Faculty

Gu Dawu Professor

MainPage: [Click here]

Office Telephone: +86-21-3420-5416

Office Address: SEIEE-3-427

Email: gu-dw@cs.sjtu.edu.cn

Lab: Cryptology and Computer Security Laboratory

  • Research
  • Education
  • Work Experience
  • Teaching Assignment
  • Publications
  • Project Fund
  • Awards
  • Academic Service

- cryptography;

- software security;

- hardware and embedded security;

- big data and cloud security with privacy;

- financial security techniques.

- Ph.D. in cryptography, Xidian University, 1998
- M.S. in cryptography, Xidian University, 1995
- B.S. in applied mathematics, Xidian University, 1992

2015-present: Distinguished professor, Dept. of computer science and engineering, SJTU

2002-present: Professor, Dept. of computer science and engineering, SJTU

2000-2002: Associate professor, Dept. of computer science and engineering, SJTU

1998-2000: Postdoctoral fellow, Dept. of computer science and engineering, SJTU


2008 : Senior research fellow, Katholieke Universiteit Leuven (KUL) in ESAT-COSIC, Belgium 
2002 : Visiting scholar, Tokyo University in the Institute of industrial production, Japan

-  "Principal of Provable Security", for PhD students, spring semester.  
-  "Cryptographic Algorithms and Protocols", for MS students, fall semester.
-  Seminar of Crypto and Computer Security, for young teachers and graduates.


1.     Jeroen DELVAUX, Roel PEETERS, Dawu GU, Ingrid VERBAUWHEDE. A Survey on Lightweight Entity Authentication with Strong PUFs. ACM Computing Surveys, accepted. 


2.     Zhiqiang Liu, Bing Sun, Qingju Wang, Kerem Varici, Dawu Gu. Improved Zero-Correlation Linear Cryptanalysis of Reduced-round Camellia under Weak Keys. IET Information Security , accepted. 


3.     Ya Liu, Anren Yang, Zhiqiang Liu, Wei Li, Qingju Wang, Liang Song, Dawu Gu. Improved Impossible Differential Attack on Reduced Version of Camellia with FL/FL-1 Functions. IET Information Security, accepted. 


4.     Shifeng Sun, Dawu Gu, Shengli Liu. Public Key Cryptosystems Secure against Memory Leakage Attacks. IET Information Security, accepted. 


5.     Shi-Feng Sun, Dawu Gu, Zhengan Huang. Fully Secure Wicked Identity-Based Encryption against Key Leakage Attacks. The Computer Journal, accepted.


6.     Chen Lyu, Dawu Gu, Yunze Zeng, Prasant Mohapatra. PBA: Prediction-based Authentication for Vehicle-to-Vehicle Communications. IEEE Trans. on Dependable and Secure Computing (TDSC), accepted.


7.     Fan Zhang, Shize Guo, Xinjie Zhao, Tao Wang, Jian Yang, Francois-Xavier Standaert, Dawu Gu. A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers. IEEE Trans. on Information Forensics and Security (TIFS), accepted.


8.     Wei Li, Wenwen Zhang, Dawu Gu, Yanqin Cao, Zhi Tao, Zhihong Zhou, Ya Liu, Zhiqiang Liu.  Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-hoc Networks. IEEE Trans. on Dependable and Secure Computing (TDSC), 13(1):84-92, 2016.


9.     Yikun Hu, Yuanyuan Zhang, Juanru Li and Dawu Gu. Cross-Architecture Binary Semantics Understanding via Similar Code Comparison. 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016), Osaka, Japan, Mar 14-18, 2016. 


10.   Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond. CRYPTO 2015, pp.209-229, Santa Barbara, USA, August 16-20, 2015.


11.   Wen Xu, Juanru Li, Junliang Shu, Wenbo Yang, Tianyi Xie, YuanyuanZhang, Dawu Gu. From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel. CCS 2015, Denver, USA, October 12-16, 2015.


12.   Jeroen Delvaux, Dawu Gu, Dries Schellekens, Ingrid Verbauwhede. Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis. IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 34(6):889-902, 2015.


13.   Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions. TCC 2015, pp.7-35, Warsaw, Poland, March 23-25, 2015.


14.   Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, Francois-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu. Evaluation and Improvement of Generic-Emulating DPA Attacks. CHES 2015, Saint Malo, France, September 13-14, 2015.


15.   Hui Wang, YuanyuanZhang, Juanru Li, Hui Liu, Wenbo Yang, Bodong Li, Dawu Gu. Vulnerability Assessment of OAuth Implementations in Android Applications. ACSAC 2015, Los Angeles, USA, December 7–11, 2015.


16.   Wenbo Yang, YuanyuanZhang, Juanru Li, Bodong Li, Junliang Shu, Wenju Hu, Dawu Gu. AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware. RAID 2015, Kyoto, Japan, November 2–4, 2015.


17.   Junrong Liu, Yu Yu, Francois-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Xinjun Xie. Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards. ESORICS 2015, Vienna, Austria, September 23-25, 2015.


18.   Chen Lyu, Amit Pande, Xinlei Wang, Jindan Zhu, Dawu Gu, Prasant Mohapatra. CLIP: Continuous Location Integrity and Provenance for Mobile Phones. Proceedings of the 12th IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS 2015). Dallas, USA, Oct 19-22, 2015.


19.   Qingju Wang, Zhiqiang Liu, Deniz Toz, Kerem Varici, and Dawu Gu. Related-Key Rectangle Cryptanalysis of Rijndael-160 and Rijndael-192. IET Information Security, 9(5): 266-276, 2015.


20.   Zhiqiang Liu, Ya Liu, Qiangju Wang, Dawu Gu, Wei Li. MitM Fault Analysis on Word-oriented SPN Block Ciphers. Security and Communication Networks, 8(4): 672-681, 2015.


21.   Haihua Gu, Dawu Gu, Wenlu Xie & Ray C.C.Cheung. Efficient Pairing Computation on Huff Curves. Cryptologia, 39(3): 270-275, 2015.


22.   Jeroen Delvaux, Dawu Gu, Dries Schellekens, Ingrid Verbauwhede. Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible? CHES 2014, Springer Berlin Heidelberg, Busan, Korea, September 23-26, 2014.


23.   Wenbo Yang, Juanru Li, Yuanyuan Zhang, Yong Li, Junliang Shu and Dawu Gu. APKLancet: Tumor Payload Diagnosis and Purification for Android Applications. ASIACCS 2014, Kyoto, Japan. June 2014.


24.   Hui Liu, Yuanyuan Zhang, Hui Wang, Wenbo Yang, Juanru Li and Dawu Gu. TagDroid: Hybrid SSL Certificate Verification in Android. ICICS2014, Hong Kong,China. December 16-17, 2014.


25.   Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Dawu Gu. Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering. FDTC 2014, Busan, Korea, September 23, 2014.


26.   Juanru Li, Yuanyuan Zhang, Wenbo Yang, Junliang Shu, Dawu Gu. DIAS: Automated Online Analysis for Android Applications. 14th IEEE International Conference on Computer and Information Technology (IEEE CIT 2014), Xi’an, 2014.9.11-2014.9.13.


27.   Yong Li, Yuanyuan Zhang, Juanru Li, Dawu Gu. iCryptoTracer: Dynamic Analysis on Misuse of Cryptographic Functions in iOS Applications. 8th International Conference on Network and System Security (NSS 2014), Xi’an, 2014.10.15-2014.10.17.


28.   Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu. Android App Protection via Interpretation Obfuscation. 12th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC2014), Dalian, 2014.8.24-2014.8.27.


29.   谷大武. Side Channel Attack on Crypto System of Smart Card, 台湾第24届资讯安全会议, 台北, 2014.5.30-2014.5.31.


30.   Gu Dawu, Jiang Xuxian, Xue Yibo, Zou Wei, Guo Li. PROTECTING COMMUNICATIONS INFRASTRUCTURE AGAINSTCYBER ATTACKS. China Communications, 11(8):I-II, 2014.


31.   郁昱, 谷大武. 抗泄露可证明安全流密码研究. 密码学报, 1(2):134-145, 2014.


32.   Guo Zheng, Gu Dawu, Yuan Kan, Liu Junrong, He Yuming. A Novel Method for Power Analysis Based on Combinational Logic in Block Cipher Circuit. Chinese Journal of Electronics, 23(1):151-156, 2014.


33.   Liu Ya, Gu Dawu, Li Bailan, Qu Bo. Legitimate-reader-only attack on MIFARE Classic. Mathematical and Computer Modelling, 58(1-2):219-226, 2013.


34.   Qu Bo, Gu Dawu, Guo Zheng, Liu Junrong. Differential power analysis of stream ciphers with LFSRs. Computers and Mathematics with Applications, 2013, 65(9):1291-1299.


35.   谷大武. 智能卡芯片中的密码系统--攻击和防护技术概况. 27次中国科技论坛--智能卡芯片安全技术和产业发展论坛, 北京, 2013.8.28-2013.8.28.


36.   Shifeng Sun, Dawu Gu, Shengli Liu. Efficient Leakage-Resilient Identity-Based Encryption with CCA-Security. 6th International Conference on Pairing-Based Cryptography (Pairing2013), Beijing, 2013.12.22-2013.12.24.


37.   Ruoxu Zhao, Dawu Gu, Juanru Li, Yuanyuan Zhang. Automatic Detection and Analysis of Encrypted Messages in Malware. 9th China International Conference on Information Security and Cryptology (Inscrypt 2013), Guang Zhou, 2013.11.27-2013.11.30.


38.   Chen Lyu, Dawu Gu, Xiaomei Zhang, Shifeng Sun, Yinqi Tang. Efficient, Fast and Scalable Authentication for VANETs. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC2013), Shanghai, 2013.4.7-2013.4.10.


39.   Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen, Wei Li. New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia. 19th International Workshop on Fast Software Encryption (FSE 2012), CCF-B, Washington DC, March 19-21, 2012.


40.   Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li. Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256. Journal of Systems and Software (JSS), 85(11):2451-2458, 2012.


41.   Zhao Jianjie, Gu Dawu. Provably secure three-party password-based authenticated key exchange protocol. Information Sciences, 184(1):310-323, 2012.


42.   Zhiqiang Liu, Dawu Gu, Ya Liu, Wei Li. Linear Fault Analysis of Block Ciphers. 10th International Conference on Applied Cryptography and Network Security (ACNS 2012), 241-256, Singapore, June 26-29, 2012.


43.   Ning Ding, Dawu Gu. On Constant-Round Precise Zero-Knowledge. 14th International Conference on Information and Communications Security (ICICS 2012), Hong Kong, 2012.10.29-2012.10.31.


44.   Ruoxu Zhao, Dawu Gu, Juanru Li, Liu Hui. Detecting Encryption Functions via Process Emulation and IL-based Program Analysis. 14th International Conference on Information and Communications Security (ICICS 2012), Hong Kong, 2012.10.29-2012.10.31.


45.   Qingju Wang, Dawu Gu, Vincent Rijmen, Ya Liu, Jiazhe Chen, Andrey Bogdanov. Improved Impossible Differential Attacks on Large-Block Rijndael. 15th Annual International Conference on Information Security and Cryptology (ICISC 2012), Seoul, 2012.11.28-2012.11.30.


46.   Dawu Gu, Juanru Li, Sheng Li, Zhouqian Ma, Zheng Guo, Junrong Liu. Differential fault analysis on lightweight block ciphers with statistical cryptanalysis techniques. 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2012), 27-33, Leuven, 2012.9.9-2012.9.9


47.   Yinqi Tang, Dawu Gu, Ning Ding, Haining Lu. Phrase Search over Encrypted Data with Symmetric Encryption Scheme. 32nd International Conference on Distributed Computing Systems Workshops(ICDCS-w2012), Macau, 2012.6.18-2012.6.21.


48.   Juanru Li, Dawu Gu, Yuhao Luo. Android Malware Forensics: Reconstruction of Malicious Events. 32nd International Conference on Distributed Computing Systems Workshops(ICDCS-w2012), Macau, 2012.6.18-2012.6.21.


49.   Haining Lu , Dawu Gu, Chongying Jin, Yinqi Tang. Reducing Extra Storage in Searchable Symmetric Encryption Scheme. The 2014 IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2012), Taipei, 2012.12.3-2012.12.6.


50.   Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li. Impossible Differential Attacks on Reduced-Round LBlock. 8th International Conference on Information Security Practice and Experience (ISPEC2012), 97-108, Hangzhou, 2012.4.9-2012.4.12.


51.   Zhao Jianjie, Gu Dawu, Zhang Lei. Security analysis and enhancement for three-party password-based authenticated key exchange protocol. Security and Communication Networks(SCN), 5(3):273-278, 2012.

(1) National Natural Science Foundation of China (61472250), "On analyzing the security of authenticated encryption schemes", 2015.1-2018.12
(2) Major State Basic Research Development Program (973 Plan) (2013CB338004), "Research on the principal and methods of side channel attacks", 2013.1-2017.8

2014: Yangtze River Scholar Distinguished Professors Program, by the Ministry of Education of China.

2015: first prize of science and technology award, by Shanghai municipal government.

2015: Shanghai leading talents program, by Shanghai municipal government.

2016: Shanghai outstanding academic leaders program, by Shanghai municipal government.

2005: New Century Excellent Talent Program, by the Ministry of Education of China.

2002: Rising Star program for Young Talent, by Shanghai municipal government. 

2001: second prize of science and technology award of national defense, by the commission of Science, Technology and Industry for National Defense (CSTIND)


- technical editors: China Communications, J. Cryptologic Research, Information Network Security.

- general/program chair: E-Forensics 2010, CASC 2011, CryptoIC 2013, ChinaCrypt 2015.

- PC member: ASIACRYPT, ASIACCS, ACNS, ISC, ISPEC, ICICS, Globecom, IEEE TrustCom, and NSS, etc.

Contact webmaster@cs.sjtu.edu.cn

Copyright @ 2013 SJTU Computer Science & Engineering All Rights Reserved