教师名录

傅建明

邮          箱:jmfu@whu.edu.cn

职          称:教授

办公室地址:

实验室地址:

个人简介

傅建明,博士。在华中理工大学获得了学士学位和硕士学位, 在武汉大学获得了博士学位,现为武汉大学网络安全学院教授,博士生导师。中国计算机学会高级会员,IEEE会员和ACM会员。20108月至20118月,在美国爱荷华州立大学进行学术交流和访问。主要从事逆向分析与安全评估、漏洞检测与防御、移动安全、人工智能应用及安全、恶意代码与恶意行为检测等方面的教学和科研工作。


研究方向

1、逆向分析与安全评估;

2、代码缺陷检测;

3、软件系统安全防御;

4、移动安全;

5、恶意行为检测和恶意代码检测;

6、人工智能应用与安全。

招收研究生要求:

1、熟悉C/C++/Java/汇编等编程语言;

2、喜欢对漏洞和黑客攻击刨根问底;

3、喜欢遨游在由磁盘、内存、网络、{0/1}构成的数字世界;

4、爱好逆向分析,探索软件和网络的内在奥秘;

5、了解编译器、操作系统,以及机器学习和深度学习。

参考书:

王清,0-Day安全:软件漏洞分析技术(第二版)。电子工业出版社,2011

丰生强. Android软件安全与逆向分析. 人民邮电出版社,2013.


教育背景

1987.09~1991.06 华中理工大学(学士学位)

1991.07~1994.04 华中理工大学(硕士学位)

1996.09~2000.06 武汉大学 (博士学位)

工作经验

2018.01~至今 武汉大学国家网络安全学院

1994.04~2017.12 武汉大学计算机学院

教授课程

本科教学

1. 高级语言程序设计

2. 软件安全

3. 计算机病毒

研究生教学

1. 网络安全监管 (硕士研究生)

2. 信息论 (博士研究生)

发表论文

2024

1. Chenke Luo, Jiang Ming*, Mengfei Xie, Guojun Peng, Jianming Fu*. Retrofitting XoM for Stripped Binaries without Embedded Data Relocation[C].  NDSS 25 (accepted)

2. Chenke Luo, Jianming Fu, Jiang Ming, Mengfei Xie, Guojun Peng. PtrProxy: Efficient Code Re-Randomization on AArch64 Platform. China Communications. 0 https://doi.org/10.23919/JCC.ja.2024-0077 (accepted)

3. Yu Nie, Jianming Fu, Yilai Zhang, Chao Li. Modeling implicit variable and latent structure for aspect-based sentiment quadruple extraction, Neurocomputing,Volume 586,2024,127642.

4. Q. Wang, M. Tang and J. Fu, "EavesDroid: Eavesdropping User Behaviors via OS Side Channels on Smartphones," in IEEE Internet of Things Journal, vol. 11, no. 3, pp. 3979-3993, 1 Feb.1, 2024, doi: 10.1109/JIOT.2023.3298992

5. 傅建明, 姜宇谦, 何佳, 郑锐, 苏日古嘎, 彭国军. 基于样本嵌入的挖矿恶意软件检测方法[J]. 计算机科学, 2024, 51(1): 327-334

2023

1. 操方涛,傅建明,李子川.一种基于UnicornUEFI DXE驱动模拟执行方法[J.武汉大学学报(理学版),2023696):690-698

2. C. Luo, J. Ming, J. Fu, G. Peng and Z. Li, "Reverse Engineering of Obfuscated Lua Bytecode via Interpreter Semantics Testing," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 3891-3905, 2023, doi: 10.1109/TIFS.2023.3289254.

3. M. Xie, Y. Lin, C. Luo, G. Peng and J. Fu, "PointerScope: Understanding Pointer Patching for Code Randomization," in IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 4, pp. 3019-3036, 1 July-Aug. 2023, doi: 10.1109/TDSC.2022.3203043.

4. Side Liu, Guojun Peng, Haitao Zeng, Jianming Fu, A Survey on the Evolution of Fileless Attacks and Detection Techniques, Computers & Security,2023,103653,ISSN 0167-4048,https://doi.org/10.1016/j.cose.2023.103653.

2022

1. 郑锐, 汪秋云, 林卓庞, 靖蓉琦, 姜政伟, 傅建明, 汪姝玮. 一种基于威胁情报层次特征集成的挖矿恶意软件检测方法[J]. 电子学报,  2022, 50 (11): 2707-2715.    DOI: 10.12263/DZXB.20211333.

2. Rui Zheng, Qiuyun Wang, Jia He, Jianming Fu, Guga Suri, Zhengwei Jiang, "Cryptocurrency Mining Malware Detection Based on Behavior Pattern and Graph Neural Network", Security and Communication Networks, vol. 2022, Article ID 9453797, 8 pages, 2022.

3. 傅建明, 刘畅, 解梦飞, 罗陈可. 基于诱捕的软件异常检测综述[J]. 网络与信息安全学报, 2022, 8(1): 15-29. //Jianming FU, Chang LIU, Mengfei XIE, Chenke LUO. Survey of software anomaly detection based on deception[J]. Chinese Journal of Network and Information Security, 2022, 8(1): 15-29.

4. R. Zheng, Q. Wang, Z. Lin et al., Cryptocurrency malware detection in real-world environment: Based on multi-results stacking learning. Applied Soft Computing, 2022, 124.

5. Y. Ren, D. Liu, C. Liu, Q. Xiong, J. Fu and L. Wang, "A Universal Audio Steganalysis Scheme based on Multiscale Spectrograms and DeepResNet," in IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2022.3141121.

2021

1. Wenna Song, Jiang Ming, Lin Jiang, Yi Xiang, Xuanchen Pan , Jianming Fu, Guojun Peng. Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization. CCS 2021.

2. Zheng, R.; Ma, H.;Wang, Q.;Fu, J.; Jiang, Z. Assessing the Security of Campus Networks: The Case of Seven Universities. Sensors 2021, 21,306. https://doi.org/10.3390/s21010306

3. XiuwenLiu,  JianmingFu,  YanjiaoChen,  WeichenLuo,  ZihanTang. Trust-Aware sensing Quality estimation for team Crowdsourcing in social IoT. Computer Networks Volume 184, 15 January 2021, 107695

4. Binlin Cheng*, Jiang Ming*, Erika A Leal, Haotian Zhang, Jianming Fu, Guojun Peng, Jean-Yves Marion (2021). [USENIX Security '21] Obfuscation-Resilient Executable Payload Extraction From Packed Malware. In Proceedings of the 30th USENIX Security Symposium, Virtual Event, August 11-13, 2021

5. Wenna Song, Jiang Ming, Lin Jiang, Han Yan, Yi Xiang, Yuan Chen, Jianming Fu, Guojun Peng (2021). [ICSE '21] App's Auto-Login Function Security Testing via Android OS-Level Virtualization. In Proceedings of the 43rd International Conference on Software Engineering, Virtual Event, May 25-28, 2021

6. FU Jianming,HE Jia,XIE Mengfei,MEI Xufen. Recognizing Malicious Behaviors of Chrome Extensions through Direct JavaScript Execution[J]. Wuhan University Journal of Natural Sciences,2021,26(01):89-101.

7. Yuan Luo, Long Cheng, Yu Liang, Jianming Fu, Guojun Peng, DEEPNOISE: Learning Sensor and Process Noise to Detect Data Integrity Attacks in CPS[J]. China Communications, 2021, 18(9): 192-209.

2020

1. 郑锐,汪秋云,傅建明*,姜政伟,苏日,古嘎, and汪姝玮. "一种基于深度学习的恶意软件家族分类模型."信息安全学报,2020,51: 1-9.

2. Liu, Xiuwen, Jianming Fu, and Yanjiao Chen. "Event Evolution Model for Cybersecurity Event Mining in Tweet Streams." Information Sciences (2020).

3. Xiuwen Liu ; Jianming Fu. SPWalk: Similar Property Oriented Feature Learning for Phishing Detection. IEEEAccess, 2020,8(1):87031-87045.

4. Mengfei Xie, Jianming Fu, Jia He, Chenke Luo, and Guojun Peng.JTaint: Finding Privacy-Leakage in Chrome Extensions. ACISP, 2020. (录用)

2019

1. 傅建明、彭国军、严飞,软件安全课程教学方法研究,软件导刊,202019(2)226-229.

2. 杜瑞颖,张焕国,傅建明,陈晶,唐明,何琨, ... &代永平. (2019).网络空间安全大类下的信息安全专业人才培养. 网络与信息安全学报, 5(3), 25-30.

3. Jianming Fu, Lin Li, Yingjun Wang, Jianwei Huang, and Guojun Peng.Web Scanner Detection Basedon Behavioral Differences. 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14–17, 2019

4. 傅建明,梅戌芬,郑锐. Chrome扩展安全[J.武汉大学学报(理学版),2019652):111125.

5. 刘秀文,傅建明,黎琳,等.面向用户交互场景的信息欺骗分类及其威胁抑制机制[J.武汉大学学报(理学版),2019652:126138

6. 傅建明,黎琳,王应军. 基于CNNWebshell文件检测.郑州大学学报(理学版),2019, 51(2): 1-8

7. 傅建明,黎琳,郑锐,苏日古嘎。基于GAN的网络攻击检测研究综述。信息网络安全。2019, 218(2):1-9

8. LI Pengwei, FU Jianming, XU Chao, CHENG Binlin and ZHANG Huanguo. Differentiating Malicious and Benign Android App Operations Using Second-Step Behavior Features. Chinese Journal of Electronics, 2019, 28(5):944~952

9. Luman Shi, Jianming Fu, Zhengwei Guo, Jiang Ming. "Jekyll and Hyde" is Risky: Shared-Everything Threat Mitigation in Dual-Instance Apps. MobiSys '19 Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, Pages 222-235. Seoul, South Korea, June 17 - 21, 2019

2018

1. 宋文纳, , , , . . ,2019. http://www.jos.org.cn/1000-9825/5767.htm

2. Binlin Cheng, Jiang Ming, Jianming Fu, Guojun Peng, Ting Chen, Xiaosong Zhang, Jean-Yves Marion. Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost. In Proceedings of the 25th ACM Conference on Computer and Communications Security, Toronto, Canada, October 15-19, 2018.

3. 傅建明, 林艳,刘秀文,张旭.云计算环境下基于随机化的安全防御研究. 计算机学报, 2018, 41(6): 1207~1224

4. 姜百合, 傅建明,王应军,王亚丽,黄坚伟.基于Fuzzing技术的云数据泄露漏洞检测.武汉大学学报(理学版), 2018, 64(02) :115-120

5. 王应军,傅建明,姜百合.基于随机化参数名的跨站请求伪造防御方法[J].计算机工程, 2018, 44(11): 158-164.

6. Jianming Fu,Rui Jin,Yan Lin,Baihe Jiang,Zhengwei Guo.Function Risk Assessment under Memory Leakage.International Conference on Networking and Network Applications(NaNa), 2018.10, Xian, China.

7. 黄凯, 傅建明,黄坚伟, et al.一种基于字符及解析特征的恶意域名检测方法[J].计算机仿真, 2018,35(3):287~292

2017

1. Wang, Yu-fei, et al. "Information Flow Integrity of ECPS based on Domain Partition." Current Trends in Computer Science and Mechanical Automation Vol. 2. Sciendo Migration, 2017. 624-637.

2. Fu Jianming. Xie Mengfei, Wang Yingjun, Mei Xufen. An Empirical Study of Unsolicited Content Injection into a Website.International Conference on Networking and Network Applications(NaNa). Kathmandu City, Nepal, on 15-20 October 2017

3. Jianming Fu, Rui Jin and Yan Lin. FRProtector: Defeating Control Flow Hijacking Through Function-level Randomization and Transfer Protection.13th EAI International Conference on Security and Privacy in Communication Networks(Securecomm 2017). Niagara Falls, Canada, 2017, Oct. 22~25.

4. 谢梦非, 傅建明,王应军,彭国军.移动端Web浏览器HTTP流量注入的监控与屏蔽[J]. 武汉大学学报(理学版),2017, 63(5): 385-396

5. 彭国军,梁玉,张焕国,傅建明.软件二进制代码重用技术综述.软件学报,2017,28(8):20262045.

6. Jianming Fu, Jianwei Huang and Lanxin Zhang. Curtain: Keep your hosts away from USB attacks. ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017

7. Cheng B, Fu J. Zombie Fans Detection in Sina Microblog a Machine Learning Approach[J]. JOURNAL OF INTERNET TECHNOLOGY (ISSN: 1607-9264) , 2017, 18(3): 561-568.

8. Cheng B, Fu J. Social bots detection on mobile social networks. International Journal of Network Security, Vol.19, No.1, PP.163-166, Jan. 2017 (DOI: 10.6633/IJNS.201701.19(1).17)

2016

1- 傅建明, 汤毅, 刘秀文, 张旭.一种基于动态污点的内存越界访问检测框架. 武汉大学学报(理学版), 201662(5):401-410.

2- 傅建明,刘秀文,汤毅,李鹏伟. 内存地址泄漏分析与防御[J]. 计算机研究与发展, 2016, 53(8): 1829-1849.

Fu Jianming, Liu Xiuwen, Tang Yi,Li Pengwei. Survey of Memory Address Leakage and Its Defense. Journal of Computer Research and Development, 2016, 53(8): 1829-1849.

3- Jianming Fu, Yan Lin, Xu Zhang. Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications(Trustcom),Auguest 23th, 2016, tianjin, China.

4- JianMing Fu, PengWei Li, Yan Lin, Shuang Ding. Android App Malicious Behavior Detection Based on User Intention. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications(Trustcom),Auguest 23th, 2016, tianjin, China.

5- Jianming FU, Yan Lin, Xu Zhang. Impact of Environment on Branch Transfer of Software. 12th EAI International Conference on Security and Privacy in Communication Networks(SecureComm), October 12th, 2016,Guangzhou China.{ 2017, LNICST, volume 198: 575-593 }

6- Yan Lin, Xiaoxiao Tang, Debin Gao and Jianming Fu. Control flow integrity enforcement with dynamic code optimization. In Proceedings of the 19th Information Security Conference (ISC 2016), Honolulu, USA, September 2016

2015

7- Jianming Fu, Xu Zhang, Yan Lin. An Instruction-set Randomization Using Length-preserving Permutation. TrustCom-2015,Helsinki, Finland, 20-22 August, 2015

8- 李鹏伟,傅建明,李拴保,吕少卿,沙乐天. 弹性移动云计算的研究进展与安全性分析[J]. 计算机研究与发展, 2015, 52(6): 1362-1377.

Li PengweiFu JianmingLi Shuanbao, Lü Shaoqing, Sha Letian. Elastic Mobile Cloud ComputingState of the Art and Security Analysis. Journal of Computer Research and Development, 2015, 52(6): 1362-1377.

9- 傅建明, 刘高, 李鹏伟。一种杀毒软件升级流程的安全性分析方法。武汉大学学报(理学版),2015.166):509~516.

10- 李拴保,傅建明. 多云服务提供者环境下的一种用户密钥撤销方法. 电子与信息学报,2015.9

11- sha, Le-tian, He, Li-wen, Fu, Jian-ming, Sun, Jing, and Li, Peng-wei. (2015) SDN-based Sensitive Information (SI) protection: sensitivity-degree measurement in software and data lifetime supervisor in software defined network. Security Comm. Networks, doi:10.1002/sec.1367.

12- 沙乐天,何利文,傅建明,王延松等,物联网环境下的一种敏感信息保护方法. 四川大学学报工程科学版, 2016, 48(1):132-138

13- Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng, Chunfu Jia, Huanguo Zhang. Stack Layout Randomization with Minimal Rewriting of Android Binaries . In proceedings of the 18th Annual international conference on information security and cryptology(ICISC). Nov, 2015. Seoul, Korea.

14- 李新国,李鹏伟,傅建明,丁笑一。一种安全风险可控的弹性移动云计算通用框架。计算机科学,201542A11):357~363

2014

1- 李拴保, 傅建明, 张焕国, 陈晶, 王晶, 任必军. 云环境下基于环签密的用户身份属性保护方案. 通信学报,2014, 35(9):99~111

2- 李拴保,傅建明. 云环境下基于属性的用户权限管理研究. 计算机科学,2014.9

3- Jianming Fu, Yan Lin, Xu Zhang, Pengwei Li. Computation Integrity Measurement Based on Branch Transfer[C]//Procedings of the 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2014.

4- 梁玉, 傅建明, 彭国军, 彭碧琛, 张焕国. S-Tracker:一种基于栈异常的shellcode检测方法. 华中科技大学学报,2014, (11) 39-46.

5- 傅建明,沙乐天,李鹏伟,彭国军. 一种采用硬件虚拟化的内核数据主动保护方法. 四川大学学报(工程科学版),2014,46(1):8~13 (61202387,201201411110002)

6- Letian Sha, Jianming Fu, Jing Chen, Guojun Peng. PVDF: AN AUTOMATIC PATCH-BASED VULNERABILITY DESCRIPTION AND FUZZING METHOD. Proceeding of Communication security conference, 2014, Beijing.

7- Shuanbao Li, Jianming Fu. USER REVOCATION FOR DATA SHARING BASED ON BROADCAST CP-ABE IN CLOUD COMPUTING. Proceeding of Communication security conference, 2014, Beijing.

8- 沙乐天,傅建明,陈晶,黄诗勇。一种面向敏感信息处理的敏感度度量方法。计算机研究与发展,2014,5: 1050~1060

2013

1. 傅建明,李鹏伟,李晶雯。敏感信息输入安全技术探究。信息网络安全,20131473):82~85.

2. 傅建明,彭国军,严飞,涂航。信息安全案例库的设计与实现。武汉大学教育研究, 2013164~67.

3. 李牷保,傅建明,连向磊。植入城市计算综述。计算机科学,2013403):8~15.

4. DING Shuang, FU Jianming, PENG BiChen. ModuleGuard: A Gatekeeper for Dynamic Module Loading Against Malware. Wuhan University Journal of Natural Sicence, 2013,18(6):489~498

5. 傅建明,李鹏伟,易乔,黄诗勇.一种Android组件间通信的安全缺陷静态检测方法. 华中科技大学学报,2013.11II):259~264

6. 李鹏伟,傅建明,沙乐天,丁爽。基于细胞自动机的软键盘布局随机化方案。北京交通大学学报,2013105):105~111.


课题科研

1. 国家自然科学基金项目: 基于代码模式的移动应用隐私泄露评估模型研究(2023~2026).

2. 国家重点研发课题任务:隐私数据敏感性度量及保护效果评估(2021.

3. 国家自然科学基金项目:面向代码复用攻击的诱捕防御机制研究。 (2020~2023) .

4. 内存动态威胁的检测与防护. (企业合作)

5. Dex2oat优化. (企业合作)

研究团队

http://ts.whu.edu.cn

获奖信息

1. 2016年湖北省科技进奖二等奖, “ 网络安全威胁主动感知及研判的方法与技术”,排名第一。

2. 2016年获得武汉大学杰出教学贡献校长奖(排名第三)。

3. 2016年指导学生获得全国大学生信息安全竞赛二等奖。

4. 2015年指导全国大学生互联网+创新比赛,获得武汉大学互联网+优秀指导教师。

5. 2014年国家级教学成果一等奖“创建信息安全专业培养体系,引领信息安全专业建设” (排名第八)。

6. 2012年武汉大学优秀教学成果奖“坚持特色办学思想,建设武汉大学信息安全特色专业” (排名第三)。

7. 湖北省科技进步奖二等奖-基于磁盘的数据备份与恢复管理软件(2007年,排名第4)

邮箱 jmfu@whu.edu.cn 职称 教授
办公室地址 实验室地址