1. Jianjun Chen, Jian Jiang, Haixin Duan, Nick Weaver, Tao Wan, Vern Paxson. Host of Troubles: Multiple Host Ambiguities in HTTP Implementations, Accepted by CCS 2016 ( 四大安全顶会之一,CCF A类) (PDF)
  2. Kun Du, Hao Yang, Zhou Li, Haixin Duan(*), Kehuan Zhang. The Ever-changing Labyrinth: A Large-scale Analysis of Wildcard DNS Powered Blackhat SEO, Accepted by USENIX Security 2016 (四大安全顶会之一,CCF A类) PDF
  3. Xiaojing Liao,Kan Yuan, Xiaofeng Wang(*), Zhongyu Pei,Hao Yang, Jianjun Chen, Haixin Duan(*), Kun Du, Eihal Alowaisheq, Sumayah Alrwais, Luyi Xing, Raheem Beyah, Seeking Nonsense, Looking for Trouble: Efficient Promotional­ Infection Detection through Semantic Inconsistency Search, IEEE Symposium on Security & Privacy, 2016 (PDF) (四大安全顶会之一,CCF A类)
  4. Jianjun Chen, Jian Jiang, Xiaofeng Zheng, Haixin Duan, Jinjin Liang, Tao Wan, Kang Li, Vern Paxson, Forwarding-Loop Attacks in Content Delivery Networks, accepted by NDSS 2016 (四大安全顶会之一,CCF B类。本文获NDSS 2016年杰出论文(Distinguished Paper)论文下载(PDF)
  5. Yang Haiyu, Zhuge Jianwei, Liu Wei and Liu Huiming, AMExtractor: A Widely Applicable Tool for Volatile Memory Acquisition on Android Devices, to be appear at IFIP 11.9 International Conference on Digital Forensics, New Delhi, India, January 4-6, 2016.


  1. Yongke Wang, Jianwei Zhuge, Donghong Sun, Wu Liu and Fenghua Li*,ActivityFuzzer: Detecting the Security Vulnerabilities of Android Activity Components,2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications(SMTA 2015), Paris, France, August 9-10, 2015, 262-267.
  2. Song Li, Haixin Duan, Zhiliang Wang, and Xing Li, Route Leaks Identification by Detecting Routing Loops, SecureComm 2015(11th EAI International Conference on Security and Privacy in Communication Networks)(PDF)
  3. Xiaofeng Zheng, Jian Jiang, Jinjin Liang, Haixin Duan, Shuo Chen, Tao Wan, Nicholas Weaver, Cookies lack integrity: real world implications, USENIX Security, 2015. (国际网络安全四大会议之一,CCF推荐的网络安全A类会议)PDF
  4. Wang, J.H., Cai, J., Lu, J., Yin, K., Yang, J;Solving multicast problem in cloud networks using overlay routing(国外期刊)
  5. Han, G.-L., Bao, C.-X., Li, X;A scalable and efficient IPv4 address sharing approach in IPv6 transition scenarios(国外期刊)
  6. Longhui Wang ,Guoguang Zhao  and Donghong Sun;Modeling Documents with Event Model(国外期刊)
  7. Ling C, Hamada T, Gao J, Zhao G, Sun D, Shi W;MrBayes tgMC^3++: a High Performance and Resource-Efficient GPU-oriented Phylogenetic Analysis Method(国外期刊)
  8. Guo-liang HAN;Cong-xiao BAO;Xing LI;IPv6过渡场景中的可扩展高效IPv4地址共享机制研究。(国内期刊)
  9. 刘跃;分布式蜜网系统发展概况。(国内期刊)
  10. 郭军权1 诸葛建伟2 孙东红2 段海新2;Spampot: 基于分布式蜜罐的垃圾邮件捕获系统(国内期刊)
  11. Li S, Duan HX, Wang ZL, et al;An Accurate Distributed Scheme for Detection of Prefix Interception. In press.(国内期刊)
  12. 黎松, 段海新, 李星;域间路由中间人攻击的实时检测系统。(国内期刊)
  13. 黎松,段海新,王之梁,李星;通过检测路由循环发现路由泄露。(国外会议)
  14. Xiaofeng Zheng, Jian Jiang, Jinjin Liang, Haixin Duan, Shuo Chen, Tao Wan, and Nicholas Weaver;Cookie缺乏完整性对现实网络的威胁。(国外会议)
  15.  Li S, Duan HX, Wang ZL, et al;Route Leaks Identification by Detecting Routing Loops. (国外会议)
  16. Guoguang Zhao, Cheng Ling, Donghong Sun;Using Graphic Processors to Accelerate MrBayes 3.2MrBayes 3.2 on CUDA-compatibale GPUs(国内会议)
  17.  Guoguang Zhao,Cheng Ling ,Donghong Sun;SparkSW: Scalable Distributed Computing System for Large-Scale Biological Sequence Alignment.(国内会议)
  18. Ping REN, Wu LIU, Donghong SUN, and Ke LIU; Node Localization based on Convex Optimization in Wireless Sensor Networks(国内会议)


  1. Gao, Hongyu; Yegneswaran, Vinod; Jiang, Jian; Chen, Yan; Porras, Phillip; Ghosh, Shalini; Duan, Haixin.Reexamining DNS From a Global Recursive Resolver Perspective.IEEE/ACM Transactions on Networking.
  2. SUN Donghong, SHU Zhibia2, LIU Wu, REN Ping and WU Jian-ping.Analysis of Network Security Data Using Wavelet Transforms.Journal of Algorithms & Computational Technology.
  3. 郑明,吴建平,刘武 。一种基于价格的P2P匿名通信系统节点激励机制。软件学报2015。
  4. 郭军权,诸葛建伟,孙东红,段海新。Spampot: 基于分布式蜜罐的垃圾邮件捕获系统。计算机研究与发展。
  5. 郑晓峰,梁锦津,段海新 。SSL/TLS在Web部署中的安全问题及防范。中国密码学会通讯2014.6期(总第35期)。
  6. Liang, Jinjin1, 2, 3; Jiang, Jian1, 2, 3, 4; Duan, Haixin2, 3, 5; Li, Kang6; Wan, Tao7; Wu, Jianping1, 2, 3.When HTTPS meets CDN: A case of authentication in delegated service.2014 IEEE Symposium on Security and Privacy (SP).
  7. Kun Yang, Jianwei Zhuge*, Yongke Wang, Lujue Zhou, Haixin Duan.IntentFuzzer: detecting capability leaks of android applications.ASIA CCS ’14 Proceedings of the 9th ACM symposium on Information, computer and communications security, 2014.
  8. Y Hou, JW Zhuge*, D Xin, W Feng.SBE− A Precise Shellcode Detection Engine Based on Emulation and Support Vector Machine.10th International Conference on Information Security Practice and Experience, ISPEC 2014.
  9. Yinzhi Cao, Xiang Pan, Yan Chen and Jianwei Zhuge.JShield: Towards Real-time and Vulnerability-based Detection of Polluted Drive-by Download Attacks.Annual Computer Security Applications Conference 2014 (ACSAC).Xianglun Mao, Jianwei Zhuge*,
  10. Kun Yang, and Michael Zhou.A Fuzzing Strategy on Detecting Content Leaks and Pollution in Android Applications.CSC 2014(中国通信安全大会)
  11. 刘武、孙东红、谭建龙、任萍、刘柯。移动互联网用户行为感知与分析技术研究。第七届信息安全漏洞分析与风险评估大会。


  1. Jinjin Liang, Jian Jiang, Haixin Duan, Kang Li, Jianping Wu, Measuring Query Latency of Top Level DNS Servers. 14th Passive and Active Measurement conference, PAM 2013 (To appear).
  2. Xun Lu, Jianwei Zhuge*, Ruoyu Wang, Yinzhi Cao, Yan Chen. De-obfuscation and Detection of Malicious PDF Files with High Accuracy. Accepted by HICSS-46 Forensics Analysis Track , Hawaii, Jan 2013. (To appear)
  3. 黎松,诸葛建伟*,李星. BGP安全研究, 软件学报, 2012年11月预发表. 2013年正式发表。
  4. 诸葛建伟*, 唐勇, 韩心慧, 段海新. 蜜罐技术研究与应用进展, 软件学报, 2013年正式发表。
  5. 刘武,孙东红,姚星昆,郑先伟,刘源源. 基于移动智能终端管理的远程监控与管理技术. 实验技术与管理,2013年第2期


  1. 诸葛建伟,谷亮,段海新,中国互联网信息安全地下产业链调查报告, 信息安全与通讯保密, 2012(9): 54-71.
  2. 诸葛建伟*, 陈力波, 田繁,  鲍由之, 陆恂. 基于类型的动态污点分析技术, VARA’12优秀论文,清华大学学报, 2012(10)。
  3. 孙松柏, ali, 诸葛建伟*, 段海新, 王珩. HTML5安全研究, CNCC2012中国计算机大会论文, 计算机应用与软件已录用.
  4. 郑明,吴建平. 匿名协议AMIMR的抗攻击性分析. CNCC2012中国计算机大会论文, 计算机应用与软件已录用.
  5. 李雪峰,段海新, 诸葛建伟,吴建平. 识别蜜罐网络的P2P僵尸网络构建机制, 清华大学学报, 2012, 52(3): 385-389.
  6. J. Zhuge, L. Gu, H. Duan, Investigating China’s Online Underground Economy. Conference on the Political Economy of Information Security in China, San Diego, US, Apr, 2012. Full paper published at July 2012. [Full Paper]
  7. Haixin Duan, Nicholas Weaver, Zongxu Zhao, Meng Hu, Jinjin Liang, Jian Jiang, Kang Li and Vern Paxson, Hold-On: Protecting Against On-Path DNS Poisoning, Securing and Trusting Internet Names, SATIN 2012. [Full Paper]
  8. J. Jian, L. Jinjin, L. Kang, L. Jun, D. Haixin, W. Jianping, Ghost Domain Names: Revoked Yet Still Resolvable, 19th Annual Network & Distributed System Security Symposium (NDSS), 5-8 February 2012. [Full Paper]
  9. SUN Donghong, LIU Wu, REN Ping, and SUN Dongbin. A Data Security Protection Mechanism based on Transparent Biometric Authentication for Mobile Intelligent Terminals, 3nd Cybercrime and Trustworthy Computing Workshop(CTC2012), 29-31 November 2012, Ballarat, Australia.
  10. Sun, Donghong, Guo, Yunchuan, Yin, Lihua, Hu, Changzhen COMPARISON OF MEASURING INFORMATION LEAKAGE FOR FULLY PROBABILISTIC SYSTEMS International Journal of Innovative Computing, Information and Control, 8(1A), pp 255-267, 2012/1.
  11. Sun Donghong, Liu Wu, Ren Ping. Study on Anti-Attack Model for Low-Latency Anonymous Communication System, International Conference on Cloud and Green Computing,1-3 November 2012, Xiangtan, China.
  12. LIU Wu, SUN Donghong, REN Ping, TANG Zailiang. Study on Man-In-The-Middle Attack and Defending Techniques in IPv6 Network, 2012 Second International Conference on Electronics, Communications and Control, 16-18  October 2012, Zhoushan, China.
  13. LIU Wu, SUN Donghong, REN Ping, XIONG Haibin. Path-Calculation-Based XML Data Cube Model,International Conference on Convergence and Hybrid Information Technology, 23-2 August 2012, Daejeon, Korea.
  14. LIU Wu, REN Ping, SUN Donghong, Yawei Zhao, WU Jian-ping. Protocol Analysis and Online Forensics in IPv6 Network Environment, Wireless Communications Network and Mobile Computing, 21-23 September 2012, Shanghai, China.
  15. Wu Liu, Ping Ren, Donghong Sun, and Haibin Xiong. Mobile Intelligent Terminal Based Remote Monitoring and Management System, 3nd Cybercrime and Trustworthy Computing Workshop(CTC2012), 29-31 November 2012, Ballarat, Australia.
  16. Wu Liu, Ping Ren, Donghong Sun, and Haibin Xiong. Mobile Intelligent Terminal Based Remote Monitoring and Management System, 3nd Cybercrime and Trustworthy Computing Workshop(CTC2012), 29-31 November 2012, Ballarat, Australia.
  17. 诸葛建伟,王珩,孙松柏等译著. Metasploit渗透测试指南, 电子工业出版社, 2012年1月.
  18. 江健, 诸葛建伟*, 段海新, 吴建平. 僵尸网络机理与防御技术, 软件学报,2012,23(1):82-96. [Full Paper]
  19. 姜辉,杨峰,段海新. Rootkit隐藏技术与检测方法研究, 小型微型计算机系统, 2012(5).
  20. 杨峰, 姜辉, 诸葛建伟*, 段海新. 虚拟机环境检测方法研究综述, 小型微型计算机系统, 2012年8期.
  21. 李松斌,孙东红,袁键,一种基于码字分布特性的 G.729A压缩语音流隐写分析方法,电子学报, vol 40 , pp 842-846, No.4 Apr 2012 .
  22. 诸葛建伟,谷亮,段海新,中国信息安全地下产业链调查报告, 2012. 7. [全文].
  23. 王珩, 诸葛建伟*. NetSCAP-基于SCAP的终端安全基线网络化管理系统,VARA’12。
  24. 诸葛建伟, 谷亮. 揭秘中国互联网信息安全地下产业链, 《中国教育网络》, 2012(9):56-57.
  25. 孙松柏,诸葛建伟,段海新,Glastopf: Web应用攻击诱捕软件及案例分析, 《中国教育网络》, 2012(1):75-78.


  1. Jian Jiang, Haixin Duan, Tao Lin, Fenglin Qin and Hong Zhang, A
  2. Federated Identity Management System with Centralized Trust and Unified Single Sign-On. 6th International ICST Conference on Communications and Networking in China (CHINACOM 2011), August 17-19, 2011, Harbin, China.
  3. Z. Chen, G. Gu, J. Zhuge, J. Nazario, X. Han, WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios, In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS’11) , March 2011.
  4. Wu Liu, Hai-Xin Duan, Ping Ren, Jianping Wu. Research in Trust based User Cooperation Model, 2011 2nd International Conference on Advanced Measurement and Test.
  5. Wu Liu, Hai-Xin Duan, Ping Ren, Jianping Wu. Study on Event-Sequence based Worm Behavior Analysis in Internet, 2011 International Workshop on Complexity and Data Mining (IWCDM 2011), September 24—28, 2011, Nanjing, China.
  6. Wu Liu, Hai-Xin Duan, Ping Ren, Jianping Wu. Intrusion Detection Using SVM. The 7th International Conference on Wireless Communications, Networking and Mobile Computing, September 23-25, 2011, Wuhan, China.
  7. Donghong Sun, Peng Zhang, Li Liu, Xingquan Zhu, Yong Shi. Decision Rule Extraction for Regularized Multiple Criteria Linear Programming Model, Journal of Data Warehousing and Mining, Vol. 6, Issue 4, 2011.
  8. 诸葛建伟编著. 网络攻防技术与实践,电子工业出版社,2011年6月.
  9. 刘武, 段海新, 张洪, 任萍, 吴建平. TRBAC: 基于信任的访问控制模型. 计算机研究与发展, 2011, 48(8): 1414-1420.
  10. 韩心慧, 龚晓锐, 诸葛建伟, 邹磊. 基于频繁子树挖掘算法的网页木马分类和检测研究, 清华大学学报, 2011.
  11. 唐勇, 诸葛建伟, 陈曙晖, 王勇军,卢锡城.  蠕虫正则表达式特征自动提取技术研究, 第四届中国计算机网络与信息安全学术会议(CCNIS’11), 郑州,2011.
  12. 戚兰兰,诸葛建伟,温江涛,吴志勇. 基于Fuzzing的软件漏洞挖掘技术架构研究, 第四届漏洞分析与风险评估大会大会(VARA’11), 北京, 2011.


  1. Wu Liu Hai-xin Duan Ping Ren Jian-ping Wu. Weakness analysis and attack test for WLAN, 2010 International Conference on Green Circuits and Systems (ICGCS),21-23 June, 2010: 387 – 391 (EI)
  2. LIU Wu, DUAN Hai-xin, REN Ping, Jian-ping Wu. SSL-DP: A Rootkit of Network Based SSL and TLS Traffic Decryptor, 2010 Second Cybercrime and Trustworthy Computing Workshop, 19-21, July 2010, Ballarat, Austrilia, CTC.2010:29-33(EI)
  3. Wu Liu, Hai-Xin Duan, Ping Ren, Jianping Wu: IABA: An improved PNN Algorithm for anomaly detection in network security management. ICNC 2010: 335-339(EI)
  4. Jia Zhang Haixin Duan Wu Liu Jianping Wu. A light-weighted extension of anonymous communications in IPv6 Network, 2010 International Conference on Green Circuits and Systems (ICGCS),21-23 June, 2010: 404 – 408(EI)
  5. Xuefeng Li Haixin Duan Wu Liu Jianping Wu. The growing model of Botnets, 2010 International Conference on Green Circuits and Systems (ICGCS),21-23 June, 2010: 414 – 419(EI)
  6. Donghong Sun ; Xuefeng Li ; Wu Liu ; Jianping Wu . The New Architecture of P2P-Botnet, 2010 Second Cybercrime and Trustworthy Computing Workshop, 19-21, July 2010, Ballarat, Austrilia, CTC.2010:34-40(EI)
  7. Jia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu: Analysis of Anonymity in P2P Anonymous Communication Systems. 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops(AINA 2010): 860-865 (EI)
  8. Jia Zhang, Haixin Duan, Wu Liu, Jianping Wu. Anonymity analysis of P2P anonymous communication systems. J. of Computer Communications, 2010 Published by Elsevier. 7 July 2010
  9. Lei Hou, Haixin Duan, Jianping Wu, et al. Distinguishing the Master to Defend DDoS Attack in Peer-to-Peer Networks. Proceedings of the third IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP)(in conjunction with The 10th IEEE International Conference on Computer and Information Technology (CIT 2010)),2010,p -. (EI 收录, 检索号: 20104613393430.)


  1. Jia ZHANG, Haixin DUAN, Wu LIU, Jianping WU. WindTalker: A P2P-Based Low-Latency Anonymous Communication Network, IEICE Transactions on Communications, 2009, VOL. E92-B, NO.10, pp.3183-3194
  2. LIU Wu, DUAN Hai-xin, LIN Tao, LI Xing, WU Jian-ping. H6Proxy: ICMPv6 Weakness Analysis and Implementation of IPv6 Attacking Test Proxy. Cybercrime and Trustworthy Computing (CTC-2009), July 7-10, 2009,   Brisbane, Australia


  1. Zhang Jia, Duan Haixin, Wang Lanjia. A Fast Method of Signature Generation for Polymorphic Worms, proceedings of the 2008 International Conference on Computer and Electrical Engineering, ICCEE 2008, pp8-13
  2. Jia Zhang, Yuntao Guan, Xiaoxin Jiang, Haixin Duan, Jianping Wu. AMCAS: An Automatic Malicious Code Analysis System. In Proceedings of the Ninth International Conference on Web-Age Information Management (WAIM’08),  Zhangjiajie, China, Jul, 2008.