陈平

发布者:尹秀娟发布时间:2022-03-15浏览次数:4687

陈平,现任复旦大学大数据研究院青年研究员。2012年博士毕业于南京大学计算机软件与理论专业,美国普渡大学计算机专业的联合培养博士2010-2011。美国宾州州立大学的博士后研究员2014-2018。上海领军人才2021。发表国际会议期刊论文30+,包括CCSUSENIX SecurityTIFSTDSCAutomatica等。

研究方向

软件和系统安全,内生安全,智能车安全,漏洞挖掘,区块链安全,反欺诈。

联系方式

邮箱:pchen@fudan.edu.cn

办公室:复旦大学邯郸校区邯郸路220号计算中心317室


近5年代表性论文

(1) Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers. EuroS&P 2022

(2) Lan Zhang, Peng Liu, Yoon-Ho Choi, Ping Chen. Semantics-preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection. TDSC 2022.

(3) Zhisheng Hu, Ping Chen*, Minghui Zhu, Peng Liu. A co-design adaptive defense scheme with bounded security damages against Heartbleed-like attacks. TIFS. 2021.

(4) Xusheng Li, Zhisheng Hu, Haizhou Wang, Yiwei Fu, Ping Chen, Minghui Zhu, Peng Liu. DEEPRETURN: A Deep Neural Network Can Learn How to Detect Previously-Unseen ROP Payloads without Using Any Heuristics. Journal of Computer Security, 2020.

(5) Zhisheng Hu, Minghui Zhu, Ping Chen, Peng Liu. On convergence rates of game theoretic reinforcement learning algorithms.Automatica.2019.

(6) Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Peng Liu. Feedback Control Can Make Data Structure Layout Randomization More Cost-Effective under Zero-day Attacks. Cybersecurit 2018

(7) Jun Xu, DongLiang Mu, Xinyu Xing, Ping Chen, Bing Mao. POMP: Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts. USENIXSecurity 2017. 

(8) Ping Chen, Jun Xu, Zhisheng Hu, Xinyu Xing, Minghui Zhu, Bing Mao, Peng Liu. What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon.In Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. DSN 2017.

(9) Deng Liang, Peng Liu, Jun Xu, Ping Chen, QingkaiZeng. Dancing with Wolves: Twards Practical Event-driven VMM Monitoring. VEE 2017. 

(10) Jun Xu, Dongliang Mu, Ping Chen, Xinyu Xing, Peng Liu. CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump. CCS 2016.

(11) Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao, Peng Liu. A Practical Approach for Adaptative Data Structure Layout Randomization. ESROICS 2015.

(12)DSLR–: A Low-Overhead Data Structure Layout Randomization for Defending  Data-Oriented Programming Journal of Computer Security submitted Wei Jin,Ping Chen JCS 2023


相关代表性著作

(1) Zhisheng HuPing ChenMinghui ZhuLiu PengReinforcement Learning for Adaptive Cyber Defense against Zero-Day AttacksIn S. Jajodia, G. Cybenko, P. Liu, C. Wang, and M. Wellman (Eds.), Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, Springer 2019.

(2) Ping Chen*; Zhisheng Hu; Jun Xu; Minghui Zhu; Rob Erbacher; SushilJajodia; Liu Peng; MTD Techniques for Memory Protection against Zero-Day Attacks, In S. Jajodia, G. Cybenko, P. Liu, C. Wang, and M. Wellman (Eds.), Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, Springer 2019. 


教学

本科:计算机原理DATA1300252022-2023

研究生:大规模分布式系统DATA6300042022-2023