教師名錄

傅建明

郵          箱:jmfu@whu.edu.cn

職          稱:教授

辦公室地址:

實驗室地址:

個人簡介

傅建明,博士。在華中理工大學獲得了學士學位和碩士學位, 在88858cc永利官网獲得了博士學位,現為88858cc永利官网網絡安全學院教授,博士生導師。中國計算機學會高級會員,IEEE會員和ACM會員。20108月至20118月,在美國愛荷華州立大學進行學術交流和訪問。主要從事逆向分析與安全評估、漏洞檢測與防禦、移動安全、人工智能應用及安全、惡意代碼與惡意行為檢測等方面的教學和科研工作。


研究方向

1、逆向分析與安全評估;

2、代碼缺陷檢測;

3、軟件系統安全防禦;

4、移動安全;

5、惡意行為檢測和惡意代碼檢測;

6、人工智能應用與安全。

招收研究生要求:

1、熟悉C/C++/Java/彙編等編程語言;

2、喜歡對漏洞和黑客攻擊刨根問底;

3、喜歡遨遊在由磁盤、内存、網絡、{0/1}構成的數字世界;

4、愛好逆向分析,探索軟件和網絡的内在奧秘;

5、了解編譯器、操作系統,以及機器學習和深度學習。

參考書:

王清,0-Day安全:軟件漏洞分析技術(第二版)。電子工業出版社,2011

豐生強. Android軟件安全與逆向分析. 人民郵電出版社,2013.


教育背景

1987.09~1991.06 華中理工大學(學士學位)

1991.07~1994.04 華中理工大學(碩士學位)

1996.09~2000.06 88858cc永利官网 (博士學位)

工作經驗

2018.01~至今 88858cc永利官网

1994.04~2017.12 88858cc永利官网計算機學院

教授課程

本科教學

1. 高級語言程序設計

2. 軟件安全

3. 計算機病毒

研究生教學

1. 網絡安全監管 (碩士研究生)

2. 信息論 (博士研究生)

發表論文

2024

1. Chenke Luo, Jiang Ming*, Mengfei Xie, Guojun Peng, Jianming Fu*. Retrofitting XoM for Stripped Binaries without Embedded Data Relocation[C].  NDSS 25 (accepted)

2. Chenke Luo, Jianming Fu, Jiang Ming, Mengfei Xie, Guojun Peng. PtrProxy: Efficient Code Re-Randomization on AArch64 Platform. China Communications. 0 https://doi.org/10.23919/JCC.ja.2024-0077 (accepted)

3. Yu Nie, Jianming Fu, Yilai Zhang, Chao Li. Modeling implicit variable and latent structure for aspect-based sentiment quadruple extraction, Neurocomputing,Volume 586,2024,127642.

4. Q. Wang, M. Tang and J. Fu, "EavesDroid: Eavesdropping User Behaviors via OS Side Channels on Smartphones," in IEEE Internet of Things Journal, vol. 11, no. 3, pp. 3979-3993, 1 Feb.1, 2024, doi: 10.1109/JIOT.2023.3298992

5. 傅建明, 姜宇謙, 何佳, 鄭銳, 蘇日古嘎, 彭國軍. 基于樣本嵌入的挖礦惡意軟件檢測方法[J]. 計算機科學, 2024, 51(1): 327-334

2023

1. 操方濤,傅建明,李子川.一種基于UnicornUEFI DXE驅動模拟執行方法[J.88858cc永利官网學報(理學版),2023696):690-698

2. C. Luo, J. Ming, J. Fu, G. Peng and Z. Li, "Reverse Engineering of Obfuscated Lua Bytecode via Interpreter Semantics Testing," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 3891-3905, 2023, doi: 10.1109/TIFS.2023.3289254.

3. M. Xie, Y. Lin, C. Luo, G. Peng and J. Fu, "PointerScope: Understanding Pointer Patching for Code Randomization," in IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 4, pp. 3019-3036, 1 July-Aug. 2023, doi: 10.1109/TDSC.2022.3203043.

4. Side Liu, Guojun Peng, Haitao Zeng, Jianming Fu, A Survey on the Evolution of Fileless Attacks and Detection Techniques, Computers & Security,2023,103653,ISSN 0167-4048,https://doi.org/10.1016/j.cose.2023.103653.

2022

1. 鄭銳, 汪秋雲, 林卓龐, 靖蓉琦, 姜政偉, 傅建明, 汪姝玮. 一種基于威脅情報層次特征集成的挖礦惡意軟件檢測方法[J]. 電子學報,  2022, 50 (11): 2707-2715.    DOI: 10.12263/DZXB.20211333.

2. Rui Zheng, Qiuyun Wang, Jia He, Jianming Fu, Guga Suri, Zhengwei Jiang, "Cryptocurrency Mining Malware Detection Based on Behavior Pattern and Graph Neural Network", Security and Communication Networks, vol. 2022, Article ID 9453797, 8 pages, 2022.

3. 傅建明, 劉暢, 解夢飛, 羅陳可. 基于誘捕的軟件異常檢測綜述[J]. 網絡與信息安全學報, 2022, 8(1): 15-29. //Jianming FU, Chang LIU, Mengfei XIE, Chenke LUO. Survey of software anomaly detection based on deception[J]. Chinese Journal of Network and Information Security, 2022, 8(1): 15-29.

4. R. Zheng, Q. Wang, Z. Lin et al., Cryptocurrency malware detection in real-world environment: Based on multi-results stacking learning. Applied Soft Computing, 2022, 124.

5. Y. Ren, D. Liu, C. Liu, Q. Xiong, J. Fu and L. Wang, "A Universal Audio Steganalysis Scheme based on Multiscale Spectrograms and DeepResNet," in IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2022.3141121.

2021

1. Wenna Song, Jiang Ming, Lin Jiang, Yi Xiang, Xuanchen Pan , Jianming Fu, Guojun Peng. Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization. CCS 2021.

2. Zheng, R.; Ma, H.;Wang, Q.;Fu, J.; Jiang, Z. Assessing the Security of Campus Networks: The Case of Seven Universities. Sensors 2021, 21,306. https://doi.org/10.3390/s21010306

3. XiuwenLiu,  JianmingFu,  YanjiaoChen,  WeichenLuo,  ZihanTang. Trust-Aware sensing Quality estimation for team Crowdsourcing in social IoT. Computer Networks Volume 184, 15 January 2021, 107695

4. Binlin Cheng*, Jiang Ming*, Erika A Leal, Haotian Zhang, Jianming Fu, Guojun Peng, Jean-Yves Marion (2021). [USENIX Security '21] Obfuscation-Resilient Executable Payload Extraction From Packed Malware. In Proceedings of the 30th USENIX Security Symposium, Virtual Event, August 11-13, 2021

5. Wenna Song, Jiang Ming, Lin Jiang, Han Yan, Yi Xiang, Yuan Chen, Jianming Fu, Guojun Peng (2021). [ICSE '21] App's Auto-Login Function Security Testing via Android OS-Level Virtualization. In Proceedings of the 43rd International Conference on Software Engineering, Virtual Event, May 25-28, 2021

6. FU Jianming,HE Jia,XIE Mengfei,MEI Xufen. Recognizing Malicious Behaviors of Chrome Extensions through Direct JavaScript Execution[J]. Wuhan University Journal of Natural Sciences,2021,26(01):89-101.

7. Yuan Luo, Long Cheng, Yu Liang, Jianming Fu, Guojun Peng, DEEPNOISE: Learning Sensor and Process Noise to Detect Data Integrity Attacks in CPS[J]. China Communications, 2021, 18(9): 192-209.

2020

1. 鄭銳,汪秋雲,傅建明*,姜政偉,蘇日,古嘎, and汪姝玮. "一種基于深度學習的惡意軟件家族分類模型."信息安全學報,2020,51: 1-9.

2. Liu, Xiuwen, Jianming Fu, and Yanjiao Chen. "Event Evolution Model for Cybersecurity Event Mining in Tweet Streams." Information Sciences (2020).

3. Xiuwen Liu ; Jianming Fu. SPWalk: Similar Property Oriented Feature Learning for Phishing Detection. IEEEAccess, 2020,8(1):87031-87045.

4. Mengfei Xie, Jianming Fu, Jia He, Chenke Luo, and Guojun Peng.JTaint: Finding Privacy-Leakage in Chrome Extensions. ACISP, 2020. (錄用)

2019

1. 傅建明、彭國軍、嚴飛,軟件安全課程教學方法研究,軟件導刊,202019(2)226-229.

2. 杜瑞穎,張煥國,傅建明,陳晶,唐明,何琨, ... &代永平. (2019).網絡空間安全大類下的信息安全專業人才培養. 網絡與信息安全學報, 5(3), 25-30.

3. Jianming Fu, Lin Li, Yingjun Wang, Jianwei Huang, and Guojun Peng.Web Scanner Detection Basedon Behavioral Differences. 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14–17, 2019

4. 傅建明,梅戌芬,鄭銳. Chrome擴展安全[J.88858cc永利官网學報(理學版),2019652):111125.

5. 劉秀文,傅建明,黎琳,等.面向用戶交互場景的信息欺騙分類及其威脅抑制機制[J.88858cc永利官网學報(理學版),2019652:126138

6. 傅建明,黎琳,王應軍. 基于CNNWebshell文件檢測.鄭州大學學報(理學版),2019, 51(2): 1-8

7. 傅建明,黎琳,鄭銳,蘇日古嘎。基于GAN的網絡攻擊檢測研究綜述。信息網絡安全。2019, 218(2):1-9

8. LI Pengwei, FU Jianming, XU Chao, CHENG Binlin and ZHANG Huanguo. Differentiating Malicious and Benign Android App Operations Using Second-Step Behavior Features. Chinese Journal of Electronics, 2019, 28(5):944~952

9. Luman Shi, Jianming Fu, Zhengwei Guo, Jiang Ming. "Jekyll and Hyde" is Risky: Shared-Everything Threat Mitigation in Dual-Instance Apps. MobiSys '19 Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, Pages 222-235. Seoul, South Korea, June 17 - 21, 2019

2018

1. 宋文納, , , , . . ,2019. http://www.jos.org.cn/1000-9825/5767.htm

2. Binlin Cheng, Jiang Ming, Jianming Fu, Guojun Peng, Ting Chen, Xiaosong Zhang, Jean-Yves Marion. Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost. In Proceedings of the 25th ACM Conference on Computer and Communications Security, Toronto, Canada, October 15-19, 2018.

3. 傅建明, 林豔,劉秀文,張旭.雲計算環境下基于随機化的安全防禦研究. 計算機學報, 2018, 41(6): 1207~1224

4. 姜百合, 傅建明,王應軍,王亞麗,黃堅偉.基于Fuzzing技術的雲數據洩露漏洞檢測.88858cc永利官网學報(理學版), 2018, 64(02) :115-120

5. 王應軍,傅建明,姜百合.基于随機化參數名的跨站請求僞造防禦方法[J].計算機工程, 2018, 44(11): 158-164.

6. Jianming Fu,Rui Jin,Yan Lin,Baihe Jiang,Zhengwei Guo.Function Risk Assessment under Memory Leakage.International Conference on Networking and Network Applications(NaNa), 2018.10, Xian, China.

7. 黃凱, 傅建明,黃堅偉, et al.一種基于字符及解析特征的惡意域名檢測方法[J].計算機仿真, 2018,35(3):287~292

2017

1. Wang, Yu-fei, et al. "Information Flow Integrity of ECPS based on Domain Partition." Current Trends in Computer Science and Mechanical Automation Vol. 2. Sciendo Migration, 2017. 624-637.

2. Fu Jianming. Xie Mengfei, Wang Yingjun, Mei Xufen. An Empirical Study of Unsolicited Content Injection into a Website.International Conference on Networking and Network Applications(NaNa). Kathmandu City, Nepal, on 15-20 October 2017

3. Jianming Fu, Rui Jin and Yan Lin. FRProtector: Defeating Control Flow Hijacking Through Function-level Randomization and Transfer Protection.13th EAI International Conference on Security and Privacy in Communication Networks(Securecomm 2017). Niagara Falls, Canada, 2017, Oct. 22~25.

4. 謝夢非, 傅建明,王應軍,彭國軍.移動端Web浏覽器HTTP流量注入的監控與屏蔽[J]. 88858cc永利官网學報(理學版),2017, 63(5): 385-396

5. 彭國軍,梁玉,張煥國,傅建明.軟件二進制代碼重用技術綜述.軟件學報,2017,28(8):20262045.

6. Jianming Fu, Jianwei Huang and Lanxin Zhang. Curtain: Keep your hosts away from USB attacks. ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017

7. Cheng B, Fu J. Zombie Fans Detection in Sina Microblog a Machine Learning Approach[J]. JOURNAL OF INTERNET TECHNOLOGY (ISSN: 1607-9264) , 2017, 18(3): 561-568.

8. Cheng B, Fu J. Social bots detection on mobile social networks. International Journal of Network Security, Vol.19, No.1, PP.163-166, Jan. 2017 (DOI: 10.6633/IJNS.201701.19(1).17)

2016

1- 傅建明, 湯毅, 劉秀文, 張旭.一種基于動态污點的内存越界訪問檢測框架. 88858cc永利官网學報(理學版), 201662(5):401-410.

2- 傅建明,劉秀文,湯毅,李鵬偉. 内存地址洩漏分析與防禦[J]. 計算機研究與發展, 2016, 53(8): 1829-1849.

Fu Jianming, Liu Xiuwen, Tang Yi,Li Pengwei. Survey of Memory Address Leakage and Its Defense. Journal of Computer Research and Development, 2016, 53(8): 1829-1849.

3- Jianming Fu, Yan Lin, Xu Zhang. Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications(Trustcom),Auguest 23th, 2016, tianjin, China.

4- JianMing Fu, PengWei Li, Yan Lin, Shuang Ding. Android App Malicious Behavior Detection Based on User Intention. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications(Trustcom),Auguest 23th, 2016, tianjin, China.

5- Jianming FU, Yan Lin, Xu Zhang. Impact of Environment on Branch Transfer of Software. 12th EAI International Conference on Security and Privacy in Communication Networks(SecureComm), October 12th, 2016,Guangzhou China.{ 2017, LNICST, volume 198: 575-593 }

6- Yan Lin, Xiaoxiao Tang, Debin Gao and Jianming Fu. Control flow integrity enforcement with dynamic code optimization. In Proceedings of the 19th Information Security Conference (ISC 2016), Honolulu, USA, September 2016

2015

7- Jianming Fu, Xu Zhang, Yan Lin. An Instruction-set Randomization Using Length-preserving Permutation. TrustCom-2015,Helsinki, Finland, 20-22 August, 2015

8- 李鵬偉,傅建明,李拴保,呂少卿,沙樂天. 彈性移動雲計算的研究進展與安全性分析[J]. 計算機研究與發展, 2015, 52(6): 1362-1377.

Li PengweiFu JianmingLi Shuanbao, Lü Shaoqing, Sha Letian. Elastic Mobile Cloud ComputingState of the Art and Security Analysis. Journal of Computer Research and Development, 2015, 52(6): 1362-1377.

9- 傅建明, 劉高, 李鵬偉。一種殺毒軟件升級流程的安全性分析方法。88858cc永利官网學報(理學版),2015.166):509~516.

10- 李拴保,傅建明. 多雲服務提供者環境下的一種用戶密鑰撤銷方法. 電子與信息學報,2015.9

11- sha, Le-tian, He, Li-wen, Fu, Jian-ming, Sun, Jing, and Li, Peng-wei. (2015) SDN-based Sensitive Information (SI) protection: sensitivity-degree measurement in software and data lifetime supervisor in software defined network. Security Comm. Networks, doi:10.1002/sec.1367.

12- 沙樂天,何利文,傅建明,王延松等,物聯網環境下的一種敏感信息保護方法. 四川大學學報工程科學版, 2016, 48(1):132-138

13- Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng, Chunfu Jia, Huanguo Zhang. Stack Layout Randomization with Minimal Rewriting of Android Binaries . In proceedings of the 18th Annual international conference on information security and cryptology(ICISC). Nov, 2015. Seoul, Korea.

14- 李新國,李鵬偉,傅建明,丁笑一。一種安全風險可控的彈性移動雲計算通用框架。計算機科學,201542A11):357~363

2014

1- 李拴保, 傅建明, 張煥國, 陳晶, 王晶, 任必軍. 雲環境下基于環簽密的用戶身份屬性保護方案. 通信學報,2014, 35(9):99~111

2- 李拴保,傅建明. 雲環境下基于屬性的用戶權限管理研究. 計算機科學,2014.9

3- Jianming Fu, Yan Lin, Xu Zhang, Pengwei Li. Computation Integrity Measurement Based on Branch Transfer[C]//Procedings of the 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2014.

4- 梁玉, 傅建明, 彭國軍, 彭碧琛, 張煥國. S-Tracker:一種基于棧異常的shellcode檢測方法. 華中科技大學學報,2014, (11) 39-46.

5- 傅建明,沙樂天,李鵬偉,彭國軍. 一種采用硬件虛拟化的内核數據主動保護方法. 四川大學學報(工程科學版),2014,46(1):8~13 (61202387,201201411110002)

6- Letian Sha, Jianming Fu, Jing Chen, Guojun Peng. PVDF: AN AUTOMATIC PATCH-BASED VULNERABILITY DESCRIPTION AND FUZZING METHOD. Proceeding of Communication security conference, 2014, Beijing.

7- Shuanbao Li, Jianming Fu. USER REVOCATION FOR DATA SHARING BASED ON BROADCAST CP-ABE IN CLOUD COMPUTING. Proceeding of Communication security conference, 2014, Beijing.

8- 沙樂天,傅建明,陳晶,黃詩勇。一種面向敏感信息處理的敏感度度量方法。計算機研究與發展,2014,5: 1050~1060

2013

1. 傅建明,李鵬偉,李晶雯。敏感信息輸入安全技術探究。信息網絡安全,20131473):82~85.

2. 傅建明,彭國軍,嚴飛,塗航。信息安全案例庫的設計與實現。88858cc永利官网教育研究, 2013164~67.

3. 李牷保,傅建明,連向磊。植入城市計算綜述。計算機科學,2013403):8~15.

4. DING Shuang, FU Jianming, PENG BiChen. ModuleGuard: A Gatekeeper for Dynamic Module Loading Against Malware. Wuhan University Journal of Natural Sicence, 2013,18(6):489~498

5. 傅建明,李鵬偉,易喬,黃詩勇.一種Android組件間通信的安全缺陷靜态檢測方法. 華中科技大學學報,2013.11II):259~264

6. 李鵬偉,傅建明,沙樂天,丁爽。基于細胞自動機的軟鍵盤布局随機化方案。北京交通大學學報,2013105):105~111.


課題科研

1. 國家自然科學基金項目: 基于代碼模式的移動應用隐私洩露評估模型研究(2023~2026).

2. 國家重點研發課題任務:隐私數據敏感性度量及保護效果評估(2021.

3. 國家自然科學基金項目:面向代碼複用攻擊的誘捕防禦機制研究。 (2020~2023) .

4. 内存動态威脅的檢測與防護. (企業合作)

5. Dex2oat優化. (企業合作)

研究團隊

http://ts.whu.edu.cn

獲獎信息

1. 2016年湖北省科技進獎二等獎, “ 網絡安全威脅主動感知及研判的方法與技術”,排名第一。

2. 2016年獲得88858cc永利官网傑出教學貢獻校長獎(排名第三)。

3. 2016年指導學生獲得全國大學生信息安全競賽二等獎。

4. 2015年指導全國大學生互聯網+創新比賽,獲得88858cc永利官网互聯網+優秀指導教師。

5. 2014年國家級教學成果一等獎“創建信息安全專業培養體系,引領信息安全專業建設” (排名第八)。

6. 2012年88858cc永利官网優秀教學成果獎“堅持特色辦學思想,建設88858cc永利官网信息安全特色專業” (排名第三)。

7. 湖北省科技進步獎二等獎-基于磁盤的數據備份與恢複管理軟件(2007年,排名第4)

Baidu
sogou