pornhub

  • 讨论室预约

教师名录

傅建明

邮          箱:[email protected]

职          称:教授

办公室地址:

实验室地址:

个人简介

傅建明,博士。在华中理工大学获得了学士学位和硕士学位, 在 pornhub 获得了博士学位,现为 pornhub 网络安全学院教授,博士生导师。中国计算机学会高级会员,IEEE会员和ACM会员。20108月至20118月,在美国爱荷华州立大学进行学术交流和访问。主要从事逆向分析与安全评估、漏洞检测与防御、移动安全、人工智能应用及安全、恶意代码与恶意行为检测等方面的教学和科研工作。


研究方向

1、逆向分析与安全评估;

2、代码缺陷检测;

3、软件系统安全防御;

4、移动安全;

5、恶意行为检测和恶意代码检测;

6、人工智能应用与安全。

招收研究生要求:

1、熟悉C/C++/Java/汇编等编程语言;

2、喜欢对漏洞和黑客攻击刨根问底;

3、喜欢遨游在由磁盘、内存、网络、{0/1}构成的数字世界;

4、爱好逆向分析,探索软件和网络的内在奥秘;

5、了解编译器、操作系统,以及机器学习和深度学习。

参考书:

王清,0-Day安全:软件漏洞分析技术(第二版)。电子工业出版社,2011

丰生强. Android软件安全与逆向分析. 人民邮电出版社,2013.


教育背景

1987.09~1991.06 华中理工大学(学士学位)

1991.07~1994.04 华中理工大学(硕士学位)

1996.09~2000.06 pornhub (博士学位)

工作经验

2018.01~至今 pornhub

1994.04~2017.12 pornhub 计算机学院

教授课程

本科教学

1. 高级语言程序设计

2. 软件安全

3. 计算机病毒

研究生教学

1. 网络安全监管 (硕士研究生)

2. 信息论 (博士研究生)

发表论文

2025

1. Beyond Fuzzy Matching: Constraint-Guided Patch Presence Test for Obfuscated Java Binaries. ICSE 2026 (accepted)

2. Accelerating App Recompilation Across Android System Updates via Code Reusing. CGO 2026 (Accepted)

3. Side Liu, Jiang Ming, Guodong Zhou, Xinyi Liu, Jianming Fu, Guojun Peng. Analyzing PDFs like Binaries: Adversarially Robust PDF Malware Analysis via Intermediate Representation and Language Model. ACM CCS 2025.

4. Side Liu, Jiang Ming, Yilin Zhou, Jianming Fu, Guojun Peng. VAPD: An Anomaly Detection Model for PDF Malware Forensics with Adversarial Robustness, USENIX Security 2025.

5. Lige Zhan, Jiang Ming, Jianming Fu(*), Guojun Peng, Letian Sha, Lili Lan, The hidden complexities of Android TPL detection: An empirical analysis of techniques, challenges, and effectiveness, Computers & Security, Volume 159, 2025,104672,ISSN 0167-4048, //doi.org/10.1016/j.cose.2025.104672.

6. Mengfei Xie, Yan Lin*, Hongtao Wu, Jianming Fu*, Chenke Luo, Guojun Peng. Beyond Tag Collision: Cluster-based Memory Management for Tag-based Sanitizers. The 33rd ACM Conference on Computer and Communications Security (CCS). Oct, 2025.

7. Zuquan Peng, Jianming Fu, Lixin Zou, Li Zheng, Yanzhen Ren, Guojun Peng. Backdoor samples detection based on perturbation discrepancy consistency in pre-trained language models, Neural Networks,Volume 193,2026,108025

8. Yu Nie, Jianming Fu, Xinghang Lv, Chao Li, Shixiong Yang, Guojun Peng, WAScope: Detecting privacy data leakage with web application-specific API confusion, Alexandria Engineering Journal,Volume 128,2025,Pages 1145-1158

9. L. Chenke, F. Jianming(*), M. Jiang, X. Mengfei and P. Guojun, "PtrProxy: Efficient code re-randomization on AArch64 platform," in China Communications, vol. 22, no. 6, pp. 64-82, June 2025.

10. Chenke Luo, Jiang Ming, Mengfei Xie, Guojun Peng, Jianming Fu. Retrofitting XoM for Stripped Binaries without Embedded Data Relocation[C]. In Proceedings of the 32nd Network and Distributed System Security Symposium, San Diego, California, 24 February – 28 February, 2025

11. M. Xie, Y. Lin, J. Fu, C. Luo and G. Peng, "Egalitarian Randomization for Multi-Language Applications on ARM64," in IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2025.3581802.

12. Xinghang Lv , Jianming Fu, Tao Peng. VULOC: Vulnerability location framework based on assembly code slicing. The Journal of Systems and Software 227 (2025), 112459.

13. Xinghang Lv, Jianming Fu, Yu Nie. VDCRL: vulnerability detection with supervised contrastive code representation learning, Neural Networks, Volume 192, 2025, 107861.

14. Chenke Luo, Jiang Ming, Dongpeng Xu, Guojun Peng, Jianming Fu(*). MemoryTrap: Booby Trapping Memory to Counter Memory Disclosure Attacks with Hardware Support. 2025 USENIX ATC, July 7–9, 2025, Boston, MA, USA.

15. 杨秀璋, 彭国军, 刘思德, 田杨, 李晨光, 傅建明 . [J]. 软件学报,2025,36(1):203-252

16. 解梦飞, 傅建明, 姚人懿. 基于LLM的多媒体原生库模糊测试研究[J]. 信息网络安全, 2025, 25(3): 403-414.

17. 徐贯虹,傅建明,聂宇,解梦飞.基于模拟执行的Android应用Java方法与Native函数的映射识别[J].信息安全学报,2025,10(3):1-17

18. 傅建明,李萌,刘畅.Android多开应用安全研究综述[J. pornhub 学报(理学版),2025712):146-158.


.

2. Rui Zheng, Qiuyun Wang, Jia He, Jianming Fu, Guga Suri, Zhengwei Jiang, "Cryptocurrency Mining Malware Detection Based on Behavior Pattern and Graph Neural Network", Security and Communication Networks, vol. 2022, Article ID 9453797, 8 pages, 2022.

3. 傅建明, 刘畅, 解梦飞, 罗陈可. 基于诱捕的软件异常检测综述[J]. 网络与信息安全学报, 2022, 8(1): 15-29. //Jianming FU, Chang LIU, Mengfei XIE, Chenke LUO. Survey of software anomaly detection based on deception[J]. Chinese Journal of Network and Information Security, 2022, 8(1): 15-29.

4. R. Zheng, Q. Wang, Z. Lin et al., Cryptocurrency malware detection in real-world environment: Based on multi-results stacking learning. Applied Soft Computing, 2022, 124. doi: .

5. Y. Ren, D. Liu, C. Liu, Q. Xiong, J. Fu and L. Wang, "A Universal Audio Steganalysis Scheme based on Multiscale Spectrograms and DeepResNet," in IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2022.3141121.

2021

. Trust-Aware sensing Quality estimation for team Crowdsourcing in social IoT. , 15 January 2021, 107695

4. , , , , , , (2021). . In Proceedings of the 30th USENIX Security Symposium, Virtual Event, August 11-13, 2021

, , , , , , , (2021). . In Proceedings of the 43rd International Conference on Software Engineering, Virtual Event, May 25-28, 2021

.

6. 沙乐天,何利文,傅建明,王延松等,物联网环境下的一种敏感信息保护方法. 四川大学学报工程科学版, 2016, 48(1):132-138

7. Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng, Chunfu Jia, Huanguo Zhang. Stack Layout Randomization with Minimal Rewriting of Android Binaries . In proceedings of the 18th Annual international conference on information security and cryptology(ICISC). Nov, 2015. Seoul, Korea. (已标注)

8. 李新国,李鹏伟,傅建明,丁笑一。一种安全风险可控的弹性移动云计算通用框架。计算机科学,201542A11):357~363


2014

1. 李拴保, 傅建明, 张焕国, 陈晶, 王晶, 任必军. 云环境下基于环签密的用户身份属性保护方案. 通信学报,2014, 35(9):99~111

2. 李拴保,傅建明. 云环境下基于属性的用户权限管理研究. 计算机科学,2014.9

3. Jianming Fu, Yan Lin, Xu Zhang, Pengwei Li. Computation Integrity Measurement Based on Branch Transfer[C]//Procedings of the 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2014.

4. 梁玉, 傅建明, 彭国军, 彭碧琛, 张焕国. S-Tracker:一种基于栈异常的shellcode检测方法. 华中科技大学学报,2014, (11) 39-46.

5. 傅建明,沙乐天,李鹏伟,彭国军. 一种采用硬件虚拟化的内核数据主动保护方法. 四川大学学报(工程科学版),2014,46(1):8~13 (61202387,201201411110002)

6. Letian Sha, Jianming Fu, Jing Chen, Guojun Peng. PVDF: AN AUTOMATIC PATCH-BASED VULNERABILITY DESCRIPTION AND FUZZING METHOD. Proceeding of Communication security conference, 2014, Beijing.

7. Shuanbao Li, Jianming Fu. USER REVOCATION FOR DATA SHARING BASED ON BROADCAST CP-ABE IN CLOUD COMPUTING. Proceeding of Communication security conference, 2014, Beijing.

(2023~2026).

2. 国家重点研发课题任务:隐私数据敏感性度量及保护效果评估(2021.

3. 国家自然科学基金项目:面向代码复用攻击的诱捕防御机制研究。 (2020~2023) .

4. 内存动态威胁的检测与防护. (企业合作)

5. Dex2oat优化. (企业合作)

研究团队

//ts.pornhubgo.com

获奖信息

1. 2016年湖北省科技进奖二等奖, “ 网络安全威胁主动感知及研判的方法与技术”,排名第一。

2. 2016年获得 pornhub 杰出教学贡献校长奖(排名第三)。

3. 2016年指导学生获得全国大学生信息安全竞赛二等奖。

4. 2015年指导全国大学生互联网+创新比赛,获得 pornhub 互联网+优秀指导教师。

5. 2014年国家级教学成果一等奖“创建信息安全专业培养体系,引领信息安全专业建设” (排名第八)。

6. 2012年 pornhub 优秀教学成果奖“坚持特色办学思想,建设 pornhub 信息安全特色专业” (排名第三)。

7. 湖北省科技进步奖二等奖-基于磁盘的数据备份与恢复管理软件(2007年,排名第4)

邮箱 [email protected] 职称 教授
办公室地址 实验室地址