教师名录

谷 大武 教授

主页: [点击这里]

办公室电话:+86-21-3420-5416

办公地点:SEIEE-3-427

电子邮件:gu-dw@cs.sjtu.edu.cn

实验室: 密码学与计算机安全实验室

  • 研究兴趣
  • 教育背景
  • 工作经验
  • 教授课程
  • 论文发表
  • 项目资助
  • 获奖信息
  • 学术服务

- 密码理论与算法;

- 软件与系统安全;

- 硬件系统与嵌入式安全;

- 大数据与云计算安全隐私技术;

- 金融安全.

- 博士, 密码学, 西安电子科技大学, 1995-1998
- 硕士, 密码学, 西安电子科技大学, 1992-1995
- 学士, 应用数学, 西安电子科技大学, 1988-1992

2015至今: 特聘教授, 博士生导师, 国家二级教授, 上海交通大学计算机系

2014至今: 责任教授, 博士生导师, 上海交通大学电子信息与电气工程学院

2002至今: 教授, 博士生导师, 上海交通大学计算机系

2000-2002: 副教授, 上海交通大学计算机系

1998-2000: 博士后, 上海交通大学电子学与通信流动站


2008: 高级研究学者, 比利时鲁汶大学(KUL), ESAT-COSIC 
2002: 访问学者, 日本东京大学, 生产技术研究所


2000-2009: 上海交通大学信息安全工程学院, 院长助理

2009-2011: 上海交通大学计算机系, 副主任

2011-       : 上海交通大学人才办, 主任

-  可证明安全理论, 博士生专业课, 春季学期.  
-  密码算法与协议, 硕士生专业基础课, 秋季学期.
-  密码与计算机安全讨论班, 博士生和硕士生, 每学期

1.     Jeroen DELVAUX, Roel PEETERS, Dawu GU, Ingrid VERBAUWHEDE. A Survey on Lightweight Entity Authentication with Strong PUFs. ACM Computing Surveys, accepted. 


2.     Zhiqiang Liu, Bing Sun, Qingju Wang, Kerem Varici, Dawu Gu. Improved Zero-Correlation Linear Cryptanalysis of Reduced-round Camellia under Weak Keys. IET Information Security , accepted. 


3.     Ya Liu, Anren Yang, Zhiqiang Liu, Wei Li, Qingju Wang, Liang Song, Dawu Gu. Improved Impossible Differential Attack on Reduced Version of Camellia with FL/FL-1 Functions. IET Information Security, accepted. 


4.     Shifeng Sun, Dawu Gu, Shengli Liu. Public Key Cryptosystems Secure against Memory Leakage Attacks. IET Information Security, accepted. 


5.     Shi-Feng Sun, Dawu Gu, Zhengan Huang. Fully Secure Wicked Identity-Based Encryption against Key Leakage Attacks. The Computer Journal, accepted.


6.     Chen Lyu, Dawu Gu, Yunze Zeng, Prasant Mohapatra. PBA: Prediction-based Authentication for Vehicle-to-Vehicle Communications. IEEE Trans. on Dependable and Secure Computing (TDSC), accepted.


7.     Fan Zhang, Shize Guo, Xinjie Zhao, Tao Wang, Jian Yang, Francois-Xavier Standaert, Dawu Gu. A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers. IEEE Trans. on Information Forensics and Security (TIFS), accepted.


8.     Wei Li, Wenwen Zhang, Dawu Gu, Yanqin Cao, Zhi Tao, Zhihong Zhou, Ya Liu, Zhiqiang Liu.  Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-hoc Networks. IEEE Trans. on Dependable and Secure Computing (TDSC), 13(1):84-92, 2016.


9.     Yikun Hu, Yuanyuan Zhang, Juanru Li and Dawu Gu. Cross-Architecture Binary Semantics Understanding via Similar Code Comparison. 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016), Osaka, Japan, Mar 14-18, 2016. 


10.   Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond. CRYPTO 2015, pp.209-229, Santa Barbara, USA, August 16-20, 2015.


11.   Wen Xu, Juanru Li, Junliang Shu, Wenbo Yang, Tianyi Xie, YuanyuanZhang, Dawu Gu. From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel. CCS 2015, Denver, USA, October 12-16, 2015.


12.   Jeroen Delvaux, Dawu Gu, Dries Schellekens, Ingrid Verbauwhede. Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis. IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 34(6):889-902, 2015.


13.   Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions. TCC 2015, pp.7-35, Warsaw, Poland, March 23-25, 2015.


14.   Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, Francois-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu. Evaluation and Improvement of Generic-Emulating DPA Attacks. CHES 2015, Saint Malo, France, September 13-14, 2015.


15.   Hui Wang, YuanyuanZhang, Juanru Li, Hui Liu, Wenbo Yang, Bodong Li, Dawu Gu. Vulnerability Assessment of OAuth Implementations in Android Applications. ACSAC 2015, Los Angeles, USA, December 7–11, 2015.


16.   Wenbo Yang, YuanyuanZhang, Juanru Li, Bodong Li, Junliang Shu, Wenju Hu, Dawu Gu. AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware. RAID 2015, Kyoto, Japan, November 2–4, 2015.


17.   Junrong Liu, Yu Yu, Francois-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Xinjun Xie. Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards. ESORICS 2015, Vienna, Austria, September 23-25, 2015.


18.   Chen Lyu, Amit Pande, Xinlei Wang, Jindan Zhu, Dawu Gu, Prasant Mohapatra. CLIP: Continuous Location Integrity and Provenance for Mobile Phones. Proceedings of the 12th IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS 2015). Dallas, USA, Oct 19-22, 2015.


19.   Qingju Wang, Zhiqiang Liu, Deniz Toz, Kerem Varici, and Dawu Gu. Related-Key Rectangle Cryptanalysis of Rijndael-160 and Rijndael-192. IET Information Security, 9(5): 266-276, 2015.


20.   Zhiqiang Liu, Ya Liu, Qiangju Wang, Dawu Gu, Wei Li. MitM Fault Analysis on Word-oriented SPN Block Ciphers. Security and Communication Networks, 8(4): 672-681, 2015.


21.   Haihua Gu, Dawu Gu, Wenlu Xie & Ray C.C.Cheung. Efficient Pairing Computation on Huff Curves. Cryptologia, 39(3): 270-275, 2015.


22.   Jeroen Delvaux, Dawu Gu, Dries Schellekens, Ingrid Verbauwhede. Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible? CHES 2014, Springer Berlin Heidelberg, Busan, Korea, September 23-26, 2014.


23.   Wenbo Yang, Juanru Li, Yuanyuan Zhang, Yong Li, Junliang Shu and Dawu Gu. APKLancet: Tumor Payload Diagnosis and Purification for Android Applications. ASIACCS 2014, Kyoto, Japan. June 2014.


24.   Hui Liu, Yuanyuan Zhang, Hui Wang, Wenbo Yang, Juanru Li and Dawu Gu. TagDroid: Hybrid SSL Certificate Verification in Android. ICICS2014, Hong Kong,China. December 16-17, 2014.


25.   Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Dawu Gu. Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering. FDTC 2014, Busan, Korea, September 23, 2014.


26.   Juanru Li, Yuanyuan Zhang, Wenbo Yang, Junliang Shu, Dawu Gu. DIAS: Automated Online Analysis for Android Applications. 14th IEEE International Conference on Computer and Information Technology (IEEE CIT 2014), Xi’an, 2014.9.11-2014.9.13.


27.   Yong Li, Yuanyuan Zhang, Juanru Li, Dawu Gu. iCryptoTracer: Dynamic Analysis on Misuse of Cryptographic Functions in iOS Applications. 8th International Conference on Network and System Security (NSS 2014), Xi’an, 2014.10.15-2014.10.17.


28.   Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu. Android App Protection via Interpretation Obfuscation. 12th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC2014), Dalian, 2014.8.24-2014.8.27.


29.   谷大武. Side Channel Attack on Crypto System of Smart Card, 台湾第24届资讯安全会议, 台北, 2014.5.30-2014.5.31.


30.   Gu Dawu, Jiang Xuxian, Xue Yibo, Zou Wei, Guo Li. PROTECTING COMMUNICATIONS INFRASTRUCTURE AGAINSTCYBER ATTACKS. China Communications, 11(8):I-II, 2014.


31.   郁昱, 谷大武. 抗泄露可证明安全流密码研究. 密码学报, 1(2):134-145, 2014.


32.   Guo Zheng, Gu Dawu, Yuan Kan, Liu Junrong, He Yuming. A Novel Method for Power Analysis Based on Combinational Logic in Block Cipher Circuit. Chinese Journal of Electronics, 23(1):151-156, 2014.


33.   Liu Ya, Gu Dawu, Li Bailan, Qu Bo. Legitimate-reader-only attack on MIFARE Classic. Mathematical and Computer Modelling, 58(1-2):219-226, 2013.


34.   Qu Bo, Gu Dawu, Guo Zheng, Liu Junrong. Differential power analysis of stream ciphers with LFSRs. Computers and Mathematics with Applications, 2013, 65(9):1291-1299.


35.   谷大武. 智能卡芯片中的密码系统--攻击和防护技术概况. 27次中国科技论坛--智能卡芯片安全技术和产业发展论坛, 北京, 2013.8.28-2013.8.28.


36.   Shifeng Sun, Dawu Gu, Shengli Liu. Efficient Leakage-Resilient Identity-Based Encryption with CCA-Security. 6th International Conference on Pairing-Based Cryptography (Pairing2013), Beijing, 2013.12.22-2013.12.24.


37.   Ruoxu Zhao, Dawu Gu, Juanru Li, Yuanyuan Zhang. Automatic Detection and Analysis of Encrypted Messages in Malware. 9th China International Conference on Information Security and Cryptology (Inscrypt 2013), Guang Zhou, 2013.11.27-2013.11.30.


38.   Chen Lyu, Dawu Gu, Xiaomei Zhang, Shifeng Sun, Yinqi Tang. Efficient, Fast and Scalable Authentication for VANETs. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC2013), Shanghai, 2013.4.7-2013.4.10.


39.   Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen, Wei Li. New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia. 19th International Workshop on Fast Software Encryption (FSE 2012), CCF-B, Washington DC, March 19-21, 2012.


40.   Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li. Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256. Journal of Systems and Software (JSS), 85(11):2451-2458, 2012.


41.   Zhao Jianjie, Gu Dawu. Provably secure three-party password-based authenticated key exchange protocol. Information Sciences, 184(1):310-323, 2012.


42.   Zhiqiang Liu, Dawu Gu, Ya Liu, Wei Li. Linear Fault Analysis of Block Ciphers. 10th International Conference on Applied Cryptography and Network Security (ACNS 2012), 241-256, Singapore, June 26-29, 2012.


43.   Ning Ding, Dawu Gu. On Constant-Round Precise Zero-Knowledge. 14th International Conference on Information and Communications Security (ICICS 2012), Hong Kong, 2012.10.29-2012.10.31.


44.   Ruoxu Zhao, Dawu Gu, Juanru Li, Liu Hui. Detecting Encryption Functions via Process Emulation and IL-based Program Analysis. 14th International Conference on Information and Communications Security (ICICS 2012), Hong Kong, 2012.10.29-2012.10.31.


45.   Qingju Wang, Dawu Gu, Vincent Rijmen, Ya Liu, Jiazhe Chen, Andrey Bogdanov. Improved Impossible Differential Attacks on Large-Block Rijndael. 15th Annual International Conference on Information Security and Cryptology (ICISC 2012), Seoul, 2012.11.28-2012.11.30.


46.   Dawu Gu, Juanru Li, Sheng Li, Zhouqian Ma, Zheng Guo, Junrong Liu. Differential fault analysis on lightweight block ciphers with statistical cryptanalysis techniques. 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2012), 27-33, Leuven, 2012.9.9-2012.9.9


47.   Yinqi Tang, Dawu Gu, Ning Ding, Haining Lu. Phrase Search over Encrypted Data with Symmetric Encryption Scheme. 32nd International Conference on Distributed Computing Systems Workshops(ICDCS-w2012), Macau, 2012.6.18-2012.6.21.


48.   Juanru Li, Dawu Gu, Yuhao Luo. Android Malware Forensics: Reconstruction of Malicious Events. 32nd International Conference on Distributed Computing Systems Workshops(ICDCS-w2012), Macau, 2012.6.18-2012.6.21.


49.   Haining Lu , Dawu Gu, Chongying Jin, Yinqi Tang. Reducing Extra Storage in Searchable Symmetric Encryption Scheme. The 2014 IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2012), Taipei, 2012.12.3-2012.12.6.


50.   Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li. Impossible Differential Attacks on Reduced-Round LBlock. 8th International Conference on Information Security Practice and Experience (ISPEC2012), 97-108, Hangzhou, 2012.4.9-2012.4.12.


51.   Zhao Jianjie, Gu Dawu, Zhang Lei. Security analysis and enhancement for three-party password-based authenticated key exchange protocol. Security and Communication Networks(SCN), 5(3):273-278, 2012.


(1) 国家自然科学基金面上项目(61472250):认证加密算法的安全性分析研究,2015.1-2018.12

(2) 国家重点基础研究发展计划(973)课题(2013CB338004):旁路攻击与防护理论与方法,2015.1-2017.8

(3) 教育部-中国移动科研基金项目(MCM20150301):新型物联网认证体系研发,2015.12-2016.11

(4) 上海市产学研合作计划项目(沪CXY-2013-35):专用安全分析设备与高安全芯片技术联合攻关及产业化,2013.1-2016.12

(5) 上海市科委“科技创新行动计划”(14511100300):实用新型轻量级分组密码的关键技术与工程验证,2014.7-2016.6


1. 入选教育部长江学者特聘教授(2014)、 上海领军人才(2015)、上海市优秀学术带头人计划(2016)、教育部新世纪人才计划(2005)、上海市科技启明星计划(2002)

2. 荣获上海市科技进步一等奖(2015,排名第1)、国防科学技术奖二等奖(2001,排名第6)、 国家863计划先进个人(2001)

3. 指导的研究生战队0ops获国际Code Gate信息安全竞赛冠军(2015)、国际Hack.lu CTF信息安全竞赛亚军(2014);LoCCS获首届全国密码技术竞赛一等奖(2015)

- 中国密码学会(CACR)理事、中国计算机学会(CCF)上海分部副主席、上海市计算机学会理事

- CACR密码芯片专委会副主任、CACR密码算法专委会委员、CCF信息保密专委会常委、中国保密协会隐私保护专委会委员

- 密码学报、China Communications、信息网络安全、信息安全研究等杂志编委

联系我们 webmaster@cs.sjtu.edu.cn

上海交通大学计算机科学与工程系版权所有 @ 2013