnforcement.APWeb'12:the14thAsia-PacificWebConference.LNCS7235Springer2012,pp.695-702.CongSun,EnnanZhai,ZhongChen,JianfengMa,AMulti-CompositionalEnforcementonInformationFlowSecurity.ICICS'11:2011InternationalConferenceonInformationandCommunicationsSecurity.LNCS7043Springer2011,pp.345-359.CongSun,LiyongTang,ZhongChen,ANewEnforcementonDeclassificationwithReachabilityAnalysis.ProceedingsofIEEEConferenceonComputerCommunicationsworkshops.IEEECommunicationSociety,2011,pp.1024-1029.CongSun,LiyongTang,ZhongChen,EnforcingReactiveNoninterferencewithReachabilityAnalysis.ITNG'11:Proceedingsofthe8thInternationalConferenceonInformationTechnology:NewGenerations.IEEEComputerSociety,2011,pp.321-326.CongSun,LiyongTang,ZhongChen,EnforcingRelaxedDeclassificationswithReferencePoints.ICIS'11:Proceedingsofthe10thIEEE/ACISInternationalConferenceonComputerandInformationScience.IEEEComputerSociety,2011,pp.76-81.CongSun,LiyongTang,ZhongChen,SecureInformationFlowinJavaviaReachabilityAnalysisofPushdownSystem.QSIC'10:Proceedingsofthe10thInternationalConferenceonQualitySoftware.IEEEComputerSociety,2010,pp.142-150.CongSun,LiyongTang,ZhongChen,SecureInformationFlowbyModelCheckingPushdownSystem.UIC-ATC'09:Proceedingsofthe2009SymposiaandWorkshopsonUbiquitous,AutonomicandTrustedComputing.IEEEComputerSociety,2009,pp.586-591.中文期刊吴奇烜,马建峰,孙聪,采用完整性威胁树的信息流完整性度量方法,网络与信息安全学报,2019,5(2):2019016马卓然,马建峰,苗银宾,孙聪,无人机网络中基于状态迁移的访问控制模型,西安电子科技大学学报,2018,45(6):44-50孙召昌,马建峰,孙聪,卢笛,基于嵌入式可信平台的运行时监控方法.网络与信息安全学报,2017,3(10):44-51.吴奇烜,马建峰,孙聪,张帅,张双,郑涛,针对扩展动态故障树的约束分析方法.通信学报,2017,38(9):159-166.刘佼,孙聪,马建峰,焦政达,采用可信平台度量的车辆远程诊断授权协议.西安电子科技大学学报,2017,44(3):49-54,119.马勇,马建峰,孙聪,张双,崔西宁,李亚晖,飞行控制系统组件化故障模式与影响分析方法.西安电子科技大学学报,2016,43(2):174-179.孙聪,习宁,高胜,张涛,李金库,马建峰,基于接口精化的广义无干扰性研究.计算机研究与发展,2015,52(7):1631-1641.高胜,马建峰,姚青松,孙聪,LBS中面向协同位置隐私保护的群组最近邻查询.通信学报,2015,36(3):146-154.习宁,马建峰,孙聪,卢笛,张涛,基于模型检测的服务链信息流安全可组合验证方法.通信学报,2014,35(11):23-31.焦政达,马建峰,孙聪,姚青松,新的车辆远程诊断授权协议.通信学报,2014,35(11):146-153.杨增印,马建峰,孙聪,黄德俊,叶春晓,陆地群,一种利用手指图像测量人体心率的方法.西安电子科技大学学报,2014,41(5):91-97.孙聪,唐礼勇,陈钟,基于下推系统可达性分析的程序机密消去机制.软件学报,2012,23(8):2149-2162.孙聪,唐礼勇,陈钟,马建峰,基于加权下推系统优化可达性分析的Java安全信息流研究.计算机研究与发展,2012,49(5):901-912.孙聪,唐礼勇,陈钟,基于下推系统可达性分析的输出信道信息流检测.计算机科学,2011,38(7):103-107. 相关热点
最新收录
- 武藤彩香(武藤あやか Ay 06-20
- 袁嘉敏 06-20
- 黄子佼 06-19
- 黄子佼 06-19
- 唐家三少 06-19
- 广末凉子 06-19
- 広末凉子(广末凉子 , Ryo 06-19
- 简恺乐(蝴蝶姐姐) 06-19
- 周扬青 06-19
- 东条夏( 東條なつ Tojo Na 06-17