宋宇波

宋宇波,男,博士,畢業於東南大學,東南大學網路空間安全學院副教授

基本介紹

  • 中文名:宋宇波
  • 學位/學歷:博士
  • 職業:教師
  • 專業方向:無線網路和移動通信安全
  • 任職院校:東南大學網路空間安全學院
人物經歷,研究領域,學術成果,榮譽獎項,

人物經歷

教育背景
學士(電力系統及其自動化),東南大學,1999.06;
碩士(通信與信息系統),東南大學,2002.03;
博士(信號與信息處理),東南大學,2005.07。
學術經歷
2012.06年曾在美國Lehigh University短期進修,2015年-2016年香港理工大學計算機系任研究員

研究領域

無線網路和移動通信安全,移動終端安全,隱私數據安全,區塊鏈安全等。

學術成果

研究項目
國家自然科學基金面上項目,61202448,半量子密碼學中若干問題研究,2013/01-2015/12;
國家863計畫,2007AA01Z43,TD-SCDMA大規模用戶群的信息監管關鍵技術研究,2007/07-2008/07;
國家發改委重大專項,無線智慧型終端安全檢測服務能力建設,2012/01-2013/12;
國家信息安全測試中心合作項目,無線區域網路安全性能測試平台,2011/09-2012.03;
全國信息安全標準化技術委員會項目,無線城域網安全接入控制技術規範;
國家242信息安全計畫,2007A04,第三代移動通信安全研究,2007/01-2008/12;
國家242信息安全計畫項目,2006A07, TDSCDMA移動通信安全研究,2006/01-2007/12。
先後參與完成相關領域國家自然科學基金,國家863項目,國家發改委重大專項目,國家242信息安全計畫項目多項;在國內外重要刊物上發表論文60多篇,出版教材2部,申請及授權發明專利30多項,獲得科技成果鑑定5項。
論著
[1]宋宇波,楊慧文,武威,胡愛群,高尚,一種新型的軟體定義網路DD o S聯合檢測系統,清華大學學報,2018(錄用).
[2]Song Rui, Song Yubo, Gao Shang, Xiao Bin and Hu Aiqun, I Know What You Type: Leaking User Privacy Via Novel Frequency-based Side-channel Attacks, 2018 IEEE Global Communications Conference: Communication & Information System Security (Globecom2018 CISS),2018.
[3]R. Song, Y. Song, Q. Dong, A. Hu, and S. Gao, “WebLogger: Stealing your personal PINs via mobile web application,” in 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), 2017, pp. 1–6.
[4]Y. Hua, Y. Zhang, Q. Liu, Y. Liu, and Y. Song, “The Fake BTS Detection and Location On Smart Phones,” in Proceedings of the 2017 International Conference on Industrial Design Engineering, New York, NY, USA, 2017, pp. 116–120.
[5]Y. Song, S. Gao, A. Hu, and B. Xiao, “Novel attacks in OSPF networks to poison routing table,” in Communications (ICC), 2017 IEEE International Conference on, 2017, pp. 1–6.
[6]S. Gao, Z. Peng, B. Xiao, Q. Xiao, and Y. Song, “SCoP: Smartphone energy saving by merging push services in Fog computing,” in Quality of Service (IWQoS), 2017 IEEE/ACM 25th International Symposium on, 2017, pp. 1–10.
[7]G. Shang, P. Zhe, X. Bin, and S. Yubo, “Secure and energy efficient prefetching design for smartphones,” in 2016 IEEE International Conference on Communications (ICC), 2016, pp. 1–6.
[8]S. Yubo, Z. Zhiwei, and X. Yunfeng, “Using Short Message Service (SMS) to deploy Android exploits,” in International Conference on Cyberspace Technology (CCT 2014), 2014, pp. 1–5.
[9]S. Yubo, X. Yunfeng, and Z. Zhiwei, “A platform for GSM Um interface signaling observation,” in International Conference on Cyberspace Technology (CCT 2014), 2014, pp. 1–5.
[10]S. Yubo, Z. Mujing, and Q. Kaihua, “Accurate location based services by mobile phone actively detected,” in International Conference on Cyberspace Technology (CCT 2014), 2014, pp. 1–5.
[11]S. Yubo, Z. Kelong, and Y. Xiaowen, “Achievement of multiple HTTP communications based on single TCP connection,” in International Conference on Cyberspace Technology (CCT 2014), 2014, pp. 1–4.
[12]M. Shanshan, Y. Xiaohui, S. Yubo, Z. Kelong, and C. Fei, “Android’s sensitive data leakage detection based on API monitoring,” in International Conference on Cyberspace Technology (CCT 2014), 2014, pp. 1–4.
[13]Z. Kelong, S. Yubo, and C. Fei, “Implementation of automated testing system for android applications based on dynamic taint propagation,” in Communications Security Conference (CSC 2014), 2014, 2014, pp. 1–5.
[14]Z. Zhiwei, S. Yubo, X. Yunfeng, and Y. Zhongyun, “Using Short Message Service (SMS) to Deploy Android Exploits,” in Proceedings of the 2013 Fifth International Conference on Multimedia Information Networking and Security, Washington, DC, USA, 2013, pp. 890–893.
[15]S. Yubo, Z. Mujing, and Q. Kaihua, “Accurate Location Based Services by Mobile Phone Actively Detected,” in Proceedings of the 2013 Fifth International Conference on Multimedia Information Networking and Security, Washington, DC, USA, 2013, pp. 919–922.
[16]Y. Xiaowen, S. Yubo, and Z. Kelong, “Driver-Hiding Scheme Based on PsLoadedModuleList and Driver Object,” in Proceedings of the 2013 Fifth International Conference on Multimedia Information Networking and Security, Washington, DC, USA, 2013, pp. 899–902.
[17]M. Shanshan, Y. Xiaohui, S. Yubo, Z. Kelong, and C. Fei, “Android’s Sensitive Data Leakage Detection Based on API Monitoring,” in Proceedings of the 2013 Fifth International Conference on Multimedia Information Networking and Security, Washington, DC, USA, 2013, pp. 907–910.
[18]Z. Lan, Y. Song, and L. Tang, “Novel process-protecting method using camouflage techniques based on direct kernel object manipulation,” Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), vol. 43, no. 1, pp. 24–29, 2013.
[19]Z. Kelong, S. Yubo, and Y. Xiaowen, “Achievement of Multiple HTTP Communications Based on Single TCP Connection,” in Proceedings of the 2013 Fifth International Conference on Multimedia Information Networking and Security, Washington, DC, USA, 2013, pp. 903–906.
[20]唐磊;宋宇波;藍智靈;, “基於I/O緩衝區讀寫的控制台遠程互動模型,”計算機工程, no. 01, pp. 275–278, 2013.
[21]藍智靈;宋宇波;唐磊;, “基於直接核心對象操作的進程偽裝保護方法,”東南大學學報(自然科學版), no. 01, pp. 24–29, 2013.
[22]H. Wu, A. Hu, Y. Song, N. Bu, and X. Jia, “A New Intrusion Detection Feature Extraction Method Based on Complex Network Theory,” in 2012 Fourth International Conference on Multimedia Information Networking and Security (MINES), 2012, pp. 852–856.
[23]L. Tang, Y. Song, and Z. Lan, “A novel model of console remote interaction based on I/O buffer access,” in 2012 Second International Conference on Digital Information Processing and Communications (ICDIPC), 2012, pp. 160–163.
[24]Y. Song, X. Zhu, Y. Hong, H. Zhang, and H. Tan, “A mobile communication honeypot observing system,” in 2012 4th International Conference on Multimedia and Security, MINES 2012, November 2, 2012 - November 4, 2012, 2012, pp. 861–865.
[25]Y. Song, K. Zhou, and X. Chen, “Fake BTS attacks of GSM system on software radio platform,” Journal of Networks, vol. 7, no. 2, pp. 275–281, 2012.
[26]S. Gao, A. Hu, and Y. Song, “Remote forensics system based on Minifilter,” in Proceedings of 2nd International Conference on Computer Science and Network Technology, ICCSNT 2012, Changchun, China, 2012, pp. 1381–1385.
[27]S. Yubo, H. Xili, and L. Zhiling, “The GSM/UMTS Phone Number Catcher,” in 2011 Third International Conference on Multimedia Information Networking and Security (MINES), 2011, pp. 520–523.
[28]S. Yubo, Z. Kan, Y. Bingxin, and C. Xi, “A GSM/UMTS Selective Jamming System,” in 2010 International Conference on Multimedia Information Networking and Security (MINES), 2010, pp. 813–815.
[29]K. Zhou, A. Hu, and Y. Song, “A No-Jamming Selective Interception System of the GSM Terminals,” in 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), 2010, pp. 1–4.
[30]B. Yao and Y. Song, “A partial zero-forcing precoding method for downlink multi-user MIMO channel,” in 2010 2nd International Conference on Multimedia Information Networking and Security, MINES 2010, November 4, 2010 - November 6, 2010, 2010, pp. 816–819.
[31]宋宇波;胡愛群;姚冰心;, “802.11i認證協定可驗安全性形式化分析,”中國工程科學, no. 01, pp. 67–73, 2010.
[32]李國琴;宋宇波;胡愛群;, “基於GAA-WAPI的融合網路認證機制,”南京郵電大學學報(自然科學版), no. 06, p. 59–64+70, 2010.
[33]陳開志;胡愛群;宋宇波;劉慧慧;袁紅林;, “基於BioHashing和密鑰綁定的雙重可刪除指紋模板方法,”高技術通訊, no. 11, pp. 1115–1120, 2010.
[34]S. Yubo, C. Xi, and H. Aiqun, “The Denial of Service Attack Analysis of WLAN Authentication Infrastructure,” in International Conference on Multimedia Information Networking and Security, 2009. MINES ’09, 2009, vol. 1, pp. 407–411.
[35]S. Yubo, H. Aiqun, and C. Kaizhi, “Security analysis of certificate authentication in Chinese WLAN standard,” in International Conference on Advanced Technologies for Communications, 2009. ATC ’09, 2009, pp. 23–26.
[36]徐寧;宋宇波;劉金官;嚴國平;, “繼電保護定值遠程安全配置系統的設計與研究,”南京郵電大學學報(自然科學版), no. 03, pp. 57–63, 2009.
[37]陳開志;胡愛群;宋宇波;袁紅林;, “基於最小化星座點離散度的MPSK定時盲同步,”高技術通訊, no. 11, pp. 1106–1110, 2009.
[38]Y. Song and A. Hu, “Dynamic threshold proxy authenticated encryption scheme,” in 2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008, October 12, 2008 - October 14, 2008, 2008, p. Wuhan University, China; Dalian University of Technology, China; IEEE Antennas and Propagation Society; Scientific Research Publishing, USA; IEEE Communications Society.
[39]Y. Song and A. Hu, “Dynamic key distribution system in ad hoc networks,” in 2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008, October 12, 2008 - October 14, 2008, 2008, p. Wuhan University, China; Dalian University of Technology, China; IEEE Antennas and Propagation Society; Scientific Research Publishing, USA; IEEE Communications Society.
[40]吳亞軍;胡愛群;宋宇波;, “無線區域網路協定分析系統的設計與實現,”計算機工程, no. 22, pp. 140–142, 2008.
[41]宋宇波;黃玉劃;, “CCMP協定的量化可驗安全分析,”東南大學學報(自然科學版), no. 02, pp. 206–210, 2008.
[42]宋宇波;胡愛群;楊曉輝;, “基於接入控制器模式的公共無線區域網路安全體系設計,”中國工程科學, no. 08, pp. 56–59, 2008.
[43]宋宇波;陳開志;吳亞軍;, “基於口令的鑑別密鑰交換協定設計,”信息安全與通信保密, no. 02, pp. 81–83, 2008.
[44]吳文南;胡愛群;宋宇波;, “短距離無線語音和數據傳輸模組的設計與實現,”現代電子技術, no. 05, pp. 29–31, 2007.
[45]汪姬;胡愛群;宋宇波;, “一種新的用於3G互連的盲均衡改進算法TDE-CMA,”中國工程科學, no. 02, pp. 54–57, 2007.
[46]宋宇波;陳開志;姚冰心;, “基於自我加密的無線區域網路快速切換認證,”東南大學學報(自然科學版), no. 06, pp. 945–949, 2007.
[47]劉玉潔;宋宇波;裴文江;, “VoWLAN監聽系統的設計與實現,”信息安全與通信保密, no. 10, pp. 66–68, 2007.
[48]楊丹;胡愛群;宋宇波;, “移動無線網路接入計費信息系統的設計與實現,”電子技術套用, no. 10, pp. 64–66, 2006.
[49]李炎新;胡愛群;宋宇波;, “自適應BPSK解調方法研究,”中國工程科學, no. 05, p. 49–51+68, 2006.
[50]陳曦;宋宇波;王執銓;吳慧中;, “複雜產品虛擬樣機綜合集成型決策支持系統研究,”中國工程科學, no. 02, pp. 67–74, 2006.
[51]陳端端;裴文江;宋宇波;, “基於CDMA和802.11的無線多媒體平台的設計與實現,”電子技術套用, no. 11, pp. 66–68, 2006.
[52]王質禮;胡愛群;宋宇波;, “嵌入式無線接入點網路驅動的設計與實現,”中國工程科學, no. 10, pp. 91–94, 2005.
[53]宋宇波,胡愛群, “無線區域網路TKIP協定的安全分析,”套用科學學報, no. 01, pp. 67–70, 2005.
[54]宋宇波,胡愛群, “無線接入點WAPI認證機制的研究與實現,”中國工程科學, no. 09, pp. 65–69, 2005.
[55]宋宇波,胡愛群, “WLAN802.11/11b數據加密機制的安全分析,”中國工程科學, no. 10, pp. 32–38, 2004.
[56]黃玉劃,胡愛群, “一次一密保密算法研究與實現,”套用科學學報, no. 03, pp. 287–290, 2004.
[57]黃玉劃,胡愛群, “基於雙重分組和密鑰計數的並行認證模式,”中國工程科學, no. 07, pp. 70–74, 2004.
[58]黃玉劃,胡愛群, “分組密碼算法的快速認證模式研究與設計,”東南大學學報(自然科學版), no. 02, pp. 175–178, 2004.
[59]胡駿,胡愛群,宋宇波等“Linux環境下基於QT的WLAN管理信息系統,”計算機工程, no. 03, pp. 114–116, 2004.
[60]侯奮飛,宋宇波, “基於PMI的電子政務訪問控制體系,”計算機工程, no. 17, pp. 114–116, 2004.
[61]宋宇波,胡愛群, “電子政務安全體系結構的探析,”計算機工程, no. 10, pp. 11–13, 2003.
[62]黃玉劃,胡愛群, “網路安全中密鑰更新算法研究與實現,”計算機工程與套用, no. 35, pp. 27–29, 2003.
[63]宋宇波,疏朝明, “RC6加密算法在VPN中的套用,”通信技術, no. 07, pp. 78–80, 2001.
[64]疏朝明,宋宇波等, “HMAC-SHA-1-96算法在VPN中的套用,”通信技術, no. 06, pp. 35–36, 2001.
著作
[1]胡愛群,宋宇波,蔣睿.信息安全[M].第1版.華中科技大學出版社, 30萬千字,2011.
[2]蔣睿,胡愛群,陸哲明,宋宇波等.網路信息安全理論與技術[M].華中科技大學出版社, 50萬千字,2007.
專利
[1]徐健;宋宇波;石偉;張天陽, “基於顯示設備電磁輻射通信的手機驗證登錄系統及方法”CN201810310532,2018-04-09.
[2]方昊;胡愛群;姜禹;彭林寧;宋宇波, “一種基於設備物理指紋特徵的無線網路接入安全防護系統及方法”, CN 201810223029.4, 2018-03-16.
[3]李平安李澤坤張明昊吳彧宋宇波戚姍姍, “基於公眾號的物聯網設備控制和許可權分享系統及方法”, CN 201710810831.9, 2017-09-11.
[4]劉祺華遠劉奕琳張宇宸李前宋宇波, “一種偽基站檢測定位系統,” CN107027122A, 27-May-2017.
[5]宋宇波肖斌, “物聯網設備的委託授權方法、伺服器、終端及物聯網設備”, CN 201610543643.X, 2016-07-11.
[6]宋宇波,秦艷榮,王潤,浦希益, and張志偉, “遠程實時監測智慧型移動終端基帶處理器運行狀態的方法及系統,” 201510600961.0, 18-Sep-2015.
[7]宋宇波et al., “一種基於相似類型匹配估算的SQLite刪除數據恢複方法,” CN104866610A, 04-Jun-2015.
[8]劉蘭誼,宋宇波,李卓倩,徐軍,蔡金洲, and李度洋, “一種基於心音多維特徵提取的身份識別算法及其系統,” CN104887263A, 21-May-2015.
[9]羅平,宋宇波,王有東,藍驥, and王國鵬, “一種基於電容感應技術的身份認證系統,” CN104182740A, 01-Sep-2014.
[10]羅平and宋宇波, “基於電容感應技術的門禁系統,” CN104183045A, 28-Aug-2014.
[11]胡愛群,宋宇波,高岳,孟姍姍,陳飛, and朱克龍, “一種Android應用程式隱私數據泄露離線檢測方法,” CN103729595 A, 16-Apr-2014.
[12]高尚,胡愛群,李濤,宋宇波, and王濤, “一種偽無線接入點數據分析系統及其方法,” 201310350040.4, 12-Aug-2013.
[13]高尚et al., “基於滲透測試的無線網卡安全評估方法,” 201210421952, 30-Jan-2013.
[14]胡愛群et al., “一種基於無線接入點的滲透測試系統及其測試方法,” 201210356909, 26-Dec-2012.
[15]蔣睿,宋宇波,葛蕤,黃永亮,張南, and胡錫利, “基於手機藍牙的計算機環繞智慧型防護裝置及方法,” 201110075500, 19-Dec-2012.
[16]胡愛群et al., “一種無線區域網路安全性能測試系統及方法,” 201210255233, 24-Oct-2012.
[17]宋宇波,唐磊,藍智靈, and石樂, “一種控制台程式遠程互動的方法,” 201210175830, 17-Oct-2012.
[18]宋宇波,劉亦辰,岳亞,龐健, and梁琦, “基站獲取移動通信終端國際移動設備識別碼的裝置及方法,” 201210162317, 17-Oct-2012.
[19]宋宇波,朱筱贇,張皓月,譚杭波, and王許蓮, “一種移動通信蜜罐捕獲系統及其實現方法,” 201210175212, 19-Sep-2012.
[20]宋宇波,王雪晨,劉錫侖, and賈成偉, “基於物理不可克隆功能的無線感測器網路,” 201120544168, 29-Aug-2012.
[21]宋宇波,王雪晨,劉錫侖, and賈成偉, “一種基於前饋模式的物理不可克隆功能模組,” 201120524648, 22-Aug-2012.
[22]宋宇波,王雪晨,劉錫侖, and賈成偉, “一種基於前饋模式的物理不可克隆功能模組及其實現方法,” 201110419448, 25-Jul-2012.
[23]宋宇波,王雪晨,劉錫侖, and賈成偉, “基於物理不可克隆功能的無線感測器網路及其實現方法,” 201110435692, 27-Jun-2012.
[24]蔣睿,宋宇波,胡錫利,郝婷婷, and黃澤, “一種移動終端短訊息監管的設備和方法,” CN103369482A, 01-Apr-2012.
[25]蔣睿,宋宇波,黃澤,郝婷婷, and胡錫利, “一種監控用戶手機號碼的裝置和方法,” 201210039485.6, 21-Feb-2012.
[26]蔣睿,宋宇波,郝婷婷,胡錫利, and黃澤, “一種移動終端語音通信安全監管的設備和方法,” 201210038932.6, 20-Feb-2012.
[27]宋宇波,蔣睿,張南, and胡錫利, “基於藍牙設備認證的計算機系統自動防護方法,” 201110065732, 14-Sep-2011.
[28]宋宇波, “無線區域網路通信接口的遠程加密監管方法,” 200710131503, 02-Jun-2010.
[29]宋宇波et al., “用於遠程內容監管的無線區域網路接入裝置,” 200710132257, 02-Dec-2009.
[30]宋宇波et al., “基於分散式架構的無線網路電話監聽裝置的監聽方法,” 200710132256, 14-Oct-2009.
[31]胡愛群,楊曉輝,宋宇波, and陳立全, “基於嵌入式系統的無線保護接入設備,” 200510122789, 03-Jun-2009.
[32]宋宇波, “基於碼分多址技術的移動無線區域網路接入裝置及方法,” 200710131504, 13-Feb-2008.
[33]胡愛群,楊曉輝,宋宇波, and陳立全, “基於嵌入式系統的無線保護接入設備,” 200520134188, 15-Aug-2007.
[34]胡愛群et al., “基於PKI的VPN密鑰交換的實現方法,” 01132348, 02-Aug-2006.

榮譽獎項

江蘇省科技廳,江蘇省科技進步三等獎,(2005年);
東南大學,東南大學青年教師授課競賽二等獎,(2009年);
東南大學,東南大學教學工作優秀二等獎,(2012年);
東南大學,東南大學教學工作優秀二等獎,(2014年);
東南大學,孫慶雲創新獎教金,(2016年);
東南大學,獲東南大學最受歡迎研究生導師稱號,(2017年)。

相關詞條

熱門詞條

聯絡我們