汤战勇

undefined

职称副教授/博士/硕士生导师

个人简历:

汤战勇,西北大学副教授,硕士生导师。ACM会员,CCF YOCSEF西安AC委员,现任西北大学-爱迪德物联网信息安全联合实验室副主任。近年的研究工作主要集中在移动计算与系统安全方面。其中围绕无线信号识别与感知安全、软件执行安全、代码漏洞挖掘与虚拟执行保护开展大量研究。曾在上海华为、绿盟科技任职,拥有超过八年的安全行业实际从业经验。作为项目负责人和主要研究人员承担和参与国家自然科学基金4项,参加国家科技支撑计划1项。并获得多项企业课题资助,包括荷兰爱迪德、深圳腾讯、支付宝(蚂蚁金服)以及CCF-绿盟科技鲲鹏科研基金等横向课题。在国际国内重要期刊发表SCI/EI检索论文30余篇,相关研究成果在MOBICOMINFOCOMUBICOMPPERCOMCCSNDSS以及TONTOPSComputer & SecurityCCF推荐的AB类会议和期刊上发表,其中在ACMCCS’18上获得最佳论文提名奖—“BestPaperAward Finalist!(Top-4 ranked papers)。目前已获得授权专利8项,软件著作权20余项,2016年获得陕西省高等学校科学技术一等奖(排名第二),2018年获陕西省科学技术二等奖(排名第二)。围绕终端隐私保护的相关研究成果被英国《泰晤士报》、美国《福布斯》以及国内《参考消息》、《陕西日报》等主流媒体广泛报道。

 科研成果:

A 部分英文论文

2018年发表的文章 

1.[ACM CCS'18] Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach. Guixin Ye, Zhanyong Tang*(通信作者), Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, Xiaojiang Chen, Zheng Wang: (CCF 推荐A类会议) “Best Paper Award Finalist!”(Top-4 ranked papers)

2.[MobiCom'18] CrossSense: Towards Cross-Site and Large-Scale WiFi Sensing.Jie Zhang, Zhanyong Tang*(通信作者), Meng Li, Dingyi Fang, Petteri Nurmi, Zheng Wang: (CCF 推荐A类会议)

3.[Ubicom'18] SleepGuard: Capturing Rich Sleep Information Using Smartwatch Sensing Data. Liqiong Chang, Jiaqi Lu, Ju Wang, Xiaojiang Chen, Dingyi Fang, Zhanyong Tang, Petteri Nurmi, Zheng Wang: (CCF 推荐A类会议)

4.[Ubicom'18] RF-Copybook: A Millimeter Level Calligraphy Copybook based on commodity RFID,LiqiongChang,JieXiong, Ju Wang, Xiaojiang ChenYu Wang, Zhanyong Tang,Dingyi Fang. (CCF 推荐A类会议)

5.[IJCAI'18] Evaluating Brush Movements for Chinese Calligraphy: A Computer Vision Based Approach. Pengfei Xu, Lei Wang, Ziyu Guan, Xia Zheng, Xiaojiang Chen, Zhanyong Tang, Dingyi Fang, Xiaoqing Gong, Zheng Wang: (CCF 推荐A类会议)

6.[PerCom'18] Towards Large-Scale RFID Positioning: A Low-cost, High-precision Solution Based on Compressive Sensing. L. Chang, X. Li, J. Wang, H. Meng, X. Chen, D. Fang, Z. Tang, Z. Wang IEEE International Conference on Pervasive Computing and Communications (PerCom), 2018. (CCF 推荐B类会议)

7.[ICPADS'18] Exploiting Code Diversity to Enhance Code Virtualization Protection. Chao Xue, Zhanyong Tang*(通信作者), Guixin Ye, Guanghui Li, Wei Wang, Dingyi Fang, Zheng Wang. The 24th International Conference on Parallel and Distributed Systems (ICPADS) , 2018. (CCF 推荐C类会议)

8.[ACM TOPS] A Video-based Attack for Android Pattern Lock.Guixin Ye, Zhanyong Tang*(通信作者), Dingyi Fang, Xiaojiang Chen, Willy Wolff, Adam Aviv, Zheng Wang. ACM Transactions on Privacy and Security (ACM TOPS) , 2018.  (CCF 推荐B类期刊)

9.[Computer & Security] Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling.KaiyuanKuang , Zhanyong Tang*(通信作者), Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Zheng Wang.  Computers &Security 74 (2018) 202–220 (CCF 推荐B类期刊)

10.[Computer & Security] Find Me A Safe Zone: A Countermeasure for Channel State Information Based Attacks. Jie Zhang, Zhanyong Tang*(通信作者), Li Meng, DingYi Fang, Xiaojiang Chen, Zheng Wang. Computers and Security , 2018.  (CCF 推荐B类期刊) 

2017年发表的文章

1. [NDSS '17] Cracking Android Pattern Lock in Five Attempts G.X Ye, Z.Y Tang*, D.Y Fang, X.J Chen, K.I Kim, B. Taylor and Z Wang The Network and Distributed System Security Symposium 2017 (NDSS'17) (Acceptance Rate; 16%, 68/423) 安全四大顶会之一 (CCF 推荐B类会议)

2. [TrustCom '17] SEEAD: A Semantic-based Approach for Automatic Binary Code De-obfuscationZhanyong Tang*, Lei Wang, Kaiyuan Kuang, Chao Xue, Xiaoqing Gong, Xiaojiang Chen, Dingyi Fang and Zheng Wang The 37th IEEE International Conference on Distributed Computing Systems (ICDCS), 2017. (CCF 推荐C类会议)

3. [ICPADS '17] AppIS: Protect Android Apps Against Runtime Repackaging Attacks L. Song, Z. Tang*, Z. Li, X. Gong, X. Chen, D. Fang and Z Wang  The 23rd IEEE International Conference on Parallel and Distributed Systems (ICPADS 2017), 2017 (CCF 推荐C类会议)

4. [UIC '17] Exploit Dynamic Data Flows to Protect Software Against Semantic Attacks Kuang, K., Tang, Z*., Gong, X., Fang, D., Chen, X., Zhang, H. and Wang, Z. The 14th IEEE Int'l Conf. on Ubiquitous Intelligence and Computing (UIC 2017), 2017. (CCF 推荐C类会议)

5. [CSS'17] A Bytecode Level Code Protection System for Android Applications. Beibei Zhao, Zhanyong Tang*, Zhen Li, Lina Song, Xiaoqing Gong, Dingyi Fang, Fangyuan Liu, Zheng Wang:DexPro: CSS 2017: 367-382

6. [CSE/EUC17] Coverage Hole Detection and Recovery in Wireless Sensor Networks Based on RSSI-Based Localization. Shuangjiao Zhai, Zhanyong Tang*, Dajin Wang, Zhanglei Li, Xiaojiang Chen, Dingyi Fang, Feng Chen:CSE/EUC (2) 2017: 250-257

7. [CSE/EUC17] Protect Sensitive Information against Channel State Information Based Attacks. Jie Zhang, Zhanyong Tang*, Rong Li, Xiaojiang Chen, Xiaoqing Gong, Dingyi Fang, Zheng Wang:CSE/EUC (2) 2017: 203-210

8. [IEEE/ACM Trans. Netw] FitLoc: Fine-Grained and Low-Cost Device-Free Localization for Multiple Targets Over Various Areas. Liqiong Chang, Xiaojiang Chen, Yu Wang, Dingyi Fang, Ju Wang, Tianzhang Xing, Zhanyong Tang: IEEE/ACM Trans. Netw. 25(4): 1994-2007 (2017)

9. [MISys] Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes. Zhanyong Tang, Yujie Zhao, Lei Yang, Shengde Qi, Dingyi Fang, Xiaojiang Chen, Xiaoqing Gong, Zheng Wang:Mobile Information Systems 2017: 1248578:1-1248578:14 (2017)

10. [AD HOC SENS WIREL NE] Approximate Convex Decomposition Based on Connectivity in Large-scale 3DWireless Sensor Networks. Zhaoqiang Wang, Jingjing Zhao, Xiaojiang Chen, Xiaoqing Gong, Zhanyong Tang, Chen Liu, Dingyi Fang Ad Hoc & Sensor Wireless Networks 35(1-2): 41-66 (2017)

11. [IJHPN] Android app repackaging by executable code fragmentation. Ruxia Fan, Dingyi Fang, Zhanyong Tang*, Xiaojiang Chen, Fangyuan Liu, Zhengqiao Li:Thwarting IJHPCN 10(4/5): 320-331 (2017)

2016年及以前发表的文章

1. Pengfei Xu, Xia Zheng, Xiaojun Chang, Qiguang Miao, Zhanyong Tang, Xiaojiang Chen, Dingyi Fang:Artistic information extraction from Chinese calligraphy works via Shear-Guided filter. J. Visual Communication and Image Representation 40: 791-807 (2016) SCI JCR3

2. Jie Zhang, Xiaolong Zheng, Zhanyong Tang*, Tianzhang Xing, Xiaojiang Chen, Dingyi Fang, Rong Li, Xiaoqing Gong, Feng Chen:Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality. Mobile Information Systems 2016: 8793025:1-8793025:14 (2016)  SCI JCR3

3. Liqing Ren, Xiaojiang Chen, Binbin Xie, Zhanyong Tang, Tianzhang Xing, Chen Liu, Weike Nie, Dingyi Fang:DE 2: localization based on the rotating RSS using a single beacon. Wireless Networks 22(2): 703-721 (2016) SCI JCR4

4. Binbin Xie, Dingyi Fang, Tianzhang Xing, Lichao Zhang, Xiaojiang Chen, Zhanyong Tang, Anwen Wang:FISCP: fine-grained device-free positioning system for multiple targets working in sparse deployments. Wireless Networks 22(5): 1751-1766 (2016) SCI JCR4

5. Liqiong Chang, Xiaojiang Chen, Yu Wang, Dingyi Fang, Ju Wang, Tianzhang Xing, Zhanyong Tang:FitLoc: Fine-grained and low-cost device-free localization for multiple targets over various areas. INFOCOM 2016: 1-9 (CCF A类会议)

6. Binbin Xie, Jie Xiong, Dingyi Fang, Xiaojiang Chen, Anwen Wang, Zhanyong Tang:Poster: A Device-free Evaluation System for Gymnastics using Passive RFID Tags. MobiSys (Companion Volume) 2016: 89 CCF B类会议)

7. Kaiyuan Kuang, Zhanyong Tang*, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Tianzhang Xing, Guixin Ye, Jie Zhang, Zheng Wang:Exploiting Dynamic Scheduling for VM-Based Code Obfuscation. Trustcom/BigDataSE/ISPA 2016: 489-496 (CCF C类会议)

8. Pengyan Zhang, Xiaojiang Chen, Dingyi Fang, Wei Wang, Zhanyong Tang, Yang Ma: SmartMTra: Put the Limit of the Inertial Sensor Based Indoor Motion Trajectory Tracing Using Smartphone. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 66-73 (CCF C类会议)

9. Liqiong Chang, Xiaojiang Chen, Dingyi Fang, Ju Wang, Tianzhang Xing, Chen Liu, Zhanyong Tang:FALE: Fine-grained Device Free Localization that can Adaptively work in Different Areas with Little Effort. Computer Communication Review 45(5): 601-602 (2015) SCI JCR 4

10. Zhanyong Tang, Jie Zhang, Xiaoqing Gong, Xiaohua Cheng, Xiaojiang Chen, Dingyi Fang, Wei Wang:CTLL: A Cell-Based Transfer Learning Method for Localization in Large Scale Wireless Sensor Networks. IJDSN 11: 252653:1-252653:18 (2015)  SCI JCR 4

11. Zhanyong Tang, Jie Zhang, Liang Wang, Jinzhi Han, Dingyi Fang, Anwen Wang: NDSL: Node Density-Based Subregional Localization in Large Scale Anisotropy Wireless Sensor Networks. IJDSN 11: 821352:1-821352:16 (2015) SCI JCR4

12. Liqiong Chang, Xiaojiang Chen, Ju Wang, Dingyi Fang, Chen Liu, Zhanyong Tang, Weike Nie:TaLc: Time Adaptive Indoor Localization with Little Cost. CHANTS@MobiCom 2015: 49-54 CCF A类会议)

13. Chen Liu, Dingyi Fang, Hongbo Jiang, Xiaojiang Chen, Zhanyong Tang, Ju Wang, Weike Nie:Poster: On the Low-Cost and Distance-Adaptive Device-free Localization. MobiCom 2015: 221-223 CCF A类会议)

14. Ju Wang, Dingyi Fang, Xiaojiang Chen, Liqiong Chang, Zhanyong Tang, Tianzhang Xing, Chen Liu:Poster: A Low Cost People Flow Monitoring System For Sensing The Potential Danger. MobiCom 2015: 242-244  CCF A类会议)

15. Meng Jin, Dingyi Fang, Xiaojiang Chen, Lin Cai, Zhe Yang, Zhanyong Tang: Poster: An Insomnia Therapy for Clock Synchronization in Wireless Sensor Networks. MobiCom 2015: 287-289 CCF A类会议)

16. Chen Liu, Xiaojiang Chen, Dingyi Fang, Dan Xu, Zhanyong Tang, Chieh-Jan Mike Liang:LIPS: Bring LIght Propagation Selection to Geographic Opportunistic Routing in Strip WSNs. MSCC@MobiHoc 2015: 39-44  CCF B类会议)

17. Jianan Kou, Xiaojiang Chen, Zhanyong Tang, Juan He, Chao Qu, Tianzhang Xing, Dingyi Fang:Low-cost Device-Free Localization using Detection Probability Model in Outdoors. ENSsys@SenSys 2015: 37-38  CCF B类会议)

18. Liqiong Chang, Xiaojiang Chen, Dingyi Fang, Ju Wang, Tianzhang Xing, Chen Liu, Zhanyong Tang:FALE: Fine-grained Device Free Localization that can Adaptively work in Different Areas with Little Effort. SIGCOMM 2015: 601-602  CCF A类会议)

19. Zhanyong Tang, Jianan Kou, Chao Qu, Tianzhang Xing, Xiaojiang Chen, Dingyi Fang, Ruchen Wang:Multi-link Passive Localization with Low Cost in Wireless Sensor Networks. UIC/ATC/ScalCom 2015: 344-347  CCF C类会议)

20. Tianzhang Xing, Lichao Zhang, Zhanyong Tang, Chen Liu, Xiaojiang Chen, Dingyi Fang:A Novel Method for Protritage Site with WSN. HCC 2014: 765-776  CCF C类会议)

21. Dan Xu, Xiaojiang Chen, Weike Nie, Zhanyong Tang, Zhanglei Li, Dingyi Fang, Na An:RPC: A Localization Method Based on Regional Partition and Cooperation. UIC/ATC/ScalCom 2014: 58-65  CCF C类会议)

22. Tianzhang Xing, Binbin Xie, Zhanyong Tang, Xia Zheng, Liqing Ren, Xiaojiang Chen, Dingyi Fang, Na An:Who Move the Treasures: A RFID-based Approach for the Treasures. UIC/ATC/ScalCom 2014: 154-162  CCF C类会议)

B 部分中文论文 

1. 陈晓江,陈丽丽,李博航,汤战勇,谢彬彬,王薇,王安,文房鼎益. 面向多重应用的高鲁棒被动式定位模型研究[J/OL]. 计算机学报,2017,:1-12. (2017-07-28)[2017-09-07]. 

2. 邢天璋,谢彬彬,杨康,汤战勇,房鼎益. 一种利用无线信号的被动式多目标定位系统[J/OL]. 西安电子科技大学学报,2018,(01):104-110. (2017-06-29)[2017-09-07]. 

3. 龚晓庆,周祥,汤战勇,房鼎益,彭瑶,陈峰. 基于可执行代码的反污点分析方法研究[J]. 工程科学与技术,2017,49(01):184-190. 

4. 房鼎益,张恒,汤战勇,陈晓江. 一种抗语义攻击的虚拟化软件保护方法[J]. 工程科学与技术,2017,49(01):159-168. 

5. 汤战勇,李振,张聪,龚晓庆,房鼎益. 基于攻击威胁监控的软件保护方法[J]. 计算机应用,2017,37(01):120-127. [2017-09-07].

6. 刘方圆,孟宪佳,汤战勇,房鼎益,龚晓庆. 基于smali代码混淆的Android应用保护方法[J/OL]. 山东大学学报(理学版),2017,52(03):44-50. 

7. 樊如霞,房鼎益,汤战勇,陈晓江,刘方圆,李政桥. 一种代码碎片化的Android应用程序防二次打包方法[J]. 小型微型计算机系统,2016,37(09):1969-1974. [2017-09-07].

8. 汤战勇,李光辉,房鼎益,陈晓江. 一种具有指令集随机化的代码虚拟化保护系统[J/OL]. 华中科技大学学报(自然科学版),2016,44(03):28-33. (2016/3/18 )[2017-09-07].

9. 郭军,王蕾,汤战勇,房鼎益. 基于语义的二进制代码自动化反混淆方法[J/OL]. 华中科技大学学报(自然科学版),2016,44(03):55-59. (2016/3/18 )[2017-09-07]. 

10. 汤战勇,郝朝辉,房鼎益,陈晓江. 基于进程级虚拟机的软件防篡改方法[J/OL]. 华中科技大学学报(自然科学版),2016,44(03):65-70. (2016/3/18 )[2017-09-07]

11. 房鼎益,祁生德,汤战勇,陈晓江,顾元祥. 一种基于RSSI的智能家居环境Evil-Twin攻击的检测方法[J/OL]. 计算机学报,2017,40(08):1764-1778.

12. 金梦,陈晓江,房鼎益,汤战勇,刘晨,徐丹,王薇. 一种温度自适应无线传感网络时间同步方法[J]. 软件学报,2015,26(10):2667-2683. 

13. 常俪琼,房鼎益,陈晓江,王举,汤战勇,聂卫科,刘晨. 一种有效消除环境噪声的被动式目标定位方法[J/OL]. 计算机学报,2016,39(05):1051-1066.

14. 刘晨,陈晓江,汤战勇,房鼎益,徐丹,郭军,陈昊. ODR:一种基于传输方向的无线传感器网络机会路由算法[J]. 小型微型计算机系统,2014,35(10):2203-2208.

15. 王怀军,房鼎益,董浩,陈晓江,汤战勇. 白盒环境中防动态攻击的软件保护方法研究[J]. 电子学报,2014,42(03):529-537. 

16. 王怀军,房鼎益,汤战勇,辛强伟. 应用变形引擎实现的软件动态保护方法研究[J]. 小型微型计算机系统,2013,34(07):1462-1467.

17. 赵玉洁,汤战勇,王妮,房鼎益,顾元祥. 代码混淆算法有效性评估[J]. 软件学报,2012,23(03):700-711. [2017-09-07].

18. 赵媛,王怀军,房鼎益,汤战勇. 基于SDT安全访问控制的方法[J]. 电子科技,2011,24(11):96-99. [2017-09-07]. 

19. 汤战勇,王怀军,房鼎益,陈晓江. 基于精简指令集的软件保护虚拟机技术研究与实现[J]. 微电子学与计算机,2011,28(08):1-3+8. 

20. 汤战勇,房鼎益,苏琳. 一种基于代码加密的防篡改软件水印方案[J]. 中国科学技术大学学报,2011,41(07):599-606. [2017-09-07]

21. 陈晓江,符凯,房鼎益,何路,陈峰,汤战勇. 基于DSM的软件架构重构工具[J]. 西北大学学报(自然科学版),2010,40(04):607-610. [2017-09-07]. 

22. 张汉宁,房鼎益,陈晓江,汤战勇. 基于透明加解密的数字内容安全防护系统[J]. 西北大学学报(自然科学版),2010,40(03):437-441.

23. 汤战勇,房鼎益,陈晓江,吴晓南. 一种可扩展的SMS中间件系统设计[J]. 计算机应用与软件,2007,(08):34-37. [2017-09-07].

24. 房鼎益,汤战勇,陈晓江,吴晓南. 基于陷阱网络的未知蠕虫行为模式挖掘[J]. 计算机工程,2006,(23):137-139. [2017-09-07].  

科研项目:

近年主持或者参与的科研项目

1. 基于时频域指纹映射的中国书法运笔姿态与动作的无线感知与识别方法研究  61672427 国基金面上项目  主持

2. 野生动物监测无线传感器网络中多目标被动式定位关键技术研究   61272461 国基金面上项目  参与

3. 大型遗址智能感知关键技术研究    2015KW-003  陕西省国际合作项目   主持

4. 基于攻击建模的软件动态保护方法及其有效性评测研究    2017KW-008 陕西省国际合作项目  参与(第二)

5. 面向野生动物监测的多目标三维空间定位关键技术研究     15JK1734 陕西省教育厅自然科学基金项目 主持

6. 基于无线传感网的野生动物多目标定位与检测技术研究     14NW28 西北大学自然科学基金项目  主持

7. JavaScript前端代码对抗项目     腾讯科技(深圳)-西北大学合作项目 主持

8. 基于GitHub的软件缺陷自动检测与审计机制研究      CCF-绿盟科技鲲鹏科研项目 主持

9. 面向ARM 体系结构的多调度机制和分区虚拟CPU代码混淆保护方法  支付宝(蚂蚁金服)基金  主持

10. 软件保护关键技术研究    爱迪德(荷兰)-西北大学合作项目  主持

近年相关授权与申报的发明专利

1. 一种基于区域判定的多精度节点定位方法 ZL 201410400684.4  

2. 基于压缩感知的被动式移动目标轨迹测绘方法 ZL 201410456238.5   

3. 大规模3D无线传感器网络基于凸划分的节点定位方法 ZL 201410418945.5

4. 一种基于代码碎片化的Android应用程序加壳保护方法及装置 ZL 201510548193.9

5. 一种恶意软件的多执行路径构造方法 ZL 201510256382.9  

6. 一种隐式反调试保护方法 ZL 201511025912.5

7. 一种野外条件下无线传感网络定位优化方法 ZL 201410482991.1    

8. 一种基于防御网的Android应用防篡改方法及系统 ZL 201510846522.8 

9. 一种具有指令集随机化的代码虚拟软件保护系统 ZL 201510375384.X

10. 一种基于语义的二进制代码反混淆方法 ZL 201510158163.7

11. 一种抵抗符号执行和污点分析的软件保护方法 ZL 201610108081.6

12. 反污点分析软件保护方法 ZL 201610135566.4

13. 一种基于RSSI的伪AP检测方法 ZL 201510881672.2

14. 一种smail代码混淆的Android应用保护方法 ZL 201610279693.1

15. 一种基于信道干扰的保护用户隐私的方法 ZL 201610529103.6

16. 一种基于攻击树的ROP保护方法 ZL 201610149871.9

17. 一种具有数据流混淆的虚拟化软件保护方法 ZL 201610399231.3

18. 一种快速定位Android敏感功能对应的驱动文件位置方法 ZL 201610389820.3

科研获奖:

ALL-IN-ONE一体化数字内容安全防护综合平台   2016年陕西省高等学校科技技术一等奖(排名第二)

教学情况:

 教授本科课程《物联网导论》、《传感网原理与实践》,教授研究生课程《无线传感网络与NDN

其它信息:

1. 指导2016年校大学生创新2

深度定制的Android的驱动安全隐患检测与修复  胡成明

Android手机通话辅助软件      李浩存 

2. 指导学生参加第三届全国高校物联网应用创新大赛获得三等奖(西北赛区) 赵健宏等


地址:西安市长安区郭杜教育科技产业园区学府大道1号 邮编:710127

版权所有:西北大学 ICP备案号:陕ICP备05010980号