郭山清 副教授 个人空间

郭山清   副教授

邮箱:guoshanqing@sdu.edu.cn
http://isec.sdu.edu.cn/?p=825



招生意向


招收研究生1-3名

研究方向


网络空间安全,尤其关注web安全和移动应用安全。

讲授课程


(1)离散数学
(2)网络安全

承担项目


在研项目
1.国家自然科学基金重大研究计划(”大数据驱动的管理与决策研究“),基于大数据的MSM艾滋病管理和决策范式研究,2016-2019子课题负责人
2.省自主创新及成果转化专项,公共安全大数据分析平台关键技术研究及应用,2014-2016,主持
3.山东省重点研发计划,基于强制访问控制的安卓软件分析和系统加固技术研究,2016-2017,主持
4.山东省自然基金面上项目,面向Hybrid移动应用安全中的商业逻辑漏洞自动发现技术的研究,2015-2017,主持

完成项目
1.面向 SaaS应用的可信数据管理的关键问题研究,国家自然基金重大研究计划("可信软件基础研究")预研项目(参与,第二)
2. 多态蠕虫防范技术的研究,山东省自然基金青年项目,主持
3. 新型窃密恶意代码的检测与防范机制研究,山东省优秀中青年科学家科研奖励基金,主持
4. 面向具有类传染病特征的变形恶意代码的智能检测技术的研究,教育部博士点新教师基金,主持
5. 基于路由器采样的智能网络应用业务流识别系统的研究与开发,山东省科技攻关计划,主持
6. 基于域名系统的反域名滥用技术的研究与实现,国家计算机网络与信息安全管理中心,主持
7. 恶意程序分析应用示范,中国教育科研网格二期建设项目,主持

发表论文


22. Yang Liu, Chaoshun Zuo,Zonghua Zhang,Shanqing Guo,et al. An Automatically Vetting Mechanism for SSL Error-Handling Vulnerability in Android Hybrid Web,Accepted by WWW Journal.
21 Junjie Tang,Xingmin Cui,Ziming Zhao,Shanqing Guo et al. NIVAnalyzer: a Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps.Accepted by 10th IEEE International Conference on Software Testing, Verification and Validation (ICST2017)
20.Yongfeng Li, Shanqing Guo and Bing Mao. Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling.Accepted by 12th EAI International Conference on Security and Privacy in Communication Networks(SecureComm),2016
19.Yang Liu, Xingmin Cui, Changyuan Wang, Shanqing Guo* and Xinshun Xu.Analysis of Exposed Methods to JavaScript in Hybrid Apps.Accepted by TrustCom 2016.
18.Chen Jia,Cui Xingmin,Zhao Ziming,Liang Jie,Guo Shanqing*.Toward Discovering and Exploiting Private Server-side Web APIs,Accepted by 23rd IEEE International Conference on Web Services (ICWS 2016)
17.Wang Changyuan, Liu Yang, Lu Zongfei,Guo Shanqing*, Cui Lizhen :An Overview of Social Analysis from Different Operators, Accepted by China Communications
16.Changyuan Wang, Zongfei Lu, Yang Liu, Shanqing Guo*, Xinshun Xu, Shijun Liu, Lizhen Cui. SpatialGraphx: A Distributed Graph Computing Framework for Spatial and Temporal Data at Scale. The 40th IEEE Computer Society International Conference on Computers, Software & Applications(COMPSAC). Atlanta, Georgia, USA, 2016
15.Guangdong Bai, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo .All Your Sessions are Belong to us: Investigating Authenticator Leakage through Backup Channels on Android,20th International Conference on Engineering of Complex Computer Systems(ICECCS) ,2015.
14.Chaoshun Zuo, Jianliang Wu and Shanqing Guo*,Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web Apps, Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2015.
13.Jianliang Wu, Tingting Cui, Tao Ban, Shanqing Guo, Lizhen Cui. PaddyFrog: systematically detecting confused deputy vulnerability in Android applications. Security and Communication Networks 8(13):2338-2349 (2015).
12.张 焕, 武建亮,唐俊杰,班涛,俞研,郭山清*,王利明,胡安磊.NeighborWatcher:基于程序家族关系的恶意Piggybacked手机应用检测方法研究,电子学报,2014.7
11.Ryoichi Isawa, Tao Ban, Shanqing Guo, Daisuke Inoue, and Koji Nakao,A Packer Identification Method Using Support Vector Machine with High ccuracy, IEICE Transactions on Fundamentals of eletronics, Communications and Computer Sciences.
10.Xiaoyan Yan, Bo Liang, Tao Ban, Shanqing Guo*,Liming Wang.TrafficS:A Behavior-based Network Traffic Classification Benchmark System with Traffic Sampling Functionality. In the proceedings of the 19th International Conference on Neural Information Processing, ICONIP 2012
9.Shanqing Guo*, Shuangshuang Li, Yan Yu, Anlei Hu, Tao Ban: A Fine-Grained Classification Approach for the Packed Malicious Code. In the proceedings of 14th International Conference on Information and Communications Security( ICICS), 2012: 497-504
8.侯孟波,徐秋亮,郭山清.基于无证书的两方认证密钥协商协议.软件学报,2009,20(zk):321-329
7.Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqing Guo, Li Xie: Random-walk based approach to detect clone attacks in wireless sensor networks. IEEE Journal on Selected Areas in Communications 28(5): 677-69
6. Zeng Yingpei,Cao Jiannong,Guo Shanqing,Yang Kai and Xie Li. SWCA: A secure weighted clustering algorithm in wireless ad hoc networks. IEEE Wireless Communications and Networking Conference, WCNC, 2009
5.徐晓萌,郭山清*,徐秋亮.多态蠕虫的研究与进展,计算机科学与探索,2008,2(2):131-138
4.石进,郭山清,陆音,谢立.一种基于攻击图的入侵响应方法.软件学报,2008,19(10):2746-2753
3.郭山清,谢立,曾英佩.入侵检测在线规则生成模型,计算机学报,2006,29(9),1521-1530
2.林果园,郭山清,黄皓,曹天杰.基于动态行为和特征模式的异常检测模型,计算机学报,2006,29(9), 1551-1558
1.郭山清,高丛,姚建,谢 立.基于改进的随机森林算法的入侵检测模型,软件学报,2005,16(8),1490-1498

本人研究生从事的工作领域


政府、企业