科院考研推荐链接:
Web安全、恶意代码分析 、大数据安全分析
招生专业:083900-网络空间安全
招生方向:网络攻防技术,网络安全评测
2016/09--Now 中国科学院大学 岗位教师
2015/10--Now 中国科学院信息工程研究所 第六研究室 副研究员
2013/09--2015/10 中国科学院大学 计算机科学与技术学院 讲师
2011/06--2013/09 中国科学院大学 计算机科学与技术学院 博士后
一、学术论文 DBLP: Qixu Liu
[1]. Zihao Zhao, Qixu Liu*, et.al. WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning. 21st International Conference on Information and Communications Security(ICICS 2019), Beijing, China, Dec15-17, 2019
[2]. Kaili Qiu, Qixu Liu*, et.al. An Empirical study of OAuth-based SSO System on Web. the 13th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2018), Tianjin, China, June 20-22, 2018
[3]. Zhejun Fang, Qixu Liu, et.al. A Static Technique For Detecting Input Validation Vulnerability in Android Apps. SCIENCE CHINA Information Sciences.60(5): 052111:1-052111:16. 2017
[4]. Qianru Wu, Qixu Liu, Yuqing Zhang, Pen Liu and Guanxing Wen. A Machine Learning Approach for Detecting Third-Party Trackers on the Web. 21st European Symposium on Research in Computer Security(ESORICS 2016), Greece, Heraklion, 26 - 30 September 2016
[5]. Xiaofeng Liu, Qixu Liu, Xiaoxi Wang, Zhaopeng Jia, Fingerprinting Web Browser for Tracking Anonymous Web Attackers. 1st IEEE International Conference on Data Science in Cyberspace(DSC 2016). Changsha, 13-16 June 2016.
[6]. Qianru Wu, Qixu Liu, Yuqing Zhang and Guanxing Wen. TrackerDetector:a System to Detect Third-Party Trackers through Machine Learning. Computer Networks - Elsevier. Volume 91, Pages 164-173, November 14, 2015.
[7]. Yuqing Zhang, Qixu Liu, Qihan Luo, Xaili Wang. XAS: cross-API scripting attacks in social ecosystems. SCIENCE CHINA Information Sciences. 58(1): 012101(14), 2015.
[8]. Qixu Liu, Qianru Wu, Yuqing Zhang, Xiali Wang. POSTER: Recommendation-based Third-Party Tracking Monitor to Balance Privacy with Personalization. The 21th ACM Conference on Computer and Communications Security (CCS 2014). poster paper, Scottsdale, Arizona, USA, November 3 - 7, 2014.
[9]. Qixu Liu, Yuqing Zhang, Chen Cao, Guanxing Wen. Poster Abstract: Cloud Synchronization Increase Cross-application Scripting Threats on Smartphone. The 16th International Symposium on Recent Advances in Intrusion Detection (RAID 2013), poster paper,St. Lucia, October 23-25, LNCS 8145, pp. 465–466, 2013.
[10]. Qixu Liu, Yuqing Zhang, Ying Kong, Qianru Wu. Improving VRSS-based vulnerability prioritization using analytic hierarchy process. Journal of Systems and Software - Elsevier, 85(8): pages: 1699-1708, 2012.8
[11]. Qixu Liu, Yuqing Zhang. VRSS: A New System for Rating and Scoring Vulnerabilities. Computer Communications - Elsevier, 34(3): pages: 264-273, 2011.3
[12]. Qixu Liu, Yuqing Zhang. TFTP vulnerability finding technique based on fuzzing. Computer Communications - Elsevier, 31(14): pages: 3420-3426, 2008.9
[13].何熙巽,张玉清,刘奇旭*. 软件供应链安全综述[J]. 信息安全学报, 5(1): 57-73, 2020.1
[14].刘奇旭,王柏柱 等. 基于功能代码片段的Java后门检测方法[J]. 信息安全学报, 4(5): 33-47, 2019.9
[15].刘奇旭,邱凯丽 等. 面向OAuth2.0授权服务API的账号劫持攻击威胁检测[J]. 通信学报, 40(6): 40-50, 2019.6
[16].周环,刘奇旭*,崔翔,张方娇. 基于神经网络的定向口令猜测研究[J]. 信息安全学报, 3(5): 25-37, 2018.9
[17].刘奇旭, 徐辰晨 等. 基于网络欺骗的家用无线路由器防护方法[J]. 计算机研究与发展, 55(7): 1440-1450, 2018.7
[18].刘奇旭, 温涛, 闻观行. Flash跨站脚本漏洞挖掘技术研究[J]. 计算机研究与发展, 51(7):1624-1632, 2014.7
[19].刘奇旭, 张翀斌, 张玉清, 张宝峰. 安全漏洞等级划分关键技术研究[J]. 通信学报, 33(Z1): 79-87, 2012.9
[20].刘奇旭, 张玉清. 基于Fuzzing的TFTP漏洞挖掘技术[J]. 计算机工程, 33(20):142-144, 2007.10
二、国家标准
GB/T 33561-2017,《信息安全技术 安全漏洞分类规范》,2017-12-01实施
GB/T 30279-2013,《信息安全技术 安全漏洞等级划分指南》,2014-07-15实施
GB/T 28458-2012,《信息安全技术 安全漏洞标识与描述规范》,2012-10-01实施
GB/T 24363-2009,《信息安全技术 信息安全应急响应计划规范》,2009-12-01实施
[1]. 课题负责人,国家重点研发计划,2016.12-2019.11
[2]. 社交网络开放平台漏洞挖掘及威胁评估方法研究,项目负责人,国家自然科学基金青年科学基金项目(61303239),2014.01-2016.12
[3]. 基于生命周期的漏洞威胁评估技术研究,项目负责人,信息安全国家重点实验室开放课题(2015-MS-04),2015.01-2016.12
[4]. 网络安全漏洞攻击趋势预测,项目负责人,第五批博士后基金特别资助(2012T50152),2012.09-2013.08
[5]. 安全漏洞威胁评估关键技术研究,项目负责人,第50批博士后基金面上项目(2011M500416),2011.10-2013.04