当前位置: X-MOL首页全球导师 国内导师 › 孙德刚

个人简介

招生专业 083900-网络空间安全 招生方向 移动互联网安全,网络体系结构与安全防护 教育背景 1998-08--2002-06 北京交通大学 工学硕士 教授课程 无线安全 保密科学技术 无线通信安全技术 电磁泄漏发射与防护 奖励信息 (1) 某应用研发, 二等奖, 部委级, 2018 (2) 某工程建设, 三等奖, 其他, 2016 (3) 重要场所安全工程建设, 三等奖, 其他, 2014 (4) 计算机及移动存储介质管理系统研制、标准制定及配备应用示范, 二等奖, 部委级, 2012 (5) 文档管理系统, 二等奖, 部委级, 2009 (6) 分级保护标准及应用示范, 二等奖, 部委级, 2007 (7) 两办工程建设, 二等奖, 部委级, 2004 (8) TEMPEST技术研究, 二等奖, 国家级, 2001 (9) TEMPEST标准制定, 一等奖, 部委级, 1997 (10) 信息保护机研制, 二等奖, 部委级, 1995 发表著作 (1) 高级DPA理论与实践—迈向安全嵌入式电路的安全极限, 国防工业出版社, 2016-01, 第 3 作者 科研项目 ( 1 ) 虚拟化技术在信息系统中应用与实现, 主持, 国家级, 2012-05--2014-06 ( 2 ) 207项目, 主持, 国家级, 2018-01--2020-12

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

(1) Group Collision Attack, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 14, NO. 4, APRIL 2019, 2018, 第 3 作者 (2) A novel method for specific emitter identification based on singular spectrum analysis., In 2017 IEEE Wireless Communications and Networking Conference, 2017, 第 1 作者 (3) Could we beat a new mimicking attack?, In 19th Asia-Pacific Network Operations and Management Symposium, 2017, 第 1 作者 (4) Distinguishing flooding distributed denial of service from flash crowds using four data mining approaches, Comput. Sci. Inf. Syst., 14(3), 2017, 第 3 作者 (5) Towards easy key enumeration, IACR Cryptology ePrint Archive, 2017, 第 2 作者 (6) Profiling good leakage models for masked implementations, IACR Cryptology ePrint Archive, 2017, 第 3 作者 (7) A New Method to Recognize Computer through Electromagnetic Radiation, A New Method to Recognize Computer through Electromagnetic Radiation, ]. Asia-Pacific International Symposium on Electromagnetic Compatibility, APEMC 2016, 2016, 第 1 作者 (8) Network transmission of hidden data using smartphones based on compromising emanations., Network transmission of hidden data using smartphones based on compromising emanations., Asia-Pacific Intenational Symposium on Electromagnetic Compatibility & Signal Integrity and Technical Exhibition,APEMC 2016., 2016, 第 1 作者 (9) Method for detecting information leakage from computer display in electromagnetic radiation, In 2016 IEEE Trustcom/BigDataSE/ISPA, 2016, 第 1 作者 (10) Method for detecting text information leakage in electromagnetic radiation from a computer display, IET Information Security, 10(6), 2016, 第 1 作者 (11) Group verification based multiple-differential collision attack, In Information and Communications Security - 18th International Conference, 2016, 第 3 作者 (12) Power traces clipping and splicing enhanced correlation collision analysis, In 2016 IEEE Trustcom/BigDataSE/ISPA, 2016, 第 3 作者 (13) Uncertain? no, it’s very certain! recovering the key from guessing entropy enhanced CPA, In ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, 2016, 第 3 作者 (14) Enhanced correlation power analysis by biasing power traces, In Information Security - 19th International Conference, 2016, 第 3 作者 (15) Double-key recovery based correlation power analysis, In 2016 IEEE Trustcom/BigDataSE/ISPA, 2016, 第 2 作者 (16) An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks, An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks, Information and Communications Security. Springer International Publishing, 2015, 第 1 作者 (17) An Efficient and Anti-interference Method of Synchronizing Information Extraction for Video Leaking Signal [J]., An Efficient and Anti-interference Method of Synchronizing Information Extraction for Video Leaking Signal [J]., IET Signal Processing, 2015, 第 1 作者 (18) POSTER: using improved singular value decomposition to enhance correlation power analysis, In Security and Privacy in Communication Networks - 11th International Conference, 2015, 第 1 作者 (19) 基于访问控制矩阵的移动存储介质安全控制, Classified Removable Storage Medium Control Based on the Access Control Matrix, The 2014 2nd International Conference on Systems and Informatics(ICSAI2014), 2014, 第 1 作者 (20) 视频电磁泄漏频率的判断方法, A Low-cost and Efficient Method of Determining the Best Frequency Band for Video Leaking Signal Reconstruction, The 2014 2nd International Conference on Systems and Informatics(ICSAI2014)EI, 2014, 第 1 作者 (21) A Low-cost and Efficient Method of Determining the Best Frequency Band for Video Leaking Signal Reconstruction[C], A Low-cost and Efficient Method of Determining the Best Frequency Band for Video Leaking Signal Reconstruction[C], Proc of International Conference on Systems and Informatics. Shanghai: IEEE, 2014., 2014, 第 1 作者 (22) 电磁泄漏文本信息检测方法, Method for Determining Whether or Not Text Information is Leaked From Computer Display Through Electromagnetic Radiation, International Conference on Information and Communications Security, 2014, 第 1 作者

学术兼职

2016-01-01-2020-01-01,中国计算机学会信息保密专委会, 副主任 2015-08-01-2020-07-31,中国保密协会科学技术分会, 主任 2014-08-01-2018-07-31,信息安全共性技术国家工程研究中心, 主任

推荐链接
down
wechat
bug