电话 :010-82500680
个人下载亚博app主页:rucsesec.github.io
电子邮箱:liangb@ruc.edu.cn
清华大学博士后
2. 人工智能安全:针对人工智能/机器学习系统的攻击与防御方法研究;
3. 移动安全:移动应用分析、移动安全攻防、新型威胁识别;
4.系统软件安全机制:主要研究以操作系统为代表的系统软件中的安全增强机制;
欢迎有志于信息安全研究的同学报考我的博士和硕士研究生。也欢迎本科生进入实验室,参与研究和开发工作。
2.程序设计安全(本科)
3.软件安全分析与测试(研究生)
- 国家自然科学基金通用技术基础研究联合基金重点支持项目:漏洞相关数据集中的知识发现及在漏洞检测中的应用(项目负责人)
- 国家科技重大专项课题 ******(项目负责人);
- 国家自然科学基金重点项目分课题:软件安全性分析的关键技术与工具(项目负责人);
- “核高基”重大专项课题任务:新一代android应用安全性分析(项目负责人);
- “核高基”重大专项课题任务:浏览器执行环境安全(项目负责人);
- “核高基”重大专项课题任务:android缺陷检测及攻击验证(项目负责人);
- “核高基”重大专项课题任务:android/linux及chrome/chromium新型桌面/浏览器的安全性分析(项目负责人);
- 国家自然科学基金项目:动态污点分析中的隐式信息流分析方法研究(项目负责人);
- 国家自然科学基金项目:基于数据挖掘的安全漏洞静态检测方法研究(项目负责人);
- 国家自然科学基金项目:结合系统结构特征的系统软件安全脆弱性静态检测方法研究(项目负责人);
- 北京市自然科学基金项目:基于静态检测的web信息系统安全漏洞发掘方法研究(项目负责人);
- ...
近年主要论文:
-jianan feng, jiachun li, changqing miao, jianjun huang, wei you, wenchang shi, bin liang*. fight fire with fire: combating adversarial patch attacks using pattern-randomized defensive patches. to appear in the ieee symposium on security & privacy (s&p 2025) (ccf a)
-jianjun huang, jianglei nie, yuanjun gong, wei you, bin liang*, pan bian. raisin: identifying rare sensitive functions for bug detection. proceedings of the 46th international conference on software engineering (icse 2024) (ccf a)
-dongnan he, dongchen xie, yujie wang, wei you*, bin liang, jianjun huang, wenchang shi, zhuo zhang, xiangyu zhang. define-use guided path exploration for better forced execution. proceedings of the 33rd acm sigsoft international symposium on software testing and analysis (issta 2024) (ccf a)
-yuanjun gong, jianglei nie, wei you, wenchang shi, jianjun huang*, bin liang*, jian zhang. sicode: embedding-based subgraph isomorphism identification for bug detection. proceedings of the 32nd ieee/acm international conference on program comprehension (icpc 2024) (ccf b)
-changqing miao, jianan feng, wei you, wenchang shi, jianjun huang∗, bin liang∗. a good fishman knows all the angles: a critical evaluation of google’s phishing page classifier. proceedings of the 30th acm conference on computer and communications security (ccs 2023). (ccf-a)
-suyue guo, xinyu wang, wei you*, bin liang, wenchang shi, yiwei zhang, jianjun huang, jian zhang. operand-variation-oriented differential analysis for fuzzing binding calls in pdf readers. proceedings of the 45th acm/ieee internatinoal conference on software engineering (icse 2023). (ccf-a)
-xiaohui zhang, yuanjun gong, bin liang*, jianjun huang, wei you, wenchang shi, jian zhang. hunting bugs with accelerated optimal graph vertex matching. the 31st acm sigsoft international symposium on software testing and analysis (issta 2022). (ccf-a).
-bin liang, hongcheng li, miaoqiang su, xirong li, wenchang shi and xiaofeng wang. detecting adversarial image examples in deep neural networks with adaptive noise reduction. ieee transactions on dependable and secure computing (tdsc). vol. 18, no. 01, pp. 72-85, 2021. (ccf-a).
-jianjun huang, songming han, wei you, wenchang shi, bin liang*, jingzheng wu and yanjun wu. hunting vulnerable smart contracts via graph embedding based bytecode matching. ieee transactions on information forensics and security. (tifs), vol. 16, pp. 2144-2156, 2021. (ccf-a).
-shilei bai, bin liang*, jianjun huang, wei you, jiachun li, yaping li, wenchang shi. detecting the capacitance-based gamepad for protecting mobile game fairness. ieee transactions on computers (toc). vol. 70, no. 9, pp. 1374-1386, 2021. (ccf-a).
-jianjun huang, jiasheng jiang, wei you, bin liang*. precise dynamic symbolic execution for nonuniform data access in smart contracts. ieee transactions on computers (toc). online, 2021. (ccf-a).
-pan bian, bin liang*, jianjun huang, wenchang shi, xidong wang, jian zhang. sinkfinder: harvesting hundreds of unknown interesting function pairs with just one seed. in proceedings of the 28th acm joint european software engineering conference and symposium on the foundations of software engineering (esec/fse’20), pages 11011113, 2020. (ccf-a).
-jiwei yan, hao liu, linjie pan, jun yan, jian zhang, bin liang. multiple-entry testing of android applications by constructing activity launching contexts. in proceedings of the 42nd international conference on software engineering (icse 2020). (ccf-a).
-wei you, bin liang*, wenchang shi, peng wang and xiangyu zhang. taintman: an art-compatible dynamic taint analysis framework on unmodified and non-rooted android devices. ieee transactions on dependable and secure computing (tdsc), vol. 17, no. 1, pp. 209-222, 1 jan.-feb. 2020. (ccf-a).
-hongcheng li, jiangjun huang, bin liang, wenchang shi, yifang wu, shilei bai. identifying parasitic malware as outliers by code clustering. journal of computer security (jcs), vol.28, no.2, pp.157-189. jan. 2020. (ccf-b).
-yifang wu, jiangjun huang, bin liang, wenchang shi. do not jail my app: detecting the android plugin environments by time lag contradiction. journal of computer security (jcs), vol.28, no.2, pp.269-293. jan. 2020. (ccf-b).
-pan bian, bin liang*, yan zhang, chaoqun yang, wenchang shi, and yan cai. detecting bugs by discovering expectations and their violations. ieee transactions on software engineering (tse), 45(10): 9841001, 2019. (ccf-a).
-wei you, xuwei liu, shiqing ma, david perry, xiangyu zhang, bin liang. slf: fuzzing without valid seed inputs. in proceedings of the 41st international conference on software engineering (icse 2019). (ccf-a).
-wei you, xueqiang wang, shiqing ma, jianjun huang, xiangyu zhang, xiaofeng wang, bin liang. profuzzer: on-the-fly input type probing for better zero-day vulnerability detection. in proceedings of the 40th ieee symposium on security and privacy (s&p 2019). (ccf-a).
-yan cai, biyun zhu, ruijie meng, hao yun, liang he, purui su, bin liang. detecting concurrency memory corruption vulnerabilities. in proceedings of the 2019 27th acm joint meeting on european software engineering conference and symposium on the foundations of software engineering (esec/fse 2019). (ccf-a).
-bin liang, hongcheng li, miaoqiang su, pan bian, xirong li, wenchang shi. deep text classification can be fooled. proc. 27th international joint conference on artificial intelligence (ijcai 2018), pp.4208-4215. (ccf-a).
-pan bian, bin liang*, wenchang shi, jianjun huang, and yan cai. narminer: discovering negative association rules from code for bug detection. in proceedings of the 26th acm joint european software engineering conference and symposium on the foundations of software engineering (esec/fse’18), pages 411422, 2018. (ccf-a).
-yuanjun gong, bin liang*, jianjun huang. fooling image search engine. def con, china. 2018.
-wei you, peiyuan zong, kai chen, xiaofeng wang, xiaojing liao, pan bian, bin liang. semfuzz: semantics-based automatic generation of proof-of-concept exploits. in proceedings of the 23rd acm conference on computer and communications security (ccs 2017). (ccf-a).
-bin liang, pan bian, yan zhang, wenchang shi, wei you, yan cai. antminer: mining more bugs by reducing noise interference. in proceedings of the 38th international conference on software engineering (icse 2016), may 2016. (ccf-a).
-wei you, bin liang*, wenchang shi, shuyang zhu, peng wang, sikefu xie, xiangyu zhang. reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices. in proceedings of the 38th international conference on software engineering (icse 2016), may 2016. (ccf-a).
-bin liang, miaoqiang su, wei you, wenchang shi, gang yang. cracking classifiers for evasion: a case study on the google’s phishing pages filter. in proceedings of the 25th international world wide web conference (www 2016), april 2016. (ccf-a).
-wei you, bin liang*, jingzhe li, wenchang shi, xiangyu zhang. android implicit information flow demystified. acm symposium on information, computer and communications security (asiaccs 2015). (ccf-c).
-bin liang, wei you, liangkun liu, wenchang shi, mario heiderich. scriptless timing attacks on web browser privacy. ieee/ifip international conference on dependable systems and networks (dsn 2014). (ccf-b)
-jianjun huang, xiangyu zhang, lin tan, peng wang, bin liang. asdroid: detecting stealthy behaviors in android applications by user interface and program behavior contradiction. in proceedings of the 36th international conference on software engineering (icse 2014), pp.1036-1046 . (ccf-a).
-bin liang, wei you, wenchang shi, zhaohui liang. detecting stealthy malware with inter-structure and imported signatures. acm symposium on information, computer and communications security (asiaccs 2011) . (ccf-c)
-边攀,梁彬*,黄建军,游伟,石文昌,张健. rtdminer: 基于数据挖掘的引用计数更新缺陷检测方法. 软件学报, 2023,34(10):4724-4742
-李赞, 边攀, 石文昌, 梁彬*. 一种利用补丁的未知漏洞发现方法. 软件学报, 2018, v.29(05):27-40.
......
近年主要专利:
-梁彬, 李红程. 一种深度神经网络图像对抗样本检测方法和系统. cn202010111521.x
-梁彬, 韩松明, 黄建军, 石文昌. 一种以太坊智能合约漏洞检测方法及装置. cn201911316138.1
-梁彬, 白石磊, 黄建军, 游伟, 李佳纯, 石文昌. 一种电容游戏手柄的检测方法和系统. cn201911323783.6
-梁彬,李赞,边攀,石文昌. 一种利用补丁信息进行未知漏洞发现的相似性检测方法. zl201810047837.x
-梁彬, 游伟, 李赞, 石文昌. 一种基于动态污点分析的按需跟踪方法及装置. zl201510802094.9.
......中国电子学会软件定义推进委员会委员
中国计算机学会软件工程专委委员
gsp政府安全计划微软源代码查看授权专家
2021年中国计算机学会自然科学一等奖(高精度智能化的软件分析与测试方法)
2017年中国人民大学十大教学标兵