删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

中国科学院大学研究生导师教师师资介绍简介-陈恺

本站小编 Free考研考试/2020-04-28

基本信息






陈恺,中国科学院信息工程研究所
研究员/教授,博导
信息安全国家重点实验室,副主任
《Cybersecurity》编辑部,主任
国家“”青年拔尖人才、北京市“”基金获得者、北京智源青年科学家、北京市“科技新星”
电子邮件:chenkai AT iie.ac.cn
通信地址:北京市海淀区杏石口路65号C区2号楼 中国科学院信息工程研究所
邮政编码:100195
主页:http://www.kaichen.org


































招生信息现有助理研究员岗位(正式事业编制)、博士后、博士、硕士、实习生职位,欢迎感兴趣的同学联系。
招生专业083900-网络空间安全

研究方向软件与系统安全,人工智能安全,智能终端安全,隐私保护


教育背景 2004-09--2009-12 中国科学院研究生院 博士
2000-09--2004-07 南京大学 本科


工作经历2012.01--至今 中国科学院信息工程研究所
2014.10--2015.08美国印第安纳大学
2012.07--2014.09 美国宾州州立大学
2010.01--2011.12 中国科学院软件研究所

专利与奖励
专利成果 (1) 一种虚拟化网络环境构建方法和系统,发明,2011,第4作者,专利号:1.X
(2) 一种预测软件漏洞发布数量的方法和系统,发明,2009,第1作者,专利号:7.X
(3) 一种二进制程序漏洞自动化定位方法,发明,2013,第1作者,专利号:3.8
(4) 以太网驱动级底层过滤方法和系统,发明,2008,第1作者,专利号:ZL 7.5
(5) 一种攻击时漏洞检测方法及其系统,发明,2011,第1作者,专利号:ZL 0.5
(6) 一种识别业务系统中关键攻击路径的方法,发明,2011,第4作者,专利号:71
(7) 识别脆弱性利用安全威胁并确定相关攻击路径的方法,发明,2012,第4作者,专利号:5.0
(8) 一种手机应用软件自动生成水印的方法和系统,发明,2014,第1作者,专利号:20**
(9) 一种基于树优化的程序依赖关系分析方法及系统,发明,2014,第1作者,专利号:20**
(10) 基于程序依赖图的Android仿冒应用检测方法,发明,2015,第1作者,专利号:4
(11) 一种内存变量分布动态发现方法,发明,2015,第1作者,专利号:20**
(12) 一种Android软件用户登录界面安全性检测方法,发明,2015,第2作者,专利号:5


出版信息
发表论文90余篇,部分论文如下






[USENIX Security] Peiyuan Zong, Tao Lv, Dawei Wang, Zizhuang Deng, Ruigang Liang, Kai Chen, "FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning", USENIX Security 2020
[USENIX Security] Yuxuan Chen, Xuejing Yuan*(co-first author), Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, XiaoFeng Wang, "Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices", USENIX Security 2020
[CCS] Yue Zhao, Hong Zhu, Ruigang Liang, Qintao Shen, Shengzhi Zhang, Kai Chen, "Seeing isn’t Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors", CCS 2019
[USENIX Security] Y. Chen, L. Xing, Y. Qin, X. Liao, X. Wang, K. Chen, W. Zou, "Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis", USENIX Security 2019
[S&P] Yi Chen, Mingming Zha, Nan Zhang, Dandan Xu, Qianqian Zhao, Xuan Feng, Kan Yuan, Fnu Suya, Yuan Tian, Kai Chen, XiaoFeng Wang, Wei Zou, "Demystifying Hidden Privacy Settings in Mobile Apps", IEEE S&P 2019
[DSN] Jiaqi Peng, Feng Li, Bingchang Liu, Lili Xu, Binghong Liu, Kai Chen and Wei Huo, "1dVul: Discovering 1-day Vulnerabilities through Binary Patches", DSN 2019
[EuroS&P] Ke Xu, Yingjiu Li, Robert H. Deng, Kai Chen, Jiayun Xu, "DroidEvolver: Self-Evolving and Scalable Android Malware Detection System", EuroS&P 2019
[EuroS&P] Baojun Liu, Zhou Li, Peiyuan Zong, Chaoyi Lu, Haixin Duan, Ying Liu, Sumayah Alrwais, Xiaofeng Wang, Shuang Hao, Yaoqi Jia, Yiming Zhang, Kai Chen, Zaifeng Zhang, "TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-scale DNS Analysis", EuroS&P 2019
[USENIX Security] Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A Gunter, "CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition", USENIX Security, 2018
[TMC] Kai Chen, Yingjun Zhang, Peng Liu, "Leveraging Information Asymmetry to Transform Android Apps into Self-Defending Code against Repackaging Attacks", IEEE Transactions on Mobile Computing (TMC), 2018,(Accepted)
[EuroS&P] Ke Xu, Yingjiu Li, Robert H. Deng, Kai Chen, "DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks", 3rd IEEE European Symposium on Security and Privacy (EuroS&P), London, UK, April 24-26, 2018 (Accepted)
[TIFS] Jing Chen, Chiheng Wang, Ziming Zhao, Kai Chen, Ruiying Du, and Gail-Joon Ahn, "Uncovering the Face of Android Ransomware: Characterization and Real-time Detection", IEEE Transactions on Information Forensics and Security (TIFS), 2018, (Accepted)
[TIFS] Ming Fan, Jun Liu, Xiapu Luo, Kai Chen, Zhenzhou Tian, Qinghua Zheng, Ting Liu, "Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis" , IEEE Transactions on Information Forensics and Security (TIFS), 2018,(Accepted)
[COSE] Chen Zhong, Tao Lin, Peng Liu, John Yen, and Kai Chen, "A Cyber Security Data Triage Operation Retrieval System", Computers & Security, 2018,(Accepted)
[CCS] Yi Chen, Wei You, Peter Yeonjoon Lee, Kai Chen, XiaoFeng Wang, Wei Zou, "Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution", In Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS), 2017. (Accepted)

[CCS] Wei You, Peiyuan Zong, Kai Chen, XiaoFeng Wang, Xiaojing Liao, Pan Bian, Bin Liang, "SemFuzz: Semantics-based Automatic PoC Generation", In Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS), 2017. (Accepted)
[CCS] Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, XiaoFeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han, "Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews", In Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS), 2017. (Accepted)
[RAID] Kai Chen, Tongxin Li, Bin Ma, Peng Wang, XiaoFeng Wang, Peiyuan Zong, "Filtering for Malice through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level", RAID 2017 (Accepted)
[DSN] Yeonjoon Lee, Tongxin Li, Nan Zhang, Soteris Demetriou, Mingming Zha, XiaoFeng Wang, Kai Chen, Xiaoyong Zhou, Xinhui Han and Michael Grace, "Ghost Installer in the Shadow: Security Analysis of App Installation on Android", DSN 2017. (Accepted)
[MobiSys] Lannan Luo*, Qiang Zeng*, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, and Peng Liu. ( *Co-first authors), "System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation," ACM MobiSys 2017. (Accepted)
[MobiSys] Xing Liu, Tianyu Chen, Feng Qian, Zhixiu Guo, Felix Xiaozhu Lin, Xiaofeng Wang, and Kai Chen, "Characterizing Smartwatch Usage in The Wild", ACM MobiSys 2017. (Accepted)
[S&P] Kai Chen, Xueqiang Wang, Yi Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Bin Ma, Aohui Wang, Yingjun Zhang, Wei Zou, "Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS". Accepted by the 36th IEEE Symposium on Security and Privacy (Oakland)
[TRE] Kai Chen, Yingjun Zhang and Peng Liu, "Dynamically Discovering Likely Memory Layout to Perform Accurate Fuzzing", IEEE Transactions on Reliability, 2016, accepted, to appear
[ISSRE] Ming Fan, Jun Liu, Xiapu Luo, Kai Chen, Tianyi Chen, Zhenzhou Tian, Xiaodong Zhang and Ting Liu, Frequent Subgraph based Familial Classification of Android Malware, Proceedings of 27th International Symposium on Software Reliability Engineering (ISSRE), Ottawa, Canada, Oct., 2016. (Best Research Paper Award)
[CCS] Heqing Huang, Sencun Zhu, Kai Chen, and Peng Liu, "From System Service Freezing to System Server Shutdown in Android: All You Need Is a Loop in an Application." To appear in the 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, USA. October 12-16, 2015
[CCS] Yousra Aafer, Nan Zhang, Zhongwen Zhang, Xiao Zhang, Kai Chen, XiaoFeng Wang, Xiaoyong Zhou, Wenliang Du, and Michael Grace. "Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References". To appear in the 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, USA. October 12-16, 2015
[CCS] Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang, Kai Chen, Shi-min Hu, Xinhui Han. "Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS X and iOS". To appear in the 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, USA. October 12-16, 2015
[CCS] Yangyi Chen, Tongxin Li, XiaoFeng Wang, Kai Chen, Xinhui Han, "Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations", To appear in the 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, USA. October 12-16, 2015
[USENIX Security] Kai Chen, Peng Wang, Yeonjoon Lee, Xiaofeng Wang, Nan Zhang, Heqing Huang, Wei Zou, Peng Liu, "Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale," USENIX Security 2015
[SESA] Kai Chen and Jun Shao. "Preface to special issue on miscellaneous emerging security problems", EAI Endorsed Transactions on Security and Safety, EAI, 2015, 15
[ASIACCS] Heqing Huang, Kai Chen, Chuangang Ren, Peng Liu, Sencun Zhu and Dinghao Wu, “Towards Discovering and Understanding the Unexpected Hazards in Tailoring Antivirus Software for Android,” ACM ASIACCS 2015, full paper
[ICSE] Kai Chen, Peng Liu, Yingjun Zhang, “Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Markets”, ICSE 2014, regular paper, June 2014.
[ASE] Chuangang Ren, Kai Chen *(co-first author), Peng Liu, "Droidmarking: Resilient Software Watermarking for Impeding Android Application Repackaging," ASE 2014, Sept. 15-19, Sweden, 2014.
[SERE] ZHANG Yingjun, CHEN Kai, "AppMark: A Picture-based Watermark for Android Apps", SERE 2014
[JOE] CHEN Kai, ZHANG Yingjun, "Statically-Directed Dynamic Taint Analysis", Journal of Electronics, 2014
[SIM] Mingyi Zhao, Jens Grossklags and Kai Chen, "An Exploratory Study of White Hat Behaviors in a Web Vulnerability Disclosure Program", ACM CCS Workshop on Security Information Workers, 2014.
[SLSS] Yingjun Zhang, Kezhen Huang, Yuling Liu, Kai Chen, Liang Huang, Yifeng Lian, "Timing-based Clone Detection on Android Markets”, SLSS 2014
[SLSS] Heqing Huang, Kai Chen, Peng Liu, Sencun Zhu and Dinghao Wu, "Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms", SLSS 2014
[JOS] 黄亮, 冯登国, 连一峰, 陈恺, 张颖君, 刘玉岭. "一种基于多属性决策的DDoS攻击防护措施遴选方法". 软件学报, 2014.
[SERE] CHEN Kai, ZHANG Yingjun, LIAN Yifeng, "Vulnerability-based Backdoors: Threats From Two-steps Trojans", SERE 2013
[ISPEC] LIU Yuling, FENG Dengguo, LIAN Yifeng, CHEN Kai and ZHANG Yingjun, Optimal Defense Strategies for DDoS defender using Bayesian Game Model, ISPEC 2013
[ISPEC] ZHANG Yingjun, CHEN Kai, LIAN Yifeng, "VulLocator: Automatically Locating Vulnerable Code in Binary Programs", ISPEC 2013
[JCRAD] 刘玉岭、冯登国、连一峰、陈恺、吴迪,“基于时空维度分析的网络安全态势预测方法”,计算机研究与发展
[JCRAD] 黄亮, 冯登国, 连一峰, 陈恺. 基于神经网络的DDoS防护绩效评估[J],计算机研究与发展,2013,50(10):2100-2108
[CJC] CHEN Kai,SU Purui,FENG Dengguo,"Dynamic overflow vulnerability detection method based on finite CSP", 计算机学报 ,2012
[JOS] 吴迪,冯登国,连一峰,陈恺, "一种给定脆弱性环境下的安全措施效用评估模型", 软件学报,2012
[JCRAD] 吴迪,冯登国,连一峰,陈恺,一种基于攻击图的安全威胁识别和分析方法,计算机研究与发展,2012
[SCICHINA] CHEN Kai, FENG Dengguo, SU Purui, ZHANG Yingjun, "Black-box testing based on colorful taint analysis". Sci China Inf Sci, 2012, 55: 171–183, doi: 10.1007/s11432-011-4291-y
[ICISC] CHEN Kai, LIAN Yifeng、Zhang Yingjun,"AutoDunt: Dynamic Latency Dependence Analysis for Accurate Detection of Zero Day Vulnerabilities", ICISC 2011, Springer
[SCICHINA] 陈恺,冯登国,苏璞睿,张颖君,"基于彩色污点传播的黑盒测试方法", 中国科学, 2011, 41(5), 526-540
[WISA] ZHANG Yingjun, ZHANG Yang, CHEN Kai, "A Map-layer-based Access Control Model", WISA 2011, Springer, LNCS
[JCRAD] 聂楚江、赵险峰、陈恺、韩正清,"一种微观漏洞数量预测模型",计算机研究与发展,2011,48(7), 1279-1287
[JOS] CHEN Kai,FENG Dengguo , SU Purui,NIE Chujiang, ZHANG Xiaofei, "Multi-Cycle Vulnerability Discovery Model for Prediction",软件学报,2010, 21(9), 2367-2375
[CJC] CHEN Kai,SU Purui,FENG Dengguo," Exploring multiple execution paths based on dynamic lazy analysis ",计算机学报,2010, 33(3), 493-503
[ICICS] CHEN Kai、LIAN Yifeng、Zhang Yingjun,"Automatically Generating Patch in Binary Programs Using Attribute-based Taint Analysis", M. Soriano, S. Qing, and J. Lpez (Eds.): ICICS 2010, LNCS 6476, pp. 367--382. Springer, Heidelberg (2010)
[JOC] 张颖君、冯登国、陈恺,"面向空间索引树的授权机制", 通信学报,2010, 31(9),64-73
[SEPCOM] CHEN Kai, SU Purui, ZHANG Yingjun, FENG Dengguo, "SEPCOM: Customizable Zero Copy Model," Proceedings of the Valuetools, 2007.






























科研活动
科研项目(1) 基于矿脉理论的软件安全漏洞测评方法研究,主持,国家自然科学基金,2012-01--2014-12
(2) 基于海量软件片段比对的恶意代码检测方法研究,主持,国家自然科学基金,2016-01--2018-12
(3) 基于漏洞数据集的漏洞特征库分析与预测方法研究,主持,国家自然科学基金(重点项目),2019-01--2022-12


相关话题/中国科学院大学 师资

  • 领限时大额优惠券,享本站正版考研考试资料!
    大额优惠券
    优惠券领取后72小时内有效,10万种最新考研考试考证类电子打印资料任你选。涵盖全国500余所院校考研专业课、200多种职业资格考试、1100多种经典教材,产品类型包含电子书、题库、全套资料以及视频,无论您是考研复习、考证刷题,还是考前冲刺等,不同类型的产品可满足您学习上的不同需求。 ...
    本站小编 Free壹佰分学习网 2022-09-19
  • 中国科学院大学研究生导师教师师资介绍简介-陈凯先
    基本信息陈凯先男博导中国科学院上海药物研究所电子邮件:kxchen@simm.ac.cn通信地址:上海市浦东新区张江祖冲之路555号邮政编码:201203研究领域招生信息招生专业1007Z1-药物设计学招生方向计算机药物辅助设计教育背景1985-03--1988-06法国巴黎生物物理化学研究所访问1978-09--1985-02中国科学院上海药物研究所获硕士、博士学位1962-09--1967-0 ...
    本站小编 Free考研考试 2020-04-28
  • 中国科学院大学研究生导师教师师资介绍简介-陈开宁
    基本信息陈开宁男汉族硕导南京地理与湖泊研究所电子邮件:knchen@niglas.ac.cn联系电话:手机号码:**通信地址:江苏南京市北京东路73号邮政编码:210008研究领域湖泊生态学、水生植物生态学、湿地科学、环境科学招生信息招生专业071004-水生生物学083001-环境科学招生方向湖泊生物与生态湖泊生态环境工程教育背景学历--研究生学位--博士出国学习工作工作经历工作简历1984年至 ...
    本站小编 Free考研考试 2020-04-28
  • 中国科学院大学研究生导师教师师资介绍简介-陈俊平
    基本信息陈俊平男博导上海天文台电子邮件:Junping.chen@shao.ac.cn通信地址:上海市南丹路80号团组网址:www.shao.ac.cn/shao_gnss_ac研究领域招生信息招生专业070402-天体测量与天体力学081601-大地测量学与测量工程070821-地球与空间探测技术招生方向GPS/GLONASS/GALILEO/北斗的融合实时高精度GNSS研究多模导航以及精密定位 ...
    本站小编 Free考研考试 2020-04-28
  • 中国科学院大学研究生导师教师师资介绍简介-陈俊锋
    基本信息陈俊锋男中国科学院上海硅酸盐研究所电子邮件:jfchen@mail.sic.ac.cn通信地址:上海市嘉定区和硕路588号邮政编码:201899研究领域招生信息招生专业080502-材料学080501-材料物理与化学080502-材料学招生方向先进无机闪烁晶体材料制备先进无机闪烁晶体材料制备与元器件应用基于闪烁效应的辐射探测器教育背景2010-09--2015-01中国科学院大学工学博士2 ...
    本站小编 Free考研考试 2020-04-28
  • 中国科学院大学研究生导师教师师资介绍简介-陈俊
    基本信息陈俊男硕导中国科学院高能物理研究所电子邮件:chenjun@ihep.ac.cn通信地址:北京市石景山区玉泉路19号(乙)中国科学院高能物理研究所邮政编码:100049部门/实验室:多学科中心研究领域1Design,ConstructionandCharacterizationofStimuli(redoxpotential,pH,light)ResponsivePolym ...
    本站小编 Free考研考试 2020-04-28
  • 中国科学院大学研究生导师教师师资介绍简介-陈俊
    基本信息陈俊男硕导中国科学院深海科学与工程研究所电子邮件:chenj@idsse.ac.cn通信地址:海南省三亚市吉阳区鹿回头路28号邮政编码:部门/实验室:深海工程技术部研究领域招生信息招生专业080202-机械电子工程招生方向深海装备总体技术,深海探测技术教育背景2010-09--2018-06中国科学院沈阳自动化研究所工学博士2006-09--2010-06华中科技大学工学学士、文学学士(辅 ...
    本站小编 Free考研考试 2020-04-28
  • 中国科学院大学研究生导师教师师资介绍简介-陈君
    基本信息陈君女硕导中国科学院声学研究所电子邮件:chenj@dsp.ac.cn通信地址:北京市海淀区北四环西路21号邮政编码:部门/实验室:声学所研究领域招生信息招生专业081002-信号与信息处理招生方向宽带网络通信教育背景2001-04--2004-06中国科学院声学研究所博士研究生1998-09--2001-04浙江大学电气工程学院硕士研究生1994-09--1998-06浙江大学电气工程学 ...
    本站小编 Free考研考试 2020-04-28
  • 中国科学院大学研究生导师教师师资介绍简介-陈军
    基本信息陈军男博导中国科学院动物研究所电子邮件:chenj@ioz.ac.cn通信地址:北京市朝阳区北辰西路1号院5号邮政编码:100101研究领域招生信息招生专业071002-动物学招生方向蜱螨学教育背景1994-09--1997-07中国科学院动物研究所博士1991-09--1994-07陕西师范大学硕士1987-09--1991-07陕西师范大学学士学历学位工作经历工作简历2010-10~现 ...
    本站小编 Free考研考试 2020-04-28
  • 中国科学院大学研究生导师教师师资介绍简介-陈隽
    基本信息陈隽女博导中国科学院水生生物研究所电子邮件:chenjun@ihb.ac.cn通信地址:湖北武汉武昌区东湖南路7号邮政编码:研究领域淡水生态毒理学招生信息招生专业071004-水生生物学招生方向淡水生态学,生态毒理学教育背景学历--研究生学位--博士工作经历2011.11--今:中国科学院水生生物研究所,研究员,2013年任博士生导师2010.01--2010.12:英国阿伯丁大学,中国科 ...
    本站小编 Free考研考试 2020-04-28
  • 中国科学院大学研究生导师教师师资介绍简介-陈娟
    基本信息陈娟女硕导中国科学院水土保持与生态环境研究中心电子邮件:chenjuan@nwsuaf.edu.cn通信地址:陕西省杨凌区西农路26号邮政编码:部门/实验室:研究生部研究领域植物营养生理和逆境生理植物-微生物互作的作用机制信号分子在植物的生理功能研究招生信息欢迎各位有志青年一起学习探讨和交流2017年林雪媛2018年张卫勤2019年张亚梅招生专业090301-土壤学071300-生态学招生 ...
    本站小编 Free考研考试 2020-04-28