基本信息

陈恺,中国科学院信息工程研究所
研究员/教授,博导


前沿创新与科教融合中心,主任
信息安全国家重点实验室,副主任
《信息安全学报》编辑部,主任

国家“万人计划”领军人才
国家“万人计划”青年拔尖人才
中国科学院青年科学家奖
CCF-IEEE CS青年科学家奖
NASAC青年软件创新奖
北京市“杰出青年”基金获得者
北京智源青年科学家
中国科学院“青促会”(优秀会员)
中国科学院朱李月华优秀教师奖
北京市“科技新星”


电子邮件:chenkai AT iie.ac.cn
通信地址:北京市海淀区树村路19号,中国科学院信息工程研究所
邮政编码:100193

主页: http://www.kaichen.org

招生信息

欢迎感兴趣的同学联系。

招生专业
083900-网络空间安全
研究方向

软件与系统安全,人工智能安全,智能终端安全,隐私保护

教育背景

2004-09--2009-12 中国科学院研究生院 博士
2000-09--2004-07 南京大学 本科

工作经历

2012.01--至今 中国科学院信息工程研究所
2014.10--2015.08 美国印第安纳大学     
2012.07--2014.09 美国宾州州立大学
2010.01--2011.12 中国科学院软件研究所

出版信息

   
发表论文100余篇,部分论文如下

[CCS] Zijin Lin, Yue Zhao, Kai Chen, Jinwen He, "I Don't Know You, But I Can Catch You: Real-Time Defense against Diverse Adversarial Patches for Object Detectors", CCS 2024

[S&P] Peizhuo Lv, Hualong Ma, Kai Chen, Jiachen Zhou, Shengzhi Zhang, Ruigang Liang, Shenchen Zhu, Pan Li, Yingjun Zhang, "MEA-Defender: A Robust Watermark against Model Extraction Attack", S&P 2024

[NDSS] Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fang Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng, "SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-Supervised Learning", NDSS 2024

[NDSS] Peiwei Hu, Ruigang Liang, Kai Chen, "DeGPT: Optimizing Decompiler Output with LLM", NDSS 2024

[USENIX Security] Dandan Xu, Di Tang, Yi Chen, XiaoFeng Wang, Kai Chen, Haixu Tang, LongXing Li, "Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples", USENIX Security 2024

[USENIX Security] Chang Yue, Chen Zhong, Kai Chen, Zhiyu Zhang, Yeonjoon Lee, "DARKFLEECE: Probing the Dark Side of Android Subscription Apps", USENIX Security 2024

[USENIX Security] Shenchen Zhu, Yue Zhao, Kai Chen, Bo Wang, Hualong Ma, Cheng'an Wei, "AE-Morpher: Improve Physical Robustness of Adversarial Objects against LiDAR-based Detectors via Object Reconstruction", USENIX Security 2024

[TIFS] Hong Zhu, Yue Zhao, Shengzhi Zhang, Kai Chen, "NeuralSanitizer: Detecting Backdoors in Neural Networks", IEEE Transactions on Information Forensics and Security (TIFS), 2024

[ISSTA] Ying Cao, Runze Zhang, Ruigang Liang, Kai Chen, "Evaluating the Effectiveness of Decompilers", ISSTA 2024

[TIFS] Dandan Xu, Kai Chen, Miaoqian Lin, XiaoFeng Wang,  "AutoPwn: Artifact-assisted Heap Exploit Generation for CTF PWN Competitions", IEEE Transactions on Information Forensics and Security (TIFS), 2024

[AAAI] Yue Zhao, Congyi Li, Kai Chen, "UMA: Facilitating Backdoor Scanning via Unlearning-based Model Ablation", AAAI 2024

[AAAI] Jiachen Zhou, Peizhuo Lv, Yibing Lan, Guozhu Meng, Kai Chen, Hualong Ma, "DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models", AAAI 2024

[CCS] Jinwen He, Kai Chen, Guozhu Meng, Jiangshan Zhang, Congyi Li, "Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing", CCS 2023

[USENIX Security] Zizhuang Deng, Guozhu Meng, Kai Chen, Tong Liu, Lu Xiang, Chunyang Chen, "Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and Vulnerabilities", USENIX Security 2023

[USENIX Security] Cheng'an Wei, Yeonjoon Lee, Kai Chen, Guozhu Meng, Peizhuo Lv, "Aliasing Backdoor Attacks on Pre-trained Models", USENIX Security 2023

[USENIX Security] Miaoqian Lin, Kai Chen, Yang Xiao, "Detecting API Post-Handling Bugs Using Code and Description in Patches", USENIX Security 2023

[S&P] Hong Zhu, Shengzhi Zhang, Kai Chen, "AI-Guardian: Defeating Adversarial Attacks using Backdoors", S&P 2023

[USENIX Security] Peizhuo Lv, Chang Yue, Yunfei Yang, Shengzhi Zhang, Hualong Ma, Kai Chen, "A Data-free Backdoor Injection Approach in Neural Networks", USENIX Security 2023

[USENIX Security] Peiwei Hu, Ruigang Liang, Ying Cao, Kai Chen, Runze Zhang, "AURC: Detecting Errors in Program Code and Documentation", USENIX Security 2023

[USENIX Security] Dawei Wang, Ying Li, Zhiyu Zhang, Kai Chen, "CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing", USENIX Security 2023

[NDSS] Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, and Yuqing Zhang, "PPA: Preference Profiling Attack Against Federated Learning", NDSS 2023

[TDSC] Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Hualong Ma, Yue Zhao, and Yingjiu Li, "A Robustness-Assured White-Box Watermark in Neural Networks", IEEE Transactions on Dependable and Secure Computing (accepted)

[ISSTA] Lei Bu, Qiuping Zhang, Suwan Li, Jinglin Dai, Guangdong Bai, Kai Chen, Xuandong Li, "Security Checking of Trigger-Action-Programming Smart Home Integrations", ISSTA 2023

[ICME] Peizhuo Lv, Hualong Ma, Jiachen Zhou, Ruigang Liang, Kai Chen, Shengzhi Zhang, Yunfei Yang, "DBIA: Data-free Backdoor Injection Attack against Transformer Networks", ICME 2023

[CCS] Zizhuang Deng, Kai Chen, Guozhu Meng, Xiaodong Zhang, Ke Xu, Yao Cheng, "Understanding Real-world Threats to Deep Learning Models in Android Apps", CCS 2022

[CCS] Siyuan Tang, Xianghang Mi, Ying Li, XiaoFeng Wang, Kai Chen, "Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam", CCS 2022

[ASE] Xueyang Li, Shangqing Liu, Ruitao Feng, Guozhu Meng, Xiaofei Xie, Kai Chen, Yang Liu, "TransRepair: Context-aware Program Repair for Compilation Errors", ASE 2022

[ASE] Suwan Li, Lei Bu, Guangdong Bai, Zhixiu Guo, Kai Chen, Hanlin Wei, "VITAS : Guided Model-based VUI Testing of VPA Apps", ASE 2022

[ASE] Fuman Xie, Yanjun Zhang, Chuan Yan, Suwan Li, Lei Bu, Kai Chen, Zi Huang, Guangdong Bai, "Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps", ASE 2022

[TDSC] Jiqiang Gao, Boyu Hou, Xiaojie Guo, Zheli Liu, Ying Zhang, Kai Chen, Jin Li, "Secure Aggregation is Insecure: Category Inference Attack on Federated Learning", TDSC, 2022 (accepted)

[ISSTA] Lei Bu, Qiuping Zhang, Suwan Li, Jinglin Dai, Guangdong Bai, Kai Chen, Xuandong Li, "Security Checking of Trigger-Action-Programming Smart Home Integrations", ISSTA 2023

[ICME] Peizhuo Lv, Hualong Ma, Jiachen Zhou, Ruigang Liang, Kai Chen, Shengzhi Zhang, Yunfei Yang, "DBIA: Data-free Backdoor Injection Attack against Transformer Networks", ICME 2023

[TOPS] Yuxuan Chen, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen, XiaoFeng Wang, Shanqing Guo, "SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems", ACM Transactions on Privacy and Security, 2022 (accepted)

[CCS] Yue Zhao, Hong Zhu, Kai Chen, Shengzhi Zhang, "AI-Lancet: Locating Error-inducing Neurons to Optimize Neural Networks", CCS 2021

[USENIX Security] Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He. DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks, USENIX Security 2021

[S&P] Yi Chen, Yepeng Yao, XiaoFeng Wang, Dandan Xu, Xiaozhong Liu, Chang Yue, Kai Chen, Haixu Tang, Baoxu Liu. "Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis", IEEE S&P 2021

[UbiComp] Dawei Wang, Kai Chen, Wei Wang, "Demystifying the Vetting Process of Voice-controlled Skills on Markets", UbiComp 2021

[WWW] Dongsong Yu, Guangliang Yang, Guozhu Meng, Xiaorui Gong, Xiu Zhang, Xiaobo Xiang, Xiaoyu Wang, Yue Jiang, Kai Chen, Wei Zou, Wenke Lee and Wenchang Shi, "SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization," in Proceedings of the 30th The Web Conference (WWW), Ljubljana, Slovenia, 2021. 

[DSN] Weijie Liu, Wenhao Wang, XiaoFeng Wang, Xiaozhu Meng, Yaosong Lu, Hongbo Chen, Xinyu Wang, Qingtao Shen, Kai Chen, Haixu Tang, Yi Chen, Luyi Xing, Practical and Efficient in-Enclave Verification of Privacy Compliance, DSN 2021

[TIFS] Cong Dong, Zhigang Lu, Zelin Cui, Baoxu Liu, Kai Chen, MBTree: Detecting Encryption RATs Communication Using Malicious Behavior Tree, TIFS 2021

[CCS] Tao Lv, Ruishi Li, Yi Yang, Kai Chen, Xiaojing Liao, XiaoFeng Wang, Peiwei Hu, Luyi Xing, "RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection", CCS 2020

[USENIX Security] Zhixiu Guo, Zijin Lin, Pan Li, Kai Chen, "SkillExplorer: Understanding the Behavior of Skills in Large Scale", USENIX Security 2020

[USENIX Security] Peiyuan Zong, Tao Lv, Dawei Wang, Zizhuang Deng, Ruigang Liang, Kai Chen, "FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning", USENIX Security 2020

[USENIX Security] Yuxuan Chen, Xuejing Yuan*(co-first author), Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, XiaoFeng Wang, "Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices", USENIX Security 2020

[UbiComp] Y. Lee, Y. Zhao, J. Zeng, K. Lee, N. Zhang, F. Shezan, Y. Tian, K. Chen, X. Wang, "SPEAKER-RADAR: a Sonar-based Liveness Detection System for Protecting Smart Speakers Against Remote Attackers", ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), 2020

[TSE] Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He. Towards Security Threats of Deep Learning Systems: A Survey, IEEE Transactions on Software Engineering, 09 November 2020, IEEE TSE 2020

[TCAD] Jinfeng Li, Liwei Chen, Gang Shi, Kai Chen and Dan Meng, "ABCFI: Fast and Lightweight Fine-grained Hardware-assisted Control Flow Integrity", IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Volume: 39, Issue: 11, Nov. 2020, Page(s): 3165 - 3176

[ESORICS] Jinfeng Li, Liwei Chen, Qizhen Xu, Linan Tian, Gang Shi, Kai Chen, and Dan Meng,"Zipper Stack Shadow Stacks Without Shadow", ESORICS 2020

[EuroS&P] Yunhui Long, Lei Wang, Diyue Bu, Vincent Bindschaedler, Xiaofeng Wang, Haixu Tang, Carl A Gunter, Kai Chen, A Pragmatic Approach to Membership Inferences on Machine Learning Models, EuroS&P 2020

[TMC] Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, and Peng Liu. "Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation", IEEE TRANSACTIONS ON MOBILE COMPUTING (TMC), VOL. 19, NO. 12, DECEMBER 2020, 2946-2964

[CCS] Yue Zhao, Hong Zhu, Ruigang Liang, Qintao Shen, Shengzhi Zhang, Kai Chen, "Seeing isn’t Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors", CCS 2019

[USENIX Security] Y. Chen, L. Xing, Y. Qin, X. Liao, X. Wang, K. Chen, W. Zou, "Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis", USENIX Security 2019

[S&P] Yi Chen, Mingming Zha, Nan Zhang, Dandan Xu, Qianqian Zhao, Xuan Feng, Kan Yuan, Fnu Suya, Yuan Tian, Kai Chen, XiaoFeng Wang, Wei Zou, "Demystifying Hidden Privacy Settings in Mobile Apps", IEEE S&P 2019

[DSN] Jiaqi Peng, Feng Li, Bingchang Liu, Lili Xu, Binghong Liu, Kai Chen and Wei Huo, "1dVul: Discovering 1-day Vulnerabilities through Binary Patches", DSN 2019

[EuroS&P] Ke Xu, Yingjiu Li, Robert H. Deng, Kai Chen, Jiayun Xu, "DroidEvolver: Self-Evolving and Scalable Android Malware Detection System", EuroS&P 2019

[EuroS&P] Baojun Liu, Zhou Li, Peiyuan Zong, Chaoyi Lu, Haixin Duan, Ying Liu, Sumayah Alrwais, Xiaofeng Wang, Shuang Hao, Yaoqi Jia, Yiming Zhang, Kai Chen, Zaifeng Zhang, "TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-scale DNS Analysis", EuroS&P 2019

[USENIX Security] Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A Gunter, "CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition", USENIX Security, 2018

[TMC] Kai Chen, Yingjun Zhang, Peng Liu, "Leveraging Information Asymmetry to Transform Android Apps into Self-Defending Code against Repackaging Attacks", IEEE Transactions on Mobile Computing (TMC), 2018, (Accepted)

[EuroS&P] Ke Xu, Yingjiu Li, Robert H. Deng, Kai Chen, "DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks", 3rd IEEE European Symposium on Security and Privacy (EuroS&P), London, UK, April 24-26, 2018 (Accepted)

[TIFS] Jing Chen, Chiheng Wang, Ziming Zhao, Kai Chen, Ruiying Du, and Gail-Joon Ahn, "Uncovering the Face of Android Ransomware: Characterization and Real-time Detection", IEEE Transactions on Information Forensics and Security (TIFS), 2018, (Accepted)

[TIFS] Ming Fan, Jun Liu, Xiapu Luo, Kai Chen, Zhenzhou Tian, Qinghua Zheng, Ting Liu, "Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis" , IEEE Transactions on Information Forensics and Security (TIFS), 2018, (Accepted)

[COSE] Chen Zhong, Tao Lin, Peng Liu, John Yen, and Kai Chen, "A Cyber Security Data Triage Operation Retrieval System", Computers & Security, 2018, (Accepted)

[CCS] Yi Chen, Wei You, Peter Yeonjoon Lee, Kai Chen, XiaoFeng Wang, Wei Zou, "Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution", In Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS), 2017. (Accepted)

[CCS] Wei You, Peiyuan Zong, Kai Chen, XiaoFeng Wang, Xiaojing Liao, Pan Bian, Bin Liang, "SemFuzz: Semantics-based Automatic PoC Generation", In Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS), 2017. (Accepted)

[CCS] Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, XiaoFeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han, "Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews", In Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS), 2017. (Accepted)

[RAID] Kai Chen, Tongxin Li, Bin Ma, Peng Wang, XiaoFeng Wang, Peiyuan Zong, "Filtering for Malice through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level", RAID 2017 (Accepted)

[DSN] Yeonjoon Lee, Tongxin Li, Nan Zhang, Soteris Demetriou, Mingming Zha, XiaoFeng Wang, Kai Chen, Xiaoyong Zhou, Xinhui Han and Michael Grace, "Ghost Installer in the Shadow: Security Analysis of App Installation on Android", DSN 2017. (Accepted) 

[MobiSys] Lannan Luo*, Qiang Zeng*, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min  Yang, Xinyu Xing, and Peng Liu. ( *Co-first authors), "System Service Call-oriented  Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and  Exploit Generation," ACM MobiSys 2017. (Accepted) 

[MobiSys] Xing Liu, Tianyu Chen, Feng Qian, Zhixiu Guo, Felix Xiaozhu Lin, Xiaofeng Wang,  and Kai Chen, "Characterizing Smartwatch Usage in The Wild", ACM MobiSys 2017. (Accepted)

[S&P] Kai Chen, Xueqiang Wang, Yi Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Bin Ma, Aohui Wang, Yingjun Zhang, Wei Zou, "Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS".  Accepted by the 36th IEEE Symposium on Security and Privacy (Oakland)

[TRE] Kai Chen, Yingjun Zhang and Peng Liu, "Dynamically Discovering Likely Memory Layout to Perform Accurate Fuzzing", IEEE Transactions on Reliability, 2016, accepted, to appear

[ISSRE] Ming Fan, Jun Liu, Xiapu Luo, Kai Chen, Tianyi Chen, Zhenzhou Tian, Xiaodong Zhang and Ting Liu, Frequent Subgraph based Familial Classification of Android Malware, Proceedings of 27th International Symposium on Software Reliability Engineering (ISSRE), Ottawa, Canada, Oct., 2016. (Best Research Paper Award)

[CCS] Heqing  Huang, Sencun Zhu, Kai Chen, and Peng Liu, "From System Service Freezing to System Server Shutdown in Android: All You Need Is a Loop in an Application." To appear in the 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, USA. October 12-16, 2015

[CCS] Yousra Aafer, Nan Zhang, Zhongwen Zhang, Xiao Zhang, Kai Chen, XiaoFeng Wang, Xiaoyong Zhou, Wenliang Du, and Michael Grace. "Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References". To appear in the 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, USA. October 12-16, 2015

[CCS] Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang, Kai Chen, Shi-min Hu, Xinhui Han. "Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS X and iOS". To appear in the 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, USA. October 12-16, 2015

[CCS] Yangyi Chen, Tongxin Li, XiaoFeng Wang, Kai Chen, Xinhui Han, "Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations", To appear in the 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, USA. October 12-16, 2015

[USENIX Security] Kai Chen, Peng Wang, Yeonjoon Lee, Xiaofeng Wang, Nan Zhang, Heqing Huang, Wei Zou, Peng Liu, "Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale," USENIX Security 2015

[SESA] Kai Chen and Jun Shao. "Preface to special issue on miscellaneous emerging security problems", EAI Endorsed Transactions on Security and Safety, EAI, 2015, 15

[ASIACCS] Heqing Huang, Kai Chen, Chuangang Ren, Peng Liu, Sencun Zhu and Dinghao Wu, “Towards Discovering and Understanding the Unexpected Hazards in Tailoring Antivirus Software for Android,” ACM ASIACCS 2015, full paper

[ICSE] Kai Chen, Peng Liu, Yingjun Zhang, “Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Markets”, ICSE 2014, regular paper, June 2014. 

[ASE] Chuangang Ren, Kai Chen *(co-first author), Peng Liu, "Droidmarking: Resilient Software Watermarking for Impeding Android Application Repackaging," ASE 2014, Sept. 15-19, Sweden, 2014.

[SERE] ZHANG Yingjun, CHEN Kai, "AppMark: A Picture-based Watermark for Android Apps", SERE 2014

[JOE] CHEN Kai, ZHANG Yingjun, "Statically-Directed Dynamic Taint Analysis", Journal of Electronics, 2014 

[SIM] Mingyi Zhao, Jens Grossklags and Kai Chen, "An Exploratory Study of White Hat Behaviors in a Web Vulnerability Disclosure Program", ACM CCS Workshop on Security Information Workers, 2014.

[SLSS] Yingjun Zhang, Kezhen Huang, Yuling Liu, Kai Chen, Liang Huang, Yifeng Lian, "Timing-based Clone Detection on Android Markets”, SLSS 2014

[SLSS] Heqing Huang, Kai Chen, Peng Liu, Sencun Zhu and Dinghao Wu, "Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms", SLSS 2014

[JOS] 黄亮, 冯登国, 连一峰, 陈恺, 张颖君, 刘玉岭. "一种基于多属性决策的DDoS攻击防护措施遴选方法". 软件学报, 2014.

[SERE] CHEN Kai, ZHANG Yingjun, LIAN Yifeng, "Vulnerability-based Backdoors: Threats From Two-steps Trojans", SERE 2013

[ISPEC] LIU Yuling, FENG Dengguo, LIAN Yifeng, CHEN Kai and ZHANG Yingjun, Optimal Defense Strategies for DDoS defender using Bayesian Game Model, ISPEC 2013

[ISPEC] ZHANG Yingjun, CHEN Kai, LIAN Yifeng, "VulLocator: Automatically Locating Vulnerable Code in Binary Programs", ISPEC 2013 

[JCRAD] 刘玉岭、冯登国、连一峰、陈恺、吴迪,“基于时空维度分析的网络安全态势预测方法”,计算机研究与发展

[JCRAD] 黄亮, 冯登国, 连一峰, 陈恺. 基于神经网络的DDoS防护绩效评估[J],计算机研究与发展,2013,50(10):2100-2108

[CJC] CHEN Kai,SU Purui,FENG Dengguo,"Dynamic overflow vulnerability detection method based on finite CSP", 计算机学报 ,2012 

[JOS] 吴迪,冯登国,连一峰,陈恺, "一种给定脆弱性环境下的安全措施效用评估模型", 软件学报,2012

[JCRAD] 吴迪,冯登国,连一峰,陈恺,一种基于攻击图的安全威胁识别和分析方法,计算机研究与发展,2012

[SCICHINA] CHEN Kai, FENG Dengguo, SU Purui, ZHANG Yingjun, "Black-box testing based on colorful taint analysis". Sci China Inf Sci, 2012, 55: 171–183, doi: 10.1007/s11432-011-4291-y

[ICISC] CHEN Kai, LIAN Yifeng、Zhang Yingjun,"AutoDunt: Dynamic Latency Dependence Analysis for Accurate Detection of Zero Day Vulnerabilities", ICISC 2011, Springer 

[SCICHINA] 陈恺,冯登国,苏璞睿,张颖君,"基于彩色污点传播的黑盒测试方法", 中国科学, 2011, 41(5), 526-540

[WISA] ZHANG Yingjun, ZHANG Yang, CHEN Kai, "A Map-layer-based Access Control Model", WISA 2011, Springer, LNCS 

[JCRAD] 聂楚江、赵险峰、陈恺、韩正清,"一种微观漏洞数量预测模型",计算机研究与发展,2011,48(7), 1279-1287

[JOS] CHEN Kai,FENG Dengguo , SU Purui,NIE Chujiang, ZHANG Xiaofei, "Multi-Cycle Vulnerability Discovery Model for Prediction",软件学报,2010, 21(9), 2367-2375

[CJC] CHEN Kai,SU Purui,FENG Dengguo," Exploring multiple execution paths based on dynamic lazy analysis ",计算机学报,2010, 33(3), 493-503

[ICICS] CHEN Kai、LIAN Yifeng、Zhang Yingjun,"Automatically Generating Patch in Binary Programs Using Attribute-based Taint Analysis", M. Soriano, S. Qing, and J. Lpez (Eds.): ICICS 2010, LNCS 6476, pp. 367--382. Springer, Heidelberg (2010) 

[JOC] 张颖君、冯登国、陈恺,"面向空间索引树的授权机制", 通信学报,2010, 31(9),64-73

[SEPCOM] CHEN Kai, SU Purui, ZHANG Yingjun, FENG Dengguo, "SEPCOM: Customizable Zero Copy Model," Proceedings of the Valuetools, 2007.

科研活动

   
科研项目

(1) 基于矿脉理论的软件安全漏洞测评方法研究,主持,国家自然科学基金,2012-01--2014-12
(2) 基于海量软件片段比对的恶意代码检测方法研究,主持,国家自然科学基金,2016-01--2018-12
(3) 基于漏洞数据集的漏洞特征库分析与预测方法研究,主持,国家自然科学基金(重点项目),2019-01--2022-12
(4) 可解释、可通用的下一代人工智能方法--深度学习隐私保护计算新型体系框架与模型,主持,国家自然科学基金(重大研究计划-重点项目),2023-01--2026-12

学术服务

PC member:

USENIX Security: 2021, 2022
IEEE S&P: 2022
CCS: 2018, 2019, 2022, 2023
RAID: 2019, 2020, 2021
DSN: 2021
......