删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

中国科学院大学研究生导师简介-陈恺

中国科学院大学 免费考研网/2016-05-09

基本信息
陈恺 男 信息工程研究所
研究员,博士
电子邮件:chenkai AT iie.ac.cn
通信地址:北京市海淀区闵庄路甲89号 中国科学院信息工程研究所
邮政编码:100195

主页: http://www.kaichen.org
招生信息现有助理研究员岗位(正式事业编制)、博士后、博士、硕士、实习生职位,欢迎感兴趣的同学联系。

招生专业 信息安全



招生方向 软件安全,移动智能终端,安全测评,隐私保护


教育背景 2004-09--2009-12 中国科学院研究生院 博士
2000-09--2004-07 南京大学 本科

工作经历2012.01--至今 中国科学院信息工程研究所
2014.10--2015.08 美国印第安纳大学
2012.07--2014.09 美国宾州州立大学
2010.01--2011.12 中国科学院软件研究所
专利与奖励

专利成果 (1) 一种虚拟化网络环境构建方法和系统,发明,2011,第4作者,专利号:**1.X
(2) 一种预测软件漏洞发布数量的方法和系统,发明,2009,第1作者,专利号:**7.X
(3) 一种二进制程序漏洞自动化定位方法,发明,2013,第1作者,专利号:**3.8
(4) 以太网驱动级底层过滤方法和系统,发明,2008,第1作者,专利号:ZL **7.5
(5) 一种攻击时漏洞检测方法及其系统,发明,2011,第1作者,专利号:ZL **0.5
(6) 一种识别业务系统中关键攻击路径的方法,发明,2011,第4作者,专利号:**71
(7) 识别脆弱性利用安全威胁并确定相关攻击路径的方法,发明,2012,第4作者,专利号:**5.0
(8) 一种手机应用软件自动生成水印的方法和系统,发明,2014,第1作者,专利号:**82
(9) 一种基于树优化的程序依赖关系分析方法及系统,发明,2014,第1作者,专利号:**12
(10) 基于程序依赖图的Android仿冒应用检测方法,发明,2015,第1作者,专利号:**4
(11) 一种内存变量分布动态发现方法,发明,2015,第1作者,专利号:**55
(12) 一种Android软件用户登录界面安全性检测方法,发明,2015,第2作者,专利号:**5

出版信息

发表论文40余篇,部分论文如下[S&P] Kai Chen, Xueqiang Wang, Yi Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Bin Ma, Aohui Wang, Yingjun Zhang, Wei Zou, "Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS". Accepted by the 36th IEEE Symposium on Security and Privacy (Oakland)
[TRE] Kai Chen, Yingjun Zhang and Peng Liu, "Dynamically Discovering Likely Memory Layout to Perform Accurate Fuzzing", IEEE Transactions on Reliability, 2016, accepted, to appear
[CCS] HeqingHuang, Sencun Zhu, Kai Chen, and Peng Liu, "From System Service Freezing to System Server Shutdown in Android: All You Need Is a Loop in an Application." To appear in the 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, USA. October 12-16, 2015
[CCS] Yousra Aafer, Nan Zhang, Zhongwen Zhang, Xiao Zhang, Kai Chen, XiaoFeng Wang, Xiaoyong Zhou, Wenliang Du, and Michael Grace. "Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References". To appear in the 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, USA. October 12-16, 2015
[CCS] Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang, Kai Chen, Shi-min Hu, Xinhui Han. "Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS X and iOS". To appear in the 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, USA. October 12-16, 2015
[CCS] Yangyi Chen, Tongxin Li, XiaoFeng Wang, Kai Chen, Xinhui Han, "Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations", To appear in the 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, USA. October 12-16, 2015
[USENIX Security] Kai Chen, Peng Wang, Yeonjoon Lee, Xiaofeng Wang, Nan Zhang, Heqing Huang, Wei Zou, Peng Liu, "Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale," USENIX Security 2015
[SESA] Kai Chen and Jun Shao. "Preface to special issue on miscellaneous emerging security problems", EAI Endorsed Transactions on Security and Safety, EAI, 2015, 15
[ASIACCS] Heqing Huang, Kai Chen, Chuangang Ren, Peng Liu, Sencun Zhu and Dinghao Wu, “Towards Discovering and Understanding the Unexpected Hazards in Tailoring Antivirus Software for Android,” ACM ASIACCS 2015, full paper
[ICSE] Kai Chen, Peng Liu, Yingjun Zhang, “Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Markets”, ICSE 2014, regular paper, June 2014.
[ASE] Chuangang Ren, Kai Chen *(co-first author), Peng Liu, "Droidmarking: Resilient Software Watermarking for Impeding Android Application Repackaging," ASE 2014, Sept. 15-19, Sweden, 2014.
[SERE] ZHANG Yingjun, CHEN Kai, "AppMark: A Picture-based Watermark for Android Apps", SERE 2014
[JOE] CHEN Kai, ZHANG Yingjun, "Statically-Directed Dynamic Taint Analysis", Journal of Electronics, 2014
[SIM] Mingyi Zhao, Jens Grossklags and Kai Chen, "An Exploratory Study of White Hat Behaviors in a Web Vulnerability Disclosure Program", ACM CCS Workshop on Security Information Workers, 2014.
[SLSS] Yingjun Zhang, Kezhen Huang, Yuling Liu, Kai Chen, Liang Huang, Yifeng Lian, "Timing-based Clone Detection on Android Markets”, SLSS 2014
[SLSS] Heqing Huang, Kai Chen, Peng Liu, Sencun Zhu and Dinghao Wu, "Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms", SLSS 2014
[JOS] 黄亮, 冯登国, 连一峰, 陈恺, 张颖君, 刘玉岭. "一种基于多属性决策的DDoS攻击防护措施遴选方法". 软件学报, 2014. accepted
[SERE] CHEN Kai, ZHANG Yingjun, LIAN Yifeng, "Vulnerability-based Backdoors: Threats From Two-steps Trojans", SERE 2013
[ISPEC] LIU Yuling, FENG Dengguo, LIAN Yifeng, CHEN Kai and ZHANG Yingjun, Optimal Defense Strategies for DDoS defender using Bayesian Game Model, ISPEC 2013
[ISPEC] ZHANG Yingjun, CHEN Kai, LIAN Yifeng, "VulLocator: Automatically Locating Vulnerable Code in Binary Programs", ISPEC 2013
[JCRAD] 刘玉岭、冯登国、连一峰、陈恺、吴迪,“基于时空维度分析的网络安全态势预测方法”,计算机研究与发展
[JCRAD] 黄亮, 冯登国, 连一峰, 陈恺. 基于神经网络的DDoS防护绩效评估[J],计算机研究与发展,2013,50(10):2100-2108
[CJC] CHEN Kai,SU Purui,FENG Dengguo,"Dynamic overflow vulnerability detection method based on finite CSP", 计算机学报 ,2012
[JOS] 吴迪,冯登国,连一峰,陈恺, "一种给定脆弱性环境下的安全措施效用评估模型", 软件学报,2012
[JCRAD] 吴迪,冯登国,连一峰,陈恺,一种基于攻击图的安全威胁识别和分析方法,计算机研究与发展,2012
[SCICHINA] CHEN Kai, FENG Dengguo, SU Purui, ZHANG Yingjun, "Black-box testing based on colorful taint analysis". Sci China Inf Sci, 2012, 55: 171–183, doi: 10.1007/s11432-011-4291-y
[ICISC] CHEN Kai, LIAN Yifeng、Zhang Yingjun,"AutoDunt: Dynamic Latency Dependence Analysis for Accurate Detection of Zero Day Vulnerabilities", ICISC 2011, Springer
[SCICHINA] 陈恺,冯登国,苏璞睿,张颖君,"基于彩色污点传播的黑盒测试方法", 中国科学, 2011, 41(5), 526-540
[WISA] ZHANG Yingjun, ZHANG Yang, CHEN Kai, "A Map-layer-based Access Control Model", WISA 2011, Springer, LNCS
[JCRAD] 聂楚江、赵险峰、陈恺、韩正清,"一种微观漏洞数量预测模型",计算机研究与发展,2011,48(7), 1279-1287
[JOS] CHEN Kai,FENG Dengguo , SU Purui,NIE Chujiang, ZHANG Xiaofei, "Multi-Cycle Vulnerability Discovery Model for Prediction",软件学报,2010, 21(9), 2367-2375。
[CJC] CHEN Kai,SU Purui,FENG Dengguo," Exploring multiple execution paths based on dynamic lazy analysis ",计算机学报,2010, 33(3), 493-503
[ICICS] CHEN Kai、LIAN Yifeng、Zhang Yingjun,"Automatically Generating Patch in Binary Programs Using Attribute-based Taint Analysis", M. Soriano, S. Qing, and J. Lpez (Eds.): ICICS 2010, LNCS 6476, pp. 367--382. Springer, Heidelberg (2010)
[JOC] 张颖君、冯登国、陈恺,"面向空间索引树的授权机制", 通信学报,2010, 31(9),64-73
[SEPCOM] CHEN Kai, SU Purui, ZHANG Yingjun, FENG Dengguo, "SEPCOM: Customizable Zero Copy Model," Proceedings of the Valuetools, 2007.
科研活动

会议报告(1) Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations,2015-10,USENIX Security 2015
(2) Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale,2015-08,ACM CCS 2015
(3) Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Markets,2014-06,ICSE 2014
(4) Vulnerability-based Backdoors: Threats From Two-steps Trojans,2013-06,SERE 2013
(5) AutoDunt: Dynamic Latency Dependence Analysis for Accurate Detection of Zero Day Vulnerabilities,2011-11,ICISC 2011
(6) Automatically Generating Patch in Binary Programs Using Attribute-based Taint Analysis,2010-12,ICICS 2010
科研项目(1) 基于矿脉理论的软件安全漏洞测评方法研究,主持,国家自然科学基金,2012-01--2014-12
(2) 基于海量软件片段比对的恶意代码检测方法研究,主持,国家自然科学基金,2016-01--2018-12

相关话题/软件 系统 计算机 信息 中国科学院