当前位置: X-MOL首页全球导师 国内导师 › 王跃武

个人简介

教授课程 网络与系统安全研究前沿 网络与系统安全 系统结构安全可信计算新思路 系统结构安全—可信计算新思路 计算机病毒原理 计算机通信网络安全 奖励信息 (1) 国产密码算法软件实现安全技术及其在重要领域中的应用, 一等奖, 部委级, 2015 发表著作 (1) 数字签名应用安全证明获取方法, 国家市场监督管理总局 国家标准化管理委员会 国家标准, 2018-09, 第 1 作者

研究领域

移动智能终端系统安全 信息系统安全测评 网络与系统安全

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

(1) Cache-in-the-Middle (CITM) Attacks : Manipulating Sensitive Data in Isolated Execution Environments, Cache-in-the-Middle (CITM) Attacks : Manipulating Sensitive Data in Isolated Execution Environments, CCS, 2020, 第 5 作者 (2) TrustICT: An Efficient Trusted Interaction Interface between Isolated Execution Domains on ARM Multi-core Processors, TrustICT: An Efficient Trusted Interaction Interface between Isolated Execution Domains on ARM Multi-core Processors, SenSys, 2020, 第 2 作者 (3) Evaluation on the Security of Commercial Cloud Container Services, Evaluation on the Security of Commercial Cloud Container Services, ISC, 2020, 第 3 作者 (4) SASAK: Shrinking the Attack Surface for AndroidKernel with Stricter "seccomp" Restrictions, SASAK: Shrinking the Attack Surface for AndroidKernel with Stricter "seccomp" Restrictions, MSN, 2020, 第 3 作者 (5) User Alignment with Jumping Seed Alignment Information Propagation, 2020 International Joint Conference on Neural Networks, 2020, 第 5 作者 (6) P2IC: Pragmatic and Probabilistic Integrity Verification for Cloud Storage, ISCC, 2020, 第 4 作者 (7) SafeSdcardfs: Securing the External Storage of Android in Uncontrolled Environment, Trustcom, 2020, 第 2 作者 (8) Vulnerable Service Invocation and Countermeasures, ACM TDSC, 2019, 第 4 作者 (9) SuiT: Secure User Interface Based on TrustZone, ICC 2019, 2019, 第 2 作者 (10) ALTEE: Constructing Trustworthy Execution Environment for Mobile App Dynamically, ISCC 2019, 2019, 第 2 作者 (11) OCRAM-assisted Sensitive Data Protection on ARM-based Platform, ESORICS, 2019, 第 3 作者 (12) A Measurement Study on Linux Container Security: Attacks and Countermeasures, Annual Computer Security Applications Conference (ACSAC), 2018, 第 3 作者 (13) How to Block the Malicious Access to Android External Storage, International Conference on Information Security and Cryptology(ICISC), 2018, 第 2 作者 (14) DangerNeighbor Attack: Information Leakage via postMessage Mechanism in HTML5, Computer&Security, 2018, 第 5 作者 (15) Android APP第三方库权限隔离, Splitting Third-party Libraries' Privileges from Android Apps, ACISP: Australasian Conference on Information Security and Privacy, 2017, 通讯作者 (16) SPEAKER:应用容器的分段执行, SPEAKER: Split-Phase Execution of Application, 14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '17), 2017, 第 5 作者 (17) Vulnerable Implicit Service: A Revisit, ACM CCS, 2017, 通讯作者 (18) Enforcing ACL Access Control on Android Platform, International Information Security Conference, 2017, 第 3 作者 (19) DeepDroid:一种动态实施Android企业级安全策略的方案, DeepDroid:Dynamically Enforcing Enterprise Policy on Android Devices, NDSS, 2015, 通讯作者 (20) TrustICE:基于硬件隔离的移动设备安全隔离执行环境, TrustICE: Hardware-assisted Isolated Computing Environments on Mobile Devices, DSN, 2015, 通讯作者 (21) TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens, 22nd ACM SIGSAC Conference on Computer and Communications Security(CCS2015), 2015, 通讯作者 (22) Reliable and Trustworthy Memory Acquisition on Smartphones, IEEE Transactions on Information Forensics and Security (TIFS), 2015, 通讯作者 (23) 一次Root,永久威胁:Android Permission机制安全分析, Once Root Always a Threat: Analyzing the Security Threats of Android Permission System, ACISP, 2014, 通讯作者 (24) 一种基于行为的Android系统资源访问控制方案. , 计算研究与发展, 2014, 通讯作者 (25) WrapDroid:一种灵活细粒度地Android APP行为管控方案, WrapDroid: Flexible and Fine-Grained Scheme towards Regulating Behaviors of Android Apps, ICISC, 2014, 第 2 作者 (26) TustDump:可靠的智能手机内存获取机制, TrustDump: Reliable Memory Acquisition on Smartphone, ECSORICS, 2014, 通讯作者 (27) 基于动态密钥的Android短信加密系统, 中国科学院研究生院学报, 2013, 通讯作者 (28) Cyber-Physical Voice Privacy Theft and Protection on Smart Mobile Terminal, TrustCOM, 2013, 第 2 作者 (29) MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring, ICISC, 2012, 通讯作者 (30) 基于Fluid的带宽限制蠕虫仿真模型, 软件学报, 2011, 第 3 作者 (31) 社会化网络服务中的信任扩张与控制, 计算机研究与发展, 2010, 第 3 作者 (32) A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms, INSCRYPT, 2009, 第 3 作者 (33) A Multi-level Fidelity-preserving Bandwidth-limited Worm Simulation Model and Its Application, ANSS, 2008, 第 1 作者 (34) 拓扑相关蠕虫仿真分析, 软件学报, 2008, 第 1 作者 (35) Contagion蠕虫仿真分析, 计算机研究与发展, 2008, 第 1 作者 (36) 基于拓扑结构的蠕虫防御策略仿真分析, 计算机学报, 2007, 第 1 作者

推荐链接
down
wechat
bug