基本信息
孙德刚  男  博导  中国科学院计算机网络信息中心
电子邮件: dgsun@cnic.cn
通信地址: 北京市海淀区闵庄路甲89号
邮政编码: 100083

招生信息

   
招生专业
083900-网络空间安全
招生方向
移动互联网安全,网络体系结构与安全防护

教育背景

1998-08--2002-06   北京交通大学   工学硕士

工作经历

   
社会兼职
2016-01-01-2020-01-01,中国计算机学会信息保密专委会, 副主任
2015-08-01-2020-07-31,中国保密协会科学技术分会, 主任
2014-08-01-2018-07-31,信息安全共性技术国家工程研究中心, 主任

教授课程

无线安全
保密科学技术
无线通信安全技术
电磁泄漏发射与防护

专利与奖励

   
奖励信息
(1) 某应用研发, 二等奖, 部委级, 2018
(2) 某工程建设, 三等奖, 其他, 2016
(3) 重要场所安全工程建设, 三等奖, 其他, 2014
(4) 计算机及移动存储介质管理系统研制、标准制定及配备应用示范, 二等奖, 部委级, 2012
(5) 文档管理系统, 二等奖, 部委级, 2009
(6) 分级保护标准及应用示范, 二等奖, 部委级, 2007
(7) 两办工程建设, 二等奖, 部委级, 2004
(8) TEMPEST技术研究, 二等奖, 国家级, 2001
(9) TEMPEST标准制定, 一等奖, 部委级, 1997
(10) 信息保护机研制, 二等奖, 部委级, 1995

出版信息

   
发表论文
[1] 孙德刚, 徐国坤, 王伟杰, 王妍, 吕遒健, Xingxing Zhou, Zhiqi Li. LWVN:An Lightweight Virtual Network Methond to Defend Lateral Movement. Trustcomnull. 2023, [2] 刘玟, 孙德刚, 王妍, 陈仲元, 韩心搏, 杨海天. ABTD-Net: Autonomous Baggage Threat Detection Networks for X-ray Images.. 2023 IEEE International Conference on Multimedia & Expo (ICME)null. 2023, [3] 杨海天, 孙德刚, 王妍, 赵楠, 张仕响, 黄伟庆. AdaptParse: Adaptive Contextual Aware Attention Network for Log Parsing via Word Classification. 2023 International Joint Conference on Neural Networks (IJCNN)null. 2023, [4] 杨海天, 孙德刚, 刘玟, 李燕淑, 王妍, 黄伟庆. ASGNet: Adaptive Semantic Gate Networks for Log-Based Anomaly Diagnosis. 2023 International Conference on Neural Information Processing (ICONIP)null. 2023, [5] 刘玟, 孙德刚, 杨海天, 祝贺, 王妍. IAD-Net: Multivariate KPIs Interpretable Anomaly Detection with Dual Gated Residual Fusion Networks. 2023 TrustComnull. 2023, [6] 毛锐, 纪鹤鸣, 程迪, 王晓宇, 王妍, 孙德刚. Implicit Continuous Authentication Model Based on Mobile Terminal Touch Behavior. . IEEE Symposium on Computers and Communications (ISCC)null. 2022, [7] Li, Ce, Lv, Qiujian, Li, Ning, Wang, Yan, Sun, Degang, Qiao, Yuanyuan. A novel deep framework for dynamic malware detection based on API sequence intrinsic features. COMPUTERS & SECURITY[J]. 2022, 116: http://dx.doi.org/10.1016/j.cose.2022.102686.
[8] Yang, Haitian, Zhao, Xuan, Wang, Yan, Sun, Degang, Chen, Wei, Huang, Weiqing. BertHANK: hierarchical attention networks with enhanced knowledge and pre-trained model for answer selection. KNOWLEDGE AND INFORMATION SYSTEMS[J]. 2022, 64(8): 2189-2213, http://dx.doi.org/10.1007/s10115-022-01703-7.
[9] Li, Ce, Cheng, Zijun, Zhu, He, Wang, Leiqi, Lv, Qiujian, Wang, Yan, Li, Ning, Sun, Degang. DMalNet: Dynamic malware analysis based on API feature engineering and graph learning. COMPUTERS & SECURITY[J]. 2022, 122: http://dx.doi.org/10.1016/j.cose.2022.102872.
[10] 程子俊, 孙德刚, 王蕾祺, 吕遒健, 王妍. MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed Scenarios. 2022 IEEE Symposium on Computers and Communicationsnull. 2022, [11] 王思叶. URTracker: unauthorized reader detection and localization using COTS RFID. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 12937 LNCS, p 339-350, 2021, Wireless Algorithms, Systems, and Applications - 16th International Conference, WASA 2021, Proceedings;. 2021, [12] Wang, Tingting, Zhao, Xufeng, Lv, Qiujian, Hu, Bo, Sun, Degang, Shen, W, Barthes, JP, Luo, J, Shi, Y, Zhang, J. Density Weighted Diversity Based Query Strategy for Active Learning. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD)null. 2021, 156-161, [13] 孙德刚, 郭韵婷, 喻民, 姜建国, 黄伟庆. FUNC-ESIM: A Dual Pairwise Attention Network for Cross-version Binary Function Matching. IJCNNnull. 2021, [14] Ou, Changhai, Lam, SiewKei, Sun, Degang, Zhou, Xinping, Qiao, Kexin, Wang, Qu. SNR-Centric Power Trace Extractors for Side-Channel Attacks. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS[J]. 2021, 40(4): 620-632, http://dx.doi.org/10.1109/TCAD.2020.3003849.
[15] Sun Degang. DeepMIT: A Novel Malicious Insider Treat Detection Framework based on Recurreent Neural Network. Proceedings of the 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design. 2021, [16] Yang, Yang, Li, Min, Meng, Bo, Huang, Zihao, Ren, Junxing, Sun, Degang. Objects as Extreme Points. Pacific Rim International Conference on Artificial Intelligence(PRICAI)null. 2021, http://arxiv.org/abs/2104.14066.
[17] Yang, Yang, Li, Min, Meng, Bo, Ren, Junxing, Sun, Degang, Huang, Zihao. Rethinking the Aligned and Misaligned Features in One-stage Object Detection. 2021, [18] 王婷婷, 吕遒健, 胡波, Sun Degang. A Few-Shot Class-Incremental Learning Approach for Intrusion Detection.. The 30th International Conference on Computer Communication and Networks (ICCCN)[J]. 2021, [19] Sun, Degang, Liu, Meichen, Li, Meimei, Shi, Zhixin, Liu, Pengcheng, Wang, Xu, Shen, W, Barthes, JP, Luo, J, Shi, Y, Zhang, J. DeepMIT: A Novel Malicious Insider Threat Detection Framework based on Recurrent Neural Network. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD)null. 2021, 335-341, [20] 王婷婷, 吕遒健, 胡波, Sun Degang. CVSS-based Multi-Factor Dynamic Risk Assessment Model for Network System.. In 2020 IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)[J]. 2020, [21] 魏冬. Spectrum Demand Estimation Model for NGSO Communication Systems Considering Time Delay Constraints and Different Spectrum Access Strategies. 2020 27th International Conference on Telecommunications (ICT). 2020, [22] Sun, Degang, Zhang, Qiaoyu, Wei, Dong, Zhang, Meng. A Secure Constellation Design for Polarized Modulation in Wireless Communications. IEEEACCESS[J]. 2020, 8: 130588-130597, https://doaj.org/article/01dda75c7e0740a2ade45b45b11cd162.
[23] Sun, Degang, Yang, Yang, Li, Min, Yang, Jian, Meng, Bo, Bai, Ruwen, Li, Linghan, Ren, Junxing. A Scale Balanced Loss for Bounding Box Regression. IEEE ACCESS[J]. 2020, 8: 108438-108448, https://doaj.org/article/6f63cb6c44cd4bfe9c139ea814f5415e.
[24] Sun Degang. Terminator: A File-level Hybrid Framework for Intellectual Property Theft Detection and Prevention. International Conference on Computing Frontiers. 2020, [25] Ou, Changhai, Wang, Zhu, Sun, Degang, Zhou, Xinping. Group Collision Attack. IEEETRANSACTIONSONINFORMATIONFORENSICSANDSECURITY[J]. 2019, 14(4): 939-953, https://www.webofscience.com/wos/woscc/full-record/WOS:000449082400009.
[26] Sun, Degang, Wu, Zhengrong, Wang, Yan, Lv, Qiujian, Hu, Bo, IEEE. Cyber Profiles Based Risk Prediction of Application Systems for Effective Access Control. 2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC)null. 2019, 836-842, [27] Sun, Degang, Wu, Zhengrong, Wang, Yan, Lv, Qiujian, Hu, Bo, IEEE. Risk Prediction for Imbalanced Data in Cyber Security : A Siamese Network-based Deep Learning Classification Framework. 2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN)null. 2019, [28] Sun Degang. An Improved Adaptive Anomaly Detection Method for Electromagnetic Streaming Data. International Conference on Information Technology and Science. 2019, [29] Sun Degang. An Efficient Electromag-netic Streaming Data Anomaly Detection Framework Based on Storm. International Conference on Big Data and Computing. 2019, [30] Zhou, Xinping, Whitnall, Carolyn, Oswald, Elisabeth, Sun, Degang, Wang, Zhu, Eisenbarth, T, Teglia, Y. A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher. SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2017)null. 2018, 10728: 70-87, [31] 孙德刚. 基于HOG的跳频信号自动化检测模型. 通信技术. 2018, [32] 孙德刚. 电子邮件信息泄露问题探讨. 通信技术. 2018, [33] Sun, Degang, Yang, Kun, Shi, Zhixin, Lv, Bin, Li, G, Ge, Y, Zhang, Z, Jin, Z, Blumenstein, M. A Behavior-Based Method for Distinction of Flooding DDoS and Flash Crowds. KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT (KSEM 2017)null. 2017, 10412: 129-136, [34] Kong, Bin, Yang, Kun, Sun, Degang, Li, Meimei, Shi, Zhixin. Distinguishing Flooding Distributed Denial of Service from Flash Crowds Using Four Data Mining Approaches. COMPUTER SCIENCE AND INFORMATION SYSTEMS[J]. 2017, 14(3): 839-856, https://www.webofscience.com/wos/woscc/full-record/WOS:000413777600019.
[35] Sun Degang. Towards easy key enumeration. IACR Cryptology ePrint Archive. 2017, [36] Sun Degang, Yang Kun, Shi Zhixin, Wang Yan, Ma L, Khreishah A, Zhang Y, Yan M. Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017null. 2017, 10251: 729-740, [37] Sun Degang. Towards optimal pre-processing in leakage detection. IACR Cryptology ePrint Archive. 2017, [38] 周新平, 孙德刚, 王竹, 欧长海. 一种基于奇异值分解的功耗轨迹筛选方法. 电子学报[J]. 2017, 45(9): 2250-2255, http://lib.cqvip.com/Qikan/Article/Detail?id=673352127.
[39] Sun Degang, Li Yiwei, Xu Yanyun, Hu Jianlin, IEEE. A Novel Method for Specific Emitter Identification Based on Singular Spectrum Analysis. 2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC)null. 2017, [40] Sun Degang. Profiling good leakage models for masked implementations. IACR Cryptology ePrint Archive. 2017, [41] Sun Degang, Yang Kun, Lv Bin, Shi Zhixin, IEEE. Could We Beat A New Mimicking Attack?. 2017 19TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS 2017): MANAGING A WORLD OF THINGSnull. 2017, 247-250, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000417431200045.
[42] Sun Degang. Manifold Learning Towards Masking Implementations: A First Study. IACR Cryptology ePrint Archive. 2017, [43] Sun Degang. Group verification based multiple-differential collision attack. In Information and Communications Security - 18th International Conference. 2016, [44] Sun, DeGang, Shi, Jun, Wei, Dong, Zhang, Meng, Huang, WeiQing. Method for detecting text information leakage in electromagnetic radiation from a computer display. IET INFORMATION SECURITY[J]. 2016, 10(6): 413-417, https://www.webofscience.com/wos/woscc/full-record/WOS:000386964400010.
[45] Ou Changhai, Wang Zhu, Sun Degang, Zhou Xinping, Ai Juan, Hoepman JH, Katzenbeisser S. Uncertain? No, It's Very Certain! Recovering the Key from Guessing Entropy Enhanced CPA. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016null. 2016, 471: 308-320, [46] Sun Degang, Wei Di, Zhang Ning, Lv Zhiqiang, Yin Xi, IEEE. Network Transmission of Hidden Data using Smartphones based on Compromising Emanations. 2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC)null. 2016, 190-193, [47] Sun, Degang, Shi, Jun, Ding, Xuejie, Zhang, Meng, Huang, Weiqing, IEEE. Method for Detecting Information Leakage From Computer Display in Electromagnetic Radiation. 2016 IEEE TRUSTCOM/BIGDATASE/ISPAnull. 2016, 2041-2046, [48] Zhou Xinping, Sun Degang, Wang Zhu, Ou Changhai, Ai Juan, IEEE. Double-Key Recovery Based Correlation Power Analysis. 2016 IEEE TRUSTCOM/BIGDATASE/ISPAnull. 2016, 1016-1022, [49] Sun Degang. Enhanced correlation power analysis by biasing power traces. In Information Security - 19th International Conference. 2016, [50] Ou, Changhai, Wang, Zhu, Sun, Degang, Zhou, Xinping, Ai, Juan, IEEE. Power Traces Clipping and Splicing Enhanced Correlation Collision Analysis. 2016IEEETRUSTCOMBIGDATASEISPAnull. 2016, 989-995, [51] Sun Degang, Shi Jun, Wei Dong, Zhang Meng, Huang Weiqing, Qiu Xuguang, IEEE. A New Method to Recognize Computer through Electromagnetic Radiation Based on Spectral Centroid. 2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC)null. 2016, 184-186, [52] 孙德刚. An Efficient and Anti-interference Method of Synchronizing Information Extraction for Video Leaking Signal [J].. IET Signal Processing. 2015, [53] 孙德刚. An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks. Information and Communications Security. Springer International Publishing. 2015, [54] Sun Degang. POSTER: using improved singular value decomposition to enhance correlation power analysis. In Security and Privacy in Communication Networks - 11th International Conference. 2015, [55] 孙德刚. 电磁泄漏文本信息检测方法. International Conference on Information and Communications Security. 2014, [56] 孙德刚. 基于访问控制矩阵的移动存储介质安全控制. The 2014 2nd International Conference on Systems and Informatics(ICSAI2014). 2014, [57] 孙德刚. A Low-cost and Efficient Method of Determining the Best Frequency Band for Video Leaking Signal Reconstruction[C]. Proc of International Conference on Systems and Informatics. Shanghai: IEEE, 2014.. 2014, [58] 孙德刚. 视频电磁泄漏频率的判断方法. The 2014 2nd International Conference on Systems and Informatics(ICSAI2014)EI. 2014, [59] Ce Li, Zijun Cheng, He Zhu, Leiqi Wang, Qiujian Lv, Yan Wang, Ning Li, Degang Sun. DMalNet: Dynamic Malware Analysis Based on API Feature Engineering and Graph Learning. COMPUTERS & SECURITY. http://dx.doi.org/10.1016/j.cose.2022.102872.
发表著作
(1) 高级DPA理论与实践—迈向安全嵌入式电路的安全极限, 国防工业出版社, 2016-01, 第 3 作者

科研活动

   
科研项目
( 1 ) 虚拟化技术在信息系统中应用与实现, 主持, 国家级, 2012-05--2014-06
( 2 ) 207项目, 主持, 国家级, 2018-01--2020-12

指导学生

已指导学生

杨文  硕士研究生  081201-计算机系统结构  

邓辉  硕士研究生  081201-计算机系统结构  

王浩  硕士研究生  0812Z1-信息安全  

韦迪  硕士研究生  085211-计算机技术  

郭辰阳  硕士研究生  081201-计算机系统结构  

李怡伟  硕士研究生  0812Z1-信息安全  

崔亚洲  硕士研究生  085211-计算机技术  

曾佳  硕士研究生  085212-软件工程  

周新平  博士研究生  0812Z1-信息安全  

杨琨  博士研究生  081202-计算机软件与理论  

石珺  博士研究生  081202-计算机软件与理论  

张杰  硕士研究生  085211-计算机技术  

刘赛  硕士研究生  081001-通信与信息系统  

王友军  硕士研究生  081202-计算机软件与理论  

欧长海  博士研究生  083900-网络空间安全  

现指导学生

王婷婷  博士研究生  0812Z1-信息安全  

毛锐  博士研究生  0812Z1-信息安全  

吴峥嵘  硕士研究生  081001-通信与信息系统  

胡羽蓝  硕士研究生  085211-计算机技术  

房鹏飞  硕士研究生  085211-计算机技术  

崔越  博士研究生  081002-信号与信息处理  

杨阳  博士研究生  083900-网络空间安全  

卢思学  博士研究生  083900-网络空间安全  

刘超超  博士研究生  083900-网络空间安全  

夏宇琦  硕士研究生  081001-通信与信息系统  

李慧艳  硕士研究生  081201-计算机系统结构  

耿静茹  硕士研究生  083900-网络空间安全  

田雨  硕士研究生  085211-计算机技术  

白入文  博士研究生  083900-网络空间安全  

徐国坤  博士研究生  083900-网络空间安全  

杨峥  博士研究生  083900-网络空间安全  

程子俊  硕士研究生  081203-计算机应用技术  

李妍  硕士研究生  085211-计算机技术  

张艺馨  硕士研究生  085211-计算机技术