当前位置: X-MOL首页全球导师 国内导师 › 吴敬征

个人简介

招生专业 081202-计算机软件与理论 081220-信息安全 081201-计算机系统结构 招生方向 漏洞挖掘,移动终端安全,操作系统安全 隐蔽信道 云计算 教育背景 2008-09--2012-07 中国科学院软件研究所 工学博士 2006-09--2008-07 北京理工大学 工学硕士 2002-09--2006-07 河北工业大学 工学学士 工作简历 2012-07--今 中国科学院软件研究所 副研究员 专利成果 (1) 一种云计算环境下的隐蔽通信方法,发明,2011,第1作者,专利号:No.201110202708.1 (2) 一种隐蔽信道标识方法,发明,2011,第1作者,专利号:201010569881.0 (3) 云环境下基于二维码的移动智能终端安全漏洞修复方法,发明,2013,第1作者,专利号:201210436396.5 (4) 一种基于虚拟机的数字版权保护方法,发明,2012,第5作者,专利号:201210080801.4 (5) 云环境下基于二维码的移动智能终端漏洞查询与推送方法,发明,2013,第1作者,专利号:201210387511.4 (6) 一种基于移动智能终端地理位置信息的数据保护方法,发明,2013,第2作者,专利号:2013105479836 学术专著 [32] Jingzheng Wu, Yanjun Wu, Bei Guan, Yuqi Lin, Samee U. Khan, Nasro Min-Allah, Yongji Wang. C2Hunter: Detection and Mitigation of Covert Channels in Data Centers. Khan S U, Zomaya A Y. Handbook on Data Centers. Springer New York. 2015: 961-996. (Ei) 科研项目 (1) 移动智能终端隐蔽信道机理研究,主持,国家级,2014-01--2016-12 (2) 云环境下隐蔽信道标识、检测、限制技术及安全策略模型关键问题研究,主持,研究所(学校)级,2013-01--2014-12 (3) NGB TVOS(1.0)关键技术研究,主持,院级级,2012-06--2013-12 (4) 云计算环境下的隐蔽信道机理研究,参与,国家级,2012-01--2015-12 (5) 开源操作系统内核分析和安全性评估,参与,国家级,2012-01--2014-12 参与会议 (1) Identification and Evaluation of Sharing Memory Covert Timing Channel in Xen Virtual Machines,2011-07,Jingzheng Wu (2) Constructing Scenario of Event-Flag Covert Channel in Secure Operating System,2010-12,Jingzheng Wu

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

[1] Jingzheng Wu, Yanjun Wu, Mutian Yang, Zhifei Wu, Tianyue Luo, Yongji Wang. Poster: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application. 22nd ACM Conference on Computer and Communications Security(ACM CCS 2015), October 12-16, 2015, The Denver Marriot City Center, Denver, Colorado, US. (Accepted) [2] Tianyue Luo, Chen Ni, Qing Han, Mutian Yang, Jingzheng Wu, Yanjun Wu. Poster: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities. 22nd ACM Conference on Computer and Communications Security(ACM CCS 2015), October 12-16, 2015, The Denver Marriot City Center, Denver, Colorado, US. (Accepted) [3] Jingzheng Wu, Zhifei Wu, Mutian Yang, Tianyue Luo, Yanjun Wu, Yongji Wang. Poster: Quality, Reliability and Security Study of Vendor Customized Android Applications. 22nd Network and Distributed System Security(NDSS), February 8-11, 2015, San Diego, California USA. (Accepted) [4] Jingzheng Wu, Yanjun Wu, Mutian Yang, Zhifei Wu, Yongji Wang. Vulnerability Detection of Android System in Fuzzing Cloud. IEEE 6th International Conference on Cloud Computing (CLOUD 2013). Santa Clara, CA, USA. June 28 2013-July 3 2013: 954 - 955. (Ei) [5] Jingzheng Wu, Wu Yanjun, Wu Zhifei, Yang Mutian, Wang Yongji. Vulcloud: Scalable and Hybrid Vulnerability Detection in Cloud Computing. Proceedings of the Software Security and Reliability-Companion, 2013 IEEE 7th International Conference on (SERE 2013). Gaithersburg, MD, USA. June 18-20 2013: 225-226. (Ei) [6] Jingzheng Wu, Liping Ding, Yuqi Lin, Nasro Min-Allah, Yongji Wang. XenPump: A New Method to Mitigate Timing Channel in Cloud Computing. IEEE 5th International Conference on Cloud Computing (CLOUD 2012). Hawaii, USA. June 24-29, 2012: 678 - 685. (Ei, 17%) [7] Jingzheng Wu, Liping Ding, Yongji Wang, Wei Han. Identification and Evaluation of Sharing Memory Covert Timing Channel in Xen Virtual Machines. IEEE 4th International Conference on Cloud Computing (CLOUD 2011). Washington DC, USA. July 4-9, 2011: 283 - 291. (Ei, 18%) [8] Jingzheng Wu, Liping Ding, Yongji Wang, Wei Han. A Practical Covert Channel Identification Approach in Source Code based on Directed Information Flow Graph. The Fifth Annual International Conference on Secure Software Integration and Reliability Improvement (SSIRI 2011). Jeju Island, Korea. Jun 27-29, 2011: 98-107. (Ei) [9] Jingzheng Wu, Yongji Wang, Liping Ding, Yanping Zhang. Constructing Scenario of Event-Flag Covert Channel in Secure Operating System. 2nd International Conference on Information and Multimedia Technology (ICIMT 2010). Hongkong. Dec 28-30, 2010: 371 - 375. [10] Yang Mutian, Wu Jingzheng, Wu Yanjun, Wu Zhifei. Policykeeper: Recommending Proper Security Mechanisms Based on the Severity of Vulnerability Considering User Experience; proceedings of the Software Security and Reliability-Companion (SERE-C), 2013 IEEE 7th International Conference on, 18-20 June 2013. 227-228. (Ei) [11] Lin Yuqi, Ding Liping, Wu Jingzheng, Xie Yalong, Wang Yongji. Robust and Efficient Covert Channel Communications in Operating Systems: Design, Implementation and Evaluation; proceedings of the Software Security and Reliability-Companion (SERE-C), 2013 IEEE 7th International Conference on, 18-20 June 2013. 45-52. (Ei) [12] Ding Baozeng, He Yeping, Zhou Qiming, Wu Yanjun, Wu Jingzheng. hGuard: A Framework to Measure Hypervisor Critical Files; proceedings of the Software Security and Reliability-Companion (SERE-C), 2013 IEEE 7th International Conference on, 18-20 June 2013, 2013. 176-181. (Ei) [13] 李红鞠, 吴敬征, 罗天悦, 曲 璐. 一种针对内核模块的高代码覆盖率的动态检测方法. 第一届开源操作系统设计与分析学术会议(OSDA 2013). 北京, 中国. 2013年9月14日: 43-52. [14] 罗天悦, 吴敬征, 李红鞠, 武延军. 基于同源性的Android操作系统源代码静态检测结果的分析. 第一届开源操作系统设计与分析学术会议(OSDA 2013). 北京, 中国. 2013年9月14日: 115-124. [15] 武志飞, 吴敬征, 罗天悦, 杨牧天. 一种Android应用程序DOS漏洞和信息泄露漏洞的检测方法. 第一届开源操作系统设计与分析学术会议(OSDA 2013). 北京, 中国. 2013年9月14日: 78-84. [16] 曲 璐, 吴敬征, 杨牧天, 罗天悦. 针对SQLite弱权限导致隐私泄露威胁的检测方法. 第一届开源操作系统设计与分析学术会议(OSDA 2013). 北京, 中国. 2013年9月14日: 92-100. 学术期刊论文 [17] Jingzheng Wu, Liping Ding, Yanjun Wu, Nasro Min-Allah, Samee U. Khan, Yongji Wang. C²Detector: A Covert Channel Detection Framework in Cloud Computing. Security and Communication Networks. 2014, 7(3): 544–557. (SCI, Ei) [18] Jingzheng Wu, Yongji Wang, Liping Ding, Xiaofeng Liao. Improving performance of network covert timing channel through Huffman coding. Mathematical and Computer Modelling, 2012, 55(1-2): 69-79. (SCI, Ei) [19] Bei Guan, Jingzheng Wu, Yongji Wang, Samee U. Khan. CIVSched: A Communication-Aware Inter-VM Scheduling Technique for Decreased Network Latency between Co-Located VMs. Cloud Computing, IEEE Transactions on, 2014, 2(3): 320-332. (SCI, Ei) [20] Jingzheng Wu, Yanjun Wu, Zhifei Wu, Mutian Yang, Tianyue Luo, Yongji Wang. AndroidFuzzer: Detecting Android Vulnerabilities in Fuzzing Cloud. Journal of Computational Information Systems, 2015, 11(11): 3859-3866. (Ei) [21] Jingzheng Wu, Yanjun Wu, Mutian Yang, Zhifei Wu, Tianyue Luo, Yongji Wang. QRCloud: Android Vulnerability Query and Push Services based on QR Code in Cloud Computing. Journal of Computational Information Systems, 2015, 11(11): 3875-3881. (Ei) [22] 吴敬征, 丁丽萍, 王永吉. 云计算环境下隐蔽信道关键问题研究. 通信学报.2011,32(9A): 184-203. (Ei) [23] 吴敬征, 武延军, 罗天悦, 武志飞, 杨牧天, 王永吉. 一种基于权限控制机制的 Android 系统隐蔽信道限制方法. 中国科学院大学学报, 2015, 32(5): 696-705. [24] 吴敬征, 武延军, 武志飞, 杨牧天, 罗天悦, 王永吉. 基于有向信息流的Android隐私泄露恶意应用检测方法. (已录用:中国科学院大学学报) [25] 王永吉, 吴敬征, 曾海涛, 丁丽萍, 廖晓锋. 隐蔽信道研究. 软件学报, 2010, 21(9): 2262-2288. (Ei) [26] 王永吉, 吴敬征, 曾海涛, 丁丽萍. 一种基于并发冲突间隔时间的隐蔽信道检测方法. 计算机研究与发展. 2011, 48(8): 1542-1553. (Ei) [27] 陈力,王永吉,吴敬征,吕荫润. 基于树状线性规划搜索的单调速率优化设计. 软件学报(已录用) [28] Liping Ding, Jian Gu, Yongji Wang, Jingzheng Wu. Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree. China Communications, 2010, 7(6): 120-127. (SCI, Ei) [29] 廖晓锋, 王永吉, 范修斌, 吴敬征. 基于LDA主题模型的安全漏洞分类. 清华大学学报(自然科学版), 2012, 52(10): 1351-1355. (Ei) [30] Liping Ding, Yifei Guo, Jian Gu, Jingzheng Wu. DRMIBT: A New DRMImplementation Based on Virtual Machine. Energy Procedia, 2011, 13(1):4790-4799.(Ei) [31] Zhuoya JU, Shuangyuan YU, Jingzheng Wu. MFCA: A Novel Approach of Structured P2P Network Flow Control Based on Interest Attenuation Policy. Journal of Computational Information Systems 10: 19 (2014) 8413–8420. (Ei)

推荐链接
down
wechat
bug