13
+86-10-82546611 +86-10-82546564 : [email protected] : http:/ /www.sklois.cn S •••• STATE KEY LAB ORA TORY OF INFORMATION SECURITY

LAB ORA TORY OF INFORMATION SECURITY - CASsklois.iie.cas.cn/cxwh/systx/201605/P020160516539519023793.pdf · LAB ORA TORY OF INFORMATION SECURITY ~~~~*~j20151:F~~fii~::SZ:, ~fiif¥.5X~Hll!~f)(it

  • Upload
    vannhan

  • View
    238

  • Download
    0

Embed Size (px)

Citation preview

Page 1: LAB ORA TORY OF INFORMATION SECURITY - CASsklois.iie.cas.cn/cxwh/systx/201605/P020160516539519023793.pdf · LAB ORA TORY OF INFORMATION SECURITY ~~~~*~j20151:F~~fii~::SZ:, ~fiif¥.5X~Hll!~f)(it

J:gi~ : +86-10-82546611

f~~ : +86-10-82546564

m~m : [email protected]

IXXJ~ti : http:/ /www.sklois.cn

S I5I061Z1~iE Q:-if:D6~~~·D ID•~'3Z.:I:.eJ~.!Il •••• ~-:J!!L.:E.D!Illt.

STATE KEY LAB ORA TORY OF INFORMATION SECURITY

Page 2: LAB ORA TORY OF INFORMATION SECURITY - CASsklois.iie.cas.cn/cxwh/systx/201605/P020160516539519023793.pdf · LAB ORA TORY OF INFORMATION SECURITY ~~~~*~j20151:F~~fii~::SZ:, ~fiif¥.5X~Hll!~f)(it

~~~~*~j20151:F~~fii~::SZ:, ~fiif¥.5X~Hll!~f)(it 0000000 0 0000000 00 0000000 0 0 0 000000 000 0000000 0 00000000 00 00000000 0 0000000 00 0000000 0 0000

2

~~~~B7f20151:F~~I't\~!J:!~ 00000 0 0 0 0000000 00 0000000 0 00000000 00 00000000 0 0000000 00 0000000 0 0 0 000000 000 0000000 0 00000000 00 00000000 0 0000000 00 0000000 0 00000000 000 0 3

~t~~®*~~~1~w;~~WG~:xm~~~~ 0 000 0000000 0 00000000 00 00000000 0 0000000 00 0000000 0 00000000 000 0000000 0 00000000 00 00000000 0 0000000 00 0000000 0 00000000 00 000 3

~~~~§~ISJ~~~~~j5f.Jtt:JG~ ( CNAP ) 5.1-tJT ooooo oo ooooooo o oooooooo oo oooooooo o ooooooo oo ooooooo o o o oooooo ooo ooooooo o oooooooo oo oooooooo o ooooooo o --4

9J~~~§~ISJ~~t1.1-~tt~.BX:l:z: 000000 0 00000000 00 00000000 0 0000000 000 00000000 0 0000000 00 0000000 0 00000000 00 00000000 0 0000000 000 000000 0 0 0 0000000 00 0000000 0 00000000 0 6

((f~,l@,~~~1~)) BHIJi5:&fiJ~~1~:&Jj~JH1~f:E~t~B7f 0000 00 00000000 0 0000000 000 000000 0 0 0 0000000 00 0000000 0 00000000 00 00000000 0 0000000 00 8

~~*ltH~JH& , t~lz:~la~~f'F~I5J~'813°0000000 00 00000000 0 0000000 00 0000000 0 00000000 000 0000000 0 00000000 00 00000000 0 0000000 00 0000000 0 00000000 00 0000000 1o

2015{'g,l@,~~*ftJ:li,¢.i: 000 00 00000000 0 0000000 000 000000 0 0 0 0000000 00 0000000 0 00000000 00 00000000 0 0000000 00 0000000 0 00000000 000 0000000 0 00000000 00 00000000 0 0000000 00 000000012

~~~~-r.u:l~ff~.BX~~PKC 2016:5F:ffl 0 000 0000000 0 00000000 00 00000000 0 0000000 00 0000000 0 00000000 000 0000000 0 00000000 00 00000000 0 0000000 00 0000000 0 00000000 00

15

~~~~A!J:!~1.JDFSE 2016~~iF~i)( 0 0000000 00 0000000 0 00000000 00 00000000 0 0000000 000 000000 0 0 0 0000000 00 0000000 0 00000000 00 00000000 0 0000000 00 0000000 0 0 0 000000 000 0015

~~EP~~~17:1:*:~~1!5%~~.9:ffliJJICJ~~~~ ooo o oooooooo ooo ooooooo o oooooooo oo oooooooo o ooooooo oo ooooooo o oooooooo oo oooooooo o ooooooo ooo oooooo o o o ooooooo oo ooooo17

~~~~~ff~.5X~*~J:ro~~!3tf-~i)(IEEE S&P (Oakland) 2016:5F:ffl 00 0000000 0 00000000 00 00000000 0 0000000 00 0000000 0 0 0 000000 000 0000000 0 0000

17

tif\I!m~ff~!J:!i.J]ICJ~~fll!i3P~JT:*:~ 000 00 0000000 0 00000000 000 0000000 0 0000000 000 00000000 0 0000000 00 0000000 0 00000000 00 00000000 0 0000000 000 000000 0 0 0 0000000 00 0000000 0

18

~-~ff~~*VJ' "~~f4~ff~~3" =~=~f'F~*~ 00 000 00 00 00 000 00 00 000 00 00 00 000 00 00 00 000 00 00 000 00 00 00 000 00 00 000 00 00 00 000 00 00 000 00 00 00 000 00 00 000 019

~1JDtf*f~$-:j;E535JJ 00 00 000 00 00 000 00 00 00 000 00 00 000 00 00 00 000 00 00 000 00 00 00 000 00 00 000 00 00 00 000 00 00 000 00 00 00 000 00 00 00 000 00 00 000 00 00 00 000 00 00 000 00 00 00 0

20

9J~f4~~WGm~~t1.1-~*iJJ~~~~ 00 00 000 00 00 000 00 00 00 000 00 00 000 00 00 00 000 00 00 000 00 00 00 000 00 00 000 00 00 00 000 00 00 000 00 00 00 000 00 00 00 000 00 00 000 00 00 00 000 00 00 000 00 00 00 0 21

Page 3: LAB ORA TORY OF INFORMATION SECURITY - CASsklois.iie.cas.cn/cxwh/systx/201605/P020160516539519023793.pdf · LAB ORA TORY OF INFORMATION SECURITY ~~~~*~j20151:F~~fii~::SZ:, ~fiif¥.5X~Hll!~f)(it

0 I ~ · Jlll 1---------------------------------0 I ~ · Jlll I

~~~¥~T 2015 ~GiB~3Z:, iiiflf~~i~

~i~lliMRifD~~{t~~f[~O[IiJ)J83f4~ffi1'F I {g,~.~~~~~~~~~~:¥:(SKLOIS)Bjtj=if~~.El.~.R~1ii~

:>Z:. ~{iif~PX~i~~)~iVJ. 201Stj= I ~~1:Fil~*~D3.~~i.Sd~~ I ;t,if\~~~A!I.!:3B3i~:>Z: ((Revis­

iting Attribute-Based Encryption With Verifiable Outsourced Decryption)) ~1~17t~i~:>Z:

-~~I ~$·ta~A!I.!:3B3i~:>Z: ((Dynamically Discovering Likely Memory Layout to Perform

Accurate Fuzzing)) • P"58~A!I.!:3B3i~:>Z: ((Solving Linear Equations Modulo Unknown Di­

visors: Revisited)) ~1~17t~i~:>Z:=~~; ~$~tB~A~ff~B3If~PX~ ((TI:tf~~~.*~ft)) ~1~17t~I

~PX~-~~~*~~~AM~~I~PX~«ffiSW~*-~*&.*m». ~~~AM~~I~PX~

«~•ttB~~@ffl.*m»~~~~I~PX~=~~.

3Fl14B ..t!:f I 1*.~-~~~~~~~~~~:¥:?¥fr7201S1:F!l~1tt~:sz:. ~1iif~PX~n~~1SGt.

20161:F1Fl23 E3 I {g,l~\t~~~~~~~~~~:¥:201Stj=Jl~*~D3.~1.f~t*B7f.

~_t I {g,i~tif~~ff~Jlff:tlhPt?fftE:~x~illH~ I ~~~:¥::tif\*ill.:E1frP:J:k~1t~20121:F-20lS1:FI1'F)C!~ I ~~~

:¥:-~GM~D3..m&M~D3.. BmM~D3..m*WM~D3.. ~-~M~D3..~mm~M~D3.B~UrP:J~~~

93.1HB7~~~:¥:831t~·~PX~. ~J§ I :k~x120lS1:FJl17t~i~:>Z:fD17t~If~PX~fD20161:F!l~~~:¥:3TJNiJ

~i!Hr7i~~.

~~~*~93.~~~~~W~rP:J~~.m~~~.A~~ffiR~~~OO~~~:¥:W~&~7~~-~tt

am.•~~~~~:¥:**~mmfi7~MMM.

20161:F3Fl2S a I ~t*~im*~~~15R-W~~%~~-fr-+~A*~~~:¥:~:xm. ~~~:¥:I1'FAD3.rP:l*

~~~~m7~~:¥:~•*•~~#1.fm:¥:~~7n~re~ttM~PX~.

Page 4: LAB ORA TORY OF INFORMATION SECURITY - CASsklois.iie.cas.cn/cxwh/systx/201605/P020160516539519023793.pdf · LAB ORA TORY OF INFORMATION SECURITY ~~~~*~j20151:F~~fii~::SZ:, ~fiif¥.5X~Hll!~f)(it

01 ~~~n~l-----------------------------------------------------------------------~ ~r-.... 0 I Mt~~Jf5el

20161:F2Fl9E3 I ~E:\~~11] ((~~~~i'SJ~~~~friVJH:JGU)) ( Cybersecurity National Action Plan I

cNAPtt:JGU) I J-;._tm~~~mtlji~MBll<Sf, 1lDs!rr~~A::t~;._1:n9ti~, ±~itt.!:3J1~83-a1'F~15rniA-=F I ~mit~~~

~1±~*~1'SJ83~~. -®?¥1Ml~m~lz:~*f~§Jm'{g,~,~~'§', 11JU~1901z~;:c~~~:r~~ I i5t.Bjj~~x1~~~~i'SJ~

~83~f!nitiU7~JT~Jt. BtJT~~11J83s:JGmg, iE~$ft tt:JGU~83J~1t I ~ff~U~**~m83iVlrP:J I PJ~:J.~~~1±~~~

~i'SJ~~1Jrni83S:JGmgiE~**U~J'~;!:l;~1'Fffl.

-, CNAPtt:!GU.:E~!:t;J~)j-;tJTJ;tiVJrP:l~ff~U

,k)._tf:JGU t±:l B83B1tMDiVltJL..t~ I ~E:\~iE~H11.f~Fs3Z~~t±:l B 7 c NAPH:!GU I ~~ 7 {;!:l;l'-1f~~D{5Rf~iE~Q

~~~~~).9~ I tE,f[~*IEEiE~WJJIPUfftE~ I ~I.P;\i£~~~83~ ~~3?.~tBf[1.f~~B1lt~~ R\.:E5tt.iL~83~ ~.

tt:JGut~t±:l~t\7~~~~~~i'SJ~~1JEitt~D3.~ I tu~**+1F83~m~~~ I i~3l<-t:E:Wm. 2Fl17 a I ~E:\

~B~~j:~~Tom Donilon ( mt3'§~~~~Jeilii'6J ) fDSam Palmisano ( IBM~'PJmCEO ) BtlU~~D3.~83.:EJm'

fDiWiUtt I J>t~::r:~D3.. J-)._§m83A~..t*~ I ~~i*~m831Jit1JJ?.~~E:l~iE~H111-t:E:83 "S:JGmgsl@!" t~it.

tt:JGUJ'~t±:li~lz:~~iE~H1~JHlz83~*f~§Jt{g,l~t~~'§ ( CISO) I ~rni~~~H~~~~~~I{'F I ~-?¥iVJ~~~ «~

~~i'SJiE~~¥fil» cri~lz:83~~~i'SJ~~t1.l,~D3.ittfr~JH1z, :tVJ83t~ft-.!:3ft-~. 1i~~J1~83~ I cNAPtt:JGU~7

~~JT~H~iE~WJIT~~~~~~5crmi~lz:833HZ~831*J~M3Z*I.PJ1t1t~~ I *illlE±I~H~§Jt{g}~t'B c Cio ) ~~ I ltt

IJ\!P~~7Ciso I ~&B~7~~1±1*J~\t~:!l!±§X~mJ!t~..t83~1t I l'l.P~1*J~Mtsl~:!l! I ~1*J~t~~sl~:!l! I ~:J.~~~

tffi-=F-51~:!!!~'1'-{g,i~t~:!l!±§X83I 1'FfD~m.

l'l.P1:fB~~f[NicE~~t~~rni83~~~9:~tt:JGu I lttiJ\CNAPtt:JGU1JJ:jij/J\~oo~t±:IA::t±g~831'6J~ I JEm~~1±

~~~~~J§~A::t±g~83~fm I tE.~~n~1.f~~~i'SJ~~~tw~crittfr "i~~S:JG" 83--1'-~17.1-\iMlMB. ~~tlU~A::t

±g~83 ":Y~~{~" t~! I ~~--tff~~;._~s:JG83i5tS! I ~i5t.BJ3~~mA::t±g~t~ft-iU..ts:lG:I:.wn1t83~,J\. s$~A::t

±g~.!:3J§~~A/.t{fffl83~tit~ I f[ "f[$~B1BZI'l.P*, *Z§~S:!G" 83~:m.

3 1!JD

cNAPtt:JGU:~$7 15Rt?*fimtlji~MB~~83~~·~ I m~t±:\31 1z~;:c831*J~t13Z#Im1t1t~~, ~~~~~~

~1:*~§~)Jcp{,\ ~~~~i'SJ~~15R~:tH:JGUm~~. ~~NISTr20151:J=9Fl t±:IB7 ((Framework for Cyber­

Physical Systems)) J~t±:lw.Jlft!!WfD~~~t!!WB~~~Jl~~-a, /GPJB!iU, t1.l'I'~J~m. ,k)._cpPJ~:J.~iU I ~~AB~~

ij._i.RiU I *fimtlji~MB15R1?.!:3~~~~i'SJ~~~~.W;tEJ*83, ~-17.1-\83 I ~~~~t~ft-iU~~~~i'SJ~~~~J\..t*~1*~ E3

ll!o

CNAPtt:JGUf[JID~{t~]lJ], ·t~tlW"rni83!:t;J~ I {§:IG§~~;:;tl;-mJ§83~~~I1'F. 2008tj=CNCitt:JGUcp I ~]l}],

·t~ilW"rni83~:t;J~2:17$~ I cNAP#*X1~JlJJfo·t~i~@!±§Xl.¥m831ll~ I Rf§J~t~U7FBI~~~~~friVl?&:~, ~~~

ff~~;._~m~~ltff±§tt:JGU. ?.~rm~i~@: I ~JlJJff~2017~JiF83:r~~crf[7o1z~;:ctr:~83:r~~7f3Z:~~m:r:~~~~i'SJ@!

±§X. ~~~Ht/J\CNAPtt:!GU~11J83~~~!:t;J~if~~2i7DoDfDODNI83I1'F.

~~M1fJ~$c1.f~~~~i'SJ~~..t83iE~~ii:m83fD5m~83. 52::tif\~!l!iE~WJB1lt~.:E~~ "1t~H/t~" c Get

ready) I Jj\11)1fiE~WJj:~ft-iU "~)t~" ( Readiness ) 83~1)\ I ~E:\~iE~WJitJ:-zvj:~ft-~ ":Y~%~)t~" ( Pre­

Readiness ) • ~~l.j._i.RiU~~~i'SJ~~ruJ! "-zviU11Z'' I $~zvtiittJ~{t. J39~ I irr1F*J'~t±:l83~ms:JGmg I

t~~ifrcr@lt~~mWJ:lGU;tEJ~-a I :~G~~~:r:~~m- I :~G~3l<-IJ\·~m~m~ I rm~~s:JGmg~1t83:15it I :~Gl'fJTfi~IE~

s:JGmg§;t~fotMlMB. Pim I ~~Aij._iPsU~~~~i'SJ~~cr83~~~twm~~-:t.w "i~~S:JG" I 1t;Gz:r "i~~S:JG" 83{"W

It~.

ft~~~~~~i'SJtEl*83~:!l!±§X I ~HifD~~fftE;fiJ~$~ I lt~i'SJ®F·/f~JT I 1ME±IT1~ft±tB~liE~g, 1fl'1ID.PJ,

$$fD;fUfra:~~:~G~83·t~I5Cr: I ~HI1±~~-t:E:-f9:B1i'SJI:t;J~~I'iiJ~~~ti1.f-@ I ~11J~~tJU~1.f~~~~mJJ!utu~..t I mz

*1t~H{}W/t~.

~~~u~~YJJJ!U~J~..t I ~~~~;fUfra:11~*15;c~-/EQ~I'iiJi.1i~tu~~mJJ!u I ~;t~tu~83S:JG~m:JGu I im~~~~~

H83ttl.frn I ~~~~l.J._PJ83~YJ:JGU I 1tE.11J§%~JtPX~S:JG~m:JGU83f[nttl.fr~fottiVl~. I.PJ1± I ;fiJfra:1i~AA83~

~~~YJJJ!UtUMit I s~~PX~~~~imfr83t~it I ~fl:ll~~~~ruR 13Z*UM, ~*~)(~ I t~*ffl~fi:ll~.&H15it.

2016

Page 5: LAB ORA TORY OF INFORMATION SECURITY - CASsklois.iie.cas.cn/cxwh/systx/201605/P020160516539519023793.pdf · LAB ORA TORY OF INFORMATION SECURITY ~~~~*~j20151:F~~fii~::SZ:, ~fiif¥.5X~Hll!~f)(it

0 I iT~~ittl---------------------------------------0 I iT~~ittl

cr~~~~~i'SJ~~tw~~4'~1±~t**frPXlz::k~. *t1.l~~~ffi~p:;]J-)._$~~~~i'SJ~~*El*r-~, ~9:~, f4 ~ff, @fflB3tJU7~L lt:~iSZ/i' A~IPJEl~~BXB3~~·~, fr~·~, ~~~ifU·~U~lli.R. cp~If~~%~%±, ~t*ffiB

~*~~9:1~15;~>'<3~~cp~~~~~i'SJ~~t1.J,~$-I:E:.

cp~~~~~i'SJ~~t1.J\~ ( Cyber Security Association of China I CSAC ) mH~=~=~~{lz~~g~*~

1*J~tVJ-~:¥: I u~~ta~w;tJL*cr~ARl*Uo~RliE~g~a3~~1~®fo~'!~w.

3 1!JD

tw~~*§:~: ~i*tri=m~B-;;;-1'Fm I ~.&.RfoiVl93.U~~1Jrnin~~.!:3cr~~~~~rSJ~~9ti~ I ~~93.~&~ I

~frill&~ I ~~~s~rug~&~ I 1JEittcr~~~~~i'SJ83~~fo~m.

~..t I cr~If~~JG~JG±, ~t*m~~*~~9:1.~15;~>'<3~~cr~~~~~i'SJ~~tw~~$-t:E:. ~PJ~E:\E:l c cr~) f[~&~'PJ13Z*iWi~ls,~u~~itt I ~llJJf4:ktt~;tn,~~%~9:1~:~JE3 I _t;ij~im:k~1*J~t~~If~~~JG~%-t:E:*9t~ I;~ tJIIr!J~tRtt~;tn,*~5cf[~&~'PJ]i[$~=Ernr~1t~ I g§~~im:k~1*J~\t~~J!~~~ff~cr{"=E1f~Rlm I cr~f4~ ~%1*J~tif~~ff~?tr?trtE::tlhPt I ~t*~mf4f3Zf[~&~'PJls,~~rPJ* I a!l1±~~~~13Z* c ~t*) f[~&~'PJ13Z*iWi~ ~~,~::E;ijw~ I cr~If~~%~%±, cr~~rf4t3Z~~~'PJ~rf4~~ff~~%~%-t:E:~~~ I OS$;~~~f4t3Z~&17ff[~& ~Pj§Jm'13Z*~*~~rp~~JTJ16 I ~~t3Z*f[~&~'PJS~mgg(3j~g~-t:E:*~It#33~~t1.J\~j~If$-I:E:.

'EJJ5~1lJJf4:k, ~t*:k~, OS$;~I~:k~, ~t*ffi~~:k~, cp~f4~~§G{g,l~tif~~ff~Jlff:&tt~JlfffD$X{tJ: ?tr, cr~~iVl, cr~~*im, ~PJ~E:\E:l, a!l, 36o ~m~ifp:;]83 2oo ~~~11z1'F~~@PXD3.~1lo7~-JEE1t~:k~.

Page 6: LAB ORA TORY OF INFORMATION SECURITY - CASsklois.iie.cas.cn/cxwh/systx/201605/P020160516539519023793.pdf · LAB ORA TORY OF INFORMATION SECURITY ~~~~*~j20151:F~~fii~::SZ:, ~fiif¥.5X~Hll!~f)(it

0 I iT~~ittl---------------------------------------0 I iT~~ittl

(( 1~ ,1@, ~~ ~1& ))BU fU -5-~ fiJ ~ ~1& ~~~Jfi1~1±~~JRB7f

2o16 1:F 3 FJ s a I «1*J~t~~~1~» ~UTU-~S-~11JM~1~~m~m1~11J~1.f~t*BH. 15;~>'<~%±, 10J~~~

~%±, ~5}J%±, ~$lc?~%± I cp~f4~~%f4~1~1~~~-t:E:m~~itt I cp~f4~~jG{g,l~tif~~ff~JlffJlffiE::tlhfj- I

f4~t±:l#.&ff~~U-t:E:~~~itt I ((Journal of Computer Science and Technology)), ((tf~ij;JL~1~)), HXftJ:~1~)), «tt ~*JL~ff~.!:3~m» ~~*:lt~tUI'iiJt:: I « 1*J~t~~~1~» ~-JEE~~~~~ so ~At±:IJt~)(.

~_t I m~~m:*~it7~~~JTI!j]t±:l#.&r-~~~,~x1 «1*J~t~~~1~» ~UTU83*5C~ I #~~~1~~cp~1.f{g,~&,

~~~~±§X7..kSf~~B3~*:lt~fU •

.!:3#~~~~7J~7Jx1~1~~UTU~~*5C~ I 1~t±:l~~~Jl:~I~J!n1*.~&,~~f413Z~m.!:3~~~~i'SJ~~15R~l I ~~VJ.

« {g,~&,~~~1~» ~~~~s~mg$* I -tB~~f4~ma3~~?.~~*· §HW I ~~1±*~~±§X~f[~~~~olliJn83~

*tUw.J I (({g,~&,~~~1~» 83~~VJ.IE3~B1 I x1~*~~p:;J)H4~ff)J~ I ttiVl~~{g,~&,~~f413Z~~~JTfD~~~~i'SJ

~~~f4~m~f[~f~~*~)(..

=~=~:5J~>'<~%±:&~7-~~*~t~~~t~~*'~.!:3~~~1t I ~U@~HB3~*~~ I ~t~~/EQ,~, ~7..kSf I

J1~~~'1z I ~r~N~ I rm~i~'$' I ~ttiVJ{g,~&,~~f413Z~~~JT~m1'Ft±:l~~iQi¥iA. =EVJ.~f1zcp~f4~~%1*.~&,If~

~H~?tr:tlhPt?tr-t:E:~~ I ~~~ « {g,~&,~~~1~» 83VJ.tu~m~~@-tJJf[;fiJ~ftJ: I f.Rt.&ttiVJ~p:;J9H*.~&,~~~*~

;~of413Z~~~JT~m.

« {g,~&,~~~t~» ~~~)Jfi~JTB3rni~fD),t(~BB3~*~UE I ~)JH@{g,~&,~~f413Z~ff~fD~~~~i'SJ~~~f4~

ma3~~~1t~*~i~SJZB I PX~~~~*:lt~tua3-rniTIJt~.R.

~t~fiim±tB±.Lt : http://jcs.iie.ac.cn/

3 1!JD

Page 7: LAB ORA TORY OF INFORMATION SECURITY - CASsklois.iie.cas.cn/cxwh/systx/201605/P020160516539519023793.pdf · LAB ORA TORY OF INFORMATION SECURITY ~~~~*~j20151:F~~fii~::SZ:, ~fiif¥.5X~Hll!~f)(it

0 I iT~~ittl---------------------------------------0 I iT~~ittl

(20161:F4Fl11E3 :>Z:~*jJ: : ~~~1.±~)

@:t~~: ~$~~~g~~;\§S~~Ut~ "{ff!tn==~"

tt:JGUf!-~i~l2:~*~~~~1'FS~'PJ~ff~

~~z~~B~~MFJBBt~J:@: I ~~~llJJff~tE:

~iiJ1t%l!·-F~~4Fl5 E31±~~%l!~ J$S~mg.!:3~~~~ff~

cpil,\~~ I ~ll)]ff~IE1±~~f~~$15t1.J,~fD~~~

~~1'FS~§~)J83~£ I 'EJJ5~~~~~1'FS~1±~*~1'FS~

t~i**~5ccp mztBJ~83fo§§,.

-F~~iSt.: "x1t3Z*831*~~7f.MJB::k83)J~

fD:tJL~ I 1§tB~7x1-=Fr)(mf.MJ~~~*~5c83:tJL~.

pff~). I f.MJ/.t~tt**li tj=p:;]~~~~~~~±§X83t~?&:~~'

ml!±~1loiU 3 5 o1z~;:c I rm.§f.MJ1.ffi~n~ llJJff~~*~

1'FS~t~i**~5cB1@*~~x1~~~1'FS~83fo§§,{t~t±:l~ :;:!& If

IE.o

~*~~~~'FS~'PJ~ff~~t±:IB3~BJ3~FH{g,l~t. l'§j-~ I 1.±

~~~i)(~JG$$~93.~?¥fr83-:t.WDJTiiE~..t I I.PMf

~~~Pj~ff~Pj~' )ij$_t~~lli52:·~?.tltffi5t. I ~$~

~.2i~l2:~~~1'FS~'PJ~ff~B3B1tJLB~~PXAA.

~~m5t. : ~~~~fiJi~ 1

1'FS~~'PJ~~

~~11J83fr~®Jo~~tl I ff~11J§~Er±tB#Lfr1f

~. J39~ I ~ llJJff~~J~:r~~, 17t%r~ § , s~mgfoiE~

*B1 I t~f[ --ti11'FS~'PJ~ff~'PJ~ m:mt~;tt~ma3

{ft{ttJLtU. ~i;\~ I ~~'FS~tB$~*~~~)\~/j'g

mt~;tt~ma3:tJL~J. "

~$;\1:Fm~Jti~l2:7~~~'PJ~ff~ I 1§'8-m:~~~

f[~*~1'FS~JJ§~a3s~mg'PJ~ff~ I rm/G~--t~~sa3

~*~1'FS~'PJ~ff~.

1Jrni:m?.~~ 7 ~~:kittm I 1§~1.f~i~l2:~*~1'FS~

'PJ~ff~83~ncr~$~rnix1~~*~~s~. ~~~iSt.: "

~ llJJff~/.t~U~U3T~9tl2: --tiJ ll~fr-~~~1'FS~B~;\83~

±Jt ~~~g~~;\ 1fffl83I~~~~:J.J>t§~)Jif~~f[Jlff.X

~. ~r~~~g~~;\B3t~i*~*U*~5cfDx1~~~~±M83

~*IIDQ I ~ll)]ff~~)~f[{t~t±:ltt:JGU I 3X=tft~1*-'1' .:;t::. "" <'::z_ ::E.,_,_ a;,~ If

'<: .!J:l.!A!..D:t~-~7.J o

B'ftJL#:iGPXAA.

~~Jij${g,~,1'FS~ff~.:EH11J==~cr~~4'1:F2Fl1.f@J~

ia:ttt~i'6J83B111~i5t. I § m83I 1'F~J~illl*JN1±~ * ~fl:ll9tl2:§ aa3~~~~~~;\1E.

~iA.~ I ~11JJij$83~~~~~I1'F3m~1±--t~,

~~:m?.~~ittma3~frf9: I -EJJ515RtP~11J83*~5c I ±giJII~

11JB3AD3. I i&~~{IJB33Z:1t I ~~~~~~~{t~~~~:J=L

~0 II

1.±~~~!1!~ J$S~mg.!:3~~~~ff~cp'L,'t±:\Jt-F~~g~

-t:E:3&~¥83~1*~~Jij$cr~:tif\~· 5e~ltffx1~~z~

i5t. I ~llJ]ff~~--t~:kB3tJU~ I /G~/Gilll*l~~

{t~t±:li&~.

5e~ltni5t. : ~~~o~~§~n -tt~15 I '8f[,~1~~

-mn;~m:Ml I ~~~~m~fDi$JTitt±tBt~~1JrPJ. 1~/G

§~-~zi'SJ~Jt1t~t±:\~®i&~. "

ffiJJt:l'§fD~~ I ~Jt~~~1'FS~t~i*B3~t~~~fD~

{tB-®~:ktJU~~~j:~t±:l9ti)(.

~~~$~~~'PJ~ff~B3)ij$_t~~5E31.f~~~

~St. I 1l~ltfffDcp~~~~~*B3~~~~~~~D I

{§~{ffMIE1JD:ktt~JJrniB3?&:~t~A, /GlfJTJ'~~ §

aa3~~~§~n. ~~~~H±4Fl6Bt~J:@:f8\ I lli52:·~~

Wi..t~~x1~i)(~JG*$~93.~i5t. I ffi?..&~~a~~**

$~)J~ii1~-/j'~~ I {§~tE~~~S~:JJrni I~®

~~.!:3~~B~~i§1£~!J'.

~~~llJJ§B-I:E:~iiJ1t~!1!·-F~~B~~l'~i~1JDx11fftli52:fD

~;fiJfiiilUtJ:r)(ru.a~~~~s~ I ~1f~~~~~~§~)Jp;tz

~7~iu~-§;t~ I ~cr--t?¥m~Jt~-F~~IE

1.±~ ~m~~~ 'PJ~§Bf!-~~--t~rni.§~.2:sl:B~'PJ~

-{:s1~~~~'§93. 5 E3i5t. I -F~~A~~~~PJ~

§Bp;tz~--1'-~s:sl:B~'PJ~§B~f[fRt~~)(.B~. *E' 93.

1±~~~_tl~~~~~®~~1±~~~~15

rniB~.:E~1§11t'EJJ5I)($~~*liB~~~~mtHi~:fitB~).

J>t~~~~~PJ§~lf~~:l:ij\-®~~~fD{I~j&~~rm/1'

{)({)(~l~i~§Xfj];iE~~. liM~ I {tB~iSt. I )\{fJ~*

~t§.'N~Yiffi~.§JQfD~ {tB~.§~QPJ§~lf~fffl ~~~{'!=~

lEG~ ~";fljffl~~~I)(m~~~~fD~{tB~~i§p;IZaf~'vr'.

J3~~$~JT1lll5tt~~tl 4 Fl 5 E3t~J:@:$ 1 ~~J~

$..t~~lli52: · ~~Wr 5 E31.f--t~i.)(~JG!J,~.§~i.)(_t

tE~i.)(~%$$~93.~B~DJTiiE~..t I ~{:sl~~~PJ

~§B'PJ~$ ~~~~1*ffB~A( E8 13 3Z:~~{f~!J,~.§,

68 3Z:~~~{5R}p1j\~.§, 27 3Z:1'FS~{*Ij\~.§fD 25 3Z:{;I:!;

~~~J,~.§;t~p;tz) ~~1.± 2018 iF 9 Fl 30 E3W9tp;tz:J:H~

~{:s1J~$..t~~~~ : "~D4-f[ili 100 3Z:1j\~.§IE

ruttlr~~~frEJJ." 1?U~o I ~~~'PJ~ffB~I*~~3Z:t~~~

~~~~~1**~a3~~~Hr~~;±~no I ~f[r-JzH

x1i&WHDfb.A ~:!l!±§X § t~B~~~~~~frEJJ.

1m~f8\ I ~~frEJJ~;fiJffl~~~W:m?.~Di.Rr:t)(fD

0~-1'-)\{~,~I #J\{~~~~Il)]§B~~~ I f.A.~*~~

i¥§B07f~~~iU~tU~~~~~~llii~:fitBB~~~~.

§B. 1.fi~ffil1'1-~~~~~Pj~§BB~I{'F~J~B1 I ~~ltfi

~U?¥7 {5RB~ llJJ§B~~~, ~~~*~j:~{;!:!;•t~t~~m~

~i&H1cr8~~~~1*ffBil. ~{:s1J~$..t~~i5t. : "ft{fJ

~?..&~~~~~~FH{5Rft{fJ B~~~~llJJ~PI {'Fii§~Jt~. "

{tBiSt. I ~= /j'~,~~ft~~~i'6J~E3fra:1JD1.SUB~B1{1~ I

~'*~~t~1;1:!;~rnia~·t~t~ I ~~~*~fo1'FS~t~m'Bt~1;1:!;

~~.

Page 8: LAB ORA TORY OF INFORMATION SECURITY - CASsklois.iie.cas.cn/cxwh/systx/201605/P020160516539519023793.pdf · LAB ORA TORY OF INFORMATION SECURITY ~~~~*~j20151:F~~fii~::SZ:, ~fiif¥.5X~Hll!~f)(it

0 I iT~~ittl

( 2016tj=03Fl18E3 :>Z:~*jJ: : cp~15R.Wtt~) 2015 I 11~~cp~fg,l~t~~W/GSfJ'LB3-1:Fo ~-tj= I ~JT~~~~j!~MB I ~3l<9ti~~~~.!:3{g}~t~~{5R~l

17.1-\.* ; HUJ!fi~IE~CtL)IEit~ I BJ3~FH7~~~~&~t~;!:l;~Mifr~~~~~~w.>Z~ I 1lD:kX1f*J~t~~~~8W83HUron

!l ; ~i:t;J32~~f1z~l'iiJ~~ «cr~:9:~*~tw~~~7~f*,l~tt&:Rfo~mEH~~~{J» I ~mm~~7~7~f*,l~ta3m~&, ~

'@fD~11J ; ~~~~~~i'§J~~~~ ft-~~-~~f4 I PX~{g,l~\t~~~f4~~±§X~f[~f~~*~.>ZB3:k$o

.!:3lttl'iiJB1 I ~11JtB:~Gmi*~mgie~~11J~iiT, -=Ff9:~~~a3~HJ~f*,l~t~~$1tJ:o 9*1Fm I ~11Jtmw,~

i~ 1 tB~~JT-tj=j:~~J~-0

f'F~cr~~:ka3~*U~Zz- I tJLlli~±~MU8~fB7~7~ I ~

it2300JJfflpfg,l~t~~~~D I ~cr·EJJ5fflP~, 71oom~f@, no.w

€83-W~!?!~o tJLll1Jrni@JilllfB\ I t3Z*ff~nsm:rtJ~A~~ I ~~~..t

;mf~83~20B1:F7tltR83~~~~~ I ff:sjiJ.l ~~;tmlfifff[fflP-W~!?!±~

~~~J\no.wa3~1=BJ3:>Z:*~~~!?J I ~..t;mea3f*,l~t#:~G§~~m.w~!?J, ~

:!N~l£-13- I #9ti)(.W~!?Ji~'@t~mi~B3fflP~I~fl-~ll 0

.... BMiiE.S.Iiiii~JIIF"I!t.dltl'lftle.lo<.lil!l;._, f!:!EIM-f'-l"'iii '-'1JlT!Iii'1A7ti!I.Mflfil'liE:mft!:Aitii&.MJ ... ~1&-flllll..-j!:f'J , -~lllG23..,...JttPII:UM, JHi:trlW8uctttft , C.C4Uflit.-\l:'t:l. .. ;/t;.. 1 . 'f'lWtt•- :ili.,&ln.JIIIJ'>:

_,... ________ . ·---·- · . ,__,_..,...,.._,~ .. ~ .. .. -·- --- ~·----, ... , .. ,_

l1l ~'f. ~ ~:!5- 2:=~= -::::E:::?::f:ij~:OO __ itho~com::; :..;.:: , ·.::== -:-,.:::_, ... ;;~'::-

~~=~~~~~~~.~~~*' ~~MM~mP••&a**~~~~. ~~~-~*~~&-·#

~~~~*ft"~~"PC~o ~~~-~*~mP~~~Ah~. ~~~M~, M~.+~~#~~~~~.

~~&·~~~~~~·~p~~~±JA.~o

¥:9:~*~~~SJZB~11J83t~15-lffi~ I t~r, t~az~, ~s, 11J

TmD~ iit.ljj)@Ji5 I ~).];t)] ~' BBII!I, --F$%lL ~*~' x§Jt i~i E3 ~

~liiffii@Ji5~~tiff1±~tB7~1~ I ~.gPJ~tJ~INmw.gn~fg,~, I ~cr-E1

t5~i~, ~{B-iiE-\3-, .:f-tJL-13-, .@i'SJ-13-, 3T ( ~) .@B1i'SJ, ~JI!ii±.tt

f*m--F€411z, f*m--F~.ttalt~, m~f@~o

,fUf: .W-%-~~i!ii~i1~m:t£Jf~)~, .riA-~lk~~~t•a. PJat~~~:~'d~ir.f.:t.¥.Jfa9~i~, *a.W-%-1±-M.l.. ~1£~1tifi], 11t?i iT .f-1t,&o 1±-~;J(-~~A1H9~@i;b±, &i* *r ~*~~ m Pl!ii~@i;b~M~ . .+~JLAppiJ ,%, ~~~i~JtWt m P P.~-th~±JA E :t;iY..~;fJ-0

)I~~~~JT~11JIDDfB\ I .:t§~~~~B3)ij~~f!n~IB3~~

i~~ff:f[F~~~~.~~t I ff~Bi~~s*~±M9~ IP ±ta±m~J I ~*~±tall:

l'l.Pi!Hr~rni7~~ I Hm~~no~o ~mJ§ I ;ij~~f!n~~F"BJ3 I fB\ltt$ ~~~ff~BmP*~&m~-W~!?J I *m~~o~®~t±:IIm~~7~7~o ~

MIXB31'§JB1 I )ij~~f!n9ti)(B~~:gt6J§~~~I)($83fflP I ~~'§~:eX~*

.*~'PJ~INi~~~ftJ:f~(i;ittfrfl~~

~~:~~~±~~. ~~·tt~, ~~·~£, ~~~tt~, ~£,~~.~~~~~~A+,~~·

kfR~Ft}~Ft1~1t ,&;i!tJla9 PC~ o

5 Flll a 21,~tr:~ I ~~TI}rf7i~*, ~fg, f[@:TI:~ic~~~~~~~).J>tW1xjV:~t±:II!n~~~crl'f1T83·t~/5C I

tE:B1i'SJru1!11P~~MD~~ I -EJJ5 4oo EW1xj6fflp1.fi:t;J83iiT1ZfflP~iU~ofli.J I ~f[f~*fB\~~J~,g~~*-~'Fo ~

~'B:B~11J015fB\ ~~~~:r:~~~t±:II!n~* I ~~ff~B~~~~s1ruJm:~ I 13Z*A.~B1.fi~1~~cr~~ 0 m:i~~a 2 ~~~I :kff~Br-~::t1:*~*0 ~~~~Jt~fil~ I *'J\:krnif.RE:tJL I ~~W1xj6r-~~~a3mm~~71H~~~Jt!m

i11500 7JJT,o

~~=-·Mi~~~-~~~~~. ~~~~~~~~~Mi?~-·&~iliAo*4h0#~*4~

~~~o~~#~~~-·&h0#~~~~~*~ft~~~~. ~~OO~M~~~~£~11~~~~~~£

.M-~, ~>'t -f f9U;5" o

~9~¥~~~~~~Pjif-j5- I ~*-*~3tt¥1±~$~~j~j~ I ~.gR ~D

@:fflP.:f-tJL-13-~!?J I ~~~*3{g8315It I {ffflp~iJU~~l'$X-/j'~~tU

~~iH7.1-\:>Z:ftJ: I ~JtPJ~iVJr)(mo ~f[~~ I ~.gPJ~).1.ffflPiG~:~Gn:rt:eX:~GI~

i~*31*83·t~/5Cl' Af~-=FtJL I ~3llitEfflP~iU~~*3{gfW~~~~~~~ I f$/G _ _ ___ ____. ~o~:~G:m±tB ~~~~~ t~-=F;tJL I ~i*rm@f~WIN:>Z:ftJ:, ~l&~m~JJ¥~INmP~

fD.W~!?!~fg,~,o ~~I ~~~~~~'PJB~~7~1~fot<~Tf~(i;t~;!:l;~i:t~~'PJ I m:rmt~;!:l;~~-=F;tJL~r-r-jtijo

~~: ~~~·Jt~~~A*~*~ff~~~~~+~. ~+A~~~±~~-ko ~~#~~~a*A

*~~~~~.*~-~~~~~~·$~. ~±~~.+~r~, mP~APJ~~o

Page 9: LAB ORA TORY OF INFORMATION SECURITY - CASsklois.iie.cas.cn/cxwh/systx/201605/P020160516539519023793.pdf · LAB ORA TORY OF INFORMATION SECURITY ~~~~*~j20151:F~~fii~::SZ:, ~fiif¥.5X~Hll!~f)(it

0 I iT~~ittl

~~:g:~;u~mz~.cr{":t~15-llfr~ , 7f~~1fm~l=3¥~ 'B15~@:83I~H~mzmf~(i;B1 , ~tmA~f[

mam~~~~earew,#mfi@~~~o~~~~~~fi. ~•m~. ~~~~~.Imme~

~~§=App~--~~~~~mPm~-£0 *~~~~~•~a"~~tt"~m~•&M~*'

fflPPJ~)Jm~fH&#.&*. ~i&.Wii!?J&B1t~~7~7~o

,?.. if: lt.Jl.:f )K;;;. 01 ;ZJ:.J!i :k_jJ\!Ata9App*~lHt, #J~A.r!J ~Jtii Til m~~~~±•~~~. ~a~~r. h~~~~#J~, ~mP~~. ~~

i~ftt~**A T~*-w/PJJa9+~Jt.JLJJ+~4J:1t-fT-1~f:.:fJKil m ~ Jft\a9App. JJ:t 5rf-, ii.fk.#J~xtApp I e I D-\l:..~i!A;iYJ-1}, !!Ht, ;;£-ix..m P 7tl! i C I oudx.ilYllfr

-iiE, vY.J~1*c+~JG1t.&~±.

f[fflPfB\,~a~M~~@~~HP~~~75~*~HP,

ill#*l&~ff~%~~-~~15-~ffiSo~M~~@fB\~~~~

HPfflf[~~AffiSM.MB~m~mP~-~-~~AHP.W

ii!?J. ~17fiiE. UHr-F~{g,~&,o ~D~~l£P*~~~~?&:~t~~ ,~11~Jlff

'€11'F8315R~~~'PJC~ PJ~€H1100 lJJT,o

~~: ~#~~£R~~~~~~-~ff*~~-£~~. ~JKmP~~~Prili~$~*~~P, il*­~~·~~#~$-~~.~~~~~*ffM~~~ .• TM, 0~~~~~mP~Pr~lt.~~~P, ~~ ~~1t m P ~1':1- ~~51-l.b~+t"»l ~1'"-*X.~l ~.

~.g;f1Jffl$im'~~~'PJB3.*~5c7~7~ ,A{~~~&~~~~~~ 3 E~~A

{g,~&.mfr~I=J!~~o §m A'F~AD3.B*~iffi~ ,'§15~· ,~8WMR~A~tt

¥~~~mz~B·~~~~$im~~.*m~~€~~0~~-~~~B,~

I.P;l 13 ~f[*$im'~~B3{g,~&.~~7~7~t~15- ,)~&.*~ft~~D~.~&~~§

~- ~W€B. ~~~~B:{g~~~15rni ,~cp 9 17ft~15-83fB~~~~ "~~~~ 0

,?.,if: ~f:i-k-1i'l*f-A..1t.&~h~1t-i'F~. r«J~t~t};a9191~1th. :ili:Jl:JJ, OO~FV!-1!1']1J,e_,y,t «·t;Jc:i!$-17'] UiE

~~~~))~~~~~~~.$~~~. ~:i!~±ilJt~~~-·~£~£, ~1*cmP~~~±. ~~A*

~~~ ~~m? 1§ ,&;'t!tJl, ~Jt-t~. -!- 3d9-f-~ IJLHt, ·t;Jc:i!~ ±il * ~i!p *Jfx_~f-~&_.Jlr~ • .i!JR.J:.:id:JJ\!.~ a9, * 17] JL vY. J:.5 7] JL vY. r -PJ .fk. 0

~~~~ffl.Wii!?Jlfi~.!:3~ff~~ (Intern ati on a I Conference on the Theory and Practice

of Public-Key Cryptography, f§Jf$ PKC) ~

~~.ww~~~@~mu~*~~~-~-~*

b-~~~~B~~~-~m15~~-~M~~

~fD~:k~~ ,!j[f[t.&~B3~*F"~o~ 19 lEE~ ~~~ffl.Wii!?J!fi~.!:3~ff~~i.)( (PKC 2016) ~

2o16 1:F 3 FJ 6 a -9 aacr~B)$?¥b ,:k~~

l&iH~Wi 142 ~ ,~ffli~:>Z: 34 ~ ~~~$~

24%0 {g,l~t~~~~~~~~~~:¥:~1f=Fj~~ff~D3.. x~

~~~ff~D3.&'€11'F~~~*· 5*5I. mltffBJ3iG~B3~ff ~~~((Non-Malleable Functions and

2016 iF 3 Fl 19 E3 ~ 3 Fl 25 E3 ~~~~:¥:*

*~~M~D3..~~m~M~D3.ffi*~~~±~

~~~ ~ 7.&: )l:® ~ 1JD 7 ~ = +- Fs3 ~ ~~~~iBHX f!:J: 1JD.W ~i.)(( International Conference on Fast

Software Encryption, FSE 2016 )o FSE ~~

~~.Wii!?J~~ IACR )B3TI}UW.~*~i.)(2- ,~71

Applications>H~*IEE~i.)(~ffl (SKLOIS ~~ -jG~~{lz )o

mwm#~~remw~~-~.!:3~~0~~

M~I~&~7~PJ~m~B~-~~mwm

#~~-~7~PJ~m~am~~~B2~~

a~~~**~m~7~PJ~m~aamm*

mm~$~~~~~mzmo~~I~~~•~7

Boldyreva ~ (Asiacrypt 2009) fD Kiltz ~

(Eurocrypt 2010) f:~~B3im~~~B3~3TI6J ~ ,tBt.&:kMi&m7 Baecher ~ (CT -RSA

2008) fD Qin ~ (PKC 2015) B3tEl*~~o

~~~~fB\.WWa$1J~~~*~M~~:>Z:,cp

~~-m~~CCF~~~~~~jj~~B~

~i.)(o*'J\~i.)( ,~f[ 6 ~*~cr~83i~:>Z:*~m l& ~~~ FSE J3J5e~cp~§/)\~~!'§J-tj=jl~~

~:sz:•~~~~om•~~~~~~~~:¥:f[~~

i~:>Z:*~m~& ,~cr ~-~11zim~ ,'€11'Fi~:>Z:im~ 0

Page 10: LAB ORA TORY OF INFORMATION SECURITY - CASsklois.iie.cas.cn/cxwh/systx/201605/P020160516539519023793.pdf · LAB ORA TORY OF INFORMATION SECURITY ~~~~*~j20151:F~~fii~::SZ:, ~fiif¥.5X~Hll!~f)(it

**~~M~~ffi~~~M~~e~~I

1'1= "On the Construction of Light­

weight Circulant Involutory MDS ma-

trices" E±l**s!¥dt~7:k~t~15-. I.P;lf[MDS

m~~~~m•~~-~~~~~.~~~~

~~~~M~.@~W~~7-®f[~~@ffl

1fl'1i83t~~ I ~D~I~Et&M DS~8~$. ~{IJ~

T~F~~~-t~~M DS~8~$. ;fljffl*~~J! I §

/)\~t±:\74~MI~Et&MDS~8~$83t~~ I #.§

~~I.PJ1t1fl't~zm834~fr§ &M DS~8~$if~!J'.

~frMDS~8~$~I.PJJlff$~B.IG~83l'W I #~t±:\7

itiUl'W83 MD S~8~$83t~~.

"Related-key almost universal hash

function: Definitions, Constructions and

~&t±:l7~~~~~am*mm~~r:•~ ..

tfLu~lHi·~~" 83~JT~)(. : RKA-AUfDRKA-AXU

~~I #.§~t±:\7~~~~~83~1*~~t~~RH1

, RH2fDRH3~~J>t~aMACfDTBC83@ffl.

:k~MM~±~,~~~ftm,~~~-±~

83I1'F "MILP-Based Automatic Search

Algorithms for Differential and Linear

Trails for Speck" E811~Jl.{t~7:k~t~15-. i~:>Z:

~~B7~D1iJJ;fiJfflJ~e~~~!iJ:!GUt3Z*x1ARX~t~

~mwa$mfi§~~~BB~.#~~~~

~~~~~i~H83--t~~~ARXeu!?JaJ!

SPECKmfr7BtJT. ~J§~~A~.!:3tEl*~~

i1i~7~D1iJJ;fiJfflJ~e~~~m:JGU13Z*x1-~f[~&

~~mmfiam.~~m-~~m§~~mw

BtJT83ffi!E.

~~~~){IJ~~j1J~ff~~.!:3~JT1JDJ&~J.¥WI

:k~)Jct~Bjjf~±-8"1'F83I1'F "Lightweight

M DS Generalized Circulant Matrices" EB

)Jct$B)j{t~7:k~t~15-. i~:>Z:~ff~7~~~~~~

MDS~8~$ I ~U~7~1~MDS~8~$83·~~J>t~~

~~~~t±:l7M~c~m~~mm.~~7~

~/G/mi1883C17t~~~~~~M DS~8~$ I ~tB

~a~H:sz:~~-m~~~-~~8~~~~-~

MDS~8~$.

~)(:lt~i'SJ I ~~~.!:3*§~±tB83~ff~~~Jtm

rn--~+nhL "-*~ t:::-'~~±t/.-7 r-~...---'-~:t;; -+-<;:..>..L 8 ..g 'U=:J~/Z\J:l~JJ'I71--=l~~~I.IZI1'"T J t-<0CIJI~ r ~P<37o

20161:F3Fl27 a -4Fl2 a . @{g,l~t~~~~ B*~r)(m83J.J:Hm831JJ!. ~B~w~~9:1~imi1x1z

~~~~~~-.~~mm~~*~~~•ftm m-m~~~~~m.m~7ma~~m~a*

*~~~mfi~~m~~. ~~~~~~~~•.

*iJ] :It~ i'SJ I ~ B~ w~~9:1~1'F7 ~~ «security ltt9~ I ~ B~W~~9:1~aiJJ i'6J :It~ i'SJ.!:3~~~~f4~ff

Innovations in the Big-Data Era)) 83~*1~ A~~)t~~~HD.*~ft~~, 7i~~~~ff~1JrP:Jm

15-.*15-~ffl7-~~~~@m~#mfi~~e fi7~M.#~~1Jm-~~wme~mfi7

arew~ru~15$.~J>t~~a~~~~~-~ ~A~~.

~~~~~Jf~PX~*&:I~~&~~iJ\~i)( IEEE S&P (Oakland) 2016 ~ffl

"Following Devil' s Footprints: Cross

Platform Analysis of Potentially Harmful ~~§/)\J'~t±:li~SfB83ea1tii!?JB~~1t~)JiW15

Libraries on Android and iOS"*~{g,~,~~ J! .a§H~SfB1tii!?JruJ!~Ul'f1T~~ea83·t~/5C

~~±.9XT~~~i)( IEEE Symposium on Security r:mfrea1tiiM3t~)JiW .#~}_H1~833¥~'§15

& Privacy( IEEE S&P )2016 ~ffl. *I~~ff~~ ffi:I:.W~{91J .~~~..t§IJ\iG~*ffi:I:.W:k~!iJt~ea

.!:3EPm~~~:k~~I'§JiG~. IEEE S&P ~ ~ ~tt 1-tii!?Jt~)Jilt ~{7.1-\±tB ,;fiJfflt~)JiliJ~ *tX1!:J:fD i OS

am~~ccFm~~~~.!:3ma~~~~~A ~#~l'iiJ•earew~~~.~~*earew

~~*~iS( .~i)(~UVJ.r 1980 iF .~~~~1.}._~83 i~SfEl'±tBB~~1iU3¥~$X1!:J:~mfrea1tii!?J83t~

ma~~~~-~~~*~~~~a~*w~ ru.~~~~i1~~ms~~~*earew.~

~I~W .t~f[t.&:k83~oloJ)J. t:!G#~:m?.~i~SfB~~HiE .imi1~~~®~~HiEmfr

B~~;J .~:m?. iOS SfEl'~f[*~~HiE83f~(i; .#m

-~§~~~/G~~m$m7Aill~~~. fifi~~~~-~.~ill§~~3¥~iOS'§15

1§~tJLW9~, eatx1tJ:~Im~~*~1Mfii .~~§~ rtJ:t.wfo s -tm -15$x1tJ:rtJ:t.w@m$x1tJ:mfr:k~m

~~liiffifflp-;j;"*7t.&:k830Sitft.:7t~~HI~SfB~ t~83BtJT ,/mi115 E-1'-3¥~ iOS $X1!:J:*~~-

83ea$x1!:J:t~)Jil1Ji'6J~+B0S!Xi .~03¥~ iOS SfEl'. t~)Jilt

Page 11: LAB ORA TORY OF INFORMATION SECURITY - CASsklois.iie.cas.cn/cxwh/systx/201605/P020160516539519023793.pdf · LAB ORA TORY OF INFORMATION SECURITY ~~~~*~j20151:F~~fii~::SZ:, ~fiif¥.5X~Hll!~f)(it

()l5t~~·~1~1 ---------------------------------------------------------------------------------------------

(Department of Electrical Engineering & Computer Science) Fengjun LiW:l!f~~1~Jii~ I~

~~:¥:;t,U~~~ff~D3.~~~i!Hr~*~)~. ;fif\Il~~ff~D3..!:3Fe n gj u n Lit®±tt~~J$9~-EJ,~&~~~,

B~~Bm~m~~~~~~oos~e~m~~~m~~~~~~~-~7~~~e~*~·

ltt/~iJJI'6J I :tif\Il~~ff~D3..!:3Fengjun Lit®±.:E~ttx1mJ=~1t.Wii!?J~~~iitiH~MB, Zi~~~~t¥

M,B~~ffiS~-~e~M~Hm7~A~M~. m%~tt~~~mm~~~~.WW~*@ffl~~

~i1i~t~t±:l7~~JT83~~5c~:t~ I ~~~~83~~·~fo~m·~; ~~~I ttx17it¥ii~~&~cr83iJJ"i'6J~tu~

~~~~B~7~~~-~~~~-~7-mfflPSUffi~fi~$~7it¥M~~~~m~;C€~~

M~71±~~7icr~m•~•~~~'E1m~~~•ttm•~ffi~=~· ~~m~~B~~~:¥:~m~

973iJ~83~~~.EJ.~ I €~~~~itt-t~:7J=tmim~~•fo@:ru~~5c I ~:m?.~~t!!w-;~a3~ff~~~.

ltt9~ I x)(~~~Jtcr~a3tw±~H~~±g~, f4~ff~~, i~~~~~i'6J~ittfr7~i~.

201Stj=12Fl-2016tj=2FJ I ~-~ff~:¥:?¥

b7"~~WM~~".:E~~~*-·*B~"

~~WM~~"~.:E~~~~WM~~cp~~~

~al3~*~m~1±W~m~,~~~~•~,

E3 ~I 1'F~)~~~OOB3JXL*=. *~*·~~~~I, ~~-~~~~ili

J\ +1tt= I 'E1J=~imHL i~~, .:r-;;2L ~*, m~~ ~fl:ll~ru. ~cr I $:==@:~U1'F~t*~iD «~~»

~~7WMI~~-~~-I~~R~~*~*

~~~M";T&Bm~~«~~WM~~»m

~7Iffi~b~~~~~~7~WM~~~~~;

==~m~~~«~m~~-~»m~7~~~~,

~i¥iA83~•*~" ; «1~$1®~ *» , «ltiSt.ftr ~~D~D , ((~.q~:&i!lB)) , ((~LlJ§~)) ,

(( !:ft&€ii~B31J'~)) ~1'F~J-J._~-tt:§Jl~I.PJ 7 $m~~~WM~~~m~7WMI~~~~­

~,mm~~~M"JXLm.*BW~t±:l~tt~

30{tj: I {jt~~~T I *B1'F~~ «~-~ff~:¥:

"~~WM~~".:E~*·~~m»BW~~$

B~~~~BtE~-M~:¥:-~~~~~~~m

t±:l~$Bimm~~~1.f~-~«ma~~~~~

I~~~~:¥: ij Hl.)) cp flj t±:l 0

~~~~7W~I~~~-ft~i¥iAM"~

•~7r*W~I~~~~~~•m~~~~~

~M$m7~~~~,mitt7~~~~•~.

Page 12: LAB ORA TORY OF INFORMATION SECURITY - CASsklois.iie.cas.cn/cxwh/systx/201605/P020160516539519023793.pdf · LAB ORA TORY OF INFORMATION SECURITY ~~~~*~j20151:F~~fii~::SZ:, ~fiif¥.5X~Hll!~f)(it

0 I ~1-t.1t.~~ I------------------------------------

20161:F3Fl27B I ~nBJ3Ml I ~~~:¥:~RI~1lo7?tri~?¥VJ-83 ~~~iVlPX~Jt1~~ I ~~1~zviE"

~iVJ. ~iVJ~~~~~~~~~?¥VJ~*~~iVJ~"~-I~--~~-~~~--~~~~~-~ ~).±~5$~RI 17.1-\~ I ~~t~RIIt~1*~ § 83 I ~~~:¥:li;\ +~I~~D3.J>t~~~1JD7)~iVJ.

20161:F4Fl9 ar:!:f I cr ~f4~~JH~~tw~~-fr+~11zm~~, m~~H~*iJJ"7~~~:¥:. ~ ~:¥:I~AD3.~*~~-fi~ffl7~~:¥:~•*•~~#am:¥:~ffl7~~:¥:~n~re~ttM~PX

~.m~~H~ill~m~~M~PX~~~7m*~*~· 5€~*~AD3.~~7~~:¥:~VJ.~~~~

ili~~mMm•~7~~:¥:~I~•~. m~~H~ill~~m•~~~r:7~m•cr~~~:¥:.

C€~crW~m~~~-fil>t~~:¥:m~~H~-~~cpW~M-ffi*M.~7·~~~~iVJ

R~m~~~*M~iVJ~-$B~~Hm~~~-~~-*~€-~iVJ.

Page 13: LAB ORA TORY OF INFORMATION SECURITY - CASsklois.iie.cas.cn/cxwh/systx/201605/P020160516539519023793.pdf · LAB ORA TORY OF INFORMATION SECURITY ~~~~*~j20151:F~~fii~::SZ:, ~fiif¥.5X~Hll!~f)(it

0 I ~ 1-t.1t.~~ I ----------------------1

~tiitt~~~:~lH4~ffi1'F I §@)-i<~BB3~*ffill I 1JD5$~~~:¥::>Z:1t9ti~ I ~r-:k~RI, ~~f~

m-~m~~§~~~•B~a~~:¥:~®~m®m:k~~~~~a~~~I, ~~~mm~e

fD~.!:3~ I «1*J~t~~~~~~~~~~:¥:imHlJ r20lS1:F11FliEitfD:k~mrni7 0 I.PJ~~~:¥:rnirP:J

~~~I,~~hl•~~~m•~~:

hlM~3=.!:3~~:¥:9t~ffi*~m~~~:¥:~I,~~M*C~~~~:¥:~~,WMittm,

~~.!:3e~,~W, :>Z:~~~~) ;~~~~ili~fift~ffi, W~:>Z:B, ~*M~~~, ~MM~

1~~, g~~:>Z:B~tEl*M1tJ:t~PJ o M1tJ:~3J({g,i~t~~, PJ~ ; ~:>Z:#~ ; -~/G/mi11000-*o t~Mi~~~mB1tJ:[email protected] I ffiB1tJ:.:E~i~)1BJ3 ~~~~~:¥:imHlJ~M" 0 *~iEM}g$

~tj=f[~'1zo

m:k~~~~•~•@~~•~$ft~~m~~~~~~~•.!:3m~a~~:¥:WM, ~~~

~iE~crm~~~rm;~~Ji83JEEP '

20 161:F1Fl