- Advanced Malware Detection Techniques
- Security and Verification in Computing
- Internet Traffic Analysis and Secure E-voting
- Direction-of-Arrival Estimation Techniques
- Blockchain Technology Applications and Security
- Blind Source Separation Techniques
- Network Security and Intrusion Detection
- Cloud Data Security Solutions
- Structural Health Monitoring Techniques
- Software System Performance and Reliability
Institute of Software
2024
Nanjing University
2024
Beijing Jiaotong University
2021
Abstract “Shift To Left” is the cornerstone of successful implementation DevSecOps. By testing projects for vulnerabilities in early stages development, teams can save overall costs before security issues reach build phase. As one popular practices Left,” Software Composition Analysis (SCA) system aims to leverage Bill Materials (SBOM) enhance software supply chain security. However, SBOM lacks mature generation and distribution mechanisms, requiring incentive measures drive industry...
As the access control mode of notepad files cannot meet requirements risk for sensitive file hierarchical access, this paper proposes an application classification-based detection method abnormal to files. The classification and classification, policy mapping, basic preset are designed. Combining operating system’s identification different applications at runtime, we monitor by applications. cross-access experiment levels verified effectiveness security strategy reduced disclosure
Web services have covered all areas of social life, and various browsers become necessary software on computers mobile phones, they are also the entrances to services. All kinds threats web data security continue appear, so focus security. In response requirements service for access entity identification control, this paper proposes a multi-dimensional browser fingerprint detection method based adversarial learning, designs control framework combined with detection. Through joint use...