1. 简单百科
  2. 诸葛建伟

诸葛建伟

诸葛建伟,清华大学网络科学与网络空间研究院副研究员。

教育背景

理学博士(计算机应用),北京大学,中国,2006;

理学学士(计算机科学与技术),北京大学,中国,2001。

社会兼职

东南大学网络空间安全学院,博士研究生校外指导教师,2019-至今;

哈尔滨工业大学(威海)客座教授,2016–2018;

中国计算机学会高级会员;

中国网络空间安全协会个人会员;

曾担任WWW,AsiaCCS,VARA,OS2ATC等多个国际国内学术会议TPC成员,Future Internet,ACM China Magazine等国内外期刊Editor;

XCTF国际联赛联合创始人,技术委员会委员;

GeekPwn天府杯、补天杯、网鼎杯、强网杯、全国大学生信息安全竞赛创新实践能力赛评委专家。

研究领域

互联网安全威胁监测和响应;

多种类型恶意代码的采集、分析、检测与防御技术;

软件漏洞分析,检测与缓解;

工控与物联网安全。

奖励与荣誉

WitAwards2017安全年度人物奖(全国奖项,Freebuf授予);

2014、2018年最佳书籍作译者奖,电子工业出版社

2016年最佳书籍作译者奖,机械工业出版社

2014年成果转化奖,腾讯TSRC;

IBM Ph.D. Fellowship, 2005 (worldwide, honored by IBM Corp.);

微软 Research Asia Fellowship, 2004 (Asia Pacific-wide, honored by MSRA)。

学术成果

会议论文:

Gengqian Zhou, Jianwei Zhuge*, Adapting to local conditions: Similarities and differences in anonymous online market between Chinese and English Speaking Communities, ICDF2C 2020.

[2]Baozheng Liu , Chao Zhang* , Guang Gong , Yishun Zeng , Haifeng Ruan , Jianwei Zhuge* . FANS: Fuzzing Android Native System Services via Automated Interface Analysis, USENIX Security 2020.

Kun Yang, Hanqing Zhao, Chao Zhang, Jianwei Zhuge and Haixin Duan. Fuzzing IPC with Knowledge Inference. SRDS 2019. October 1-4.

Guannan Guo, Jianwei Zhuge*, Mengmeng Yang, Gengqian Zhou, Yixiong 吴语 The International Conference on Internet of Things, Embedded Systems and Communications (IINTEC 2018), Hammamet, Tunisia December 20-22, 2018.

Yukun Liu, Jianwei Zhuge*, and Chao Zhang. CBTracer: Continuously Building Datasets for Binary Vulnerability and ExploitResearch. AsiaCCS 1st Radical and Experiential Security Workshop, Incheon, Republic of Korea. 2018/6/4.

Kun Yang, Yuan Deng, Chao Zhang, Jianwei Zhuge, Haixin Duan. ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs inMultiple Software. 21st Information Security Conference (ISC 2018). London(Guildford), UK. 9-12 Sep 2018.

Yang, Haiyu, Zhuge, Jianwei(*), Liu, Huiming, Liu, Wei, A TOOL FOR VOLATILE MEMORY ACQUISITION FROM ANDROID DEVICES, 12th IFIP WG 11.9 International Conference on Advances in Digital Forensics, 2016.

Kun Yang; Jianwei Zhuge (*); Yongke Wang; Lujue Zhou; Haixin Duan, Intent Fuzzer: Detecting Capability Leaks of Android Applications, ACM Symposium on Information, Computer and Communications Security (AsiaCCS) 2014. 2014.6.4-2014.6.8.

Yinzhi Cao; Xiang pan; Yan Chen; Jianwei Zhuge, JShield: Towards Real-时间 and Vulnerability-based Detection of Polluted Drive-by Download Attacks, Annual Computer Security Applications Conference (ACSAC), 2014. 12.8-2014.12.10.

X. Lu ; J. Zhuge(*); R. Wang; Y. Cao; Y. Chen, De-obfuscation and Detection of Malicious PDF Files with High Accuracy, HI层叠样式表46 Forensics Analysis Track, 2013.1.7-2013.1.10.

J. Zhuge*, L. Gu, H. Duan, Investigating China’s Online Underground Economy. Conference on the Political Economy of Information Security in China, San Diego, US, Apr, 2012.

Z. Chen, G. Gu, J. Zhuge, J. Nazario, X. Han, WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios, to appear inProceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS’11) , HongKong, China, March 2011.

C. Song, J. Zhuge*, X. Han, Z. Ye, Preventing Drive-by Download via Inter-Module Communication Monitoring, In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS’10) , Beijing, China, Apr 2010.

C. Song, C. Qin, J. Zhuge*, et al, MwSandbox: On Improving the Efficiency of Automated Coarse-grained Dynamic Malware Analysis, Proceedings of the 14th Youth Conference on Communication, July 2009.

J. Zhuge*, T. Holz, C. Song, J. Guo, X. Han, and W. Zou. Studying Malicious Websites and the Underground Economy on the Chinese Web, In Proceedings of the 7th Workshop on the Economics of Information Security (WEIS’08), Hanover, NH, USA, June 2008.

J. Zhuge, Y. Zhou, J. Guo, et al. Malicious Websites on the Chinese Web: Overview and Case Study, 20th Annual FIRST Conference (FIRST’08), British Columbia, Canada, June 2008.

Y. Zhou, J. Zhuge*, et al. Matrix: a Distributed Honeynet and its Applications, 20th Annual FIRST Conference (FIRST’08), British Colombia, Canada, June 2008.

J. Zhuge*, T. Holz, X. Han, C. Song, and W. Zou. Collecting Autonomous Spreading Malware Using High-interaction Honeypots, In Proceedings of 9th International Conference on Information and Communications Security (ICICS’07), Zhengzhou, China, Lecture Notes in Computer Science 4861, 438~451. Dec 2007.

J. Zhuge*, X. Han, Y. Chen, Z. Ye, and W. Zou. Towards High Level Attack Scenario Graph through Honeynet Data Correlation Analysis, In Proceedings of the 7th IEEE Workshop on Information Assurance (IAW’06), West Point, New York, USA, 2006.

J. Zhuge, and R. Yao*. Security Mechanisms for Wireless Home Network, In Proceedings of IEEE Global Telecommunications Conference 2003 (GLOBECOM’03), Vol. 3, pp. 1527-1531, San Francisco, USA, 2003.

期刊论文:

Miao Yu, Jianwei Zhuge*, Ming Cao, Zhiwei Shi, and Lin Jiang. A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices. Future Internet 2020, 12(2), 27; https://doi.org/10.3390/fi12020027.

Gengqian Zhou, Jianwei Zhuge*, Yunqian, Fan, Kun Du, Shuqiang Lu. A Market in Dream: The Rapid Development of Anonymous Cybercrime, Mobile Networks and Applications, 2020, 25(4). (SCI IF: 2.497)

YUAN WEI, SENLIN LUO, JIANWEI ZHUGE, JING GAO, ENNAN ZHENG, BO LI, LIMIN pan ARG: Automatic ROP chains Generation, IEEE Access ( Volume: 7 ): 120152 - 120163. 2019. (SCI IF: 4.098).

郭军权,诸葛建伟*,孙东红,段海新Spampot:基于分布式蜜罐的垃圾邮件捕获系统,计算机研究与发展, 2014:51(5),1071-1080.

诸葛建伟*,唐勇,韩心慧,段海新.蜜罐技术研究与应用进展.软件学报,2013,24(4):825-842.

黎松,诸葛建伟*,李星.BGP安全研究,软件学报,24(1):121-138,2013.

唐勇,诸葛建伟,陈曙晖,卢锡城.蠕虫正则表达式特征自动提取技术研究.通信学报,2013(3):141-147.

诸葛建伟*,陈力波,田繁,鲍由之,陆恂.基于类型的动态污点分析技术.清华大学学报:自然科学版,52(10):1320-1328, 2012.

江健,诸葛建伟*,段海新,吴建平僵尸网络机理与防御技术.软件学报,23(1),82-96,2012.

李雪峰,段海新,诸葛建伟,吴建平.识别蜜罐网络的P2P僵尸网络构建机制,清华大学学报:自然科学版,52(3):385-389,2012.

参考资料

诸葛建伟-清华大学网络科学与网络空间研究院.清华大学网络科学与网络空间研究院.2022-02-08