简 历:
王喆,计算机系统结构专业博士。主要研究方向是计算机系统安全,包括体系结构安全、系统虚拟化安全、操作系统安全、软硬件漏洞挖掘与利用等。现阶段主要的研究兴趣是系统安全与程序分析、编译、操作系统、虚拟化和体系结构的交叉研究。主持1项国家自然科学基金青年基金,同时作为骨干人员,承担多项国家863计划、国家自然科学基金重点项目、北京市科委重大专项、国防装备研发计划。近年来在计算机安全、软件工程和操作系统等领域的顶级国际会议和期刊上发表CCF-A类论文10余篇,包括IEEE Security & Privacy(Oakland)、USENIX Security、USENIX ATC、ACM CCS、ACM ISSTA、IEEE TCAD、IEEE TDSC、IEEE TSE等。曾获2021年度国科大“领雁”金奖、2020年度计算所“卓越之星”等奖项和称号。
2021年10月 — 今:中科院计算所,副研究员
2018年07月 — 2021年09月:中科院计算所,助理研究员
2012年09月 — 2018年06月:中科院计算所,博士
2008年09月 — 2012年06月:北京工业大学,本科
主要论著:
论文:
[1]Bowen Tang, Chenggang Wu, Pen-Chung Yew, Yinqian Zhang, Mengyao Xie, Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, and Zhe Wang (通信). SpecWands: An Efficient Priority-based Scheduler Against Speculation Contention Attacks. Published in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD’23). CCF-A
[2]Peihua Zhang, Chenggang Wu, Mingfan Peng, Kai Zeng, Ding Yu, Yuanming Lai, Wei Wang, Zhe Wang: Khaos: The Impact of Inter-procedural Code Obfuscation on Binary Diffing Techniques. In Proceedings of the 21st IEEE/ACM International Symposium on Code Generation and Optimization (CGO’23). CCF-B
[3]Mengyao Xie, Chenggang Wu, Yinqian Zhang, Jiali Xu, Yuanming Lai, Yan Kang, Wei Wang, and Zhe Wang (通信): CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation. In Proceedings of the 29th ACM Conference on Computer and Communications Security (CCS'22). CCF-A
[4]Chenggang Wu, Mengyao Xie, Zhe Wang (通信), Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, and Min Yang: Dancing with Wolves: An Intra-process Isolation with Privileged Hardware. Published in IEEE Transactions on Dependable and Secure Computing (TDSC 2022). CCF-A
[5]Bowen Tang, Chenggang Wu, Zhe Wang (通信), Lichen Jia, Pen-Chung Yew, Yueqiang Cheng, Yinqian Zhang, Chenxi Wang, Guoqing Harry Xu: SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks. Published in IEEE Transactions on Dependable and Secure Computing (TDSC 2022). CCF-A
[6]Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Nepal Surya, Yansong Gao, Kang Li, Zhe Wang, and Chenggang Wu: SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh. In Proceedings of the 2022 USENIX Annual Technical Conference (ATC'22). CCF-A
[7]Chenyang Lyu, Hong Liang, Shouling Ji, Xuhong Zhang, Binbin Zhao, Meng Han, Yun Li, Zhe Wang, Wenhai Wang, and Raheem Beyah: SLIME: Program-sensitive Energy Allocation for Fuzzing. In Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'22). CCF-A
[8]Shunfan Zhou, Zhemin Yang, Qiao Dan, Jie Xiang, Peng Liu, Min Yang, Zhe Wang, and Chenggang Wu: Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths. In Proceedings of the 31st USENIX Security Symposium (Security’22). CCF-A
[9]Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, and Zhiping Shi: Making Information Hiding Effective Again. Published in IEEE Transactions on Dependable and Secure Computing (TDSC 2021). CCF-A
[10]Zhe Wang, Chenggang Wu, Mengyao Xie, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, and Min Yang: SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation. In Proceedings of the 41st IEEE Symposium on Security and Privacy (Oakland’20). CCF-A
[11]Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, and Zhiping Shi: SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization. In Proceedings of the 28th USENIX Security Symposium (Security’19). CCF-A
[12]Zhe Wang, Chenggang Wu, Xiang Yuan, Zhenjiang Wang, Jianjun, Li, Pen-Chung Yew, Jeff Huang, Xiaobing Feng, Yanyan Lan, Yunji Chen, Yuanming Lai, and Yong Guan. Using Local Clocks to Reproduce Concurrency Bugs. Published in IEEE Transactions on Software Engineering (TSE 2017). CCF-A
[13]Zhe Wang, Chenggang Wu, Jianjun Li, Yuanming Lai, Xiangyu Zhang, Wei-Chung Hsu, and Yueqiang Cheng: ReRanz: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks. In Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environment (VEE’17). CCF-B
[14]Zhe Wang, Jianjun Li, Chenggang Wu, Dongyan Yang, Zhenjiang Wang, Wei-Chung Hsu, Bin Li, and Yong Guan. HSPT: Practical Implementation and Efficient Management of Embedded Shadow Page Tables for Cross-ISA System Virtual Machines. In Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE’15). CCF-B
专利:
[1]王喆,武成岗,王振江,李建军:一种抵御代码重用攻击的方法 CN201510501698.X已授权
[2]王喆,武成岗,赖远明,康妍:一种容器虚拟化安全加固装置及方法 CN201910188731.6已受理
[3]王喆,武成岗,赖远明,康妍:一种面向应用程序的特权硬件定制化平台的技术 CN201910462140.3已受理
[4]王喆,武成岗,赖远明,康妍:一种应用的保护方法及系统 CN 201810164759.1已受理
[5]武成岗,王喆,唐博文,贾力陈,谢梦瑶:一种微架构 CN202010054119.2已受理
[6]武成岗,王喆,唐博文,贾力陈,谢梦瑶:一种基于缓存划分及回滚的处理器瞬态攻击防御方法 CN202010053240.3已受理
[7]武成岗,王喆,唐博文,贾力陈,谢梦瑶:一种基于缓存回滚以防御处理器瞬态攻击的装置 CN202010053237.1已受理
[8]武成岗,王喆,唐博文,贾力陈,谢梦瑶:一种基于缓存随机无效的处理器瞬态攻击防御方法 CN202010053213.6已受理
科研项目:
[1]NSFC青年基金项目:《面向应用安全的特权级硬件挖掘研究》,项目负责人
[2]NSFC基金重点项目:《多层次软件架构的漏洞感知及防利用技术研究》,主要参与人
[3]北京市科委项目:《代码布局持续随机化关键技术研究》,主要参与人
获奖及荣誉:
[1]2021年中国科学院大学领雁金奖/银奖
[2]2020年中科院计算所“卓越之星”称号
[3]2020、2019年中科院计算所优秀科研人员(两次)
[4]2018年中国科学院大学院长优秀奖
[5]2017年所长特别奖(夏培肃奖)
[6]2017、2015年博士研究生国家奖学金
[7]2014年曙光博士生奖
[8]2014年中国科学院大学“三好学生标兵”称号
[9]2013年中国科学院大学“三好学生”称号
王喆 副研究员
研究方向:
所属部门:处理器芯片重点实验室
导师类别:硕导
联系方式:wangzhe12@ict.ac.cn
个人网页:https://zhexwang.github.io/