
I am an Assoicate Professor in the State key Laboratory of information security (SKLOIS), Institute of Information Engineering (IIE), Chinese Acadamy of Sciences (CAS). I obtained my Ph.D degree from the University of Chinese Acadamy of Sciences (UCAS) in 2017.
My research interests lie in the general area of Applied Cryptography and Data Security, particularly in data storage security (e.g., solid state storage and cloud storage), as well as cryptographic testing and evaluation. I have published 30+ papers on security venues, such as ACM CCS (17), IEEE TDSC (21), ACSAC (16,17,22), ESORICS (23) and AsiaCCS (16,19). I won Distinguished Paper Award of ACSAC 2017.
Homepage:https://jia-shijie.github.io
Research Areas
Applied Cryptography and Data Security
Publications
Papers
* denotes the corresponding author.
You can also find my papers on my Google Scholar profile or DBLP.
- [CCF-B] Bowen Xu, Shijie Jia*, Jingqiang Lin, Fangyu Zheng, Yuan Ma, Limin Liu, Xiaozhuo Gu and Li Song. JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications. The 28th European Symposium on Research in Computer Security (ESORICS 2023). (Accepted To appear)
- [CCF-B] Wenqing Li, Shijie Jia*, Limin Liu, Fangyu Zheng, Yuan Ma, Jingqiang Lin. CryptoGo: Automatic Detection of Go Cryptographic API Misuses. 2022 Annual Computer Security Applications Conference (ACSAC 2022), Austin, Texas, USA, December 2022. PDF
- [CCF-C] Li Song, Qiongxiao Wang, Shijie Jia*, Jingqiang Lin, Linli Lu, Yanduo Fu. You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise Networks. The 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022): October 2022. PDF
- [CCF-C中文] ChengLi Yu, Yang Zhang, Shijie Jia *. Research on Data Security Threats and Protection of Key Technologies in Cloud Environment. Netinfo Security,2022. PDF
于成丽,张阳,贾世杰 *. 云环境中数据安全威胁与防护关键技术研究,信息网络安全, 2022. - [CCF-C] Yang Zhang, Weijing You, Shijie Jia, Limin Liu, Ziyi Li, Wenfei Qian. EnclavePoSt: A Practical Proof of Storage-time in Cloud via Intel SGX. Security and Communication Networks (SCN 2022). PDF
- [CCF-C] Mingshu Du, Yuan Ma, Na Lv, Tianyu Chen, Shijie Jia, Fangyu Zheng. An Empirical Study on the Quality of Entropy Sources in Linux Random Number Generator. 2022 IEEE International Conference on Communications (ICC 2022): May 2022. PDF
- [CCF-C] Li Song, Qiaoxiao Wang, Jingqiang Lin, Shijie Jia, Yingjiu Li, Yikai Chen. Approach then connect: A Physical Location-based Wi-Fi Password Dynamic Update Scheme. 2022 IEEE Wireless Communications and Networking Conference (WCNC 2022): April 2022. PDF
- [CCF-B中文] WenFei Qian, Pingjian Wang, Shijie Jia, Qionglu Zhang, Tianyu Chen and Yingjiao Niu. An identity authentication scheme for high concurrency scenarios based on SM2 collaborative signature algorithm. Journal of Cyber Security:2021. (Accepted To appear)
钱文飞,王平建,贾世杰,张琼露,陈天宇,牛莹姣:一种适用于高并发场景的基于SM2协作签名算法身份鉴别方案.信息安全学报(2021). - [CCF-A] Shijie Jia*, Qionglu Zhang, Luning Xia, Jiwu Jing, Peng Liu. MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer. IEEE Transactions on Dependable and Secure Computing (TDSC) vol. 19, no. 5, pp. 3494-3507, 1 Sept.-Oct. 2022 (IEEE TDSC 2022). PDF
- [CCF-C] Jingyi Liu, Yanyan Zhao, Limin Liu, Shijie Jia. Exploring Sequential and Collaborative Contexts for Next Point-of-Interest Recommendation. The 14th International Conference on Knowledge Science, Engineering and Management (KSEM 2021): August 2021. PDF
- [CCF-C] Xi Fang, Limin Liu, Shijie Jia, Xinyi Zhao, Yang Zhang. P-Shake: Towards Secure Authentication and Communication between Mobile Devices. 2021 IEEE Wireless Communications and Networking Conference (WCNC 2021): March 2021. PDF
- [CCF-C] Jiawei Wan, Shijie Jia*, Limin Liu, Yang Zhang. Supporting Efficient Dynamic Update in Public Integrity Verification of Cloud Data. The 39th IEEE International Performance Computing and Communications Conference (IPCCC 2020): November 2020. PDF
- [CCF-C] Yingjiao Niu, Lingguang Lei, Yuewu Wang, Jiang Chang, Shijie Jia, Chunjing Kou. SASAK: Shrinking the Attack Surface for Android Kernel with Stricter “seccomp” Restrictions. The 16th International Conference on Mobility, Sensing and Networking (MSN 2020): December 2020. PDF
- [EI] Yingjiao Niu, Yuewu Wang, Shijie Jia, Quan Zhou, Lingguang Lei, Qionglu Zhang, and Xinyi Zhao. Enhancing the Security of Mobile Device Management with Seccomp. The 6th Annual International Conference on Network and Information Systems for Computers(ICNISC 2020): August 2020. PDF
- [CCF-C] Yang Zhang, Dongzheng Jia, Shijie Jia*, Limin Liu, Jingqiang Lin. Splitter: An Efficient Scheme to Determine the Geolocation of Cloud Data Publicly. The 29th International Conference on Computer Communications and Networks (ICCCN 2020): August 2020. PDF
- [CCF-C] Dongzheng Jia, Yang Zhang, Shijie Jia*, Limin Liu, Jingqiang Lin. DPV-Geo: Delay-based Public Verification of Cloud Data Geolocation. The IEEE 25th symposium on Computers and Communications (ISCC 2020): July 2020. PDF
- [EI] Qionglu Zhang, Shijie Jia*, Junlin He, Xinyi Zhao, Luning Xia, Yingjiao Niu, Jiwu Jinig. Ensuring Data Confidentiality with a Secure XTS-AES Design in Flash Translation Layer. The IEEE 5th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA 2020): April 2020. PDF
- [CCF-C] Biao Gao, Bo Chen, Shijie Jia*, and Luning Xia. eHIFS: An Efficient History Independent File System.The 14th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2019):July 2019. PDF
- [IIE-C] Peiying Wang, Shijie Jia*, Bo Chen, Luning Xia and Peng Liu. MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer. The Ninth ACM Conference on Data and Application Security and Privacy (CODASPY 2019):March 2019. PDF
- [CCF-C] Dongzheng Jia, Limin Liu, Shijie Jia, Jingqiang Lin. VoteGeo: An IoT-based Voting Approach to Verify the Geographic Location of Cloud Hosts. The 38th IEEE -International Performance Computing and Communications Conference (IPCCC 2019): October 2019. PDF
- [CCF-C中文] Ming Yin, Shijie Jia *. A Technology to Prevent Ransomware Attacks Based on Solid State Drives in LAN. Netinfo Security: September 2019-09,19(9),14-19. PDF
殷明,贾世杰 *. 一种局域网中基于SSD防范勒索软件攻击的技术.信息网络安全:2019(9),14-19. - [IIE-B] Qionglu Zhang, Shijie Jia*, Bing Chang and Bo Chen. Ensuring Data Confidentiality Via Plausibly Deniable Encryption and Secure Deletion–A Survey. CyberSecurity:5 June, 2018,1/1.PDF
- [CCF-A] Shijie Jia, Luning Xia, Bo Chen, Peng Liu. DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer. 2017 ACM Conference on Computer and Communications Security (ACM CCS 2017), Dallas, Texas, USA: October 30 - November 03, 2017,2217-2229.(Acceptance rate: 151/836=18%) PDF
- [CCF-B] Le Guan, Shijie Jia*, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia. Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. 2017 Annual Computer Security Applications Conference (ACSAC 2017), San Juan, Puerto Rico, USA, December 2017 (Acceptance rate: 48/244=19.7%).PDF 获会议最佳论文奖/Distinguished Paper Award, 获奖率0.8%
- Shengjun Tang, Shijie Jia*, Luning Xia. A secure data storage method of flash memory based on position shifting. Conference on Identification, Certification and Authentication, 2017, 2:68-74. PDF
汤胜军,贾世杰 *,夏鲁宁. 基于位置跳变的闪存数据安全存储方法.软件杂志.2017年第2期:68-74. - [CCF-B] Bo Chen, Shijie Jia, Luning Xia and Peng Liu. Sanitizing Data is Not Enough! Towards Sanitizing Structural Artifacts in Flash Media. 2016 Annual Computer Security Applications Conference (ACSAC 2016), Los Angeles, California, USA, December 2016:496—507.PDF
- [CCF-B中文] Guozhu Zhang, Luning Xia, Shijie Jia and Yafei Ji. “Star Drawing Operation”: A Method to Identify HF RFID Cloning Card Based on RF Fingerprinting. Journal of Cyber Security: 2016,2(2),33-47. PDF
张国柱,夏鲁宁,贾世杰,嵇亚飞.“牵星”法:一种基于射频指纹的高频RFID克隆卡检测方法.信息安全学报,2016,2(2),33-47. - [EI] Guozhu Zhang, Luning Xia, Shijie Jia and Yafei Ji. Physical-layer Identification of HF RFID Cards Based on RF Fingerprinting. International Conference on Information Security Practice and Experience (ISPEC 2016), 2016: 284-299. PDF
- [CCF-C] Guozhu Zhang, Luning Xia, Shijie Jia and Yafei Ji. Identification of Cloned HF RFID Proximity Cards Based on RF Fingerprinting. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016): 2016,292-300. PDF
- [CCF-B中文] Shuangshuang Gu, Luning Xia and Shijie Jia. A Program of Authentication and Key Protection for Hard Disk Encryption[J].Journal of Cryptologic Research: 2016, 3(2), 126-136. PDF
谷双双,夏鲁宁,贾世杰. 一种加密硬盘的身份鉴别和密钥保护方案[J]. 密码学报, 2016, 3(2): 126-136. - [CCF-C] Shijie Jia, Luning Xia, Bo Chen and Peng Liu. NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer. The 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2016), Xian, China, May 30 - June 3, 2016 ,305-315. PDF
- [CCF-C] Shijie Jia, Luning Xia, Zhan Wang, et al. Extracting Robust Keys from NAND Flash Physical Unclonable Functions. The 18th Information Security Conference (ISC 2015):2015,437-454. PDF
- [CCF-C] Yafei Ji, Luning Xia, Jingqiang Lin, Jian Zhou, Guozhu Zhang, Shijie Jia. Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication. Information and Communications Security (ICICS 2015). 2015: 346-355. PDF
- Shijie Jia, Luning Xia and Nan Wen. Signature Private Key Generation Method Based on the Physical Characteristics of Nand Flash and its Application[J]. Journal of University of Chinese Academy of Sciences: 2015, 32(5), 695-700. PDF
贾世杰, 夏鲁宁, 闻楠. 基于Nand Flash物理特性的签名私钥产生方法及其应用[J]. 中国科学院大学学报, 2015, 32(5): 695-700. - [EI] Xiaolei Sun, Luning Xia, Shijie Jia. Enhancing location privacy for electric vehicles by obfuscating the linkages of charging events. The 5th International Conference on Electronics Information and Emergency Communication (ICEIEC 2015),2015: 155-158. PDF
Patents
Authorized Patents(已授权专利)
- 一种具有环境控制的USB加密存储系统及方法
专利号:ZL201310652031.0;发明人排序:6/13; 授权公告日:2017年1月11日. - 一种基于闪存产生满熵随机数的方法和装置
专利号:ZL201510026059.2;发明人排序:2/5; 授权公告日:2017年10月10日. - 近场通信中点对点通信模式下防范中继攻击的轻量级方法
专利号:ZL201510061163.5;发明人排序:4/5; 授权公告日:2017年11月21日. - 一种外设存储介质的口令鉴别方法
专利号:ZL201410814839.9;发明人排序:3/5; 授权公告日:2018年3月23日. - 基于Nand Flash闪存的安全存储方法及系统
专利号:ZL201610370911.2;发明人排序:3/7; 授权公告日:2019年2月19日. - 一种弱网络连接区域的IoT-based云主机物理位置验证方法
专利号:ZL201911014984.8;发明人排序:3/11; 授权公告日:2021年11月23日. - 一种基于闪存的数据快速恢复方法与系统
专利号:ZL201711144794.9;发明人排序:1/7; 授权公告日:2021年11月30日. - 一种恶意软件检测平台快速恢复方法及系统
专利号:ZL201711144811.9;发明人排序:1/7; 授权公告日:2022年1月4日. - 一种基于固态存储设备防范勒索软件攻击的方法和系统
专利号:ZL201810953026.6;发明人排序:1/3; 授权公告日:2022年4月1日. - 一种半公开的区块链系统方案
专利号:ZL201910725064.0;发明人排序:6/6; 授权公告日:2022年5月17日.
Pending Patents (处于审查状态的专利)
- 一种基于CPOR模型的云数据位置公开验证方法及系统
专利号:ZL202010529956.6;发明人排序:3/9; 申请日:2020年6月11日. - 一种云数据地理位置的验证方法及系统
专利号:ZL202010582761.8;发明人排序:3/9; 申请日:2020年6月23日. - 一种支持高效动态更新的云数据完整性验证方法及系统
专利号:ZL202011356235.6;发明人排序:4/9; 申请日:2020年11月27日. - 一种应用于移动设备的通信方法
专利号:ZL202110156382.7;发明人排序:3/5; 申请日:2021年2月4日. - 一种使用SD卡基于国产密码算法的可信启动方法及系统
专利号:ZL202110441966.9;发明人排序:4/7; 申请日:2021年4月23日. - 一种Go语言密码误用自动化检测方法及装置
专利号:ZL202211429754.X;发明人排序:1/5; 申请日:2022年11月17日.
Honors & Distinctions
- 2nd “Financial Cryptography Cup” National Cryptographic Technology Contest (2nd place, 1st co-winner), 2022.
第二届“金融密码杯”全国密码技术大赛二等奖,领队,队名:CryptoGeek - Outstanding Youth Award of Chinese Association for Cryptologic Research (CACR),2021.
中国密码学会优秀青年奖 - Outstanding staff of Cryptographic Testing and Evaluation, Chinese Association for Cryptologic Research (CACR),2019. 中国密码学会-优秀密评工作人员
- Distinguished Paper Award of 2017 Annual Computer Security Applications Conference (ACSAC 2017). ACSAC 2017会议最佳论文奖
- Imported Outstanding Young Talents of IIE-CAS, 2017.
中国科学院信息工程研究所引进优秀青年人才