General
Purui Su
Professor,
Deputy Director of Trusted Computing and
Information Assurance Lab


Email: Purui (AT) iscas.ac.cn
Telephone: (086)-10-62661723
Address: 4# South Fourth Street, Zhong Guan Cun, Beijing,China
Postcode: 100190


Research Areas

Software Security, System Security, Network Security

Publications

[1] Meining Nie, Purui SU, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu, Dengguo Feng, Xede:Practical Exploit Early Detection, RAID 2015.    
[2] Minghua Wang, Heng Yin, Abhishek vasisht bhaskar, Purui SU, Dengguo Feng, Binary Code Continent:Finer-Grained Control Flow Integrity for Stripped Binaries, ACSAC 2015.    
[3] Yacong Gu, Qi Li, Hongtao Zhang, Purui Su, Xinwen Zhang, Dengguo Feng. “Direct Resource Hijacking in Android is Still Dangerous.” IEEE Internet Computing 2015.  
[4] Qi Li,Xinwen zhang, Xin Zhang, Purui Su, Invalidating Idealized BGP Security Proposals and Countermeasure, IEEE Trans. On Dependable and Secure Computing
[5] Yao Cheng, Chang Xu, Yi Yang, Linyun Ying, Purui Su and Dengguo Feng. Automated User Profiling in Location-based Mobile Messaging Applications[C]. In Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), 2014.
[6] Jia Yan, LingYun Ying, Yi Yang, Purui Su, Dengguo Feng. Long Term Tracking and Characterization of P2P Botnet. [C]. In Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), 2014.
[7] Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Qi Li, Hui Kong and Dengguo Feng. Revisiting Node Injection of P2P Botnet.The 8th International Conference on Network and System Security (NSS), 2014.
[8] Wang M, Su P, Li Q, et al. Automatic Polymorphic Exploit Generation for Software Vulnerabilities[M]//Security and Privacy in Communication Networks. Springer International Publishing, 2013: 216-233.
[9] Jiang J, Nie M, Su P, et al. VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing[M]//Security and Privacy in Communication Networks. Springer International Publishing, 2013: 122-139.
[10] Yao Cheng, Lingyun Ying, Sibei Jiao, Purui Su, Dengguo Feng. Bind Your Phone Number with Caution: Automated User Profiling Through Address Book Matching on Smartphone[C]. In Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2013: 335-340.
[11] He L, Feng D, Su P, et al. OSNGuard: Detecting Worms with User Interaction Traces in Online Social Networks[M]//Information and Communications Security. Springer International Publishing, 2013: 59-74.