李永乐 数学讲师
广受学生信赖的“线代王”
在考研复试准备和整个读研期间,提前了解联系研究生导师并选择正确导师尤为重要,的研究生导师会影响学生的一生;如何选择适合自己的导师并收集到报考老师的相关信息呢?,小编为大家整理了“2022年中国科学院大学硕士研究生导师信息”程亮导师,希望可以帮助大家找到心仪的导师,顺利读研。
中国科学院大学硕士研究生导师信息:程亮
程亮 男 软件研究所
电子邮件:chengliang@tca.iscas.ac.cn
通信地址:北京市中关村南四街4号,5号楼809
邮政编码:100190
研究领域软件与系统安全
招生信息
招生专业
083900-网络空间安全
招生方向
可信操作系统与系统保障,程序安全性分析,信息物理系统安全
教育背景2003-09--2009-06 中国科学技术大学 工学博士
1999-09--2003-06 中国科学技术大学 工学学士
工作经历
工作简历
2014-01~2016-01,宾夕法尼亚大学, 访问学者
2013-12~现在, 中国科学院软件研究所, 副研究员
2009-07~2013-12,中国科学院软件研究所, 助理研究员
专利与奖励
专利成果
[1] 程亮, 张阳, 冯登国. 一种测试用例集生成方法. 中国: CN102193858A, 2011-09-21.
[2] 张阳, 程亮, 冯登国. 一种计算机系统安全模型验证方法. 中国: CN102194061A, 2011-09-21.
出版信息
发表论文
[1] 王文硕, 程亮, 张阳, 李振. 基于函数重要度的模糊测试方法. 计算机系统应用[J]. 2021, 30(11): 145-154, [2] 王敏, 冯登国, 程亮, 张阳. 基于机器学习的模糊测试种子输入优化. 计算机系统应用[J]. 2021, 30(6): 1-8, [3] Li Zhangtan, Cheng Liang, Zhang Yang, Feng Dengguo. Understanding and Mitigating Security Risks of Network on Medical Cyber Physical System. 2021 The 16th International Conference on Wireless Algorithms, Systems, and Applicationsnull. 2021, [4] Fu Yu, Tong Siming, Guo Xiangyu, Cheng Liang, Zhang Yang, Feng Dengguo. Improving the Effectiveness of Grey-box Fuzzing By Extracting Program Information. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)null. 2020, [5] 刘天鹏, 程亮, 张阳, 佟思明. 基于文件格式信息的改进模糊测试方法. 计算机系统应用[J]. 2019, 28(5): 10-17, http://lib.cqvip.com/Qikan/Article/Detail?id=7001939688.
[6] 李张谭, 程亮, 张阳. 基于深度学习的模糊测试种子生成技术. 计算机系统应用[J]. 2019, 28(4): 9-17, http://lib.cqvip.com/Qikan/Article/Detail?id=88848989504849574852484851.
[7] 傅玉, 石东辉, 张阳, 程亮. 基于覆盖频率的模糊测试改进方法. 计算机系统应用[J]. 2019, 17-24, http://lib.cqvip.com/Qikan/Article/Detail?id=88848989504849574849484851.
[8] Cheng, Liang, Zhang, Yang, Zhang, Yi, Wu, Chen, Li, Zhangtan, Fu, Yu, Li, Haisheng. Optimizing seed inputs in fuzzing with machine learning. 2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2019)null. 2019, 244-245, [9] Li, Zhangtan, Cheng, Liang, Zhang, Yang. Tracking Sensitive Information and Operations in Integrated Clinical Environment. 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019)null. 2019, 192-199, [10] Li, Zhangtan, Cheng Liang, Yang Zhang. Mitigating network-layer security attacks on authentication-enhanced OpenICE. ACM SIGBED Review[J]. 2018, 16(2): 14-23, [11] 曹佳欣, 程亮, 张阳. 基于能力依赖图的SEAndroid安全策略分析. 计算机系统应用[J]. 2018, 27(10): 112-120, http://ir.iscas.ac.cn/handle/311060/19078.
[12] 傅玉, 邓艺, 孙晓山, 程亮, 张阳, 冯登国. 面向二进制程序的空指针解引用错误的检测方法. 计算机学报[J]. 2018, 41(3): 574-587, http://lib.cqvip.com/Qikan/Article/Detail?id=674756940.
[13] Cheng Liang, Li, Zhangtan, Zhang Yi, Yang Zhang, Insup Lee. Protecting interoperable clinical environment with authentication. ACM SIGBED REVIEW[J]. 2017, 14(2): 34-43, [14] 万云鹏, 邓艺, 石东辉, 程亮, 张阳. 基于符号执行的自动利用生成系统. 计算机系统应用. 2017, 26(10): 44-52, http://lib.cqvip.com/Qikan/Article/Detail?id=673513549.
[15] Yang Zhang, Xiaoshan Sun, Yi Deng, Liang Cheng, Shuke Zeng, Yu Fu, Dengguo Feng. Improving Accuracy of Static Integer Overflow Detection in Binary. The 18th International Symposium on Research in Attacks, Intrusions,and Defensesnull. 2015, [16] Han Zhihui, Cheng Liang, Zhang Yang, Feng Dengguo. Operating System Security Policy Hardening via Capability Dependency Graphs. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015null. 2015, 9065: 3-17, [17] 曾述可, 张阳, 程亮, 邓艺, 冯登国. 一种静态分析工具的优化方法. 小型微型计算机系统[J]. 2015, 36(4): 648-653, [18] Han Zhihui, Cheng Liang, Zhang Yang, Zeng Shuke, Deng Yi, Sun Xiaoshan. Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM)null. 2014, 432-439, [19] Cheng, Liang, Zhang, Yang, Han, Zhihui, Deng, Yi, Sun, Xiaoshan, Feng, Dengguo. Evaluating and comparing the quality of access control in different operating systems. COMPUTERS & SECURITY[J]. 2014, 47: 26-40, http://dx.doi.org/10.1016/j.cose.2014.05.001.
[20] 曾述可, 张阳, 程亮, 邓艺, 冯登国. 一种针对 Android系统隐私保护机制有效性的评估方法. 中国科学技术大学学报[J]. 2014, 44(10): 853-861, [21] Chen Dong, Zhang Yang, Cheng Liang, Deng Yi, Sun Xiaoshan. Heuristic path pruning algorithm based on error handling pattern recognition in detecting vulnerability. 2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW)null. 2013, 95-100, http://dx.doi.org/10.1109/COMPSACW.2013.14.
[22] Zhihui Han, Liang Cheng, Yang Zhang, Dengguo Feng. Measuring and Comparing the Protection Quality in Different Operating Systems. Network and System Security (NSS)null. 2013, [23] Sun Xiaoshan, Zhang Yang, Cheng Liang. A linear-time complexity algorithm for solving the dyck-cfl reachability problem on bi-directed trees. 5th International Conference on Machine Vision: Computer Vision, Image Analysis and Processing, ICMV 2012null. 2013, http://ir.iscas.ac.cn/handle/311060/16654.
[24] Xiaoshan Sun, Liang Cheng, Yang Zhang, Yi Deng, Jingbiao Hou. Refining the pointer analysis by exploiting constraints on the CFL-paths. The 20th Asia-Pacific Software Engineering Conference (APSEC 2013)null. 2013, [25] Cheng Liang, Zhang Yang, Han Zhihui, IEEE. Quantitatively Measure Access Control Mechanisms Across Different Operating Systems. 2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (SERE)null. 2013, 50-59, [26] Chen Dong, 张阳, 程亮, Deng Yi, Sun Xiaoshan. Heuristic path pruning algorithm based on error handling pattern recognition in detecting vulnerability. 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, COMPSACW 2013null. 2013, 95-100, http://ir.iscas.ac.cn/handle/311060/16542.
[27] 程亮, 张阳, Han Zhihui. Quantitatively Measure Access Control Mechanisms Across Different Operating Systems. 7th IEEE International Conference on Software Security and Reliability (SERE)null. 2013, 50-59, http://ir.iscas.ac.cn/handle/311060/16550.
[28] Cheng Liang, Zhang Yang. Model checking security policy model using both uml static and dynamic diagrams. ACM International Conference Proceeding Seriesnull. 2011, 159-166, http://ir.iscas.ac.cn/handle/311060/16239.
科研活动
科研项目
( 1 ) 逻辑驱动的跨操作系统安全机制评价方法研究, 主持, 国家级, 2012-01--2014-12
( 2 ) 操作系统访问控制错误修复方法研究, 参与, 国家级, 2015-01--2018-12
( 3 ) 基于源代码的深度安全测试和漏洞挖掘研究, 主持, 国家级, 2016-05--2017-05
( 4 ) 软件与系统漏洞分析与可利用判定技术研究, 参与, 国家级, 2017-07--2021-06
( 5 ) 基于智能模糊测试的深度漏洞挖掘技术研究, 主持, 国家级, 2018-01--2018-12
参与会议
(1)Improving accuracy of static integer overflow detection in binary Yang Zhang, Xiaoshan Sun, Yi Deng, Liang Cheng, Shuke Zeng, Yu Fu, Dengguo Feng 2015-11-02
指导学生现指导学生
曹佳欣 硕士研究生 085211-计算机技术
以上是天任教育给大家分享“2022年中国科学院大学硕士研究生导师信息”程亮导师的信息,想要了解更多高校研究生导师信息可持续关注。