基本信息
王跃武  男  博导  中国科学院信息工程研究所
电子邮件: wangyuewu@iie.ac.cn
通信地址: 北京市海淀区闵庄路甲87号
邮政编码: 100093

研究领域

移动智能终端系统安全
信息系统安全测评
网络与系统安全

招生信息

招收网络安全、系统安全、密码工程技术等方向的博士和硕士研究生。

教授课程

网络与系统安全研究前沿
网络与系统安全
系统结构安全可信计算新思路
系统结构安全—可信计算新思路
计算机病毒原理
计算机通信网络安全

专利与奖励

   
奖励信息
(1) 国产密码算法软件实现安全技术及其在重要领域中的应用, 一等奖, 部委级, 2015

出版信息

   
发表论文
[1] 李彦初, 雷灵光, 王跃武, 荆继武, 周荃. TrustSAMP: Securing Streaming Music Against Multivector Attacks on ARM Platform. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (TIFS )[J]. 2022, [2] Rong Wei, Fangyu Zheng, Lili Gao, Jiankuo Dong, Guang Fan, Lipeng Wan, Jingqiang Lin, 王跃武. Heterogeneous-PAKE: Bridging the Gap between PAKE Protocols and Their Real-World Deployment. ACSAC 2021[J]. 2021, [3] Chang, Huan, Lei, Lingguang, Sun, Kun, Wang, Yuewu, Jing, Jiwu, He, Yi, Wang, Pingjian. Vulnerable Service Invocation and Countermeasures. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2021, 18(4): 1733-1750, http://dx.doi.org/10.1109/TDSC.2019.2936848.
[4] 王杰, 孙琨, 雷灵光, 王跃武. Cache-in-the-Middle (CITM) Attacks : Manipulating Sensitive Data in Isolated Execution Environments. CCS[J]. 2020, [5] Yuewu Wang. P2IC: Pragmatic and Probabilistic Integrity Verification for Cloud Storage. ISCC. 2020, [6] 牛莹娇, 雷灵光, 王跃武. SASAK: Shrinking the Attack Surface for AndroidKernel with Stricter "seccomp" Restrictions. MSN[J]. 2020, [7] Yuewu Wang. SafeSdcardfs: Securing the External Storage of Android in Uncontrolled Environment. Trustcom. 2020, [8] 吴一非, 雷灵光, 王跃武. Evaluation on the Security of Commercial Cloud Container Services. ISC[J]. 2020, [9] Li, Xiang, Su, Yijun, Gao, Neng, Xiang, Ji, Wang, Yuewu, IEEE. User Alignment with Jumping Seed Alignment Information Propagation. 2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN)null. 2020, [10] 王杰, 王跃武, 雷灵光. TrustICT: An Efficient Trusted Interaction Interface between Isolated Execution Domains on ARM Multi-core Processors. Sensys[J]. 2020, [11] Guan, Chong, Sun, Kun, Lei, Lingguang, Wang, Pingjian, Wang, Yuewu, Chen, Wei. DangerNeighbor attack: Information leakage via postMessage mechanism in HTML5. COMPUTERS & SECURITY[J]. 2019, 80: 291-305, http://dx.doi.org/10.1016/j.cose.2018.09.010.
[12] Cai, Yang, Wang, Yuewu, Lei, Lingguang, Zhou, Quan, IEEE. ALTEE: Constructing Trustworthy Execution Environment for Mobile App Dynamically. 2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC)null. 2019, 284-290, [13] Chu, Dawei, Wang, Yuewu, Lei, Lingguang, Li, Yanchu, Jing, Jiwu, Sun, Kun, Sako, K, Schneider, S, Ryan, PYA. OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform. COMPUTER SECURITY - ESORICS 2019, PT IInull. 2019, 11736: 412-438, [14] Yuan, Sisi, Wang, Yuewu, Wang, Pingjian, Lei, Lingguang, Zhou, Quan, Li, Jun, Lee, K. How to Block the Malicious Access to Android External Storage. INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018)null. 2019, 11396: 287-303, [15] 林璟锵, 郑昉昱, 王跃武. 密钥安全研究进展. 信息安全研究. 2019, 5(1): 68-74, http://lib.cqvip.com/Qikan/Article/Detail?id=7001084598.
[16] Li, Xiang, Su, Yijun, Gao, Neng, Tang, Wei, Xiang, Ji, Wang, Yuewu, Gedeon, T, Wong, KW, Lee, M. Aligning Users Across Social Networks by Joint User and Label Consistence Representation. NEURAL INFORMATION PROCESSING (ICONIP 2019), PT IInull. 2019, 11954: 656-668, [17] Cai, Yang, Wang, Yuewu, Lei, Lingguang, Zhou, Quan, Li, Jun, IEEE. SuiT: Secure User Interface Based on TrustZone. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2019, [18] Lin Xin, Lei Lingguang, Wang Yuewu, Jing Jiwu, Sun Kun, Zhou Quan, ACM. A Measurement Study on Linux Container Security: Attacks and Countermeasures. 34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018)null. 2018, 418-429, http://dx.doi.org/10.1145/3274694.3274720.
[19] Yuewu Wang. Enforcing ACL Access Control on Android Platform. ISC 2017. 2017, [20] 王跃武. Android APP第三方库权限隔离. ACISP: Australasian Conference on Information Security and Privacy. 2017, [21] 湛家伟, 左奇伟, 牛莹姣, 王跃武. Android应用程序第三方库的恶意行为隔离技术综述. 计算机应用与软件. 2017, 34(10): 304-309, http://lib.cqvip.com/Qikan/Article/Detail?id=673516709.
[22] Lei Lingguang, He Yi, Sun Kun, Jing Jiwu, Wang Yuewu, Li Qi, Weng Jian, ACM. Vulnerable Implicit Service: A Revisit. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITYnull. 2017, 1051-1063, http://dx.doi.org/10.1145/3133956.3133975.
[23] 王跃武. SPEAKER:应用容器的分段执行. 14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '17). 2017, [24] 王学强, 雷灵光, 王跃武. 一种易部署的Android APP动态行为监控方法. 中国科学院大学学报[J]. 2015, 32(5): 689-694, [25] Sun, He, Sun, Kun, Wang, Yuewu, Jing, Jiwu. Reliable and Trustworthy Memory Acquisition on Smartphones. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2015, 10(12): 2547-2561, https://www.webofscience.com/wos/woscc/full-record/WOS:000370000800006.
[26] 王跃武. DeepDroid:一种动态实施Android企业级安全策略的方案. NDSS. 2015, [27] 王跃武. TrustICE:基于硬件隔离的移动设备安全隔离执行环境. DSN. 2015, [28] Yuewu Wang. TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens. ACM Conference on Computer and Communications Security (CCS). 2015, [29] 王跃武. WrapDroid:一种灵活细粒度地Android APP行为管控方案. ICISC. 2014, [30] 王跃武. 一次Root,永久威胁:Android Permission机制安全分析. ACISP. 2014, [31] 王学强, 雷灵光, 王跃武. 移动互联网安全威胁研究. 信息网络安全. 2014, 30-33, http://lib.cqvip.com/Qikan/Article/Detail?id=662254613.
[32] 雷灵光, 荆继武, 王跃武, 张中文. 一种基于行为的Android系统资源访问控制方案. 计算机研究与发展[J]. 2014, 51(5): 1028-1038, http://lib.cqvip.com/Qikan/Article/Detail?id=49468404.
[33] 王跃武. TustDump:可靠的智能手机内存获取机制. ECSORICS. 2014, [34] Yuewu Wang. Cyber-Physical Voice Privacy Theft and Protection on Smart Mobile Terminal. TrustCOM. 2013, [35] 王跃武. 基于动态密钥的Android短信加密系统. 中国科学院研究生院学报. 2013, [36] 王琼霄, 王琼宵, 高能, 王跃武. 对SIP认证协议的安全性分析与改进. 信息网络安全. 2013, 5-7, http://lib.cqvip.com/Qikan/Article/Detail?id=47650519.
[37] Lei Lingguang, Wang Yuewu, Zhou Jian, Zha Daren, Zhang Zhongwen, IEEE. A Threat to Mobile Cyber-physical Systems: Sensor-based Privacy Theft Attacks on Android Smartphones. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013)null. 2013, 126-133, [38] 李昭, 王跃武, 雷灵光, 张中文. 基于动态密钥的Android短信加密方案. 中国科学院研究生院学报[J]. 2013, 30(2): 272-277, [39] 雷灵光, Yuewu Wang. MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring. ICISC[J]. 2012, [40] 刘涛, 聂晓峰, 荆继武, 王跃武. 基于小型对象分配技术的GTNetS蠕虫仿真内存管理. 中国科学院研究生院学报[J]. 2012, 29(1): 131-135, http://lib.cqvip.com/Qikan/Article/Detail?id=40402414.
[41] 聂晓峰, 荆继武, 王跃武, 向继. 基于Fluid的大规模带宽限制蠕虫仿真模型. 软件学报[J]. 2011, 22(9): 2166-2181, http://lib.cqvip.com/Qikan/Article/Detail?id=39062411.
[42] 康乐, 荆继武, 王跃武. 社会化网络服务中的信任扩张与控制. 计算机研究与发展[J]. 2010, 1611-1621, http://lib.cqvip.com/Qikan/Article/Detail?id=35181887.
[43] Nie Xiaofeng, Jing Jiwu, Wang Yuewu, Bao F, Yung M, Lin DD, Jing JW. A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms. INFORMATION SECURITY AND CRYPTOLOGYnull. 2010, 6151: 313-323, [44] 陈红, 聂晓峰, 荆继武, 王跃武. 基于SEM的网络蠕虫传播模型研究. 计算机仿真[J]. 2010, 103-106,126, http://lib.cqvip.com/Qikan/Article/Detail?id=34918321.
[45] 王跃武, 陈红, 荆继武, 聂晓峰. 仿真技术在信息安全研究中的应用. 信息网络安全. 2009, 44-46, http://lib.cqvip.com/Qikan/Article/Detail?id=31860170.
[46] 吴晶晶, 荆继武, 王跃武, 林璟锵, 刘怡聪. 真实应用环境下的PKI信任模型. 中国科学院研究生院学报[J]. 2009, 26(3): 389-399, http://lib.cqvip.com/Qikan/Article/Detail?id=30614092.
[47] 刘琦, 王跃武, 荆继武, 向继. 拓扑相关蠕虫仿真分析. 软件学报[J]. 2008, 19(6): 1508-1518, http://lib.cqvip.com/Qikan/Article/Detail?id=27429952.
[48] Wang, Yuewu, Liu, Peng, Jing, Jiwu, Jia, Xiaoqi, IEEE. A multi-level fidelity-preserving bandwidth-limited worm simulation model and its application. 41ST ANNUAL SIMULATION SYMPOSIUM, PROCEEDINGSnull. 2008, 308-+, [49] 王跃武, 荆继武, 向继, 刘琦. Contagion蠕虫传播仿真分析. 计算机研究与发展[J]. 2008, 45(2): 207-216, http://lib.cqvip.com/Qikan/Article/Detail?id=26603154.
[50] 王跃武, 荆继武, 向继, 刘琦. 基于拓扑结构的蠕虫防御策略仿真分析. 计算机学报[J]. 2007, 30(10): 1777-1786, http://lib.cqvip.com/Qikan/Article/Detail?id=25687930.
发表著作
(1) 数字签名应用安全证明获取方法, 国家市场监督管理总局 国家标准化管理委员会 国家标准, 2018-09, 第 1 作者
(2) 信息安全技术 可信执行环境服务规范, IInformation security technology—Trusted execution environment service specification, 国家标准, 2024-01, 第 4 作者
(3) 可信执行环境技术规范 系统架构, Information Security Technology Specification for Trusted Execution Environment System Architecture, 国家标准, 2024-12, 第 其他 作者