诸葛建伟副研究员
个人介绍

姓名:诸葛建伟

职称:副研究员

邮箱:zhugejw@tsinghua.edu.cn

主页地址:http://netsec.ccert.edu.cn/people/zhugejw/

教育背景

理学博士 (计算机应用), 北京大学, 中国,2006

理学学士 (计算机科学与技术),北京大学,中国, 2001

社会兼职

东南大学网络空间安全学院,博士研究生校外指导教师,2019 -

哈尔滨工业大学(威海)客座教授,2016 – 2018

中国计算机学会高级会员

中国网络空间安全协会个人会员

曾担任WWW,AsiaCCS,VARA,OS2ATC等多个国际国内学术会议TPC成员,Future Internet,ACM China Magazine等国内外期刊Editor

XCTF国际联赛联合创始人,技术委员会委员

GeekPwn、天府杯、补天杯、网鼎杯、强网杯、全国大学生信息安全竞赛创新实践能力赛评委专家

研究领域

互联网安全威胁监测和响应

多种类型恶意代码的采集、分析、检测与防御技术

软件漏洞分析,检测与缓解

工控与物联网安全

研究概况

清华大学,网络科学与网络空间研究院,副研究员。 蓝莲花战队联合创始人及领队、XCTF国际联赛共同发起人及技术委员会主任。 国内网络安全领域的知名技术书籍作者与译者。WitAwards互联网安全评选2017年度安全人物获奖者。

2006年6月毕业于北京大学,获理学博士学位,就读期间获得IBM Ph.D. Fellow, 微软学者, 惠普中国优秀学生, 北大五四青年科学奖等奖励,获得北京大学教职,在北大计算机研究所信息安全工程研究中心从事教学科研工作,2009年8月晋升为副研究员。2010年12月调入清华大学网络科学与网络空间研究院(原网络中心),主要承担网络与系统安全方向的教学与科研工作,及支持CCERT服务工作,目前是狩猎女神科研小组负责人。主要从事互联网安全威胁监测、安全漏洞检测分析、工控与IoT安全等基础技术的研究与工程实践工作。北京信息科学国家研究中心、清华大学下一代互联网核心网国家工程实验室科研基地的青年科研业务骨干教师。中国计算机学会高级会员、ACM会员、CACM期刊Editor。

主持和参与国家自然科学基金、核高基子课题等国家纵向科研项目,以及腾讯、中国电信、西门子等横向项目共计30余项,2010年以来在清华主持或共同主持项目20多项,个人负责经费超过2000万元。

出版多本网络安全专著教材和翻译技术书籍,在USENIX Security、ACSAC、AsiaCCS、IFIP等网络与系统安全领域知名国际会议,及Future Internet、计算机学报、软件学报等国内外期刊上发表学术论文近八十篇,截至2020年12月,Google Scholar引用数1478次,H-index指数为19,申请国内外发明专利16项,其中已获授权9项。

联合创建网络安全技术竞赛战队-蓝莲花战队,并作为领队带队成为中国历史上首支进入DEFCON CTF全球网络安全技术对抗赛(网络安全领域“世界杯”)总决赛的团队;2013年战队全球排位第6位,2013、2014年连续两年亚洲排名第一;2014、2015年在DEFCON CTF全球总决赛获得第5名;2016年和上海交通大学0ops 联合组队b1o0p获得DEFCON CTF全球总决赛亚军。创建清华-紫荆花战队,在国内网络安全技术对抗赛多次获得冠军等成绩。

奖励与荣誉

WitAwards 2017 安全年度人物奖 (全国奖项, Freebuf授予)

2014、2018年最佳书籍作译者奖,电子工业出版社.

2016年最佳书籍作译者奖,机械工业出版社。

2014年成果转化奖,腾讯TSRC.

IBM Ph.D. Fellowship, 2005 (worldwide, honored by IBM Corp.)

Microsoft Research Asia Fellowship, 2004 (Asia Pacific-wide, honored by MSRA)

学术成果

会议论文:

[1] Gengqian Zhou, Jianwei Zhuge*, Adapting to local conditions: Similarities and differences in anonymous online market between Chinese and English Speaking Communities, ICDF2C 2020.

[2] Baozheng Liu , Chao Zhang* , Guang Gong , Yishun Zeng , Haifeng Ruan , Jianwei Zhuge* . FANS: Fuzzing Android Native System Services via Automated Interface Analysis, USENIX Security 2020.

[3] Kun Yang, Hanqing Zhao, Chao Zhang, Jianwei Zhuge and Haixin Duan. Fuzzing IPC with Knowledge Inference. SRDS 2019. October 1-4.

[4] Guannan Guo, Jianwei Zhuge*, Mengmeng Yang, Gengqian Zhou, Yixiong Wu. The International Conference on Internet of Things, Embedded Systems and Communications (IINTEC 2018), Hammamet, Tunisia December 20-22, 2018.

[5] Yukun Liu, Jianwei Zhuge*, and Chao Zhang. CBTracer: Continuously Building Datasets for Binary Vulnerability and ExploitResearch. AsiaCCS 1st Radical and Experiential Security Workshop, Incheon, Republic of Korea. 2018/6/4.

[6] Kun Yang, Yuan Deng, Chao Zhang, Jianwei Zhuge, Haixin Duan. ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs inMultiple Software. 21st Information Security Conference (ISC 2018). London(Guildford), UK. 9-12 Sep 2018.

[7] Yang, Haiyu, Zhuge, Jianwei(*), Liu, Huiming, Liu, Wei, A TOOL FOR VOLATILE MEMORY ACQUISITION FROM ANDROID DEVICES, 12th IFIP WG 11.9 International Conference on Advances in Digital Forensics, 2016.

[8] Kun Yang; Jianwei Zhuge (*); Yongke Wang; Lujue Zhou; Haixin Duan, Intent Fuzzer: Detecting Capability Leaks of Android Applications, ACM Symposium on Information, Computer and Communications Security (AsiaCCS) 2014. 2014.6.4-2014.6.8.

[9] Yinzhi Cao; Xiang Pan; Yan Chen; Jianwei Zhuge, JShield: Towards Real-time and Vulnerability-based Detection of Polluted Drive-by Download Attacks, Annual Computer Security Applications Conference (ACSAC), 2014. 12.8-2014.12.10.

[10] X. Lu ; J. Zhuge(*); R. Wang; Y. Cao; Y. Chen, De-obfuscation and Detection of Malicious PDF Files with High Accuracy, HICSS-46 Forensics Analysis Track, 2013.1.7-2013.1.10.

[11] J. Zhuge*, L. Gu, H. Duan, Investigating China’s Online Underground Economy. Conference on the Political Economy of Information Security in China, San Diego, US, Apr, 2012.

[12] Z. Chen, G. Gu, J. Zhuge, J. Nazario, X. Han, WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios, to appear inProceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS’11) , HongKong, China, March 2011.

[13] C. Song, J. Zhuge*, X. Han, Z. Ye, Preventing Drive-by Download via Inter-Module Communication Monitoring, In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS’10) , Beijing, China, Apr 2010.

[14] C. Song, C. Qin, J. Zhuge*, et al, MwSandbox: On Improving the Efficiency of Automated Coarse-grained Dynamic Malware Analysis, Proceedings of the 14th Youth Conference on Communication, July 2009.

[15] J. Zhuge*, T. Holz, C. Song, J. Guo, X. Han, and W. Zou. Studying Malicious Websites and the Underground Economy on the Chinese Web, In Proceedings of the 7th Workshop on the Economics of Information Security (WEIS’08), Hanover, NH, USA, June 2008.

[16] J. Zhuge, Y. Zhou, J. Guo, et al. Malicious Websites on the Chinese Web: Overview and Case Study, 20th Annual FIRST Conference (FIRST’08), British Columbia, Canada, June 2008.

[17] Y. Zhou, J. Zhuge*, et al. Matrix: a Distributed Honeynet and its Applications, 20th Annual FIRST Conference (FIRST’08), British Columbia, Canada, June 2008.

[18] J. Zhuge*, T. Holz, X. Han, C. Song, and W. Zou. Collecting Autonomous Spreading Malware Using High-interaction Honeypots, In Proceedings of 9th International Conference on Information and Communications Security (ICICS’07), Zhengzhou, China, Lecture Notes in Computer Science 4861, 438~451. Dec 2007.

[19] J. Zhuge*, X. Han, Y. Chen, Z. Ye, and W. Zou. Towards High Level Attack Scenario Graph through Honeynet Data Correlation Analysis, In Proceedings of the 7th IEEE Workshop on Information Assurance (IAW’06), West Point, New York, USA, 2006.

[20] J. Zhuge, and R. Yao*. Security Mechanisms for Wireless Home Network, In Proceedings of IEEE Global Telecommunications Conference 2003 (GLOBECOM’03), Vol. 3, pp. 1527-1531, San Francisco, USA, 2003.

期刊论文:

[1] Miao Yu, Jianwei Zhuge*, Ming Cao, Zhiwei Shi, and Lin Jiang. A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices. Future Internet 2020, 12(2), 27; https://doi.org/10.3390/fi12020027.

[2] Gengqian Zhou, Jianwei Zhuge*, Yunqian, Fan, Kun Du, Shuqiang Lu. A Market in Dream: The Rapid Development of Anonymous Cybercrime, Mobile Networks and Applications, 2020, 25(4). (SCI IF: 2.497)

[3] YUAN WEI, SENLIN LUO, JIANWEI ZHUGE, JING GAO, ENNAN ZHENG, BO LI, LIMIN PAN. ARG: Automatic ROP chains Generation, IEEE Access ( Volume: 7 ): 120152 - 120163. 2019. (SCI IF: 4.098).

[4] 郭军权,诸葛建伟*,孙东红,段海新. Spampot: 基于分布式蜜罐的垃圾邮件捕获系统,计算机研究与发展, 2014:51 (5), 1071-1080.

[5] 诸葛建伟*,唐勇,韩心慧,段海新. 蜜罐技术研究与应用进展.软件学报,2013, 24(4):825-842.

[6] 黎松, 诸葛建伟*, 李星. BGP安全研究, 软件学报, 24(1): 121-138, 2013.

[7] 唐勇, 诸葛建伟, 陈曙晖, 卢锡城. 蠕虫正则表达式特征自动提取技术研究. 通信学报, 2013(3):141-147.

[8] 诸葛建伟*, 陈力波, 田繁, 鲍由之, 陆恂. 基于类型的动态污点分析技术. 清华大学学报: 自然科学版, 52(10): 1320-1328, 2012.

[9] 江健, 诸葛建伟*, 段海新, 吴建平. 僵尸网络机理与防御技术. 软件学报, 23(1), 82-96, 2012.

[10] 李雪峰, 段海新, 诸葛建伟, 吴建平. 识别蜜罐网络的P2P僵尸网络构建机制, 清华大学学报: 自然科学版, 52(3): 385-389, 2012.