基本信息
朱子元  男  博导  中国科学院信息工程研究所
电子邮件: zhuziyuan@iie.ac.cn
通信地址: 北京市海淀区树村路12号
邮政编码:

研究领域

计算机系统结构

网络空间安全

招生信息

   
招生专业
083900-网络空间安全
招生方向
片上系统芯片安全,处理器安全

教育背景

2004-09--2010-05   同济大学   博士研究生

教授课程

嵌入式系统设计与安全
计算机体系结构安全
计算机系统结构安全
高级计算机系统结构

专利与奖励

   
奖励信息
(1) 省部级科技奖, 二等奖, 部委级, 2016
(2) 省部级科技奖, 一等奖, 部委级, 2016
(3) 科技成果转化, 特等奖, 院级, 2014
专利成果
[1] 孟丹, 丁洁, 朱子元, 王立敏, 闫超. 指令流压缩、解压缩方法及装置. CN: CN111708574B, 2020-09-25.
[2] 孟丹, 王立敏, 朱子元. 应用于处理器微结构侧信道防御措施的安全性测试方法. CN: CN111767207B, 2021-05-28.
[3] 孟丹, 李丹萍, 朱子元, 史岗. 处理器指令集的完备性检测方法、装置与电子设备. CN: CN110688304B, 2021-04-27.
[4] 孟丹, 李丹萍, 朱子元, 史岗. 处理器指令集测试方法及装置. CN: CN110716855B, 2021-05-14.
[5] 孟丹, 李丹萍, 朱子元, 史岗. 基于域填充的处理器指令编码自动生成方法及装置. CN: CN110569065A, 2019-12-13.
[6] 孟丹, 李丹萍, 朱子元, 史岗. 处理器指令编码的自动生成方法及装置. CN: CN110175047A, 2019-08-27.

出版信息

   
发表论文
[1] 李丹萍, 朱子元. x86处理器向量条件访存指令安全脆弱性分析. 计算机学报[J]. 2024, [2] 李芳, 朱子元, 闫超, 孟丹. 基于集成学习技术的恶意软件检测方法. 信息安全学报[J]. 2024, 9(1): 137-155, http://lib.cqvip.com/Qikan/Article/Detail?id=7111281046.
[3] 王光, 朱子元, 程旭. A High-Coverage and Efficient Instruction-Level Testing Approach for x86 Processors. IEEE Transactions on Computers[J]. 2023, 72(21): 3203-3217, https://ieeexplore.ieee.org/document/10159423.
[4] 王光, 朱子元, 程旭. In-depth Testing of x86 Instruction Disassemblers with Feedback Controlled DFS Algorithm. International Conference on Computer Design , 2022null. 2022, [5] Fan Liu, Weilin Zhu, Weimin Mu, Yun Zhang, Mingyang Li, Ziyuan Zhu, Weiping Wang. Elastic Resource Allocation Based on Dynamic Perception of Operator Influence Domain in Distributed Stream Processing. ICCS 2022null. 2022, https://link.springer.com/chapter/10.1007/978-3-031-08751-6_53.
[6] 冯雨思, 朱子元. Constant-Time Loading: Modifying CPU Pipeline to Defeat Cache Side-Channel Attacks. TrustComnull. 2021, [7] Huozhu Wang, Ziyuan Zhu. An Effective Approach for Malware Detection and Explanation via Deep Learning Analysis. International Joint Conference on Neural Networks[J]. 2021, [8] 王光, 朱子元, 程旭. Differential testing of x86 instruction decoders with instruction operand inferring algorithm. International Conference on Computer Designnull. 2021, [9] 韩锦荣, 张元曈, 朱子元, 孟丹. 基于底层数据流分析的恶意软件检测方法. 信息安全学报[J]. 2020, 5(4): 123-137, http://lib.cqvip.com/Qikan/Article/Detail?id=7102488258.
[10] Weimin Mu, Zongze Jin, Weilin Zhu, Fan Liu, Zhenzhen Li, Ziyuan Zhu, Weiping Wang. QEScalor: Quantitative Elastic Scaling Framework in Distributed Streaming Processing. COMPUTATIONAL SCIENCE – ICCS 2020null. 2020, 12137: 147-160, https://link.springer.com/chapter/10.1007/978-3-030-50371-0_11.
[11] Zhongkai Tong, Ziyuan Zhu. Cache side-channel attacks detection based on machine learning. TrustCom[J]. 2020, [12] Zhanpeng Wang, Ziyuan Zhu. SCPORAM: a hardware support scheme for protecting memory access patterns. TrustCom[J]. 2020, [13] Limin Wang, Ziyuan Zhu. Analyzing the Security of the Cache Side Channel Defences with Attack Graphs. 25th Asia and South Pacific Design Automation Conference, ASP-DAC 2020[J]. 2020, [14] Xiaoyang Liu, Ziyuan Zhu. pcSVF: An Evaluation of Side-Channel Vulnerability of Port Contention. TRUSTCOM[J]. 2020, [15] Fang Li, Ziyuan Zhu. Malware Detection Based on Term Frequency Analysis of GPRs Features. TrustCom[J]. 2020, [16] Meng, Dan, Hou, Rui, Shi, Gang, Tu, Bibo, Yu, Aimin, Zhu, Ziyuan, Jia, Xiaoqi, Wen, Yu, Yang, Yun. Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor. IEEE TRANSACTIONS ON COMPUTERS[J]. 2020, 69(11): 1571-1583, https://www.webofscience.com/wos/woscc/full-record/WOS:000576255400002.
[17] Zhang Yue, Zhu Ziyuan, Meng Dan. DDM: A Demand-based Dynamic Mitigation for SMT Transient Channels. 2019, http://arxiv.org/abs/1910.12021.
[18] Li, Fang, Han, Jinrong, Zhu, Ziyuan, Meng, Dan, IEEE. Spatial-Temporal Attention Network for Malware Detection Using Micro-architecture Features. 2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN)null. 2019, [19] Wang, Limin, Zhu, Ziyuan, Wang, Zhanpeng, Meng, Dan. Colored Petri Net Based Cache Side Channel Vulnerability Evaluation. IEEE ACCESS[J]. 2019, 7: 169825-169843, https://doaj.org/article/bef9eedd3f3d4ba9b2103360e13a022f.
[20] Li, Fang, Yan, Chao, Zhu, Ziyuan, Meng, Dan, Rodrigues, JMF, Cardoso, PJS, Monteiro, J, Lam, R, Krzhizhanovskaya, VV, Lees, MH, Dongarra, JJ, Sloot, PMA. A Deep Malware Detection Method Based on General-Purpose Register Features. COMPUTATIONAL SCIENCE - ICCS 2019, PT IIInull. 2019, 11538: 221-235, [21] Zhu Jianping, Song Wei, Zhu Ziyuan, Ying Jiameng, Li Boya, Tu Bibo, Shi Gang, Hou Rui, Meng Dan, ACM. CPU Security Benchmark. PROCEEDINGS OF THE 1ST WORKSHOP ON SECURITY-ORIENTED DESIGNS OF COMPUTER ARCHITECTURES AND PROCESSORS (SECARCH'18)null. 2018, 8-14, http://dx.doi.org/10.1145/3267494.3267499.
[22] Wang Hongwei, Shi Jinglin, Zhu Ziyuan, ACM. An Expected Hypervolume Improvement Algorithm for Architectural Exploration of Embedded Processors. 2016 ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC)null. 2016, http://dx.doi.org/10.1145/2897937.2897983.
[23] Wang Hongwei, Zhu Ziyuan, Shi Jinglin, Su Yongtao, IEEE. Sensitivity Analysis Based Predictive Modeling for MPSoC Performance and Energy Estimation. 2015 28TH INTERNATIONAL CONFERENCE ON VLSI DESIGN (VLSID)null. 2015, 511-516, [24] Wang Hongwei, Zhu Ziyuan, Shi Jinglin, Su Yongtao, IEEE. An Accurate ACOSSO Metamodeling Technique for Processor Architecture Design Space Exploration. 2015 20TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC)null. 2015, 689-694, [25] Shi Jinglin. System-level Design Methodology Enabling Fast Development of Baseband MP-SoC for 4G Small Cell Base Station. Proceedings of Design, Automation and Test in Europe, DATE 2014. 2014, [26] Huang Shan, Zhu Ziyuan, Su Yongtao, Shi Jinglin, IEEE. A System-Level Design Approach for SDR-Based MPSoC in LTE Baseband Processing. 2014 IEEE 57TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS)null. 2014, 623-626, [27] Han, Juan, Tang, Chao, Wang, QiuJu, Zhu, ZiYuan, Tang, Shan. Simplified MMSE Detectors for Turbo Receiver in BICM MIMO Systems. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY[J]. 2013, 28(3): 445-453, https://www.webofscience.com/wos/woscc/full-record/WOS:000318509400007.
[28] Shi Jinglin. A 100 GOPS ASP Based Baseband Processor for Wireless Communication. Proc. IEEE/ACM Design, Automation, and Test in Europe (DATE). 2013, [29] 刘智国, 朱子元, 唐杉, 苏泳涛, 王宏伟, 石晶林. 面向软基带SOC芯片设计的仿真平台. 系统仿真学报[J]. 2013, 25(11): 2575-2581,2589, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=4991917&detailType=1.
[30] 朱子元. An Efficient VLIW ASIP for TD-LTE Baseband Signal Processing. International Conference on Communications and Networking in China, ChinaCom 2012. 2012, [31] 朱子元. Idempotent H.264 intraframe multi-generation Compression. Multimedia tools and applications. 2010, [32] 朱子元. Idempotent H.264 intraframe multi-generation coding. IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP. 2009, 

科研活动

   
科研项目
( 1 ) 处理器安全, 负责人, 国家任务, 2014-01--2016-12
( 2 ) 面向服务器CPU熔断和幽灵等硬件安全威胁的系统解决方案, 负责人, 国家任务, 2018-01--2019-12
( 3 ) CPU安全评测技术研究, 负责人, 中国科学院计划, 2019-01--2023-09
( 4 ) 基于可重构技术的安全隔离执行技术及应用, 负责人, 国家任务, 2019-01--2022-12