删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

西安电子科技大学网络与信息安全学院导师教师师资介绍简介-孙聪

本站小编 Free考研考试/2021-07-10


基本信息
孙聪 副教授,博士生导师
学科:网络空间安全/电子信息
工作单位:网络与信息安全学院;陕西省网络与系统安全重点实验室

联系方式
通信地址:陕西省西安市太白南路2号,西安电子科技大学91信箱,710071
电子邮箱:suncong@xidian.edu.cn
办公地点:北校区主楼IV区316;南校区行政辅楼315


个人简介
浙江大学 计算机科学与技术 工学学士 2005
北京大学 计算机软件与理论 理学博士 2011
The Pennsylvania State University, Department of CSE, 访问**** 2018/08-2019/08

主要研究方向
信息流分析
可信软件
智能终端安全
程序分析与验证




基本信息
孙聪 副教授,博士生导师
学科:网络空间安全/电子信息
工作单位:网络与信息安全学院;陕西省网络与系统安全重点实验室

联系方式
通信地址:陕西省西安市太白南路2号,西安电子科技大学91信箱,710071
电子邮箱:suncong@xidian.edu.cn
办公地点:北校区主楼IV区316;南校区行政辅楼315


个人简介
浙江大学 计算机科学与技术 工学学士 2005
北京大学 计算机软件与理论 理学博士 2011
The Pennsylvania State University, Department of CSE, 访问**** 2018/08-2019/08

主要研究方向
信息流分析
可信软件
智能终端安全
程序分析与验证




科学研究
主持以下科研项目
国家自然科学基金项目:自主无人系统高完整性理论及关键技术研究.2019/01 - 2022/12
国家自然科学基金项目:嵌入式软件可组合信息流安全验证机制研究.2014/01 - 2016/12
国家863计划课题子课题:智能终端应用的漏洞检测与挖掘技术研究.2015/01 - 2017/12
工信部某专项科研专题:×××××技术研究.2015/01 - 2017/12
*科研项目*:×××××技术. 2017/01-2019/12
*科研项目*:×××××技术研究.2011/01 - 2013/12
陕西省重点研发计划项目(一般项目-工业领域):基于图神经网络的智能终端应用安全检测. 2020/01 - 2021/12
陕西省自然科学基础研究计划项目:嵌入式软件可组合信息流安全验证理论与方法研究. 2013/01 - 2014/12
陕西省自然科学基础研究计划项目:智能终端操作系统信息流安全证明方法研究.2016/01 - 2017/12
中央高校基本科研业务费项目:2012/01 - 2013/12,2014/01 - 2015/12




学术论文
期刊论文
Ning Xi, Jing Lv, Cong Sun, Jianfeng Ma.Secure Service Composition with Quantitative Information Flow Evaluation in Mobile Computing Environments. Entropy 2019, 21(8), 753.
Teng Li, Jianfeng Ma, Qingqi Pei, Houbing Song, Yulong Shen, Cong Sun. DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification. IEEE Access, 2019, 7: 35302-35316.
Teng Li, Jianfeng Ma, Cong Sun. SRDPV: secure route discovery and privacy-preserving verification in MANETs. Wireless Networks 25(4): 1731-1747, Springer, 2019.
Cong Sun, Jiao Liu, Yinjuan Jie, Yuwan Ma, Jianfeng Ma. Ridra: A Rigorous Decentralized Randomized Authentication in VANETs. IEEE Access, 2018, 6: 50358-50371.
Ning Xi, Jianfeng Ma, Cong Sun, Di Lu, Yulong Shen. Information flow control on encrypted data for service composition among multiple clouds, Distributed and Parallel Databases, Springer, 2018, 36(3): 511-527.
Pengbin Feng, Jianfeng Ma, Cong Sun, Xinpeng Xu, Yuwan Ma. A Novel Dynamic Android Malware Detection System With Ensemble Learning. IEEE Access, 2018, 6: 30996-31011.
Teng Li, Jianfeng Ma, Cong Sun, Ning Xi. PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks. Journal of Information Science and Engineering, 2018, 34(4): 943-960.
Teng Li, Jianfeng Ma, Cong Sun. Dlog: diagnosing router events with syslogs for anomaly detection. The Journal of Supercomputing, Springer, 2018, 74(2): 845-867.
Cong Sun, Jiao Liu, Xinpeng Xu, Jianfeng Ma. A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs. IEEE Access, 2017, 5: 24012-24022.
Di Lu, Jianfeng Ma, Cong Sun, Qixuan Wu, Zhaochang Sun, Ning Xi. Building a Secure Scheme for a Trusted Hardware Sharing Environment. IEEE Access, 2017, 5: 20260-20271.
Teng Li, Jianfeng Ma, Cong Sun. NetPro: Detecting Attacks in MANET Routing with Provenance and Verification. SCIENCE CHINA Information Sciences, 2017, 60: 118101:1-118001:3.
Pengbin Feng, Jianfeng Ma, Cong Sun. Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection. Mobile Information Systems, 2017, **:1-**:16.
Ning Xi, Di Lu, Cong Sun, Jianfeng Ma, Yulong Shen. Distributed Secure Service Composition with Declassification in Mobile Clouds. Mobile Information Systems, 2017, **:1-**:13.
Di Lu, Jianfeng Ma, Cong Sun, Xindi Ma, Ning Xi. Credit-Based Scheme for Security-aware and Fairness-aware Resource Allocation in Cloud Computing. SCIENCE CHINA Information Sciences, 2017, 60(5), 52103:1-52103:17.
Cong Sun, Jianfeng Ma, Qingsong Yao. On the architecture and development life cycle of secure cyber-physical systems. Journal of Communications and Information Networks, Springer, 2016, 1(4): 1-21 (invited).
Pengbin Feng, Cong Sun, Jianfeng Ma. Measuring the Risk Value of Sensitive Dataflow Path in Android Applications. Security and Communication Networks, 2016, 9(18): 5918-5933.
Ning Xi, Cong Sun, Jianfeng Ma, Xiaofeng Chen, Yulong Shen. Distributed Information Flow Verification for Secure Service Composition in Smart Sensor Network. China Communications, April 2016, 13(4): 119-130.
Ning Xi, Cong Sun, Jianfeng Ma, Yulong Shen. Secure service composition with information flow control in service clouds. Future Generation Computer Systems, Volume 49, August 2015: 142-148.
Cong Sun, Ning Xi, Sheng Gao, Zhong Chen, Jianfeng Ma. Automated enforcement for relaxed information release with reference points. SCIENCE CHINA Information Sciences, 2014, 57(11): 1-19.
Tao Zhang, Jianfeng Ma, Qi Li, Ning Xi, Cong Sun. Trust-based service composition in multi-domain environments under time constraint. SCIENCE CHINA Information Sciences, 2014, 57(9): 1-16.
Sheng Gao, Jianfeng Ma, Cong Sun, Xinghua Li. Balancing trajectory privacy and data utility using a personalized anonymization model. Journal of Network and Computer Applications, 2014, 38(2014): 125-134.
Sheng Gao, Jianfeng Ma, Weisong Shi, Guoxing Zhan, Cong Sun. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing. IEEE Transactions on Information Forensics and Security, 2013, 8(6): 874-887.
Ning Xi, Jianfeng Ma, Cong Sun, Yulong Shen, Tao Zhang. Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network. International Journal of Distributed Sensor Networks (IJDSN), 2013: 1-10.
会议论文
Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun. Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. ICSE 2021, pp. 1671-1682.
Sun Hyoung Kim, Cong Sun,Dongrui Zeng, Gang Tan.Refining Indirect Call Targets at the Binary Level. NDSS 2021.
Ning Xi, Cong Sun, Jianfeng Ma, Jing Lv.Distributed Quantitative Information Flow Evaluation for Service Composition in Clouds.TrustCom'19:18th International Conference On Trust, Security And Privacy In Computing And Communications. IEEE, 2019, pp.200-207.
Cong Sun, Jun Chen, Pengbin Feng, Jianfeng Ma. CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications. ML4CS'19: The Second International Conference on Machine Learning for Cyber Security. Springer, 2019, pp. 63-77.
Teng Li, Jianfeng Ma, Qingqi Pei, Chengyan Ma, Dawei Wei, Cong Sun.Privacy-Preserving Verification and Root-Cause Tracing Towards UAV Social Networks. ICC 2019: 1-6.
Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Cong Sun.Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification. APSIPA ASC 2018: Asia-Pacific Signal and Information Processing Association Annual Summit and Conference. IEEE, 2018, pp. 240-246.
Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Cong Sun. Anomalies Detection of Routers Based on Multiple Information Learning. NaNA'18:International Conference on Networking and Network Applications. IEEE, 2018, pp. 206-211.
Teng Li, Jianfeng Ma, Cong Sun, Dawei Wei, and Ning Xi.PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks. NaNA'17: 2017 International Conference on Networking and Network Applications. IEEE, 2017, pp. 5-10.
Ning Xi, Cong Sun, Di Lu, Yulong Shen. Distributed Information Flow Verification on Encrypted Data For Service Composition in Multiple Clouds. NaNA'17: 2017 International Conference on Networking and Network Applications. IEEE, 2017, pp. 286-291.
Siqi Ma, Ferdian Thung, David Lo, Cong Sun, Robert Deng. VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples. ESORICS'17: the European Symposium on Research in Computer Security 2017. Springer, 2017, pp. 229-246.
Cong Sun, Ning Xi, Jianfeng Ma. Enforcing Generalized Refinement-based Noninterference for Secure Interface Composition. COMPSAC'17: the 41st Annual Computer Software and Applications Conference (Vol. 1). IEEE, 2017, pp. 586-595. [code]
Cong Sun, Pengbin Feng, Teng Li, Jianfeng Ma. Data-Oriented Instrumentation against Information Leakages of Android Applications. COMPSAC'17: the 41st Annual Computer Software and Applications Conference (Vol. 2). IEEE, 2017, pp. 485-490.
Cong Sun, Qingsong Yao, Jianfeng Ma. Certia: Certifying Interface Automata for Cyber-Physical Systems (Demo). SMARTCOMP'17: the 3rd IEEE International Conference on Smart Computing. IEEE, 2017. [code]
Qingsong Yao, Jianfeng Ma, Cong Sun, Xinghua Li, Jinku Li. Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags. MSCC'16: the 3rd ACM Workshop on Mobile Sensing, Computing and Communication. ACM, 2016, pp. 23-28.
Ning Xi, Cong Sun, Jianfeng Ma, Yulong Shen, Di Lu. Distributed Secure Service Composition with Declassification in Mobile Networks. NaNA'16: 2016 International Conference on Networking and Network Applications. IEEE, 2016, pp. 254-259.
Teng Li, Jianfeng Ma, Cong Sun. CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks. ICA3PP'15: the 15th International Conference on Algorithms and Architectures for Parallel Processing. LNCS 9530 Springer 2015, pp. 449-462.
Siqi Ma, Shaowei Wang, David Lo, Robert Deng, Cong Sun. Active Semi-Supervised Approach for Checking App Behavior Against Its Description. COMPSAC'15: the 39th Annual International Computers, Software and Applications Conference. IEEE, 2015, pp. 179-184.
Cong Sun, Ning Xi, Jinku Li, Qingsong Yao, Jianfeng Ma. Verifying Secure Interface Composition for Component-based System Designs. APSEC'14: the 21st Asia-Pacific Software Engineering Conference. IEEE, 2014, pp. 359-366. [code]
Ning Xi, Jianfeng Ma, Cong Sun, Tao Zhang. Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments. ICWS'13: IEEE 20th International Conference on Web Services. IEEE, 2013, pp. 563-570.
Tao Zhang, Jianfeng Ma, Cong Sun, Qi Li, Ning Xi. Service Composition in Multi-Domain Environment under Time Constraint. ICWS'13: IEEE 20th International Conference on Web Services. IEEE, 2013, pp. 227-234.
Cong Sun, Sheng Gao, Jianfeng Ma. Verifying Location-based Services with Declassification Enforcement. APWeb'12: the 14th Asia-Pacific Web Conference. LNCS 7235 Springer 2012, pp. 695-702.
Cong Sun, Ennan Zhai, Zhong Chen, Jianfeng Ma. A Multi-Compositional Enforcement on Information Flow Security. ICICS'11: 2011 International Conference on Information and Communications Security. LNCS 7043 Springer 2011, pp. 345-359.
Cong Sun, Liyong Tang, Zhong Chen. A New Enforcement on Declassification with Reachability Analysis. Proceedings of IEEE Conference on Computer Communications workshops. IEEE Communication Society, 2011, pp. 1024-1029.
Cong Sun, Liyong Tang, Zhong Chen. Enforcing Reactive Noninterference with Reachability Analysis. ITNG'11: Proceedings of the 8th International Conference on Information Technology: New Generations. IEEE Computer Society, 2011, pp. 321-326.
Cong Sun, Liyong Tang, Zhong Chen. Enforcing Relaxed Declassifications with Reference Points. ICIS'11: Proceedings of the 10th IEEE/ACIS International Conference on Computer and Information Science. IEEE Computer Society, 2011, pp. 76-81.
Cong Sun, Liyong Tang, Zhong Chen. Secure Information Flow in Java via Reachability Analysis of Pushdown System. QSIC'10: Proceedings of the 10th International Conference on Quality Software. IEEE Computer Society, 2010, pp. 142-150. [code]
Cong Sun, Liyong Tang, Zhong Chen. Secure Information Flow by Model Checking Pushdown System. UIC-ATC'09: Proceedings of the 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing. IEEE Computer Society, 2009, pp. 586-591.
中文期刊
孙聪, 李占魁, 陈亮, 马建峰, 乔新博. 面向数字货币特征的细粒度代码注入攻击检测, 计算机研究与发展, 2021, 58(5): 1035-1044.
帕尔哈提江•斯迪克, 马建峰, 孙聪. 一种面向二进制的细粒度控制流完整性方法, 计算机科学, 2019, 46(11A): 417-420,432.
吴奇烜, 马建峰, 孙聪. 采用完整性威胁树的信息流完整性度量方法, 网络与信息安全学报, 2019, 5(2): **.
马卓然, 马建峰, 苗银宾, 孙聪. 无人机网络中基于状态迁移的访问控制模型, 西安电子科技大学学报, 2018, 45(6): 44-50.
孙召昌, 马建峰, 孙聪, 卢笛.基于嵌入式可信平台的运行时监控方法. 网络与信息安全学报, 2017, 3(10): 44-51.
吴奇烜, 马建峰, 孙聪, 张帅, 张双, 郑涛. 针对扩展动态故障树的约束分析方法. 通信学报, 2017, 38(9): 159-166.
刘佼, 孙聪, 马建峰, 焦政达.采用可信平台度量的车辆远程诊断授权协议. 西安电子科技大学学报, 2017, 44(3): 49-54,119.
马勇, 马建峰, 孙聪, 张双, 崔西宁, 李亚晖. 飞行控制系统组件化故障模式与影响分析方法. 西安电子科技大学学报, 2016, 43(2): 174-179.
孙聪, 习宁, 高胜, 张涛, 李金库, 马建峰. 基于接口精化的广义无干扰性研究. 计算机研究与发展, 2015, 52(7): 1631-1641. [code]
高胜, 马建峰, 姚青松, 孙聪. LBS中面向协同位置隐私保护的群组最近邻查询. 通信学报, 2015, 36(3): 146-154.
习宁, 马建峰, 孙聪, 卢笛, 张涛. 基于模型检测的服务链信息流安全可组合验证方法. 通信学报, 2014, 35(11): 23-31.
焦政达, 马建峰, 孙聪, 姚青松. 新的车辆远程诊断授权协议. 通信学报, 2014, 35(11): 146-153.
杨增印, 马建峰, 孙聪, 黄德俊, 叶春晓, 陆地群.一种利用手指图像测量人体心率的方法. 西安电子科技大学学报, 2014, 41(5): 91-97.
孙聪, 唐礼勇, 陈钟. 基于下推系统可达性分析的程序机密消去机制. 软件学报, 2012, 23(8): 2149-2162.
孙聪, 唐礼勇, 陈钟, 马建峰. 基于加权下推系统优化可达性分析的Java安全信息流研究. 计算机研究与发展, 2012, 49(5): 901-912.
孙聪, 唐礼勇, 陈钟. 基于下推系统可达性分析的输出信道信息流检测. 计算机科学, 2011, 38(7): 103-107.




荣誉获奖
系统与网络一体化安全设计关键技术,陕西省科学技术奖,一等奖,2018,排名:6
×××技术研究,国防科学技术进步奖,二等奖,2016,排名:9
×××技术研究,中航工业集团科学技术奖,一等奖,2017,排名:9
“安飞”无人机安全组网系统,陕西省科技工作者创新创业大赛,金奖,2017,排名:3




科研团队
博士研究生
2019级
王梓宇
2020级
饶雪
硕士研究生
2019级
伍亚飞,乔新博,丁铎,潘建锋
2020级
史鉴,陈亮,刘乔森,高玉堃,柴金伟,孙一博,曾荟铭,马元坤
共同指导
孙雄佳(2019级,与姚青松老师)
已毕业研究生(首次就业去向/学位论文题目)
2016级硕士
刘佼(本校转博)
陈均(腾讯/调用路径驱动的Android应用程序恶意行为检测方法研究)
李占魁(华为/基于内存转储分析的代码注入攻击检测方法)
2017级硕士
马豫宛(美团/基于变异的Android本地代码建模及精确污点分析)
许昕鹏(京东/基于数据流分析的Android应用程序密码学API误用风险评估)
介银娟(西安热工研究院/改进的可扩展认证协议安全性分析与证明技术研究)
贾晓玲(北京计算机技术及应用研究所,非全日制/基于RFID技术的智能柜软件系统设计技术研究)
2018级硕士
阚啸(中国电子科技集团公司第二十九研究所/基于程序依赖图的函数动态污点传播规则生成研究)
刘镡稚(中航工业六三一所/二进制控制流构建及完整性监控方法研究)
张玉梅(字节跳动/基于静态插桩的控制流可信证明研究)
王禾(中国银行河南省分行/跳板攻击场景下的嵌入式系统的攻击路径分析)
陈娟颖(中国兵器工业集团第二一二研究所/基于边缘计算的无人系统蜂群可信证明的研究)




课程教学
本科生课程
计算机学院
Java程序设计(09,10,11,12,13,14级)
网络程序设计(12,13级)
网络与信息安全学院
高级语言程序设计(14,15,17,18,19级)
软件逆向工程(13,14,15,17,18级)
本科生院(大类课程)
Java程序设计(20级)
研究生课程
软件安全(2019秋,2020秋)
教材
孙聪等,Java实用程序设计. 西安电子科技大学出版社,2015-08,ISBN: 978-7-5606-3753-2
孙聪等,软件逆向工程原理与实践. 西安电子科技大学出版社,2018-02,ISBN: 978-7-5606-2497-6




招生信息
博士研究生
常年招收系统安全、软件安全方向博士研究生,要求:
从事过系统安全或软件安全相关的研究或开发工作
英语能力良好
对系统安全领域的研究能够保持长期兴趣
硕士研究生
常年招收网络空间安全学术学位、电子信息专业学位硕士研究生,要求:
学习积极主动,善于思考
具有一定的编程能力
具有较好的数学基础,或较好的英语能力
2022年优先招收对以下方向之一具备充分兴趣的学生:二进制分析、内存漏洞分析、嵌入式软件安全、无人系统安全、模型驱动的安全,提供博士生、学硕指标。(请发送简历:suncong@xidian.edu.cn)




Profile
Name Title
Department:

Contact Information
Address:
Email:
Tel:


Introduction
Put brief introduction of yourself here


Research Interests
1.
2.
3.
4.
5.




Research
目前研究团队承担的科研项目:




Papers
[1]
[2]
[3]
[4]
[5]
[6]
[7];
[8]
[9]





Honors
点击网页顶部“添加栏目”可以添加其他栏目
把鼠标放在栏目标题处,尝试拖动栏目。




Team
团队教师




博士研究生
硕士研究生




Teaching
目前本人承担的教学任务:

课件下载 示例




Admission
~~~~~~~~~~~~~~~~~~~~~~~~~~
关于研究生招生的信息:
~~~~~~~~~~~~~~~~~~~~~~~~~~



相关话题/西安电子科技大学 网络