学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 孙聪的留言板
学术论文与服务

Program committee members

期刊论文

  1. Xue Rao, Cong Sun, Dongrui Zeng, Yongzhe Huang, Gang Tan. Sliver: A Scalable Slicing-based Verification for Information Flow Security. IEEE Transactions on Dependable and Secure Computing, 2024, (in press) [code]
  2. Xiaomin Wei, Yizhen Xu, Haibin Zhang, Cong Sun, Xinghua Li, Fenghua Huang, Jianfeng Ma. Sensor attack online classification for UAVs using machine learning. Computers & Security, (in press)
  3. Xiaomin Wei, Jianfeng Ma, Cong Sun. A Survey on Security of Unmanned Aerial Vehicle Systems: Attacks and Countermeasures. IEEE Internet of Things Journal, 2024, 11(21): 34826-34847.
  4. Xiaomin Wei, Cong Sun, Xinghua Li, Jianfeng Ma. GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio. Journal of Systems Architecture, 2024, 153: 103212:1-103212:11.
  5. Ziyu Wang, Cong Sun. LICAPA: Lightweight collective attestation for physical attacks detection in highly dynamic networks. Pervasive and Mobile Computing, 2024, 99: 101903:1-101903:16. [code]
  6. Cong Sun, Yuwan Ma, Dongrui Zeng, Gang Tan, Siqi Ma, Yafei Wu. μDep: Mutation-based Dependency Generation for Precise Taint Analysis on Android Native Code. IEEE Transactions on Dependable and Secure Computing, 2023, 20(2): 1461-1475. [code]
  7. Cong Sun, Xinpeng Xu, Yafei Wu, Dongrui Zeng, Gang Tan, Siqi Ma, Peicheng Wang. CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data‐flow analysis. IET Information Security, 2023, 17(4): 582-597. [code]
  8. Yafei Wu, Jian Shi, Peicheng Wang, Dongrui Zeng, Cong Sun. DeepCatra: Learning Flow- and Graph-based Behaviors for Android Malware Detection. IET Information Security, 2023, 17(1): 118-130. [code]
  9. Xiaomin Wei, Cong Sun, Minjie Lyu, Qipeng Song, Yue Li. ConstDet: Control Semantics-Based Detection for GPS Spoofing Attacks on UAVs. Remote Sensing, 2022, 14(21), 5587.
  10. Xiaomin Wei, Yao Wang, Cong Sun. PerDet: Machine-Learning-Based UAV GPS Spoofing Detection Using Perception Data. Remote Sensing, 2022, 14(19), 4925.
  11. Ning Xi, Jing Lv, Cong Sun, Jianfeng Ma. Secure Service Composition with Quantitative Information Flow Evaluation in Mobile Computing Environments. Entropy 2019, 21(8), 753.
  12. Teng Li, Jianfeng Ma, Qingqi Pei, Houbing Song, Yulong Shen, Cong Sun. DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification. IEEE Access, 2019, 7: 35302-35316.
  13. Teng Li, Jianfeng Ma, Cong Sun. SRDPV: secure route discovery and privacy-preserving verification in MANETs. Wireless Networks 25(4): 1731-1747, Springer, 2019.
  14. Cong Sun, Jiao Liu, Yinjuan Jie, Yuwan Ma, Jianfeng Ma. Ridra: A Rigorous Decentralized Randomized Authentication in VANETs. IEEE Access, 2018, 6: 50358-50371.
  15. Ning Xi, Jianfeng Ma, Cong Sun, Di Lu, Yulong Shen. Information flow control on encrypted data for service composition among multiple clouds, Distributed and Parallel Databases, Springer, 2018, 36(3): 511-527.
  16. Pengbin Feng, Jianfeng Ma, Cong Sun, Xinpeng Xu, Yuwan Ma. A Novel Dynamic Android Malware Detection System With Ensemble Learning. IEEE Access, 2018, 6: 30996-31011.
  17. Teng Li, Jianfeng Ma, Cong Sun, Ning Xi. PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks. Journal of Information Science and Engineering, 2018, 34(4): 943-960.
  18. Teng Li, Jianfeng Ma, Cong Sun. Dlog: diagnosing router events with syslogs for anomaly detection. The Journal of Supercomputing, Springer, 2018, 74(2): 845-867.
  19. Cong Sun, Jiao Liu, Xinpeng Xu, Jianfeng Ma. A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs. IEEE Access, 2017, 5: 24012-24022.
  20. Di Lu, Jianfeng Ma, Cong Sun, Qixuan Wu, Zhaochang Sun, Ning Xi. Building a Secure Scheme for a Trusted Hardware Sharing Environment. IEEE Access, 2017, 5: 20260-20271.
  21. Teng Li, Jianfeng Ma, Cong Sun. NetPro: Detecting Attacks in MANET Routing with Provenance and Verification. SCIENCE CHINA Information Sciences, 2017, 60: 118101:1-118001:3.
  22. Pengbin Feng, Jianfeng Ma, Cong Sun. Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection. Mobile Information Systems, 2017, 7397812:1-7397812:16.
  23. Ning Xi, Di Lu, Cong Sun, Jianfeng Ma, Yulong Shen. Distributed Secure Service Composition with Declassification in Mobile Clouds. Mobile Information Systems, 2017, 7469342:1-7469342:13.
  24. Di Lu, Jianfeng Ma, Cong Sun, Xindi Ma, Ning Xi. Credit-Based Scheme for Security-aware and Fairness-aware Resource Allocation in Cloud Computing. SCIENCE CHINA Information Sciences, 2017, 60(5), 52103:1-52103:17.
  25. Cong Sun, Jianfeng Ma, Qingsong Yao. On the architecture and development life cycle of secure cyber-physical systems. Journal of Communications and Information Networks, Springer, 2016, 1(4): 1-21 (invited).
  26. Pengbin Feng, Cong Sun, Jianfeng Ma. Measuring the Risk Value of Sensitive Dataflow Path in Android Applications. Security and Communication Networks, 2016, 9(18): 5918-5933.
  27. Ning Xi, Cong Sun, Jianfeng Ma, Xiaofeng Chen, Yulong Shen. Distributed Information Flow Verification for Secure Service Composition in Smart Sensor Network. China Communications, April 2016, 13(4): 119-130.
  28. Ning Xi, Cong Sun, Jianfeng Ma, Yulong Shen. Secure service composition with information flow control in service clouds. Future Generation Computer Systems, Volume 49, August 2015: 142-148.
  29. Cong Sun, Ning Xi, Sheng Gao, Zhong Chen, Jianfeng Ma. Automated enforcement for relaxed information release with reference points. SCIENCE CHINA Information Sciences, 2014, 57(11): 1-19.
  30. Tao Zhang, Jianfeng Ma, Qi Li, Ning Xi, Cong Sun. Trust-based service composition in multi-domain environments under time constraint. SCIENCE CHINA Information Sciences, 2014, 57(9): 1-16.
  31. Sheng Gao, Jianfeng Ma, Cong Sun, Xinghua Li. Balancing trajectory privacy and data utility using a personalized anonymization model. Journal of Network and Computer Applications, 2014, 38(2014): 125-134.
  32. Sheng Gao, Jianfeng Ma, Weisong Shi, Guoxing Zhan, Cong Sun. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing. IEEE Transactions on Information Forensics and Security, 2013, 8(6): 874-887.
  33. Ning Xi, Jianfeng Ma, Cong Sun, Yulong Shen, Tao Zhang. Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network. International Journal of Distributed Sensor Networks (IJDSN), 2013: 1-10.

会议论文

  1. Yunbo Wang, Cong Sun, Qiaosen Liu, Bingnan Su, Zongxu Zhang, Michael Norris, Gang Tan, Jianfeng Ma. VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs. ACSAC 2024. (accepted) [Artifact Available, Reviewed & Reproducible]
  2. Yafei Wu, Cong Sun, Dongrui Zeng, Gang Tan, Siqi Ma, Peicheng Wang. LibScan: Towards More Precise Third-Party Library Identification for Android Applications. USENIX Security 2023, pp. 3385-3402. [code]
  3. Zhiyou Tian, Cong Sun, Dongrui Zeng, Gang Tan. podft: On Accelerating Dynamic Taint Analysis with Precise Path Optimization. The 2023 Workshop on Binary Analysis Research (BAR'23), co-located with NDSS 2023.
  4. Sun Hyoung Kim, Dongrui Zeng, Cong Sun, Gang Tan. BinPointer: Towards Precise, Sound, and Scalable Binary-level Pointer Analysis. CC 2022: ACM SIGPLAN International Conference on Compiler Construction, pp. 169-180.
  5. Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino. Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. ICSE 2022, pp. 462-473.
  6. Xiao Kan, Cong Sun, Shen Liu, Yongzhe Huang, Gang Tan, Siqi Ma, Yumei Zhang. Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking. QRS 2021, pp. 702-713.
  7. Ziyu Wang, Cong Sun, Qingsong Yao, Duo Ding, Jianfeng Ma. Delica: Decentralized Lightweight Collective Attestation for Disruptive IoT Networks. ICPADS 2021, pp. 364-371.
  8. Yumei Zhang, Xinzhi Liu, Cong Sun, Dongrui Zeng, Gang Tan, Xiao Kan, Siqi Ma. ReCFA: Resilient Control-Flow Attestation. ACSAC 2021, pp. 311-322. [code]
  9. Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun. Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. ICSE 2021, pp. 1671-1682.
  10. Sun Hyoung Kim, Cong Sun, Dongrui Zeng, Gang Tan. Refining Indirect Call Targets at the Binary Level. NDSS 2021.
  11. Ning Xi, Cong Sun, Jianfeng Ma, Jing Lv. Distributed Quantitative Information Flow Evaluation for Service Composition in Clouds. TrustCom'19: 18th International Conference On Trust, Security And Privacy In Computing And Communications. IEEE, 2019, pp. 200-207.
  12. Cong Sun, Jun Chen, Pengbin Feng, Jianfeng Ma. CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications. ML4CS'19: The Second International Conference on Machine Learning for Cyber Security. Springer, 2019, pp. 63-77.
  13. Teng Li, Jianfeng Ma, Qingqi Pei, Chengyan Ma, Dawei Wei, Cong Sun. Privacy-Preserving Verification and Root-Cause Tracing Towards UAV Social Networks. ICC 2019: 1-6.
  14. Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Cong Sun. Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification. APSIPA ASC 2018: Asia-Pacific Signal and Information Processing Association Annual Summit and Conference. IEEE, 2018, pp. 240-246.
  15. Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Cong Sun. Anomalies Detection of Routers Based on Multiple Information Learning. NaNA'18: International Conference on Networking and Network Applications. IEEE, 2018, pp. 206-211.
  16. Teng Li, Jianfeng Ma, Cong Sun, Dawei Wei, and Ning Xi. PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks. NaNA'17: 2017 International Conference on Networking and Network Applications. IEEE, 2017, pp. 5-10.
  17. Ning Xi, Cong Sun, Di Lu, Yulong Shen. Distributed Information Flow Verification on Encrypted Data For Service Composition in Multiple Clouds. NaNA'17: 2017 International Conference on Networking and Network Applications. IEEE, 2017, pp. 286-291.
  18. Siqi Ma, Ferdian Thung, David Lo, Cong Sun, Robert Deng. VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples. ESORICS'17: the European Symposium on Research in Computer Security 2017. Springer, 2017, pp. 229-246.
  19. Cong Sun, Ning Xi, Jianfeng Ma. Enforcing Generalized Refinement-based Noninterference for Secure Interface Composition. COMPSAC'17: the 41st Annual Computer Software and Applications Conference (Vol. 1). IEEE, 2017, pp. 586-595. [code]
  20. Cong Sun, Pengbin Feng, Teng Li, Jianfeng Ma. Data-Oriented Instrumentation against Information Leakages of Android Applications. COMPSAC'17: the 41st Annual Computer Software and Applications Conference (Vol. 2). IEEE, 2017, pp. 485-490.
  21. Cong Sun, Qingsong Yao, Jianfeng Ma. Certia: Certifying Interface Automata for Cyber-Physical Systems (Demo). SMARTCOMP'17: the 3rd IEEE International Conference on Smart Computing. IEEE, 2017. [code]
  22. Qingsong Yao, Jianfeng Ma, Cong Sun, Xinghua Li, Jinku Li. Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags. MSCC'16: the 3rd ACM Workshop on Mobile Sensing, Computing and Communication. ACM, 2016, pp. 23-28.
  23. Ning Xi, Cong Sun, Jianfeng Ma, Yulong Shen, Di Lu. Distributed Secure Service Composition with Declassification in Mobile Networks. NaNA'16: 2016 International Conference on Networking and Network Applications. IEEE, 2016, pp. 254-259.
  24. Teng Li, Jianfeng Ma, Cong Sun. CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks. ICA3PP'15: the 15th International Conference on Algorithms and Architectures for Parallel Processing. LNCS 9530 Springer 2015, pp. 449-462.
  25. Siqi Ma, Shaowei Wang, David Lo, Robert Deng, Cong Sun. Active Semi-Supervised Approach for Checking App Behavior Against Its Description. COMPSAC'15: the 39th Annual International Computers, Software and Applications Conference. IEEE, 2015, pp. 179-184.
  26. Cong Sun, Ning Xi, Jinku Li, Qingsong Yao, Jianfeng Ma. Verifying Secure Interface Composition for Component-based System Designs. APSEC'14: the 21st Asia-Pacific Software Engineering Conference. IEEE, 2014, pp. 359-366. [code]
  27. Ning Xi, Jianfeng Ma, Cong Sun, Tao Zhang. Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments. ICWS'13: IEEE 20th International Conference on Web Services. IEEE, 2013, pp. 563-570.
  28. Tao Zhang, Jianfeng Ma, Cong Sun, Qi Li, Ning Xi. Service Composition in Multi-Domain Environment under Time Constraint. ICWS'13: IEEE 20th International Conference on Web Services. IEEE, 2013, pp. 227-234.
  29. Cong Sun, Sheng Gao, Jianfeng Ma. Verifying Location-based Services with Declassification Enforcement. APWeb'12: the 14th Asia-Pacific Web Conference. LNCS 7235 Springer 2012, pp. 695-702.
  30. Cong Sun, Ennan Zhai, Zhong Chen, Jianfeng Ma. A Multi-Compositional Enforcement on Information Flow Security. ICICS'11: 2011 International Conference on Information and Communications Security. LNCS 7043 Springer 2011, pp. 345-359.
  31. Cong Sun, Liyong Tang, Zhong Chen. A New Enforcement on Declassification with Reachability Analysis. Proceedings of IEEE Conference on Computer Communications workshops. IEEE Communication Society, 2011, pp. 1024-1029.
  32. Cong Sun, Liyong Tang, Zhong Chen. Enforcing Reactive Noninterference with Reachability Analysis. ITNG'11: Proceedings of the 8th International Conference on Information Technology: New Generations. IEEE Computer Society, 2011, pp. 321-326.
  33. Cong Sun, Liyong Tang, Zhong Chen. Enforcing Relaxed Declassifications with Reference Points. ICIS'11: Proceedings of the 10th IEEE/ACIS International Conference on Computer and Information Science. IEEE Computer Society, 2011, pp. 76-81.
  34. Cong Sun, Liyong Tang, Zhong Chen. Secure Information Flow in Java via Reachability Analysis of Pushdown System. QSIC'10: Proceedings of the 10th International Conference on Quality Software. IEEE Computer Society, 2010, pp. 142-150. [code]
  35. Cong Sun, Liyong Tang, Zhong Chen. Secure Information Flow by Model Checking Pushdown System. UIC-ATC'09: Proceedings of the 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing. IEEE Computer Society, 2009, pp. 586-591.

中文期刊

  1. 张淋茂, 孙聪, 饶雪. 动态库裁剪增强的程序系统调用限制方法, 计算机科学, 2025. (in press)
  2. 刘乔森, 孙聪, 魏晓敏, 曾荟铭, 马建峰. 多时间无干扰性验证方法, 软件学报, 2024, 35(10): 4729-4750. [code]
  3. 丁铎, 孙聪, 郑涛. 高健壮性二进制应用程序裁剪, 计算机科学, 2024, 51(10): 208-217.
  4. 陈亮, 孙聪. 基于深度学习的Linux系统DKOM攻击检测, 计算机科学, 2024, 51(9): 383-392.
  5. 魏晓敏, 李兴华, 孙聪, 张海宾, 马建峰. MagDet: 基于地磁的无人机GPS欺骗检测方法. 计算机学报, 2024, 47(4): 877-891
  6. 魏晓敏, 董云卫, 孙聪, 李兴华, 马建峰. 基于AADL的混合关键系统随机错误与突发错误安全性分析, 软件学报, 2024, 35(9).
  7. 孙聪, 曾荟铭, 宋焕东, 王运柏, 张宗旭, 马建峰. 基于机器学习的无人机传感器攻击在线检测和恢复方法, 计算机研究与发展, 2023, 60(10): 2291-2303.
  8. 孙聪, 李占魁, 陈亮, 马建峰, 乔新博. 面向数字货币特征的细粒度代码注入攻击检测, 计算机研究与发展, 2021, 58(5): 1035-1044.
  9. 帕尔哈提江•斯迪克, 马建峰, 孙聪. 一种面向二进制的细粒度控制流完整性方法, 计算机科学, 2019, 46(11A): 417-420,432.
  10. 吴奇烜, 马建峰, 孙聪. 采用完整性威胁树的信息流完整性度量方法, 网络与信息安全学报, 2019, 5(2): 2019016.
  11. 马卓然, 马建峰, 苗银宾, 孙聪. 无人机网络中基于状态迁移的访问控制模型, 西安电子科技大学学报, 2018, 45(6): 44-50.
  12. 孙召昌, 马建峰, 孙聪, 卢笛. 基于嵌入式可信平台的运行时监控方法. 网络与信息安全学报, 2017, 3(10): 44-51.
  13. 吴奇烜, 马建峰, 孙聪, 张帅, 张双, 郑涛. 针对扩展动态故障树的约束分析方法. 通信学报, 2017, 38(9): 159-166.
  14. 刘佼, 孙聪, 马建峰, 焦政达. 采用可信平台度量的车辆远程诊断授权协议. 西安电子科技大学学报, 2017, 44(3): 49-54,119.
  15. 马勇, 马建峰, 孙聪, 张双, 崔西宁, 李亚晖. 飞行控制系统组件化故障模式与影响分析方法. 西安电子科技大学学报, 2016, 43(2): 174-179.
  16. 孙聪, 习宁, 高胜, 张涛, 李金库, 马建峰. 基于接口精化的广义无干扰性研究. 计算机研究与发展, 2015, 52(7): 1631-1641. [code]
  17. 高胜, 马建峰, 姚青松, 孙聪. LBS中面向协同位置隐私保护的群组最近邻查询. 通信学报, 2015, 36(3): 146-154.
  18. 习宁, 马建峰, 孙聪, 卢笛, 张涛. 基于模型检测的服务链信息流安全可组合验证方法. 通信学报, 2014, 35(11): 23-31.
  19. 焦政达, 马建峰, 孙聪, 姚青松. 新的车辆远程诊断授权协议. 通信学报, 2014, 35(11): 146-153.
  20. 杨增印, 马建峰, 孙聪, 黄德俊, 叶春晓, 陆地群. 一种利用手指图像测量人体心率的方法. 西安电子科技大学学报, 2014, 41(5): 91-97.
  21. 孙聪, 唐礼勇, 陈钟. 基于下推系统可达性分析的程序机密消去机制. 软件学报, 2012, 23(8): 2149-2162.
  22. 孙聪, 唐礼勇, 陈钟, 马建峰. 基于加权下推系统优化可达性分析的Java安全信息流研究. 计算机研究与发展, 2012, 49(5): 901-912.
  23. 孙聪, 唐礼勇, 陈钟. 基于下推系统可达性分析的输出信道信息流检测. 计算机科学, 2011, 38(7): 103-107.