發表論文
2024
1. Chenke Luo, Jiang Ming*, Mengfei Xie, Guojun Peng, Jianming Fu*. Retrofitting XoM for Stripped Binaries without Embedded Data Relocation[C]. NDSS 25 (accepted)
2. Chenke Luo, Jianming Fu, Jiang Ming, Mengfei Xie, Guojun Peng. PtrProxy: Efficient Code Re-Randomization on AArch64 Platform. China Communications. 0 https://doi.org/10.23919/JCC.ja.2024-0077 (accepted)
3. Yu Nie, Jianming Fu, Yilai Zhang, Chao Li. Modeling implicit variable and latent structure for aspect-based sentiment quadruple extraction, Neurocomputing,Volume 586,2024,127642.
4. Q. Wang, M. Tang and J. Fu, "EavesDroid: Eavesdropping User Behaviors via OS Side Channels on Smartphones," in IEEE Internet of Things Journal, vol. 11, no. 3, pp. 3979-3993, 1 Feb.1, 2024, doi: 10.1109/JIOT.2023.3298992
5. 傅建明, 姜宇謙, 何佳, 鄭銳, 蘇日古嘎, 彭國軍. 基于樣本嵌入的挖礦惡意軟件檢測方法[J]. 計算機科學, 2024, 51(1): 327-334
2023
1. 操方濤,傅建明,李子川.一種基于Unicorn的UEFI DXE驅動模拟執行方法[J].88858cc永利官网學報(理學版),2023,69(6):690-698
2. C. Luo, J. Ming, J. Fu, G. Peng and Z. Li, "Reverse Engineering of Obfuscated Lua Bytecode via Interpreter Semantics Testing," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 3891-3905, 2023, doi: 10.1109/TIFS.2023.3289254.
3. M. Xie, Y. Lin, C. Luo, G. Peng and J. Fu, "PointerScope: Understanding Pointer Patching for Code Randomization," in IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 4, pp. 3019-3036, 1 July-Aug. 2023, doi: 10.1109/TDSC.2022.3203043.
4. Side Liu, Guojun Peng, Haitao Zeng, Jianming Fu, A Survey on the Evolution of Fileless Attacks and Detection Techniques, Computers & Security,2023,103653,ISSN 0167-4048,https://doi.org/10.1016/j.cose.2023.103653.
2022
1. 鄭銳, 汪秋雲, 林卓龐, 靖蓉琦, 姜政偉, 傅建明, 汪姝玮. 一種基于威脅情報層次特征集成的挖礦惡意軟件檢測方法[J]. 電子學報, 2022, 50 (11): 2707-2715. DOI: 10.12263/DZXB.20211333.
2. Rui Zheng, Qiuyun Wang, Jia He, Jianming Fu, Guga Suri, Zhengwei Jiang, "Cryptocurrency Mining Malware Detection Based on Behavior Pattern and Graph Neural Network", Security and Communication Networks, vol. 2022, Article ID 9453797, 8 pages, 2022.
3. 傅建明, 劉暢, 解夢飛, 羅陳可. 基于誘捕的軟件異常檢測綜述[J]. 網絡與信息安全學報, 2022, 8(1): 15-29. //Jianming FU, Chang LIU, Mengfei XIE, Chenke LUO. Survey of software anomaly detection based on deception[J]. Chinese Journal of Network and Information Security, 2022, 8(1): 15-29.
4. R. Zheng, Q. Wang, Z. Lin et al., Cryptocurrency malware detection in real-world environment: Based on multi-results stacking learning. Applied Soft Computing, 2022, 124.
5. Y. Ren, D. Liu, C. Liu, Q. Xiong, J. Fu and L. Wang, "A Universal Audio Steganalysis Scheme based on Multiscale Spectrograms and DeepResNet," in IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2022.3141121.
2021
1. Wenna Song, Jiang Ming, Lin Jiang, Yi Xiang, Xuanchen Pan , Jianming Fu, Guojun Peng. Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization. CCS 2021.
2. Zheng, R.; Ma, H.;Wang, Q.;Fu, J.; Jiang, Z. Assessing the Security of Campus Networks: The Case of Seven Universities. Sensors 2021, 21,306. https://doi.org/10.3390/s21010306
3. XiuwenLiu, JianmingFu, YanjiaoChen, WeichenLuo, ZihanTang. Trust-Aware sensing Quality estimation for team Crowdsourcing in social IoT. Computer Networks Volume 184, 15 January 2021, 107695
4. Binlin Cheng*, Jiang Ming*, Erika A Leal, Haotian Zhang, Jianming Fu, Guojun Peng, Jean-Yves Marion (2021). [USENIX Security '21] Obfuscation-Resilient Executable Payload Extraction From Packed Malware. In Proceedings of the 30th USENIX Security Symposium, Virtual Event, August 11-13, 2021
5. Wenna Song, Jiang Ming, Lin Jiang, Han Yan, Yi Xiang, Yuan Chen, Jianming Fu, Guojun Peng (2021). [ICSE '21] App's Auto-Login Function Security Testing via Android OS-Level Virtualization. In Proceedings of the 43rd International Conference on Software Engineering, Virtual Event, May 25-28, 2021
6. FU Jianming,HE Jia,XIE Mengfei,MEI Xufen. Recognizing Malicious Behaviors of Chrome Extensions through Direct JavaScript Execution[J]. Wuhan University Journal of Natural Sciences,2021,26(01):89-101.
7. Yuan Luo, Long Cheng, Yu Liang, Jianming Fu, Guojun Peng, DEEPNOISE: Learning Sensor and Process Noise to Detect Data Integrity Attacks in CPS[J]. China Communications, 2021, 18(9): 192-209.
2020
1. 鄭銳,汪秋雲,傅建明*,姜政偉,蘇日,古嘎, and汪姝玮. "一種基于深度學習的惡意軟件家族分類模型."信息安全學報,2020,5(1): 1-9.
2. Liu, Xiuwen, Jianming Fu, and Yanjiao Chen. "Event Evolution Model for Cybersecurity Event Mining in Tweet Streams." Information Sciences (2020).
3. Xiuwen Liu ; Jianming Fu. SPWalk: Similar Property Oriented Feature Learning for Phishing Detection. IEEEAccess, 2020,8(1):87031-87045.
4. Mengfei Xie, Jianming Fu, Jia He, Chenke Luo, and Guojun Peng.JTaint: Finding Privacy-Leakage in Chrome Extensions. ACISP, 2020. (錄用)
2019
1. 傅建明、彭國軍、嚴飛,軟件安全課程教學方法研究,軟件導刊,2020,19(2):226-229.
2. 杜瑞穎,張煥國,傅建明,陳晶,唐明,何琨, ... &代永平. (2019).網絡空間安全大類下的信息安全專業人才培養. 網絡與信息安全學報, 5(3), 25-30.
3. Jianming Fu, Lin Li, Yingjun Wang, Jianwei Huang, and Guojun Peng.Web Scanner Detection Basedon Behavioral Differences. 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14–17, 2019
4. 傅建明,梅戌芬,鄭銳. Chrome擴展安全[J].88858cc永利官网學報(理學版),2019,65(2):111⁃125.
5. 劉秀文,傅建明,黎琳,等.面向用戶交互場景的信息欺騙分類及其威脅抑制機制[J].88858cc永利官网學報(理學版),2019,65(2):126⁃138
6. 傅建明,黎琳,王應軍. 基于CNN的Webshell文件檢測.鄭州大學學報(理學版),2019, 51(2): 1-8
7. 傅建明,黎琳,鄭銳,蘇日古嘎。基于GAN的網絡攻擊檢測研究綜述。信息網絡安全。2019, 218(2):1-9
8. LI Pengwei, FU Jianming, XU Chao, CHENG Binlin and ZHANG Huanguo. Differentiating Malicious and Benign Android App Operations Using Second-Step Behavior Features. Chinese Journal of Electronics, 2019, 28(5):944~952
9. Luman Shi, Jianming Fu, Zhengwei Guo, Jiang Ming. "Jekyll and Hyde" is Risky: Shared-Everything Threat Mitigation in Dual-Instance Apps. MobiSys '19 Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, Pages 222-235. Seoul, South Korea, June 17 - 21, 2019
2018
1. 宋文納,彭 國 軍,傅 建 明,張 煥 國,陳 施 旅.惡 意 代 碼 演 化 與 溯 源 技 術 研 究.軟 件 學 報,2019. http://www.jos.org.cn/1000-9825/5767.htm
2. Binlin Cheng, Jiang Ming, Jianming Fu, Guojun Peng, Ting Chen, Xiaosong Zhang, Jean-Yves Marion. Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost. In Proceedings of the 25th ACM Conference on Computer and Communications Security, Toronto, Canada, October 15-19, 2018.
3. 傅建明, 林豔,劉秀文,張旭.雲計算環境下基于随機化的安全防禦研究. 計算機學報, 2018, 41(6): 1207~1224
4. 姜百合, 傅建明,王應軍,王亞麗,黃堅偉.基于Fuzzing技術的雲數據洩露漏洞檢測.88858cc永利官网學報(理學版), 2018, 64(02) :115-120
5. 王應軍,傅建明,姜百合.基于随機化參數名的跨站請求僞造防禦方法[J].計算機工程, 2018, 44(11): 158-164.
6. Jianming Fu,Rui Jin,Yan Lin,Baihe Jiang,Zhengwei Guo.Function Risk Assessment under Memory Leakage.International Conference on Networking and Network Applications(NaNa), 2018.10, Xian, China.
7. 黃凱, 傅建明,黃堅偉, et al.一種基于字符及解析特征的惡意域名檢測方法[J].計算機仿真, 2018,35(3):287~292
2017
1. Wang, Yu-fei, et al. "Information Flow Integrity of ECPS based on Domain Partition." Current Trends in Computer Science and Mechanical Automation Vol. 2. Sciendo Migration, 2017. 624-637.
2. Fu Jianming. Xie Mengfei, Wang Yingjun, Mei Xufen. An Empirical Study of Unsolicited Content Injection into a Website.International Conference on Networking and Network Applications(NaNa). Kathmandu City, Nepal, on 15-20 October 2017
3. Jianming Fu, Rui Jin and Yan Lin. FRProtector: Defeating Control Flow Hijacking Through Function-level Randomization and Transfer Protection.13th EAI International Conference on Security and Privacy in Communication Networks(Securecomm 2017). Niagara Falls, Canada, 2017, Oct. 22~25.
4. 謝夢非, 傅建明,王應軍,彭國軍.移動端Web浏覽器HTTP流量注入的監控與屏蔽[J]. 88858cc永利官网學報(理學版),2017, 63(5): 385-396
5. 彭國軍,梁玉,張煥國,傅建明.軟件二進制代碼重用技術綜述.軟件學報,2017,28(8):2026−2045.
6. Jianming Fu, Jianwei Huang and Lanxin Zhang. Curtain: Keep your hosts away from USB attacks. ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017
7. Cheng B, Fu J. Zombie Fans Detection in Sina Microblog a Machine Learning Approach[J]. JOURNAL OF INTERNET TECHNOLOGY (ISSN: 1607-9264) , 2017, 18(3): 561-568.
8. Cheng B, Fu J. Social bots detection on mobile social networks. International Journal of Network Security, Vol.19, No.1, PP.163-166, Jan. 2017 (DOI: 10.6633/IJNS.201701.19(1).17)
2016
1- 傅建明, 湯毅, 劉秀文, 張旭.一種基于動态污點的内存越界訪問檢測框架. 88858cc永利官网學報(理學版), 2016,62(5):401-410.
2- 傅建明,劉秀文,湯毅,李鵬偉. 内存地址洩漏分析與防禦[J]. 計算機研究與發展, 2016, 53(8): 1829-1849.
Fu Jianming, Liu Xiuwen, Tang Yi,Li Pengwei. Survey of Memory Address Leakage and Its Defense. Journal of Computer Research and Development, 2016, 53(8): 1829-1849.
3- Jianming Fu, Yan Lin, Xu Zhang. Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications(Trustcom),Auguest 23th, 2016, tianjin, China.
4- JianMing Fu, PengWei Li, Yan Lin, Shuang Ding. Android App Malicious Behavior Detection Based on User Intention. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications(Trustcom),Auguest 23th, 2016, tianjin, China.
5- Jianming FU, Yan Lin, Xu Zhang. Impact of Environment on Branch Transfer of Software. 12th EAI International Conference on Security and Privacy in Communication Networks(SecureComm), October 12th, 2016,Guangzhou China.{ 2017, LNICST, volume 198: 575-593 }
6- Yan Lin, Xiaoxiao Tang, Debin Gao and Jianming Fu. Control flow integrity enforcement with dynamic code optimization. In Proceedings of the 19th Information Security Conference (ISC 2016), Honolulu, USA, September 2016
2015
7- Jianming Fu, Xu Zhang, Yan Lin. An Instruction-set Randomization Using Length-preserving Permutation. TrustCom-2015,Helsinki, Finland, 20-22 August, 2015
8- 李鵬偉,傅建明,李拴保,呂少卿,沙樂天. 彈性移動雲計算的研究進展與安全性分析[J]. 計算機研究與發展, 2015, 52(6): 1362-1377.
Li Pengwei,Fu Jianming,Li Shuanbao, Lü Shaoqing, Sha Letian. Elastic Mobile Cloud Computing:State of the Art and Security Analysis. Journal of Computer Research and Development, 2015, 52(6): 1362-1377.
9- 傅建明, 劉高, 李鵬偉。一種殺毒軟件升級流程的安全性分析方法。88858cc永利官网學報(理學版),2015.16(6):509~516.
10- 李拴保,傅建明. 多雲服務提供者環境下的一種用戶密鑰撤銷方法. 電子與信息學報,2015.9
11- sha, Le-tian, He, Li-wen, Fu, Jian-ming, Sun, Jing, and Li, Peng-wei. (2015) SDN-based Sensitive Information (SI) protection: sensitivity-degree measurement in software and data lifetime supervisor in software defined network. Security Comm. Networks, doi:10.1002/sec.1367.
12- 沙樂天,何利文,傅建明,王延松等,物聯網環境下的一種敏感信息保護方法. 四川大學學報工程科學版, 2016, 48(1):132-138
13- Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng, Chunfu Jia, Huanguo Zhang. Stack Layout Randomization with Minimal Rewriting of Android Binaries . In proceedings of the 18th Annual international conference on information security and cryptology(ICISC). Nov, 2015. Seoul, Korea.
14- 李新國,李鵬偉,傅建明,丁笑一。一種安全風險可控的彈性移動雲計算通用框架。計算機科學,2015,42(A11):357~363
2014
1- 李拴保, 傅建明, 張煥國, 陳晶, 王晶, 任必軍. 雲環境下基于環簽密的用戶身份屬性保護方案. 通信學報,2014, 35(9):99~111
2- 李拴保,傅建明. 雲環境下基于屬性的用戶權限管理研究. 計算機科學,2014.9
3- Jianming Fu, Yan Lin, Xu Zhang, Pengwei Li. Computation Integrity Measurement Based on Branch Transfer[C]//Procedings of the 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2014.
4- 梁玉, 傅建明, 彭國軍, 彭碧琛, 張煥國. S-Tracker:一種基于棧異常的shellcode檢測方法. 華中科技大學學報,2014, (11) 39-46.
5- 傅建明,沙樂天,李鵬偉,彭國軍. 一種采用硬件虛拟化的内核數據主動保護方法. 四川大學學報(工程科學版),2014,46(1):8~13 (61202387,201201411110002)
6- Letian Sha, Jianming Fu, Jing Chen, Guojun Peng. PVDF: AN AUTOMATIC PATCH-BASED VULNERABILITY DESCRIPTION AND FUZZING METHOD. Proceeding of Communication security conference, 2014, Beijing.
7- Shuanbao Li, Jianming Fu. USER REVOCATION FOR DATA SHARING BASED ON BROADCAST CP-ABE IN CLOUD COMPUTING. Proceeding of Communication security conference, 2014, Beijing.
8- 沙樂天,傅建明,陳晶,黃詩勇。一種面向敏感信息處理的敏感度度量方法。計算機研究與發展,2014,5: 1050~1060
2013
1. 傅建明,李鵬偉,李晶雯。敏感信息輸入安全技術探究。信息網絡安全,2013,147(3):82~85.
2. 傅建明,彭國軍,嚴飛,塗航。信息安全案例庫的設計與實現。88858cc永利官网教育研究, 2013,1:64~67.
3. 李牷保,傅建明,連向磊。植入城市計算綜述。計算機科學,2013,40(3):8~15.
4. DING Shuang, FU Jianming, PENG BiChen. ModuleGuard: A Gatekeeper for Dynamic Module Loading Against Malware. Wuhan University Journal of Natural Sicence, 2013,18(6):489~498
5. 傅建明,李鵬偉,易喬,黃詩勇.一種Android組件間通信的安全缺陷靜态檢測方法. 華中科技大學學報,2013.11(II):259~264
6. 李鵬偉,傅建明,沙樂天,丁爽。基于細胞自動機的軟鍵盤布局随機化方案。北京交通大學學報,2013,10(5):105~111.