删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

上海交通大学计算机科学与工程系导师教师师资介绍简介-谷大武教授

本站小编 Free考研考试/2021-01-02

谷 大武 教授
主页:[点击这里]
办公室电话:+86-21-3420-5416
办公地点:SEIEE-3-427
电子邮件:gu-dw@cs.sjtu.edu.cn
实验室: 密码学与计算机安全实验室


研究兴趣
教育背景
工作经验
教授课程
论文发表
项目资助
获奖信息
学术服务


- 密码理论与算法;

- 软件与系统安全;

- 硬件系统与嵌入式安全;

- 大数据与云计算安全隐私技术;

- 金融安全.


- 博士, 密码学, 西安电子科技大学, 1995-1998
- 硕士, 密码学, 西安电子科技大学, 1992-1995
- 学士, 应用数学, 西安电子科技大学, 1988-1992

2015至今: ****, 博士生导师, 国家二级教授, 上海交通大学计算机系
2014至今: 责任教授, 博士生导师, 上海交通大学电子信息与电气工程学院
2002至今: 教授, 博士生导师, 上海交通大学计算机系
2000-2002: 副教授, 上海交通大学计算机系
1998-2000: 博士后,上海交通大学电子学与通信流动站

2008: 高级研究****, 比利时鲁汶大学(KUL),ESAT-COSIC
2002: 访问****,日本东京大学, 生产技术研究所

2000-2009: 上海交通大学信息安全工程学院, 院长助理
2009-2011: 上海交通大学计算机系, 副主任
2011- : 上海交通大学人才办, 主任

- 可证明安全理论, 博士生专业课, 春季学期.
- 密码算法与协议, 硕士生专业基础课, 秋季学期.
- 密码与计算机安全讨论班, 博士生和硕士生, 每学期

1. Jeroen DELVAUX, Roel PEETERS, Dawu GU, Ingrid VERBAUWHEDE. ASurvey on Lightweight Entity Authentication with Strong PUFs. ACMComputing Surveys, accepted.


2. Zhiqiang Liu, Bing Sun, Qingju Wang, KeremVarici, Dawu Gu. Improved Zero-Correlation Linear Cryptanalysisof Reduced-round Camellia under Weak Keys. IET Information Security , accepted.


3. Ya Liu, Anren Yang, Zhiqiang Liu, Wei Li,Qingju Wang, Liang Song, Dawu Gu. Improved ImpossibleDifferential Attack on Reduced Version of Camellia with FL/FL-1 Functions. IET Information Security, accepted.


4. Shifeng Sun, Dawu Gu,Shengli Liu. Public Key Cryptosystems Secure against Memory Leakage Attacks. IETInformation Security, accepted.


5. Shi-Feng Sun, Dawu Gu, Zhengan Huang. Fully Secure Wicked Identity-BasedEncryption against Key Leakage Attacks. The Computer Journal,accepted.


6. Chen Lyu, Dawu Gu, Yunze Zeng, Prasant Mohapatra. PBA:Prediction-based Authentication for Vehicle-to-Vehicle Communications. IEEETrans. on Dependable and Secure Computing (TDSC), accepted.


7. Fan Zhang, Shize Guo, Xinjie Zhao, TaoWang, Jian Yang, Francois-Xavier Standaert, Dawu Gu. A Frameworkfor the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight BlockCiphers. IEEE Trans. on Information Forensics and Security (TIFS),accepted.


8. Wei Li, Wenwen Zhang, Dawu Gu, Yanqin Cao, Zhi Tao, Zhihong Zhou, Ya Liu, ZhiqiangLiu. Impossible Differential Fault Analysis on the LED LightweightCryptosystem in the Vehicular Ad-hoc Networks. IEEE Trans. on Dependable andSecure Computing (TDSC), 13(1):84-92, 2016.


9. Yikun Hu, Yuanyuan Zhang, Juanru Li and DawuGu. Cross-Architecture Binary Semantics Understanding via Similar CodeComparison. 23rd IEEE International Conference on Software Analysis,Evolution, and Reengineering (SANER 2016), Osaka, Japan, Mar 14-18,2016.


10. Yu Yu, Dawu Gu, Xiangxue Li,Jian Weng. (Almost) Optimal Constructions of UOWHFs from 1-to-1, RegularOne-way Functions and Beyond. CRYPTO 2015, pp.209-229,Santa Barbara, USA, August 16-20, 2015.


11. Wen Xu, Juanru Li, Junliang Shu, WenboYang, Tianyi Xie, YuanyuanZhang, Dawu Gu. From Collision ToExploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel. CCS2015, Denver, USA, October 12-16, 2015.


12. Jeroen Delvaux, Dawu Gu,Dries Schellekens, Ingrid Verbauwhede. Helper Data Algorithms for PUF-Based KeyGeneration: Overview and Analysis. IEEE Trans. on Computer-AidedDesign of Integrated Circuits and Systems (TCAD), 34(6):889-902,2015.


13. Yu Yu, Dawu Gu, Xiangxue Li,Jian Weng. The Randomized Iterate Revisited - Almost Linear Seed Length PRGsfrom A Broader Class of One-way Functions. TCC 2015,pp.7-35, Warsaw, Poland, March 23-25, 2015.


14. Weijia Wang, Yu Yu, Junrong Liu, ZhengGuo, Francois-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu.Evaluation and Improvement of Generic-Emulating DPA Attacks. CHES 2015,Saint Malo, France, September 13-14, 2015.


15. Hui Wang, YuanyuanZhang, Juanru Li, HuiLiu, Wenbo Yang, Bodong Li, Dawu Gu. Vulnerability Assessment ofOAuth Implementations in Android Applications. ACSAC 2015,Los Angeles, USA, December 7–11, 2015.


16. Wenbo Yang, YuanyuanZhang, Juanru Li,Bodong Li, Junliang Shu, Wenju Hu, Dawu Gu. AppSpear: BytecodeDecrypting and DEX Reassembling for Packed Android Malware. RAID 2015,Kyoto, Japan, November 2–4, 2015.


17. Junrong Liu, Yu Yu, Francois-XavierStandaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Xinjun Xie.Small Tweaks do Not Help: Differential Power Analysis of MILENAGEImplementations in 3G/4G USIM Cards. ESORICS 2015, Vienna,Austria, September 23-25, 2015.


18. Chen Lyu, Amit Pande, Xinlei Wang, JindanZhu, Dawu Gu, Prasant Mohapatra. CLIP: Continuous LocationIntegrity and Provenance for Mobile Phones. Proceedings of the 12th IEEEInternational Conference on Mobile Ad hoc and Sensor Systems (MASS2015). Dallas, USA, Oct 19-22, 2015.


19. Qingju Wang, Zhiqiang Liu, Deniz Toz,Kerem Varici, and Dawu Gu. Related-Key Rectangle Cryptanalysis ofRijndael-160 and Rijndael-192. IET Information Security,9(5): 266-276, 2015.


20. Zhiqiang Liu, Ya Liu, Qiangju Wang, DawuGu, Wei Li. MitM Fault Analysis on Word-oriented SPN Block Ciphers. Securityand Communication Networks, 8(4): 672-681, 2015.


21. Haihua Gu,Dawu Gu,WenluXie&Ray C.C.Cheung. Efficient Pairing Computation on HuffCurves. Cryptologia, 39(3): 270-275, 2015.


22. Jeroen Delvaux, Dawu Gu, DriesSchellekens, Ingrid Verbauwhede. Secure Lightweight Entity Authentication withStrong PUFs: Mission Impossible? CHES 2014, Springer BerlinHeidelberg, Busan, Korea, September 23-26, 2014.


23. Wenbo Yang, Juanru Li, Yuanyuan Zhang,Yong Li, Junliang Shu and Dawu Gu. APKLancet: Tumor Payload Diagnosis andPurification for Android Applications. ASIACCS 2014,Kyoto, Japan. June 2014.


24. Hui Liu, Yuanyuan Zhang, Hui Wang, WenboYang, Juanru Li and Dawu Gu. TagDroid: Hybrid SSL Certificate Verification inAndroid. ICICS2014, Hong Kong,China. December 16-17, 2014.


25. Xinjie Zhao, Shize Guo, Fan Zhang, TaoWang, Zhijie Shi, Dawu Gu. Algebraic Fault Analysis on GOST for Key Recoveryand Reverse Engineering. FDTC 2014, Busan, Korea,September 23, 2014.


26. Juanru Li, Yuanyuan Zhang, Wenbo Yang, JunliangShu, Dawu Gu. DIAS: AutomatedOnline Analysis for Android Applications. 14th IEEE International Conference onComputer and Information Technology (IEEE CIT 2014), Xi’an, 2014.9.11-2014.9.13.


27. Yong Li, Yuanyuan Zhang, Juanru Li, Dawu Gu. iCryptoTracer: DynamicAnalysis on Misuse of Cryptographic Functions in iOS Applications. 8thInternational Conference on Network and System Security (NSS 2014), Xi’an, 2014.10.15-2014.10.17.


28. Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu. Android App Protectionvia Interpretation Obfuscation. 12th IEEE International Conference onDependable, Autonomic and Secure Computing (DASC2014), Dalian,2014.8.24-2014.8.27.


29. 谷大武. Side Channel Attack on Crypto System ofSmart Card, 台湾第24届资讯安全会议, 台北, 2014.5.30-2014.5.31.


30. Gu Dawu, Jiang Xuxian, Xue Yibo, Zou Wei, Guo Li. PROTECTINGCOMMUNICATIONS INFRASTRUCTURE AGAINSTCYBER ATTACKS. China Communications,11(8):I-II, 2014.


31. 郁昱, 谷大武. 抗泄露可证明安全流密码研究. 密码学报, 1(2):134-145, 2014.


32. Guo Zheng, Gu Dawu, Yuan Kan, Liu Junrong, He Yuming. A Novel Methodfor Power Analysis Based on Combinational Logic in Block Cipher Circuit. ChineseJournal of Electronics, 23(1):151-156, 2014.


33. Liu Ya, Gu Dawu, Li Bailan, Qu Bo. Legitimate-reader-only attack onMIFARE Classic. Mathematical and Computer Modelling, 58(1-2):219-226, 2013.


34. Qu Bo, Gu Dawu, Guo Zheng, Liu Junrong. Differential power analysisof stream ciphers with LFSRs. Computers and Mathematics withApplications, 2013, 65(9):1291-1299.


35. 谷大武. 智能卡芯片中的密码系统--攻击和防护技术概况. 27次中国科技论坛--智能卡芯片安全技术和产业发展论坛, 北京, 2013.8.28-2013.8.28.


36. Shifeng Sun, Dawu Gu, Shengli Liu. Efficient Leakage-ResilientIdentity-Based Encryption with CCA-Security. 6th International Conference onPairing-Based Cryptography (Pairing2013), Beijing, 2013.12.22-2013.12.24.


37. Ruoxu Zhao, Dawu Gu, Juanru Li, Yuanyuan Zhang. Automatic Detection andAnalysis of Encrypted Messages in Malware. 9th China International Conferenceon Information Security and Cryptology (Inscrypt 2013), Guang Zhou, 2013.11.27-2013.11.30.


38. Chen Lyu, Dawu Gu, Xiaomei Zhang, Shifeng Sun, Yinqi Tang. Efficient,Fast and Scalable Authentication for VANETs. Proceedings of IEEE WirelessCommunications and Networking Conference (WCNC2013), Shanghai, 2013.4.7-2013.4.10.


39. Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen, Wei Li. NewObservations on Impossible Differential Cryptanalysis of Reduced-Round Camellia.19th International Workshop on Fast Software Encryption (FSE 2012), CCF-B类, Washington DC, March 19-21, 2012.


40. Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li. Improved Results onImpossible Differential Cryptanalysis of Reduced-Round Camellia-192/256. Journalof Systems and Software (JSS), 85(11):2451-2458, 2012.


41. Zhao Jianjie, Gu Dawu. Provably secure three-party password-basedauthenticated key exchange protocol. Information Sciences, 184(1):310-323,2012.


42. Zhiqiang Liu, Dawu Gu, Ya Liu, Wei Li. Linear Fault Analysis of BlockCiphers. 10th International Conference on Applied Cryptography and NetworkSecurity (ACNS 2012), 241-256, Singapore, June 26-29, 2012.


43. Ning Ding, Dawu Gu. On Constant-Round Precise Zero-Knowledge. 14thInternational Conference on Information and Communications Security (ICICS2012), Hong Kong, 2012.10.29-2012.10.31.


44. Ruoxu Zhao, Dawu Gu, Juanru Li, Liu Hui. Detecting Encryption Functionsvia Process Emulation and IL-based Program Analysis. 14th InternationalConference on Information and Communications Security (ICICS 2012), HongKong, 2012.10.29-2012.10.31.


45. Qingju Wang, Dawu Gu, Vincent Rijmen, Ya Liu, Jiazhe Chen, AndreyBogdanov. Improved Impossible Differential Attacks on Large-Block Rijndael. 15thAnnual International Conference on Information Security and Cryptology (ICISC2012), Seoul, 2012.11.28-2012.11.30.


46. Dawu Gu, Juanru Li, Sheng Li, Zhouqian Ma, Zheng Guo, JunrongLiu. Differential fault analysis on lightweight block ciphers with statisticalcryptanalysis techniques. 2012 Workshop on Fault Diagnosis and Tolerance inCryptography (FDTC 2012), 27-33, Leuven, 2012.9.9-2012.9.9


47. Yinqi Tang, Dawu Gu, Ning Ding, Haining Lu. Phrase Search over EncryptedData with Symmetric Encryption Scheme. 32nd International Conference onDistributed Computing Systems Workshops(ICDCS-w2012), Macau, 2012.6.18-2012.6.21.


48. Juanru Li, Dawu Gu, Yuhao Luo. Android Malware Forensics:Reconstruction of Malicious Events. 32nd International Conference onDistributed Computing Systems Workshops(ICDCS-w2012), Macau, 2012.6.18-2012.6.21.


49. Haining Lu , Dawu Gu, Chongying Jin, Yinqi Tang. Reducing Extra Storagein Searchable Symmetric Encryption Scheme. The 2014 IEEE InternationalConference on Cloud Computing Technology and Science (CloudCom 2012), Taipei,2012.12.3-2012.12.6.


50. Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li. Impossible DifferentialAttacks on Reduced-Round LBlock. 8th International Conference on InformationSecurity Practice and Experience (ISPEC2012), 97-108, Hangzhou,2012.4.9-2012.4.12.


51. Zhao Jianjie, Gu Dawu, Zhang Lei. Security analysis and enhancement forthree-party password-based authenticated key exchange protocol. Securityand Communication Networks(SCN), 5(3):273-278, 2012.



(1) 国家自然科学基金面上项目(**):认证加密算法的安全性分析研究,2015.1-2018.12
(2) 国家重点基础研究发展计划(973)课题(2013CB338004):旁路攻击与防护理论与方法,2015.1-2017.8

(3) 教育部-中国移动科研基金项目(MCM**):新型物联网认证体系研发,2015.12-2016.11

(4) 上海市产学研合作计划项目(沪CXY-2013-35):专用安全分析设备与高安全芯片技术联合攻关及产业化,2013.1-2016.12

(5) 上海市科委“科技创新行动计划”(**):实用新型轻量级分组密码的关键技术与工程验证,2014.7-2016.6


1. 入选教育部********(2014)、 上海领军人才(2015)、上海市优秀学术带头人计划(2016)、教育部新世纪人才计划(2005)、上海市科技启明星计划(2002)
2. 荣获上海市科技进步一等奖(2015,排名第1)、国防科学技术奖二等奖(2001,排名第6)、 国家863计划先进个人(2001)
3. 指导的研究生战队0ops获国际Code Gate信息安全竞赛冠军(2015)、国际Hack.lu CTF信息安全竞赛亚军(2014);LoCCS获首届全国密码技术竞赛一等奖(2015)

- 中国密码学会(CACR)理事、中国计算机学会(CCF)上海分部副主席、上海市计算机学会理事
- CACR密码芯片专委会副主任、CACR密码算法专委会委员、CCF信息保密专委会常委、中国保密协会隐私保护专委会委员
- 密码学报、China Communications、信息网络安全、信息安全研究等杂志编委






相关话题/计算机科学 上海交通大学