代表性学术成果
1. Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu: A policy-centric approach to protecting OS kernel from vulnerable LKMs. Software Practice and Experience: 1269-1284, 2018. (CCF B类SCI, IF: 1.3 )
2. Donghai Tian, Xiaoqi Jia, Zhaolong Zhang, Li Zhan, Changzhen Hu, Jingfeng Xue: An online approach to defeating ROP attacks. Concurrency and Computation: Practice and Experience, accepted, 2018. (SCI, IF: 1.1)
3. Tian Donghai, Jia Xiaoqi, Chen Junhua, Hu Changzhen: A Concurrent Security Monitoring Method for Virtualization Environments. China Communications, 2016. (SCI, IF: 0.9)
4. Tian Donghai, Jia Xiaoqi, Chen Junhua, Hu Changzhen, Xue Jingfeng: A Practical Online Approach to Protecting Kernel Heap Buffers in Kernel Modules. China Communications, 2016. (SCI, IF: 0.9)
5. Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu: Defeating buffer overflow attacks via virtualization. Computers & Electrical Engineering: 1940-1950, 2014. (SCI, IF: 0.9)
6. Deguang Kong, Donghai Tian, Qiha Pan, Peng Liu, Dinghao Wu: Defeating buffer overflow attacks via virtualization. Computers & Electrical Engineering: 1940-1950, 2013. (SCI, IF: 0.4)
7. Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, Changzhen Hu: Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring. In Proceedings of the 18th Network and Distributed System Security Symposium (NDSS), 2012. (系统安全国际顶级会议)
8. Xi Xiong, Donghai Tian, Peng Liu: Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions. In Proceedings of the 18th Network and Distributed System Security Symposium (NDSS), 2011. (系统安全国际顶级会议)