当前位置: X-MOL首页全球导师 国内导师 › 孙聪

个人简介

个人简介 浙江大学计算机科学与技术工学学士2005 北京大学计算机软件与理论理学博士2011 ThePennsylvaniaStateUniversity,DepartmentofCSE,访问学者2018/08-2019/08 科学研究 主持以下科研项目 国家自然科学基金项目:自主无人系统高完整性理论及关键技术研究.2019/01-2022/12 国家自然科学基金项目:嵌入式软件可组合信息流安全验证机制研究.2014/01-2016/12 国家863计划课题子课题:智能终端应用的漏洞检测与挖掘技术研究.2015/01-2017/12 工信部某专项科研专题:×××××技术研究.2015/01-2017/12 装发预研项目子课题:×××××技术.2017/01-2019/12 装备预研基金重点项目子课题:×××××技术研究.2011/01-2013/12 陕西省自然科学基础研究计划项目:嵌入式软件可组合信息流安全验证理论与方法研究.2013/01-2014/12 陕西省自然科学基础研究计划项目:智能终端操作系统信息流安全证明方法研究.2016/01-2017/12 中央高校基本科研业务费项目:2012/01-2013/12,2014/01-2015/12 荣誉获奖 系统与网络一体化安全设计关键技术,陕西省科学技术奖,一等奖,2018,排名:6 ×××技术研究,国防科学技术进步奖,二等奖,2016,排名:9 ×××技术研究,中航工业集团科学技术奖,一等奖,2017,排名:9 “安飞”无人机安全组网系统,陕西省科技工作者创新创业大赛,金奖,2017,排名:3 科研团队 博士研究生 2019级 王梓宇 硕士研究生 2017级 马豫宛,许昕鹏,介银娟 2018级 阚啸,张玉梅,王禾,陈娟颖,刘镡稚 2019级 伍亚飞,乔新博,丁铎,潘建锋 共同指导 马晓欧(2017级,与王超老师),孙雄佳(2019级,与姚青松老师) 已毕业研究生(首次就业去向/学位论文题目) 2016级 刘佼(本校转博) 陈均(腾讯/调用路径驱动的Android应用程序恶意行为检测方法研究) 李占魁(华为/基于内存转储分析的代码注入攻击检测方法) 课程教学 本科生课程 计算机学院 Java程序设计(09,10,11,12,13,14级) 网络程序设计(12,13级) 网络与信息安全学院 高级语言程序设计(14,15,17,18级) 软件逆向工程(13,14,15,17级) 研究生课程 软件安全(2019) 教材 孙聪等,Java实用程序设计.西安电子科技大学出版社,2015-08,ISBN:978-7-5606-3753-2 孙聪等,软件逆向工程原理与实践.西安电子科技大学出版社,2018-02,ISBN:978-7-5606-2497-6 招生要求 1.招收系统安全、软件安全方向博士研究生 2.招收硕士研究生,要求: 1)学习积极主动,善于思考 2)具有一定的编程能力 3)具有较好的数学基础,或较好的英语能力

研究领域

信息流分析 可信软件 智能终端安全 程序分析与验证

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

期刊论文 NingXi,JingLv,CongSun,JianfengMa,SecureServiceCompositionwithQuantitativeInformationFlowEvaluationinMobileComputingEnvironments.Entropy2019,21(8),753. TengLi,JianfengMa,QingqiPei,HoubingSong,YulongShen,CongSun,DAPV:DiagnosingAnomaliesinMANETsRoutingWithProvenanceandVerification.IEEEAccess,2019,7:35302-35316. TengLi,JianfengMa,CongSun,SRDPV:secureroutediscoveryandprivacy-preservingverificationinMANETs.WirelessNetworks25(4):1731-1747,Springer,2019. CongSun,JiaoLiu,YinjuanJie,YuwanMa,JianfengMa.Ridra:ARigorousDecentralizedRandomizedAuthenticationinVANETs.IEEEAccess,2018,6:50358-50371. NingXi,JianfengMa,CongSun,DiLu,YulongShen,Informationflowcontrolonencrypteddataforservicecompositionamongmultipleclouds,DistributedandParallelDatabases,Springer,2018,36(3):511-527. PengbinFeng,JianfengMa,CongSun,XinpengXu,YuwanMa,ANovelDynamicAndroidMalwareDetectionSystemWithEnsembleLearning.IEEEAccess,2018,6:30996-31011. TengLi,JianfengMa,CongSun,NingXi,PVad:Privacy-PreservingVerificationforSecureRoutinginAdHocNetworks.JournalofInformationScienceandEngineering,2018,34(4):943-960. TengLi,JianfengMa,CongSun,Dlog:diagnosingroutereventswithsyslogsforanomalydetection.TheJournalofSupercomputing,Springer,2018,74(2):845-867. CongSun,JiaoLiu,XinpengXu,JianfengMa,APrivacy-PreservingMutualAuthenticationResistingDoSAttacksinVANETs.IEEEAccess,2017,5:24012-24022. DiLu,JianfengMa,CongSun,QixuanWu,ZhaochangSun,NingXi,BuildingaSecureSchemeforaTrustedHardwareSharingEnvironment.IEEEAccess,2017,5:20260-20271. TengLi,JianfengMa,CongSun,NetPro:DetectingAttacksinMANETRoutingwithProvenanceandVerification.SCIENCECHINAInformationSciences,2017,60:118101:1-118001:3. PengbinFeng,JianfengMa,CongSun,SelectingCriticalDataFlowsinAndroidApplicationsforAbnormalBehaviorDetection.MobileInformationSystems,2017,7397812:1-7397812:16. NingXi,DiLu,CongSun,JianfengMa,YulongShen,DistributedSecureServiceCompositionwithDeclassificationinMobileClouds.MobileInformationSystems,2017,7469342:1-7469342:13. DiLu,JianfengMa,CongSun,XindiMa,NingXi,Credit-BasedSchemeforSecurity-awareandFairness-awareResourceAllocationinCloudComputing.SCIENCECHINAInformationSciences,2017,60(5),52103:1-52103:17. CongSun,JianfengMa,QingsongYao,Onthearchitectureanddevelopmentlifecycleofsecurecyber-physicalsystems.JournalofCommunicationsandInformationNetworks,Springer,2016,1(4):1-21(invited). PengbinFeng,CongSun,JianfengMa,MeasuringtheRiskValueofSensitiveDataflowPathinAndroidApplications.SecurityandCommunicationNetworks,2016,9(18):5918-5933. NingXi,CongSun,JianfengMa,XiaofengChen,YulongShen,DistributedInformationFlowVerificationforSecureServiceCompositioninSmartSensorNetwork.ChinaCommunications,April2016,13(4):119-130. NingXi,CongSun,JianfengMa,YulongShen,Secureservicecompositionwithinformationflowcontrolinserviceclouds.FutureGenerationComputerSystems,Volume49,August2015:142-148. CongSun,NingXi,ShengGao,ZhongChen,JianfengMa,Automatedenforcementforrelaxedinformationreleasewithreferencepoints.SCIENCECHINAInformationSciences,2014,57(11):1-19. TaoZhang,JianfengMa,QiLi,NingXi,CongSun,Trust-basedservicecompositioninmulti-domainenvironmentsundertimeconstraint.SCIENCECHINAInformationSciences,2014,57(9):1-16. ShengGao,JianfengMa,CongSun,XinghuaLi,Balancingtrajectoryprivacyanddatautilityusingapersonalizedanonymizationmodel.JournalofNetworkandComputerApplications,2014,38(2014):125-134. ShengGao,JianfengMa,WeisongShi,GuoxingZhan,CongSun,TrPF:ATrajectoryPrivacy-PreservingFrameworkforParticipatorySensing.IEEETransactionsonInformationForensicsandSecurity,2013,8(6):874-887. NingXi,JianfengMa,CongSun,YulongShen,TaoZhang,DistributedInformationFlowVerificationFrameworkfortheCompositionofServiceChaininWirelessSensorNetwork.InternationalJournalofDistributedSensorNetworks(IJDSN),2013:1-10. 会议论文 CongSun,JunChen,PengbinFeng,JianfengMa,CatraDroid:ACallTraceDrivenDetectionofMaliciousBehaiviorsinAndroidApplications.ML4CS'19:TheSecondInternationalConferenceonMachineLearningforCyberSecurity.Springer,2019,(inpress). TengLi,JianfengMa,QingqiPei,ChengyanMa,DaweiWei,CongSun,Privacy-PreservingVerificationandRoot-CauseTracingTowardsUAVSocialNetworks.ICC2019:1-6. TengLi,JianfengMa,CongSun,DaweiWei,andNingXi,PVad:Privacy-PreservingVerificationforSecureRoutinginAdHocNetworks.NaNA'17:2017InternationalConferenceonNetworkingandNetworkApplications.IEEE,2017,pp.5-10. NingXi,CongSun,DiLu,YulongShen,DistributedInformationFlowVerificationonEncryptedDataForServiceCompositioninMultipleClouds.NaNA'17:2017InternationalConferenceonNetworkingandNetworkApplications.IEEE,2017,pp.286-291. SiqiMa,FerdianThung,DavidLo,CongSun,RobertDeng,VuRLE:AutomaticVulnerabilityDetectionandRepairbyLearningfromExamples.ESORICS'17:theEuropeanSymposiumonResearchinComputerSecurity2017.Springer,2017,pp.229-246. CongSun,NingXi,JianfengMa,EnforcingGeneralizedRefinement-basedNoninterferenceforSecureInterfaceComposition.COMPSAC'17:the41stAnnualComputerSoftwareandApplicationsConference(Vol.1).IEEE,2017,pp.586-595. CongSun,PengbinFeng,TengLi,JianfengMa,Data-OrientedInstrumentationagainstInformationLeakagesofAndroidApplications.COMPSAC'17:the41stAnnualComputerSoftwareandApplicationsConference(Vol.2).IEEE,2017,pp.485-490. CongSun,QingsongYao,JianfengMa,Certia:CertifyingInterfaceAutomataforCyber-PhysicalSystems(Demo).SMARTCOMP'17:the3rdIEEEInternationalConferenceonSmartComputing.IEEE,2017. QingsongYao,JianfengMa,CongSun,XinghuaLi,JinkuLi,Attackgivesmepower:DoS-defendingconstant-timeprivacy-preservingauthenticationoflow-costdevicessuchasbackscatteringRFIDtags.MSCC'16:the3rdACMWorkshoponMobileSensing,ComputingandCommunication.ACM,2016,pp.23-28. NingXi,CongSun,JianfengMa,YulongShen,DiLu,DistributedSecureServiceCompositionwithDeclassificationinMobileNetworks.NaNA'16:2016InternationalConferenceonNetworkingandNetworkApplications.IEEE,2016,pp.254-259. TengLi,JianfengMa,CongSun,CRVad:ConfidentialReasoningandVerificationTowardsSecureRoutinginAdHocNetworks.ICA3PP'15:the15thInternationalConferenceonAlgorithmsandArchitecturesforParallelProcessing.LNCS9530Springer2015,pp.449-462. SiqiMa,ShaoweiWang,DavidLo,RobertDeng,CongSun,ActiveSemi-SupervisedApproachforCheckingAppBehaviorAgainstItsDescription.COMPSAC'15:the39thAnnualInternationalComputers,SoftwareandApplicationsConference.IEEE,2015,pp.179-184. CongSun,NingXi,JinkuLi,QingsongYao,JianfengMa,VerifyingSecureInterfaceCompositionforComponent-basedSystemDesigns.APSEC'14:the21stAsia-PacificSoftwareEngineeringConference.IEEE,2014,pp.359-366. NingXi,JianfengMa,CongSun,TaoZhang,DecentralizedInformationFlowVerificationFrameworkfortheServiceChainCompositioninMobileComputingEnvironments.ICWS'13:IEEE20thInternationalConferenceonWebServices.IEEE,2013,pp.563-570. TaoZhang,JianfengMa,CongSun,QiLi,NingXi,ServiceCompositioninMulti-DomainEnvironmentunderTimeConstraint.ICWS'13:IEEE20thInternationalConferenceonWebServices.IEEE,2013,pp.227-234. CongSun,ShengGao,JianfengMa,VerifyingLocation-basedServiceswithDeclassificationEnforcement.APWeb'12:the14thAsia-PacificWebConference.LNCS7235Springer2012,pp.695-702. CongSun,EnnanZhai,ZhongChen,JianfengMa,AMulti-CompositionalEnforcementonInformationFlowSecurity.ICICS'11:2011InternationalConferenceonInformationandCommunicationsSecurity.LNCS7043Springer2011,pp.345-359. CongSun,LiyongTang,ZhongChen,ANewEnforcementonDeclassificationwithReachabilityAnalysis.ProceedingsofIEEEConferenceonComputerCommunicationsworkshops.IEEECommunicationSociety,2011,pp.1024-1029. CongSun,LiyongTang,ZhongChen,EnforcingReactiveNoninterferencewithReachabilityAnalysis.ITNG'11:Proceedingsofthe8thInternationalConferenceonInformationTechnology:NewGenerations.IEEEComputerSociety,2011,pp.321-326. CongSun,LiyongTang,ZhongChen,EnforcingRelaxedDeclassificationswithReferencePoints.ICIS'11:Proceedingsofthe10thIEEE/ACISInternationalConferenceonComputerandInformationScience.IEEEComputerSociety,2011,pp.76-81. CongSun,LiyongTang,ZhongChen,SecureInformationFlowinJavaviaReachabilityAnalysisofPushdownSystem.QSIC'10:Proceedingsofthe10thInternationalConferenceonQualitySoftware.IEEEComputerSociety,2010,pp.142-150. CongSun,LiyongTang,ZhongChen,SecureInformationFlowbyModelCheckingPushdownSystem.UIC-ATC'09:Proceedingsofthe2009SymposiaandWorkshopsonUbiquitous,AutonomicandTrustedComputing.IEEEComputerSociety,2009,pp.586-591. 中文期刊 吴奇烜,马建峰,孙聪,采用完整性威胁树的信息流完整性度量方法,网络与信息安全学报,2019,5(2):2019016 马卓然,马建峰,苗银宾,孙聪,无人机网络中基于状态迁移的访问控制模型,西安电子科技大学学报,2018,45(6):44-50 孙召昌,马建峰,孙聪,卢笛,基于嵌入式可信平台的运行时监控方法.网络与信息安全学报,2017,3(10):44-51. 吴奇烜,马建峰,孙聪,张帅,张双,郑涛,针对扩展动态故障树的约束分析方法.通信学报,2017,38(9):159-166. 刘佼,孙聪,马建峰,焦政达,采用可信平台度量的车辆远程诊断授权协议.西安电子科技大学学报,2017,44(3):49-54,119. 马勇,马建峰,孙聪,张双,崔西宁,李亚晖,飞行控制系统组件化故障模式与影响分析方法.西安电子科技大学学报,2016,43(2):174-179. 孙聪,习宁,高胜,张涛,李金库,马建峰,基于接口精化的广义无干扰性研究.计算机研究与发展,2015,52(7):1631-1641. 高胜,马建峰,姚青松,孙聪,LBS中面向协同位置隐私保护的群组最近邻查询.通信学报,2015,36(3):146-154. 习宁,马建峰,孙聪,卢笛,张涛,基于模型检测的服务链信息流安全可组合验证方法.通信学报,2014,35(11):23-31. 焦政达,马建峰,孙聪,姚青松,新的车辆远程诊断授权协议.通信学报,2014,35(11):146-153. 杨增印,马建峰,孙聪,黄德俊,叶春晓,陆地群,一种利用手指图像测量人体心率的方法.西安电子科技大学学报,2014,41(5):91-97. 孙聪,唐礼勇,陈钟,基于下推系统可达性分析的程序机密消去机制.软件学报,2012,23(8):2149-2162. 孙聪,唐礼勇,陈钟,马建峰,基于加权下推系统优化可达性分析的Java安全信息流研究.计算机研究与发展,2012,49(5):901-912. 孙聪,唐礼勇,陈钟,基于下推系统可达性分析的输出信道信息流检测.计算机科学,2011,38(7):103-107.

推荐链接
down
wechat
bug