南开大学网络空间安全学院教授、博士生导师;天津市网络与数据安全重点实验室主任;国家一流专业“信息安全”专业负责人。研究领域包括系统与网络安全、软件安全与恶意代码分析、可信计算等。承担973计划、重点研发、863计划、国家攀登计划和国家自然科学基金项目等12项,完成省部级项目10余项;发表论文120余篇。2019年获国家网络安全优秀教师奖,2016年获南开大学优秀博士学位论文指导教师称号,2001年获天津市自然科学2等奖。
社会兼职主要包括:
教育部高等学校教学指导委员会网络空间安全专业教学指导委员会委员;
天津市人民政府学科评议组成员;
《电子与信息学报》等期刊编委等。
在研项目:
1. 天津市科技局,天津市自然科学基金(重点)项目,代码虚拟化分析的关键问题研究(项目编号:20JCZDJC00640;执行时间:2020.04-2022.03),主持人
2. 全国哲学社会科学工作办公室,研究阐释党的十九届四中全会精神国家社科基金重大项目,基于数据共享与知识复用的数字政府智能化治理研究(项目负责人:王芳;项目编号:20ZDA039;执行时间:2020.05-2023.04)之课题“政府数据安全风险识别与安全保障体系研究”,课题负责人
3. 国家自然科学基金委员会,国家自然科学基金面上项目,Android应用防篡改新方法研究(项目编号:61972215;执行时间:2020.01-2023.12),主持人
4. 国家自然科学基金委员会,国家自然科学基金面上项目,加密重复数据删除系统关键问题研究(项目编号:61972073;执行时间:2020.01-2023.12),参与人
5. 科技部,2019科技部国家重点研发计划项目(所属专项:变革性技术关键科学问题),课题名称:编码密码中的数学困难问题的研究(课题编号:2018YFA0704703)(所属项目名称:密码数学难题与密码系统的设计与分析(项目编号:2018YFA0704700)),课题承担单位:南开大学,课题负责人:符方伟(项目牵头承担单位:清华大学,首席专家:王小云),执行期限: 2019年11月至2024年10月,学术骨干
近期代表性论文:
[1] Guanxiong Ha; Chunfu JIA*; Xiaowei Ge; Yuchen Chen; Xuan Shan. Similarity-aware defense scheme for online brute-force attacks in encrypted deduplication, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), (Early Accessed)(CCF-A, SCI一区)
[2] Yifan Wang; Ruizhong Du; Mingyue Li; Dongliang Xu; Chunfu JIA*; Can Mei. LPPUBR: Lightweight Privacy-Preserving Unsupervised Medical Image Bitmap Retrieval in IoT, IEEE Transactions on Computers (IEEE TC), (Early Accessed), DOI: 10.1109/TC.2025.3604470(CCF-A, SCI一区)
[3] Guanxiong Ha; Yuchen Chen; Chunfu JIA*; Keyan Chen; Rongxi Wang; Qiaowen Jia. Scalable Encrypted Deduplication Based on Location-hiding Secret Sharing of Data Keys, IEEE Transactions on Computers (IEEE TC), (Early Accessed), DOI: 10.1109/TC.2025.3603710(CCF-A, SCI一区)
[4] Shijia Li; Jiang Ming; Lanqing Liu; Longwei Yang; Ni Zhang; Chunfu JIA*. Adversarially Robust Assembly Language Model for Packed Executables Detection, 2025 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2025), November 13-17, 2023, Taipei(CCF-A, Top 4)
[5] Ye Bi; Chunfu JIA*. From Preparation to Execution: Security Protocol for Third-Party MES-Enabled 5G Support Handover Authentication and Key Evolution, IEEE Transactions on Mobile Computing (IEEE TMC), 2025-08-14. DOI: 10.1109/TMC.2025.3599376, 14 August 2025(CCF-A, SCI一区)
[6] Ding Wang; Xuan Shan; Yuxuan Wu; Chunfu JIA*. Understanding User Passwords through Parsing Tree, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), (Early Accessed) March 9, 2025 DOI: 10.1109/TDSC.2025.3552583(CCF-A, SCI一区)
[7] Xiaowei Ge; Guanxiong Ha; Chunfu JIA*; Keyan Chen; Longwei Yang; Qiaowen Jia. PopeDup: Popularity-Based Encrypted Deduplication with Privacy Learning Attacks Resistance and Protected Thresholds, IEEE Transactions on Information Forensics & Security (IEEE TIFS), Volume 20: 7695-7708, July 2025 DOI: 110.1109/TIFS.2025.3586515(CCF-A, SCI一区)
[8] Guanxiong Ha; Yuchen Chen; Zhipeng Cai; Chunfu JIA*; Xuan Shan. Random Coding Responses for Resisting Side-channel Attacks in Client-side Deduplicated Cloud Storage, IEEE Transactions on Services Computing (IEEE TSC), Vol.18(3): 1697-1710, 2025 DOI: 10.1109/TSC.2025.3568252(CCF-A)
[9] Ye Bi; Chunfu JIA*. Towards Resilience 5G-V2N: Efficient and Privacy-Preserving Authentication Protocol for Multi-Service Access and Handover, IEEE Transactions on Mobile Computing (IEEE TMC), Vol.24(6):5446-5463, 2025 DOI: 10.1109/TMC.2025.3532120(CCF-A, SCI一区)
[10] Guanxiong Ha; Xiaowei Ge; Chunfu JIA*; Yuchen Chen; Zhen Su. Revisiting SGX-based Encrypted Deduplication via PoW-Before-Encryption and Eliminating Redundant Computations, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Vol.22(3): 2037-2053, 2025 DOI: 10.1109/TDSC.2024.3476288(CCF-A, SCI一区)
[11] Fei Duan; Ding Wang; Chunfu JIA. A security analysis of honey vaults, 45th IEEE Symposium on Security and Privacy (IEEE S&P 2024), May 20-23, 2024, San Francisco, CA Pages: 203-230, DOI: 10.1109/SP54263.2024.00219(CCF-A, Top 4)
[12] Guanxiong Ha; Chunfu JIA *; Yixuan Huang; Hang Chen; Ruiqi Li; Qiaowen Jia. Scalable and popularity-based secure deduplication schemes with fully random tags, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Vol. 21(3): 1484-1500, May 1, 2024 DOI: 10.1109/TDSC.2023.3285173(CCF-A, SCI一区)
[13] Shijia Li; Jiang Ming; Pengda Qiu; Qiyuan Chen; Lanqing Liu; Huaifeng Bao; Qiang Wang; Chunfu JIA*. PackGenome: Automatically Generating Robust YARA Rules for Accurate Packer Detection, 2023 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2023), November 2023, Pages 3078-3092(2023 ACM SIGSAC Conference on Computer and Communications Security, November 26-30, 2023, Copenhagen, Denmark)DOI: 10.1145/3576915.3616625(CCF-A, Top 4)
[14] Ding Wang; Xuan Shan; Qiying Dong; Yaosheng Shen; Chunfu JIA. No Single Silver Bullet: Measuring the Accuracy of Password Strength Meters, 32nd USENIX Security Symposium, 2023, v 2, p 947-964, 32nd USENIX Security Symposium (USENIX Security 2023), August 9–11, 2023, Anaheim, CA, USA(CCF-A, Top 4)
[15] Shijia Li; Chunfu JIA*; Pengda Qiu; Qiyuan Chen; Jiang Ming; Debin Gao. Chosen-Assembly Attack Against Commercial Code Virtualization Obfuscators, 29th Network and Distributed System Security Symposium (ISOC NDSS 2022), April 24-28, 2022, San Diego California, USA, Internet Society DOI: 10.14722/ndss.2022.24015(CCF-A, Top 4)
[16] Haoyu Ma; Shijia Li; Debin Gao; Daoyuan Wu; Qiaowen Jia; Chunfu JIA*. Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Vol.19(5): 3508-3520, 01 Sept.-Oct. 2022 DOI: 10.1109/TDSC.2021.3100877(CCF-A, SCI一区)
[17] Haoyu Ma; Shijia Li; Debin Gao; Chunfu JIA*. Secure Repackage-Proofing Framework for Android Apps using Collatz Conjecture, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Vol.19(5): 3271-3285, 01 Sept.-Oct. 2022 DOI: 10.1109/TDSC.2021.3091654(CCF-A, SCI一区)
[18] Haoyu Ma; Jianwen Tian; Debin Gao; Chunfu JIA*. On the Effectiveness of Using Graphics Interrupt as a Side Channel for User Behavior Snooping, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Vol.19(5): 3257-3270, 2022 DOI: 10.1109/TDSC.2021.3091159(CCF-A, SCI一区)
[19] Qiying Dong; Chunfu JIA*; Fei Duan; Ding Wang. RLS-PSM: A Robust and Accurate Password Strength Meter Based on Reuse, Leet and Separation. IEEE Transactions on Information Forensics & Security (IEEE TIFS), Vol.16: 4988-5002, 2021 DOI: 10.1109/TIFS.2021.3107147(CCF-A, SCI一区)
[20] Haoyu Ma; Jianwen Tian; Kefan Qiu; David Lo; Debin Gao; Daoyuan Wu; Chunfu JIA*; Thar Baker. Deep-Learning-Based App Sensitive Behavior Surveillance for Android Powered Cyber-Physical Systems, IEEE Transactions on Industrial Informatics (IEEE TII), Vol.17(8): 5840-5850, 2021 DOI: 10.1109/TII.2020.3038745 (SCI 1区)
[21] Haoyu Ma; Chunfu JIA*; Shijia Li; Wantong Zheng; Dinghao Wu. Xmark: Dynamic Software Watermarking using Collatz Conjecture, IEEE Transactions on Information Forensics & Security (IEEE TIFS), Vol.14(11): 2859-2874, 2019 DOI: 10.1109/TIFS.2019.2908071(CCF-A, SCI一区)
[22] Jingwei Li; Anna Cinzia Squicciarini; Dan Lin; Smitha Sundareswaran; Chunfu Jia. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Vol.14(2): 185-198, 2017 DOI: 10.1109/TDSC.2015.2445752(CCF-A, SCI一区)
[23] Hanoyu Ma; Ruiqi Li; Xiaoxu Yu; Chunfu JIA*; Debin Gao. Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation, IEEE Transactions on Information Forensics & Security (IEEE TIFS), Vol.11(10): 2322-2337, 2016 DOI: 10.1109/TIFS.2016.2555287(CCF-A, SCI一区)
[24] Jin Li; Jingwei Li; Xiaofeng Chen; Chunfu JIA; Wenjing Lou. Identity-based Encryption with Outsourced Revocation in Cloud Computing, IEEE Transactions on Computers (IEEE TC), Vol.64(2): 425-437, 2015 DOI: 10.1109/TC.2013.208(CCF-A, SCI一区, 高被引论文)