基本信息
史岗 男 硕导 中国科学院计算技术研究所
电子邮件:shigang@ict.ac.cn
联系电话:
手机号码:
通信地址:
邮政编码:
电子邮件:shigang@ict.ac.cn
联系电话:
手机号码:
通信地址:
邮政编码:
教育背景
学历
研究生
学位
博士
工作经历
工作简历
2002-2004 中科院计算所 研实员
2004-2005 中科院计算所 助理研究员
2005-至今 中科院计算所 副研究员
专利与奖励
专利成果
[1] 陈李维, 许奇臻, 李锦峰, 史岗, 孟丹. 一种链式哈希栈运算方法及装置. CN: CN111680289B, 2023-04-14.[2] 陈李维, 聂晓帆, 张元瞳, 魏浩来, 史岗, 孟丹. 内存数据损坏攻击的监测方法和装置. CN: CN114707143A, 2022-07-05.[3] 陈李维, 聂晓帆, 张元瞳, 魏浩来, 史岗, 孟丹. 内存漏洞检测方法、装置、电子设备、存储介质和产品. CN: CN114662118A, 2022-06-24.[4] 陈李维, 田力楠, 杨焰琦, 史岗, 孟丹. 二进制文件的指令恢复方法、系统、电子设备和存储介质. CN: CN114661344A, 2022-06-24.[5] 孟丹, 李丹萍, 朱子元, 史岗. 处理器指令编码的自动生成方法及装置. CN: CN110175047B, 2022-03-29.[6] MENG, Dan, CHEN, Liwei, LI, Jinfeng, SHE, Cairui, SHI, Gang. METHOD FOR CONTROL-FLOW INTEGRITY PROTECTION, APPARATUS, DEVICE AND STORAGE MEDIUM. CN: US20210406017(A1), 2021-12-30.[7] 陈李维, 田力楠, 史岗, 孟丹. 一种二进制文件中混合在指令中的数据的识别方法及装置. CN: CN113312082A, 2021-08-27.[8] 陈李维, 田力楠, 史阳阳, 史岗, 孟丹. 一种二进制文件中合法指令的识别方法及装置. CN: CN113296833A, 2021-08-24.[9] 孟丹, 李丹萍, 朱子元, 史岗. 处理器指令集测试方法及装置. CN: CN110716855B, 2021-05-14.[10] 孟丹, 李丹萍, 朱子元, 史岗. 处理器指令集的完备性检测方法、装置与电子设备. CN: CN110688304B, 2021-04-27.[11] 陈李维, 佘才睿, 李锦峰, 史岗, 孟丹. 控制流完整性保护方法及装置. CN: CN111898120A, 2020-11-06.[12] 孟丹, 陈李维, 李锦峰, 佘才睿, 史岗. 控制流完整性保护方法、装置、设备及存储介质. CN: CN111898119A, 2020-11-06.[13] 陈李维, 许奇臻, 李锦峰, 史岗, 孟丹. 一种链式哈希栈运算方法及装置. CN: CN111680289A, 2020-09-18.[14] 孟丹, 李丹萍, 朱子元, 史岗. 基于域填充的处理器指令编码自动生成方法及装置. CN: CN110569065A, 2019-12-13.[15] 陈李维, 许奇臻, 李锦峰, 史岗, 孟丹. 降低链式哈希栈性能损耗的方法及系统. CN: CN110378109A, 2019-10-25.[16] 陈李维, 许奇臻, 李锦峰, 史岗, 孟丹. 链式哈希栈的优化方法及优化系统. CN: CN110362503A, 2019-10-22.[17] 陈李维, 许奇臻, 李锦峰, 史岗, 孟丹. 多链哈希栈结构及检测函数返回地址被篡改的方法. CN: CN110363006A, 2019-10-22.[18] 陈李维, 许奇臻, 李锦峰, 史岗, 孟丹. 链式哈希栈的影子缓存优化方法和装置. CN: CN110362502A, 2019-10-22.[19] 陈李维, 许奇臻, 李锦峰, 史岗, 孟丹. 多链式哈希栈的硬件开销优化方法及系统. CN: CN110348250A, 2019-10-18.[20] 孟丹, 李丹萍, 朱子元, 史岗. 处理器指令编码的自动生成方法及装置. CN: CN110175047A, 2019-08-27.[21] 陈李维, 李锦峰, 史岗, 孟丹. 检测堆栈中返回地址被篡改的方法及装置. CN: CN109508537A, 2019-03-22.[22] 陈李维, 李锦峰, 史岗, 孟丹. 一种检测堆栈中返回地址被篡改的堆栈结构. CN: CN109508538A, 2019-03-22.[23] 陈李维, 李锦峰, 史岗, 孟丹. 检测堆栈中返回地址被篡改的链式堆栈结构. CN: CN109508539A, 2019-03-22.[24] 孟丹, 李锦峰, 陈李维, 史岗. 检测堆栈中返回地址被篡改历史的装置. CN: CN109446798A, 2019-03-08.[25] 陈李维, 李锦峰, 史岗, 孟丹. 检测堆栈中返回地址被篡改的装置. CN: CN109446797A, 2019-03-08.[26] 孟丹, 李锦峰, 陈李维, 史岗. 基于新增指令的检测堆栈中返回地址被篡改的装置. CN: CN109409086A, 2019-03-01.[27] 陈李维, 李锦峰, 史岗, 孟丹. 一种检测返回地址被篡改的链式数据存储结构. CN: CN109409084A, 2019-03-01.[28] 孟丹, 陈李维, 李锦峰, 史岗. 检测堆栈中返回地址被篡改的方法及装置. CN: CN109409082A, 2019-03-01.[29] 陈李维, 李锦峰, 史岗, 孟丹. 检测堆栈中返回地址被篡改的装置. CN: CN109409083A, 2019-03-01.
出版信息
发表论文
[1] Nie Xiaofan, Chen Liwei, Wei Haolai, Zhang Yuantong, Cui Ningning, Shi Gang. KPDFI: Efficient data flow integrity based on key property against data corruption attack. COMPUTERS & SECURITY[J]. 2023, 128: http://dx.doi.org/10.1016/j.cose.2023.103183.[2] Wu, Tongshuai, Chen, Liwei, Du, Gewangzi, Zhu, Chenguang, Cui, Ningning, Shi, Gang. CDNM: Clustering-Based Data Normalization Method For Automated Vulnerability Detection. COMPUTER JOURNAL. 2023, http://dx.doi.org/10.1093/comjnl/bxad080.[3] 吴同帅, 陈李维, 杜戈王子, 朱晨光, 崔宁宁, 史岗. Inductive Vulnerability Detection via Gated Graph Neural Network. The IEEE 25th International Conference on Computer Supported Cooperative Work in Designnull. 2022, [4] 田力楠, 史阳阳, 陈李维, 杨焰琦, 史岗. Gadgets Splicing: Dynamic Binary Transformation for Precise Rewriting. International Symposium on Code Generation and Optimizationnull. 2022, [5] 程康, 杜戈王子, 吴同帅, 陈李维, 史岗. Automated Vulnerable Codes Mutation through Deep Learning for Variability Detection. International Joint Conference on Neural Networksnull. 2022, [6] 许奇臻, 张志杰, 陈李维, 史岗. Finding Runtime Usable Gadgets: On the Security of Return Address Authentication. The 19th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA)[J]. 2021, [7] 许奇臻, 陈李维, 史岗. Twine Stack: A Hybrid Mechanism Achieving Less Cost for Return Address Protection. Asian Test Symposium (ATS)[J]. 2021, [8] 张元曈, 陈李维, 聂晓帆, 张志杰, 魏浩来, 史岗. Accelerating Data-Flow Analysis with Full-Partitioning. The 19th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA)[J]. 2021, [9] An Wenyan, Chen Liwei, Du gewangzi, Shi Gang, Meng Dan. AVDHRAM: Automated Vulnerability Detection based on Hierarchical Representation and Attention Mechanism. The 18th IEEE International Symposium on Parallel and Distributed Processing with Applications(ISPA)[J]. 2020, [10] Li Jinfeng, Chen Liwei, Xu Qizhen, Tian Linan, Shi Gang, Chen Kai, Meng Dan. Zipper Stack: Shadow Stacks Without Shadow. The 25th European Symposium on Research in Computer Security (ESORICS)null. 2020, http://arxiv.org/abs/1902.00888.[11] Li, Jinfeng, Xu, Qizhen, Li, Yongyue, Chen, Liwei, Shi, Gang, Meng, Dan. Efficient Return Address Verification Based on Dislocated Stack. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS[J]. 2020, 39(11): 3398-3407, http://dx.doi.org/10.1109/TCAD.2020.3012645.[12] Li, Jinfeng, Chen, Liwei, Shi, Gang, Chen, Kai, Meng, Dan. ABCFI: Fast and Lightweight Fine-Grained Hardware-Assisted Control-Flow Integrity. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS[J]. 2020, 39(11): 3165-3176, http://dx.doi.org/10.1109/TCAD.2020.3012640.[13] Meng, Dan, Hou, Rui, Shi, Gang, Tu, Bibo, Yu, Aimin, Zhu, Ziyuan, Jia, Xiaoqi, Wen, Yu, Yang, Yun. Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor. IEEE TRANSACTIONS ON COMPUTERS[J]. 2020, 69(11): 1571-1583, https://www.webofscience.com/wos/woscc/full-record/WOS:000576255400002.[14] Ma Mengyu, Chen Liwei, Shi Gang, IEEE. Dam: A Practical Scheme to Mitigate Data-oriented Attacks with Tagged Memory based on Hardware. 2019 26TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC)null. 2019, 204-211, [15] Liu Tong, Shi Gang, Chen Liwei, Zhang Fei, Yang Yaxuan, Zhang Jihu, IEEE. TMDFI: Tagged Memory Assisted for Fine-grained Data-Flow Integrity towards Embedded Systems against Software Exploitation. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE)null. 2018, 545-550, [16] Guo Yingjie, Chen Liwei, Shi Gang, IEEE. Function-Oriented Programming: A New Class of Code Reuse Attack in C Applications. 2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS)null. 2018, [17] Lu Guorui, Chen Liwei, Shi Gang, IEEE. SMP: A New Mechanism to Mitigate Control-Flow Hijacking Attacks. 2018 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS ENGINEERING (ICISE)null. 2018, 51-55, [18] Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Peng Liu. Security-first architecture:deploying physically isolated active security processors for safeguarding the future of computing. CYBERSECURITY[J]. 2018, 1(1): 1-11, https://doaj.org/article/afd57b63537d46cd88e6a38fc610858d.[19] Zhu Jianping, Song Wei, Zhu Ziyuan, Ying Jiameng, Li Boya, Tu Bibo, Shi Gang, Hou Rui, Meng Dan, ACM. CPU Security Benchmark. PROCEEDINGS OF THE 1ST WORKSHOP ON SECURITY-ORIENTED DESIGNS OF COMPUTER ARCHITECTURES AND PROCESSORS (SECARCH'18)null. 2018, 8-14, http://dx.doi.org/10.1145/3267494.3267499.[20] 赵剑锋, 史岗. 安全处理器研究进展. 信息安全学报[J]. 2018, 3(1): 132-144, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=6160082&detailType=1.[21] 高语晗, 陈李维, 史岗. A Comprehensive Detection of Memory Corruption Vulnerabilities for C/C++ Programs. The 16th IEEE International Symposium on Parallel and Distributed Processing with Applications[J]. 2018, [22] 马梦雨, 陈李维, 史岗, 孟丹. 基于配件加权标记的代码重用攻击防御框架. 信息安全学报[J]. 2018, 3(5): 75-91, http://lib.cqvip.com/Qikan/Article/Detail?id=676689805.[23] 宁方潇, 文雨, 史岗. GuardSpark:Spark访问控制增强机制. 信息安全学报[J]. 2017, 2(4): 70-81, http://lib.cqvip.com/Qikan/Article/Detail?id=673577080.[24] 赵剑锋, 史岗. 硬件木马研究动态综述. 信息安全学报[J]. 2017, 2(1): 74-90, http://lib.cqvip.com/Qikan/Article/Detail?id=671760474.[25] 郑显义, 史岗, 孟丹. 系统安全隔离技术研究综述. 计算机学报[J]. 2017, 40(5): 1057-1079, http://lib.cqvip.com/Qikan/Article/Detail?id=672066264.[26] Chen Liwei, Ma Mengyu, Zhang Wenhao, Shi Gang, Meng Dan, DiVimercati SD, Martinelli F. Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017null. 2017, 502: 568-584, [27] Ning, Fangxiao, Wen, Yu, Shi, Gang, Meng, Dan, IEEE. Efficient Tamper-Evident logging of Distributed Systems via Concurrent Authenticated Tree. 2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC)null. 2017, [28] Ning, Fangxiao, Zhu, Min, You, Ruibang, Shi, Gang, Meng, Dan, IEEE. Group-based Memory Deduplication against Covert Channel Attacks in Virtualized Environments. 2016 IEEE TRUSTCOM/BIGDATASE/ISPAnull. 2016, 194-200, [29] 赵剑锋, 史岗, 孟丹. 进程安全保护技术综述. 哈尔滨工业大学学报[J]. 2016, 48(5): 77-84, https://d.wanfangdata.com.cn/periodical/hebgydxxb201605013.[30] 柳童, 史岗, 孟丹. 代码重用攻击与防御机制综述. 信息安全学报[J]. 2016, 15-27, http://lib.cqvip.com/Qikan/Article/Detail?id=88658866504849544850484850.[31] Zheng, Xianyi, Yang, Lulu, Shi, Gang, Meng, Dan, IEEE. Secure Mobile Payment employing Trusted Computing on TrustZone Enabled Platforms. 2016 IEEE TRUSTCOM/BIGDATASE/ISPAnull. 2016, 1944-1950, [32] 蔡晔, 史岗. 基于锁的Cache一致性协议的硬件优化策略. 高技术通讯[J]. 2009, 19(9): 933-938, http://lib.cqvip.com/Qikan/Article/Detail?id=31918576.[33] 蔡晔, 吴少校, 史岗. 龙芯2E嵌入式处理器模块设计. 计算机工程与应用[J]. 2007, 43(27): 108-110, http://lib.cqvip.com/Qikan/Article/Detail?id=25557314.[34] 尹宏达, 史岗, 胡明昌. 系统域网中用户级通信库的实现. 计算机工程[J]. 2005, 31(11): 190-192, http://lib.cqvip.com/Qikan/Article/Detail?id=15996063.[35] 史岗, 尹宏达, 胡明昌, 胡伟武. VIA(Virtual Interface Architecture)上的软件DSM系统实现和性能. 计算机学报[J]. 2003, 26(12): 1621-1628, http://lib.cqvip.com/Qikan/Article/Detail?id=8809564.[36] 史岗. 软件DSM机群上并行大规模地理图象处理系统ParGIP. 计算机研究与发展. 2003, [37] 胡明昌, 史岗, 胡伟武, 唐志敏, 张福新. PC机群上JIAJIA与MPI的比较. 软件学报[J]. 2003, 14(7): 1187-1194, http://lib.cqvip.com/Qikan/Article/Detail?id=8049443.
指导学生
徐瑛 硕士研究生 081203-计算机应用技术 80132-计算技术研究所
刘伟 硕士研究生 081201-计算机系统结构 80132-计算技术研究所
张广飞 硕士研究生 081201-计算机系统结构 80132-计算技术研究所
陈李维 硕士研究生 081201-计算机系统结构 80132-计算技术研究所
张华亮 硕士研究生 081201-计算机系统结构 80132-计算技术研究所