Yu Qin
Professor of Engineering
Institute of Software, Chinese Academy of Sciences.
Email: qinyu@iscas.ac.cn
Telephone: +86-010-62661721
Address: 4# South Fourth Street, Zhong Guan Cun, Beijing, China
Postcode: 100190
Curriculum Vitae
■ RESEARCH INTERESTS
My research is the area of system security, confidential computing, trusted computing, applied cryptography, and data security.
■ EDUCATION
Sep 2003 – Jan 2009, Institute of Software, Chinese Academy of Sciences (ISCAS), M.S. & Ph.D in Information Security and Network Security.
Sep 1999 – Jul 2003, Renmin University of China, B.S in Computer Science.
■ WORK EXPERIENCE
Sep 2022 – Present, Institute of Software, Chinese Academy of Sciences (ISCAS), Professor of Engineering
Mar 2009 – Sep 2022, Institute of Software, Chinese Academy of Sciences (ISCAS), Assistant Researcher, Senior Engineer
■ HONORS & AWARDS
(1) Third-Class Prize, Science and Technology Progress Award, China Inspection and Testing Society(CITS), 2023. (Provincial/Ministerial-Level Award)
(2) First-Class Prize, Electric Power Technology Innovation Award, China Electricity Council (CEC), 2022. (Provincial/Ministerial-Level Award)
(3) First-Class Prize, Electronic Information Science and Technology Award, Chinese Institute of Electronics (CIE), 2010. (Provincial/Ministerial-Level Award)
■ RESEARCH PROJECTS
2025, Co-Principal Investigator, National Key R&D Program of China - Project: "Collaborative R&D on Key Technologies for Trusted Root Based on RISC-V Instruction Set Processors"(No.2024YFE0211100)
2024, Project Leader, Huawei Project: "TCM2 Trusted Cryptography Module Test and Evaluation"
2023, Co-Principal Investigator, National Key R&D Program of China - Project: "Advanced Computing and Emerging Software" Key Project: "Key Technologies and Applications for Confidential Computing and Trusted Execution Environments" (No.2022YFB4501500)
2023, Project Leader, Alibaba Innovative Research (AIR) Program - Project: "Research on Novel Confidential Computing and Trusted Execution Environment Technologies in Cloud Environments"
2021, Project Leader, Tencent R&D Project: "Blockchain Terminal Node Secure Access Support Platform"
2020, Co-Principal Investigator, National Key R&D Program of China - Project: "Joint R&D on Security Architecture and Key Technologies for IoT Based on Quantum Key Distribution" (No.2020YFE0200600)
2019, Principal Investigator, National Natural Science Foundation of China (NSFC) - Project: "Research on Trusted Systems and Software Security for IoT Devices" (NO.61872343)
2019, Project Leader, Jiangsu Electric Power Information Technology Co., Ltd. Project: "Research on Key Technologies for a Security Protection Platform Based on Active Immunity"
2018, Co-Principal Investigator, National Key R&D Program of China - Project: "Security Protection Technology for Embedded Components and Control Units in Power System Terminals" (No.2018YFB0904903)
......
■ ACADEMIC ACTIVITIES
Global Computing Consortium (GCC), Confidential Computing Special Interest Group: Vice Chair of the Steering Committee (Sep 2024 - )
OpenAnolis Community: Member of the Security Committee (2023 - )
Electronic Authentication & Trusted Computing Task Force in State Cryptography Administration: Vice Group Leader (2020 -)
State Cryptography Administration Application Technology Overall Group: Expert Member (2020 - )
Journal of Electronics & Information Technology: Editorial Board Member (2024 - )
Trusted Computing Conferences (CTCIS, TrustCom, ICICS): Program Committee (PC) Member
■ PUBLICATIONS
● Book
Dengguo Feng, Yu Qin, Xiaobo Chu, Shijun Zhao. Trusted Computing:Principles and Applications. Walter de Gruyter Publish, German. 2017.
● Referred Journal Articles
[1] Dengguo Feng, Yu Qin*, Wei Feng, Wei Li, Ketong Shang, Hongzhan Ma. Survey of research on confidential computing. IET Commun., vol 18, 535-556. 2024.
[2] Yu Qin, Jingbin Liu, Shijun Zhao, Dengguo Feng, Wei Feng, RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device. Security and Communication Networks, vol. 2020, Article ID 8957641, 2020:1-14.
[3] Dengguo Feng, Jingbin Liu, Yu Qin*, et al. Trusted Computing Theory and Technology In Innovation-driven Development. Scientia Sinica (Informationis), 2020.
[4] Jianxiong Shao, Yu Qin*, Dengguo Feng. Formal Analysis of HMAC Authorization in the TPM2.0 Specification . IET Information Security, 2018.
[5] Wei Feng,Yu Qin, Shijun Zhao, et al. AAoT: Lightweight Attestation and Authentication of low-resource Things in IoT and CPS. Computer Networks, 2018.
[6] Wei Feng, Yu Qin, Dengguo Feng. Using Mobile Phones to Enhance Computing Platform Trust. Telecommunication Systems, 2017.
[7] Dengguo Feng, Yu Qin*, Wei Feng, Jianxiong Shao. The Theory and Practice in the Evolution of Trusted Computing. Chinese Science Bulletin, Volume 59, Issue 32, pp 4173-4189, November 2014.
[8] Shijun Zhao, Li Xi, Qianying Zhang, Yu Qin, Dengguo Feng. Security analysis of SM2 key exchange protocol in TPM2. 0. Security and Communication Networks, 2014.
[9] Qianying Zhang, Shijun Zhao, Yu Qin, and Dengguo Feng. Formal Analysis of TPM2.0 Key Management APIs. Chinese Science Bulletin, 2014.
[10] Yu Qin, Shijun Zhao, Qianying Zhang. A Formal Analysis of TPM Commands for Compromising User Key. China Communication, 2012, 9(10):91-102.
[11] Hao Li, Yu Qin, Qianying Zhang,Shijun Zhao. Securing the Distributions in P2P Networks with Trusted Platform Modules. International Journal of Computer Network and Information Security(IJCNIS), Volume 3, Number 2, 2011.
[12] DengGuo Feng, Yu Qin*. A Property-Based Attestation Protocol for TCM. Science China Information Sciences Vol 53, No 3: 454-464, 2010.
● Referred Conference Papers
[1] Wei Li, Wei Feng, Yu Qin*, et al. Att-SFI: Attestable software sandboxing with control flow integrity. EAI SecureComm 2025.
[2] Ketong Shang, Fang Lu, Ke Huang, Yu Qin*, Wei Feng. Cluster Nodes Integrity Attestation and Monitoring Scheme for Confidential Computing Platform. In Proceeding of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2023.
[3] Shijun Zhao, Qianying Zhang, Yu Qin, et al. SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE. In Proceeding of ACM SIGSAC Conference on Computer and Communications Security(CCS 2019), 2019.
[4] Shijun Zhao, Qianying Zhang, Yu Qin, Wei Feng, et al. Minimal Kernel: An Operating System Architecture for TEE to Resist Board Level Physical Attacks. In Proceeding of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses. 2019
[5] Jingbin Liu, Qin Yu*, Wei Liu, Shijun Zhao, et al. Log-Based Control Flow Attestation for Embedded Devices. In Proceeding of the 11th International Symposium on Cyberspace Safety and Security(CSS), 2019: 117-132.
[6] Yu Qin, Yingjun Zhang, Wei Feng. TICS: Trusted Industry Control System based on Hardware Security Module. In Proceedings of the 9th International Conference on Symposium on Cyberspace Safety and Security(CSS 2017).
[7] Wei Feng, Yu Qin*, Shijun Zhao, et al. Secure Code Updates for Smart Embedded Devices based on PUFs. In Proceedings of 16th International Conference on Cryptology And Network Security (CANS 2017) , 2017.
[8] Yingjun Zhang, Yu Qin*, Dengguo Feng, et al. An efficient Trustzone-based In-application Isolation Schema for Mobile Authenticators. In Procceeding of 13th EAI International Conference on Security and Privacy in Communication Networks(SecureComm 2017), 2017.
[9] Jianxiong Shao, Yu Qin*, Dengguo Feng. Computational Soundness Results for Stateful Applied Pi Calculus. 5th International Conference on Principles of Security and Trust (POST 2016), Held as Part of ETAPS 2016.
[10] Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng. AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash. The 19th Information Security Conference (ISC 2016). Springer International Publishing.
[11] Jianxiong Shao, Yu Qin*, Dengguo Feng, Weijin Wang, Formal Analysis of Enhanced Authorization in the TPM 2.0, Proc. of the 10th ACM Asia Conference on Computer and Communication Security, ASIACCS 2015, 2015.
[12] Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng. DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone. The 8th International Conference on Trust and Trustworthy Computing (TRUST 2015). Springer International Publishing, 209-227.
[13] Bo Yang, Yu Qin, Yingjun Zhang, Weijin Wang, Dengguo Feng. TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems. The 17th International Conference on Information and Communications Security (ICICS 2015). Springer International Publishing, 152-168.
[14] Shijun Zhao, Qianying Zhang, Yu Qin and Dengguo Feng. Universally Composable secure TNC protocol based on IF-T binding to TLS. NSS 2014.
[15] Li Xi, Dengguo Feng, Yu Qin, Feng Wei, Jianxiong Shao, Bo Yang. Direct Anonymous Attestation in Practice: Implementation and Efficient Revocation.PST 2014.
[16] Qianying Zhang, Shijun Zhao, Yu Qin, Dengguo Feng. Improving the security of the HMQV protocol using tamper-proof hardware. SecureComm 2014.
[17] Shijun Zhao, Qianying Zhang, Yu Qin and Dengguo Feng, Universally Composable secure TNC protocol based on IF-T binding to TLS. NSS 2014, LNCS, Volume 8792, pp 110-123, 2014.
[18] Shijun Zhao, Qianying Zhang,Guangyao Hu, Yu Qin, Dengguo Feng. Providing Root of Trust for ARM TrustZone using On-Chip SRAM. TrustED 2014, ACM, Pages 25-36, 2014.
[19] Bo Yang, Dengguo Feng, Yu Qin. A Lightweight Anonymous M-shopping Scheme Based on DAA for Trusted Mobile Platform. TrustCom 2014, IEEE.
[20] Weijin Wang,Yu Qin,Dengguo Feng. Automated Proof for Authorization Protocols of TPM 2.0 in computational model. ISPEC 2014, LNCS, Volume 8434, pp 144-158, 2014.
[21] Weijin Wang, Dengguo Feng, Yu Qin, Jianxiong Shao, Li Xi, Xiaobo Chu. ExBLACR: Extending BLACR System. ACISP 2014, LNCS, Volume 8544, pp 397-412, 2014.
[22] Li Xi, Yu Qin and Dengguo Feng. Formal analysis of ECC-based Direct Anonymous Attestation schemes in Applied Pi Calculus. In Proceeding of the 16th Information Security Conference (ISC 2013), Nov, 2013.
[23] Wei Feng, Dengguo Feng, Ge Wei, Yu Qin. TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications. 6th International Conference on Trust & Trustworthy Computing. 2013.
[24] Wei Feng, Yu Qin, Dengguo Feng, Ge Wei, Lihui Xue, and Dexian Chang. Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform. 7th International Conference on Network and System Security. 2013.
[25] Jianxiong Shao, Dengguo Feng, and Yu Qin. Type-Based Analysis of Protected Storage in the TPM. In the Procceeding of the 15th International Conference on Information and Communications Security (ICICS 2013). Nov, 2013.
[26] Wei Feng, Dengguo Feng, Ge Wei, Yu Qin etc al. TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications. In Proceedings of Trust and Trustworthy Computing - 6th International Conference(TRUST 2013), June 17-19, 2013.
[27] Wei Feng, Yu Qin, Dengguo Feng, Ge Wei, etc al. Mobile Trusted Agent(MTA):Build user-based trust for general-purpose computer platform. In the 7th International Conference on Network and System Security (NSS 2013), 2013.
[28] Yu Qin, Xiaobo Chu, Dengguo Feng, Wei Feng. DAA Protocol Analysis and Verification. In Proceedings of the Third International Conference on Trusted Systems (INTRUST 2011). Nov, 2011.
[29] Yu Qin, Dexian Chang, Shijun Zhao, Qianying Zhang. A property-based attestation scheme with the variable privacy. In Proceedings of the 6th International Conference on Frontier of Computer Science and Technology (FCST-11), Nov, 2011
[30] Wei Feng, Yu Qin, Aimin Yu, DengGuo Feng. A DRTM-based Method for Trusted Network Connection. In Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’11), Nov, 2011.
[31] Yu Qin, DengGuo Feng, Zhen Xu. An anonymous property-based attestation protocol from bilinear maps. In Proceedings of the 8th IEEE/IFIP International Symposium on Trusted Computing and Communications(TrustCom’09). 2009.
[32] Xiaobo Chu, Yu Qin, Dengguo Feng. An Efficient PBA Protocol Based on Elliptic Curves. In 3rd IEEE International Conference on Communication Software and Networks (ICCSN 2011). May 27, 2011.