基本信息
王文浩  男  硕导  中国科学院信息工程研究所
电子邮件: wangwenhao@iie.ac.cn
通信地址: 北京市海淀区益园文创产业基地C2楼
邮政编码:

研究领域

主要研究方向为机密计算、系统安全、芯片安全等。

招生信息

   
招生专业
083900-网络空间安全
0812Z1-信息安全
招生方向
网络与系统安全
硬件安全
密码基础理论与前沿

教育背景

2009-09--2015-01   中国科学院大学   博士学位
2005-09--2009-06   中国海洋大学   学士学位

工作经历

   
工作简历
2018-11~现在, 中国科学院信息工程研究所, 副研究员
2016-04~2018-08,美国印第安纳大学, 访问研究人员
2015-01~2018-10,中国科学院信息工程研究所, 助理研究员

教授课程

安全芯片技术
文献阅读

专利与奖励

   
奖励信息
(1) ACM中国新星奖提名, 其他, 2018
(2) ACM中国SIGSAC分会新星奖, 其他, 2018
(3) “青年之星”人才培养计划, 研究所(学校), 2017

出版信息

   
发表论文
[1] Zihao Wang, Jiale Guan, XiaoFeng Wang, 王文浩, Luyi Xing, Fares Alharbi. The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning. ACM CCS 2023null. 2023, [2] 何玮, Zhi Zhang, Yueqiang Cheng, 王文浩, 宋威, Yansong Gao, 张启飞, Kang Li, Dongxi Liu, Surya Nepal. WhistleBlower: A System-level Empirical Study on RowHammer. IEEE Transactions on Computers[J]. 2023, [3] Yuekai Jia, 刘双, 王文浩, 陈渝, Zhengde Zhai, 闫守孟, 何征宇. HyperEnclave: An Open and Cross-platform Trusted Execution Environment. 2022 USENIX Annual Technical Conference (USENIX ATC)null. 2022, [4] Zhi Zhang, Wei He, Yueqiang Cheng, 王文浩, Yansong Gao, Dongxi Liu, Kang Li, Surya Nepal, Anmin Fu, Yi Zou. Implicit Hammer: Cross-Privilege-Boundary Rowhammer through Implicit Accesses. IEEE Transactions on Dependable and Secure Computing (TDSC)[J]. 2022, [5] Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Surya Nepal, Yansong Gao, Kang Li, 王喆, 武成岗. SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh.. 2022 USENIX Annual Technical Conference.(USENIX ATC '22). (CCF A)null. 2022, [6] 王文浩, Weijie Liu, Hongbo Chen, XiaoFeng Wang, Hongliang Tian, 林东岱. Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services. IEEE Transactions on Dependable and Secure Computing (TDSC)[J]. 2021, [7] Liu Weijie, 王文浩, Wang XiaoFeng, Meng Xiaozhu, Lu Yaosong, Chen Hongbo, Wang Xinyu, Shen Qingtao, Chen Kai, Tang Haixu, Chen Yi, Xing Luyi. Practical and Efficient in-Enclave Verification of Privacy Compliance. 51st IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021)null. 2021, http://arxiv.org/abs/2007.10513.
[8] Zhang, Zhi, He, Wei, Cheng, Yueqiang, Wang, Wenhao, Gao, Yansong, Wang, Minghua, Li, Kang, Nepal, Surya, Xiang, Yang. BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2021, 16: 5167-5181, [9] Song, Wei, Li, Boya, Xue, Zihan, Li, Zhenzhen, Wang, Wenhao, Liu, Peng. Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It. 2021 IEEE Symposium on Security and Privacy (S&P)null. 2021, http://arxiv.org/abs/2008.01957.
[10] Zhu, Jianping, Hou, Rui, Wang, XiaoFeng, Wang, Wenhao, Cao, Jiangfeng, Zhao, Boyan, Wang, Zhongpu, Zhang, Yuhui, Ying, Jiameng, Zhang, Lixin, Meng, Dan, IEEE. Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020)null. 2020, 1450-1465, [11] Tianlin Huo, Xiaoni Meng, Wenhao Wang, Chunliang Hao, Pei Zhao, Jian Zhai, Mingshu Li. Bluethunder: A 2-level Directional Predictor Based Side-Channel Attack against SGX. TRANSACTIONS ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS[J]. 2019, https://doaj.org/article/34eabc83705e4ab5910b652180bd2a07.
[12] Chen Guoxing, Wang Wenhao, Chen Tianyu, Chen Sanchuan, Zhang Yinqian, Wang XiaoFeng, Lai TenHwang, Lin Dongdai, IEEE. Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP)null. 2018, 178-194, [13] Yang Jingchun, Liu Meicheng, Lin Dongdai, Wang Wenhao, Inomata A, Yasuda K. Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2018null. 2018, 11049: 244-261, [14] Zhou Zhe, Tang Di, Wang Wenhao, Wang Xiaofeng, Li Zhou, Zhang Kehuan, ACM. Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection. 34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018)null. 2018, 77-88, http://dx.doi.org/10.1145/3274694.3274721.
[15] Liu Meicheng, Yang Jingchun, Wang Wenhao, Lin Dongdai, Nielsen JB, Rijmen V. Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT IInull. 2018, 10821: 715-744, [16] Wang Wenhao, Chen Guoxing, Pan Xiaorui, Zhang Yinqian, Wang XiaoFeng, Bindschaedler Vincent, Tang Haixu, Gunter Carl A, ACM. Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITYnull. 2017, 2421-2434, http://dx.doi.org/10.1145/3133956.3134038.

科研活动

   
科研项目
( 1 ) 英特尔软件防护扩展抗侧信道泄漏安全性研究, 负责人, 国家任务, 2019-01--2021-12
( 2 ) 基于处理器硬件特性的新型安全问题及应用研究, 负责人, 研究所自选, 2018-01--2020-12
( 3 ) 内生安全支撑的新型网络体系结构与关键技术, 参与, 国家任务, 2020-11--2024-10
( 4 ) 后量子密码算法实现中的安全问题研究, 负责人, 研究所自选, 2021-05--2023-04

指导学生

现指导学生

陈思彤  硕士研究生  085400-电子信息  

阮雯雯  硕士研究生  083900-网络空间安全  

佘金泽  硕士研究生  083900-网络空间安全  

耿朝阳  硕士研究生  083900-网络空间安全  

闵振南  硕士研究生  085400-电子信息  

张汇豪  硕士研究生  085400-电子信息