Journal of Information Security Reserach ›› 2025, Vol. 11 ›› Issue (E2): 285-.
Previous Articles Next Articles
Online:2025-12-27
Published:2025-12-29
王勇张恒陈广勇王雪
(公安部第三研究所上海200031)
通讯作者:
王勇
助理研究员.主要研究方向为网络安全、数据安全、供应链安全.
wangyong@gass.ac.cn
作者简介:王勇
助理研究员.主要研究方向为网络安全、数据安全、供应链安全.
wangyong@gass.ac.cn
张恒
硕士,研究实习员.主要研究方向为网络安全、数据安全、供应链安全.
zhangheng@gass.ac.cn
陈广勇
硕士,副研究员.主要研究方向为人工智能安全、网络安全等级保护和关键信息基础设施保护.
chenguangyong@gass.ac.cn
王雪
硕士,研究实习员.主要研究方向为网络安全,数据安全、供应链安全.
wangxue@gass.ac.cn
基金资助:2025年度公安部技术研究计划基本科研业务费项目(2025JSYJC03)
[1]陈丽娜, 廖璇, 董国豪, 等. 基于供应链第三方开源组件的风险与挑战研究[J]. 软件, 2025, 46(1): 5355[2]ReversingLabs. The 2025 software supply chain security report[EBOL]. ReversingLabs, 2025 [20250715]. https:www.reversinglabs.com[3]张旭明, 史涯晴, 黄松, 等. 开源软件组件漏洞检测与自动修复技术研究综述[J]. 计算机科学, 2025, 52(6): 120[4]Li Zhen, Zou Deqing, Xu Shouhai, et al. VulDeePecker: A deep learningbased system for vulnerability detection[C] Proc of the 25th Annual Network and Distributed System Security Symp(NDSS). San Diego, CA: Internet Society, 2018: 115[5]Li Z, Zou D, Xu S, et al. VulDeeLocator: A deep learningbased finegrained vulnerability detector[J]. IEEE Trans on Dependable and Secure Computing, 2022, 19(4): 28212837[6]段斌, 李兰, 赖俊, 等. 基于动态污点分析的工控设备硬件漏洞挖掘方法研究[J]. 信息网络安全, 2019 (4): 4754[7]Song D, Brumley D, Yin H, et al. BitBlaze: A New Approach to Computer Security via Binary Analysis[M]. Berlin: Springer, 2008[8]Enck W, Gilbert P, Han S, et al. TaintDroid: An informationflow tracking system for realtime privacy monitoring on smartphones[J]. ACM Trans on Computer Systems, 2014, 32(2): 129[9]黄正聪. 基于脆弱点定位的固件漏洞检测系统的设计与实现[D]. 哈尔滨: 哈尔滨工业大学, 2022[10]姜慧. 基于攻击路径的全局漏洞检测[D]. 青岛: 中国海洋大学, 2016 |
| [1] | . Research Progress on Detection Technologies for Network Attack Based on Large Language Model#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 16-. |
| [2] | . Smart Contract Vulnerabilities Based on Differential Evolutionary Algorithms and Solution Time Prediction Detection#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 24-. |
| [3] | . PUFbased Identity Authentication for Internet of Things Against Machine Learning Attacks in Zerotrust Architecture#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 33-. |
| [4] | . Object Removal Video Tampering Detection and Localization Based on Learnable Ptuning#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 61-. |
| [5] |
.
The EU Artificial Intelligence Regulatory Sandbox System and Its Enlightenment#br#
#br#
[J]. Journal of Information Security Reserach, 2026, 12(1): 82-.
|
| [6] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 2-. |
| [7] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 8-. |
| [8] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 12-. |
| [9] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 15-. |
| [10] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 19-. |
| [11] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 25-. |
| [12] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 31-. |
| [13] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 35-. |
| [14] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 44-. |
| [15] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 48-. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||