发表论文
2024
1. Chenke Luo, Jiang Ming*, Mengfei Xie, Guojun Peng, Jianming Fu*. Retrofitting XoM for Stripped Binaries without Embedded Data Relocation[C]. NDSS 25 (accepted)
2. Chenke Luo, Jianming Fu, Jiang Ming, Mengfei Xie, Guojun Peng. PtrProxy: Efficient Code Re-Randomization on AArch64 Platform. China Communications. 0 https://doi.org/10.23919/JCC.ja.2024-0077 (accepted)
3. Yu Nie, Jianming Fu, Yilai Zhang, Chao Li. Modeling implicit variable and latent structure for aspect-based sentiment quadruple extraction, Neurocomputing,Volume 586,2024,127642.
4. Q. Wang, M. Tang and J. Fu, "EavesDroid: Eavesdropping User Behaviors via OS Side Channels on Smartphones," in IEEE Internet of Things Journal, vol. 11, no. 3, pp. 3979-3993, 1 Feb.1, 2024, doi: 10.1109/JIOT.2023.3298992
5. 傅建明, 姜宇谦, 何佳, 郑锐, 苏日古嘎, 彭国军. 基于样本嵌入的挖矿恶意软件检测方法[J]. 计算机科学, 2024, 51(1): 327-334
2023
1. 操方涛,傅建明,李子川.一种基于Unicorn的UEFI DXE驱动模拟执行方法[J].云顶集团yd1233学报(理学版),2023,69(6):690-698
2. C. Luo, J. Ming, J. Fu, G. Peng and Z. Li, "Reverse Engineering of Obfuscated Lua Bytecode via Interpreter Semantics Testing," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 3891-3905, 2023, doi: 10.1109/TIFS.2023.3289254.
3. M. Xie, Y. Lin, C. Luo, G. Peng and J. Fu, "PointerScope: Understanding Pointer Patching for Code Randomization," in IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 4, pp. 3019-3036, 1 July-Aug. 2023, doi: 10.1109/TDSC.2022.3203043.
4. Side Liu, Guojun Peng, Haitao Zeng, Jianming Fu, A Survey on the Evolution of Fileless Attacks and Detection Techniques, Computers & Security,2023,103653,ISSN 0167-4048,https://doi.org/10.1016/j.cose.2023.103653.
2022
1. 郑锐, 汪秋云, 林卓庞, 靖蓉琦, 姜政伟, 傅建明, 汪姝玮. 一种基于威胁情报层次特征集成的挖矿恶意软件检测方法[J]. 电子学报, 2022, 50 (11): 2707-2715. DOI: 10.12263/DZXB.20211333.
2. Rui Zheng, Qiuyun Wang, Jia He, Jianming Fu, Guga Suri, Zhengwei Jiang, "Cryptocurrency Mining Malware Detection Based on Behavior Pattern and Graph Neural Network", Security and Communication Networks, vol. 2022, Article ID 9453797, 8 pages, 2022.
3. 傅建明, 刘畅, 解梦飞, 罗陈可. 基于诱捕的软件异常检测综述[J]. 网络与信息安全学报, 2022, 8(1): 15-29. //Jianming FU, Chang LIU, Mengfei XIE, Chenke LUO. Survey of software anomaly detection based on deception[J]. Chinese Journal of Network and Information Security, 2022, 8(1): 15-29.
4. R. Zheng, Q. Wang, Z. Lin et al., Cryptocurrency malware detection in real-world environment: Based on multi-results stacking learning. Applied Soft Computing, 2022, 124.
5. Y. Ren, D. Liu, C. Liu, Q. Xiong, J. Fu and L. Wang, "A Universal Audio Steganalysis Scheme based on Multiscale Spectrograms and DeepResNet," in IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2022.3141121.
2021
1. Wenna Song, Jiang Ming, Lin Jiang, Yi Xiang, Xuanchen Pan , Jianming Fu, Guojun Peng. Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization. CCS 2021.
2. Zheng, R.; Ma, H.;Wang, Q.;Fu, J.; Jiang, Z. Assessing the Security of Campus Networks: The Case of Seven Universities. Sensors 2021, 21,306. https://doi.org/10.3390/s21010306
3. XiuwenLiu, JianmingFu, YanjiaoChen, WeichenLuo, ZihanTang. Trust-Aware sensing Quality estimation for team Crowdsourcing in social IoT. Computer Networks Volume 184, 15 January 2021, 107695
4. Binlin Cheng*, Jiang Ming*, Erika A Leal, Haotian Zhang, Jianming Fu, Guojun Peng, Jean-Yves Marion (2021). [USENIX Security '21] Obfuscation-Resilient Executable Payload Extraction From Packed Malware. In Proceedings of the 30th USENIX Security Symposium, Virtual Event, August 11-13, 2021
5. Wenna Song, Jiang Ming, Lin Jiang, Han Yan, Yi Xiang, Yuan Chen, Jianming Fu, Guojun Peng (2021). [ICSE '21] App's Auto-Login Function Security Testing via Android OS-Level Virtualization. In Proceedings of the 43rd International Conference on Software Engineering, Virtual Event, May 25-28, 2021
6. FU Jianming,HE Jia,XIE Mengfei,MEI Xufen. Recognizing Malicious Behaviors of Chrome Extensions through Direct JavaScript Execution[J]. Wuhan University Journal of Natural Sciences,2021,26(01):89-101.
7. Yuan Luo, Long Cheng, Yu Liang, Jianming Fu, Guojun Peng, DEEPNOISE: Learning Sensor and Process Noise to Detect Data Integrity Attacks in CPS[J]. China Communications, 2021, 18(9): 192-209.
2020
1. 郑锐,汪秋云,傅建明*,姜政伟,苏日,古嘎, and汪姝玮. "一种基于深度学习的恶意软件家族分类模型."信息安全学报,2020,5(1): 1-9.
2. Liu, Xiuwen, Jianming Fu, and Yanjiao Chen. "Event Evolution Model for Cybersecurity Event Mining in Tweet Streams." Information Sciences (2020).
3. Xiuwen Liu ; Jianming Fu. SPWalk: Similar Property Oriented Feature Learning for Phishing Detection. IEEEAccess, 2020,8(1):87031-87045.
4. Mengfei Xie, Jianming Fu, Jia He, Chenke Luo, and Guojun Peng.JTaint: Finding Privacy-Leakage in Chrome Extensions. ACISP, 2020. (录用)
2019
1. 傅建明、彭国军、严飞,软件安全课程教学方法研究,软件导刊,2020,19(2):226-229.
2. 杜瑞颖,张焕国,傅建明,陈晶,唐明,何琨, ... &代永平. (2019).网络空间安全大类下的信息安全专业人才培养. 网络与信息安全学报, 5(3), 25-30.
3. Jianming Fu, Lin Li, Yingjun Wang, Jianwei Huang, and Guojun Peng.Web Scanner Detection Basedon Behavioral Differences. 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14–17, 2019
4. 傅建明,梅戌芬,郑锐. Chrome扩展安全[J].云顶集团yd1233学报(理学版),2019,65(2):111⁃125.
5. 刘秀文,傅建明,黎琳,等.面向用户交互场景的信息欺骗分类及其威胁抑制机制[J].云顶集团yd1233学报(理学版),2019,65(2):126⁃138
6. 傅建明,黎琳,王应军. 基于CNN的Webshell文件检测.郑州大学学报(理学版),2019, 51(2): 1-8
7. 傅建明,黎琳,郑锐,苏日古嘎。基于GAN的网络攻击检测研究综述。信息网络安全。2019, 218(2):1-9
8. LI Pengwei, FU Jianming, XU Chao, CHENG Binlin and ZHANG Huanguo. Differentiating Malicious and Benign Android App Operations Using Second-Step Behavior Features. Chinese Journal of Electronics, 2019, 28(5):944~952
9. Luman Shi, Jianming Fu, Zhengwei Guo, Jiang Ming. "Jekyll and Hyde" is Risky: Shared-Everything Threat Mitigation in Dual-Instance Apps. MobiSys '19 Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, Pages 222-235. Seoul, South Korea, June 17 - 21, 2019
2018
1. 宋文纳,彭 国 军,傅 建 明,张 焕 国,陈 施 旅.恶 意 代 码 演 化 与 溯 源 技 术 研 究.软 件 学 报,2019. http://www.jos.org.cn/1000-9825/5767.htm
2. Binlin Cheng, Jiang Ming, Jianming Fu, Guojun Peng, Ting Chen, Xiaosong Zhang, Jean-Yves Marion. Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost. In Proceedings of the 25th ACM Conference on Computer and Communications Security, Toronto, Canada, October 15-19, 2018.
3. 傅建明, 林艳,刘秀文,张旭.云计算环境下基于随机化的安全防御研究. 计算机学报, 2018, 41(6): 1207~1224
4. 姜百合, 傅建明,王应军,王亚丽,黄坚伟.基于Fuzzing技术的云数据泄露漏洞检测.云顶集团yd1233学报(理学版), 2018, 64(02) :115-120
5. 王应军,傅建明,姜百合.基于随机化参数名的跨站请求伪造防御方法[J].计算机工程, 2018, 44(11): 158-164.
6. Jianming Fu,Rui Jin,Yan Lin,Baihe Jiang,Zhengwei Guo.Function Risk Assessment under Memory Leakage.International Conference on Networking and Network Applications(NaNa), 2018.10, Xian, China.
7. 黄凯, 傅建明,黄坚伟, et al.一种基于字符及解析特征的恶意域名检测方法[J].计算机仿真, 2018,35(3):287~292
2017
1. Wang, Yu-fei, et al. "Information Flow Integrity of ECPS based on Domain Partition." Current Trends in Computer Science and Mechanical Automation Vol. 2. Sciendo Migration, 2017. 624-637.
2. Fu Jianming. Xie Mengfei, Wang Yingjun, Mei Xufen. An Empirical Study of Unsolicited Content Injection into a Website.International Conference on Networking and Network Applications(NaNa). Kathmandu City, Nepal, on 15-20 October 2017
3. Jianming Fu, Rui Jin and Yan Lin. FRProtector: Defeating Control Flow Hijacking Through Function-level Randomization and Transfer Protection.13th EAI International Conference on Security and Privacy in Communication Networks(Securecomm 2017). Niagara Falls, Canada, 2017, Oct. 22~25.
4. 谢梦非, 傅建明,王应军,彭国军.移动端Web浏览器HTTP流量注入的监控与屏蔽[J]. 云顶集团yd1233学报(理学版),2017, 63(5): 385-396
5. 彭国军,梁玉,张焕国,傅建明.软件二进制代码重用技术综述.软件学报,2017,28(8):2026−2045.
6. Jianming Fu, Jianwei Huang and Lanxin Zhang. Curtain: Keep your hosts away from USB attacks. ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017
7. Cheng B, Fu J. Zombie Fans Detection in Sina Microblog a Machine Learning Approach[J]. JOURNAL OF INTERNET TECHNOLOGY (ISSN: 1607-9264) , 2017, 18(3): 561-568.
8. Cheng B, Fu J. Social bots detection on mobile social networks. International Journal of Network Security, Vol.19, No.1, PP.163-166, Jan. 2017 (DOI: 10.6633/IJNS.201701.19(1).17)
2016
1- 傅建明, 汤毅, 刘秀文, 张旭.一种基于动态污点的内存越界访问检测框架. 云顶集团yd1233学报(理学版), 2016,62(5):401-410.
2- 傅建明,刘秀文,汤毅,李鹏伟. 内存地址泄漏分析与防御[J]. 计算机研究与发展, 2016, 53(8): 1829-1849.
Fu Jianming, Liu Xiuwen, Tang Yi,Li Pengwei. Survey of Memory Address Leakage and Its Defense. Journal of Computer Research and Development, 2016, 53(8): 1829-1849.
3- Jianming Fu, Yan Lin, Xu Zhang. Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications(Trustcom),Auguest 23th, 2016, tianjin, China.
4- JianMing Fu, PengWei Li, Yan Lin, Shuang Ding. Android App Malicious Behavior Detection Based on User Intention. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications(Trustcom),Auguest 23th, 2016, tianjin, China.
5- Jianming FU, Yan Lin, Xu Zhang. Impact of Environment on Branch Transfer of Software. 12th EAI International Conference on Security and Privacy in Communication Networks(SecureComm), October 12th, 2016,Guangzhou China.{ 2017, LNICST, volume 198: 575-593 }
6- Yan Lin, Xiaoxiao Tang, Debin Gao and Jianming Fu. Control flow integrity enforcement with dynamic code optimization. In Proceedings of the 19th Information Security Conference (ISC 2016), Honolulu, USA, September 2016
2015
7- Jianming Fu, Xu Zhang, Yan Lin. An Instruction-set Randomization Using Length-preserving Permutation. TrustCom-2015,Helsinki, Finland, 20-22 August, 2015
8- 李鹏伟,傅建明,李拴保,吕少卿,沙乐天. 弹性移动云计算的研究进展与安全性分析[J]. 计算机研究与发展, 2015, 52(6): 1362-1377.
Li Pengwei,Fu Jianming,Li Shuanbao, Lü Shaoqing, Sha Letian. Elastic Mobile Cloud Computing:State of the Art and Security Analysis. Journal of Computer Research and Development, 2015, 52(6): 1362-1377.
9- 傅建明, 刘高, 李鹏伟。一种杀毒软件升级流程的安全性分析方法。云顶集团yd1233学报(理学版),2015.16(6):509~516.
10- 李拴保,傅建明. 多云服务提供者环境下的一种用户密钥撤销方法. 电子与信息学报,2015.9
11- sha, Le-tian, He, Li-wen, Fu, Jian-ming, Sun, Jing, and Li, Peng-wei. (2015) SDN-based Sensitive Information (SI) protection: sensitivity-degree measurement in software and data lifetime supervisor in software defined network. Security Comm. Networks, doi:10.1002/sec.1367.
12- 沙乐天,何利文,傅建明,王延松等,物联网环境下的一种敏感信息保护方法. 四川大学学报工程科学版, 2016, 48(1):132-138
13- Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng, Chunfu Jia, Huanguo Zhang. Stack Layout Randomization with Minimal Rewriting of Android Binaries . In proceedings of the 18th Annual international conference on information security and cryptology(ICISC). Nov, 2015. Seoul, Korea.
14- 李新国,李鹏伟,傅建明,丁笑一。一种安全风险可控的弹性移动云计算通用框架。计算机科学,2015,42(A11):357~363
2014
1- 李拴保, 傅建明, 张焕国, 陈晶, 王晶, 任必军. 云环境下基于环签密的用户身份属性保护方案. 通信学报,2014, 35(9):99~111
2- 李拴保,傅建明. 云环境下基于属性的用户权限管理研究. 计算机科学,2014.9
3- Jianming Fu, Yan Lin, Xu Zhang, Pengwei Li. Computation Integrity Measurement Based on Branch Transfer[C]//Procedings of the 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2014.
4- 梁玉, 傅建明, 彭国军, 彭碧琛, 张焕国. S-Tracker:一种基于栈异常的shellcode检测方法. 华中科技大学学报,2014, (11) 39-46.
5- 傅建明,沙乐天,李鹏伟,彭国军. 一种采用硬件虚拟化的内核数据主动保护方法. 四川大学学报(工程科学版),2014,46(1):8~13 (61202387,201201411110002)
6- Letian Sha, Jianming Fu, Jing Chen, Guojun Peng. PVDF: AN AUTOMATIC PATCH-BASED VULNERABILITY DESCRIPTION AND FUZZING METHOD. Proceeding of Communication security conference, 2014, Beijing.
7- Shuanbao Li, Jianming Fu. USER REVOCATION FOR DATA SHARING BASED ON BROADCAST CP-ABE IN CLOUD COMPUTING. Proceeding of Communication security conference, 2014, Beijing.
8- 沙乐天,傅建明,陈晶,黄诗勇。一种面向敏感信息处理的敏感度度量方法。计算机研究与发展,2014,5: 1050~1060
2013
1. 傅建明,李鹏伟,李晶雯。敏感信息输入安全技术探究。信息网络安全,2013,147(3):82~85.
2. 傅建明,彭国军,严飞,涂航。信息安全案例库的设计与实现。云顶集团yd1233教育研究, 2013,1:64~67.
3. 李牷保,傅建明,连向磊。植入城市计算综述。计算机科学,2013,40(3):8~15.
4. DING Shuang, FU Jianming, PENG BiChen. ModuleGuard: A Gatekeeper for Dynamic Module Loading Against Malware. Wuhan University Journal of Natural Sicence, 2013,18(6):489~498
5. 傅建明,李鹏伟,易乔,黄诗勇.一种Android组件间通信的安全缺陷静态检测方法. 华中科技大学学报,2013.11(II):259~264
6. 李鹏伟,傅建明,沙乐天,丁爽。基于细胞自动机的软键盘布局随机化方案。北京交通大学学报,2013,10(5):105~111.