Full Publications
* denotes the corresponding author.
You can also find my papers on my Google Scholar profile or DBLP.
- Xiangxin Guo, Shijie Jia*, Jingqiang Lin, Yuan Ma, Fangyu Zheng, Guangzheng Li, Bowen Xu, Yueqiang Cheng, Kailiang Ji. CryptoPyt: Unraveling Python Cryptographic APIs Misuse With Precise Static Taint Analysis. 2024 Annual Computer Security Applications Conference (ACSAC 2024), Waikiki, Hawaii, USA: December 9-13,2024. (Accepted To appear)
- Yuexi Zhang, Bingyu Li, Jingqiang Lin, Linghui Li, Jiaju Bai, Shijie Jia, Qianhong Wu. Gopher: High-Precision and Deep-Dive Detection of Cryptographic API Misuse in the Go Ecosystem. 2024 ACM Conference on Computer and Communications Security (ACM CCS 2024), Salt Lake City, USA: October 14-18. (Accepted To appear)
- Xi Luo, Honghui Fan, Lihua Yin, Shijie Jia, Kaiyan Zhao, and Hongyu Yang. CAG-Malconv A character-level malware detection method with CBAM and Attention-GRU. IEEE Transactions on Network and Service Management. PDF
- Xiangxin Guo, Jingqiang Lin, Shijie Jia, Guangzheng Li. Security Analysis of Cryptographic Application Code Generated by Large Language Models. Netinfo Security,2024.PDF 郭祥鑫,林璟锵,贾世杰,李光正. 针对大语言模型生成的密码应用代码安全性分析,信息网络安全, 2024.
- Mingyu Wang, Lingjia Meng, Fangyu Zheng, Jingqiang Lin, Shijie Jia, Yuan Ma, Haoling Fan. TLTracer: Dynamically Detecting Cache Side Channel Attacks with a Timing Loop Tracer. IEEE 2024 IEEE International Conference on Communications (ICC 2024) . PDF
- Mingyu Wang, Shijie Jia*, Fangyu Zheng, Yuan Ma, Jingqiang Lin, Lingjia Meng, Ziqiang Ma. TF-Timer: Mitigating Cache Side-Channel Attacks in Cloud through a Targeted Fuzzy Timer. The 2024 IEEE Wireless Communications and Networking Conference (WCNC 2024) . PDF
- Yuan Ma, Weisong Gu, Tianyu Chen, Na Lv, Dongchi Han, Shijie Jia. Enhancing Prediction Entropy Estimation of RNG for On-the-Fly Test. The 26th Annual International Conferenceon Information Security and Cryptology (ICISC 2023). PDF
- Biao Gao, Shijie Jia*, Jiankuo Dong, Peixin Ren. XPORAM: A Practical Multi-Client ORAM against Malicious Adversaries. The 19th International Conference on Information Security and Cryptology (Inscrypt 2023). PDF
- Tianyu Chen, Shijie Jia*, Yuan Ma, Yuan Cao, Na Lv, Wei Wang, Jing Yang and Jingqiang Lin. A Design of High-Efficiency Coherent Sampling based TRNG with on-chip Entropy Assurance. IEEE Transactions on Circuits and Systems I: Regular Papers. PDF
- Haoling Fan, Fangyu Zheng, Jingqiang Lin, Lingjia Meng, Mingyu Wang, Qiang Wang, Shijie Jia, Yuan Ma. Hydamc: A Hybrid Detection Approach for Misuse of Cryptographic Algorithms in Closed-Source Software, The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2023), 2023.PDF
- Biao Gao, Shijie Jia*, Peng Yin, Xueying Zhang. Protection of Access Pattern. The 7th International Conference on Computer Science and Artificial Intelligence (CSAI 2023). PDF
- Bowen Xu, Zhijintong Zhang, Aozhuo Sun, Juanjuan Guo, Zihan Wang, Bingyu Li, Jiankuo Dong, Shijie Jia, Li Song. T-FIM: Transparency in Federated Identity Management for Decentralized Trust and Forensics Investigation. Electronics 2023, 12(17), 3591.PDF
- Bowen Xu, Shijie Jia*, Jingqiang Lin, Fangyu Zheng, Yuan Ma, Limin Liu, Xiaozhuo Gu and Li Song. JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications. The 28th European Symposium on Research in Computer Security (ESORICS 2023). PDF
- Wenqing Li, Shijie Jia*, Limin Liu, Fangyu Zheng, Yuan Ma, Jingqiang Lin. CryptoGo: Automatic Detection of Go Cryptographic API Misuses. 2022 Annual Computer Security Applications Conference (ACSAC 2022), Austin, Texas, USA, December 2022. PDF
- Li Song, Qiongxiao Wang, Shijie Jia*, Jingqiang Lin, Linli Lu, Yanduo Fu. You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise Networks. The 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022): October 2022. PDF
- ChengLi Yu, Yang Zhang, Shijie Jia*. Research on Data Security Threats and Protection of Key Technologies in Cloud Environment. Netinfo Security,2022. PDF
于成丽,张阳,贾世杰 *. 云环境中数据安全威胁与防护关键技术研究,信息网络安全, 2022, 22 (7): 55-63. - Yang Zhang, Weijing You, Shijie Jia, Limin Liu, Ziyi Li, Wenfei Qian. EnclavePoSt: A Practical Proof of Storage-time in Cloud via Intel SGX. Security and Communication Networks (SCN 2022). PDF
- Mingshu Du, Yuan Ma, Na Lv, Tianyu Chen, Shijie Jia, Fangyu Zheng. An Empirical Study on the Quality of Entropy Sources in Linux Random Number Generator. 2022 IEEE International Conference on Communications (ICC 2022): May 2022. PDF
- Li Song, Qiaoxiao Wang, Jingqiang Lin, Shijie Jia, Yingjiu Li, Yikai Chen. Approach then connect: A Physical Location-based Wi-Fi Password Dynamic Update Scheme. 2022 IEEE Wireless Communications and Networking Conference (WCNC 2022): April 2022. PDF
- WenFei Qian, Pingjian Wang, Shijie Jia, Qionglu Zhang, Tianyu Chen and Yingjiao Niu. An identity authentication scheme for high concurrency scenarios based on SM2 collaborative signature algorithm. Journal of Cyber Security:2021.
钱文飞,王平建,贾世杰,张琼露,陈天宇,牛莹姣:一种适用于高并发场景的基于SM2协作签名算法身份鉴别方案.信息安全学报(2021). PDF - Shijie Jia*, Qionglu Zhang, Luning Xia, Jiwu Jing, Peng Liu. MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer. IEEE Transactions on Dependable and Secure Computing (IEEE TDSC) vol. 19, no. 5, pp. 3494-3507, 1 Sept.-Oct. 2022 (IEEE TDSC 2022). PDF
- Jingyi Liu, Yanyan Zhao, Limin Liu, Shijie Jia. Exploring Sequential and Collaborative Contexts for Next Point-of-Interest Recommendation. The 14th International Conference on Knowledge Science, Engineering and Management (KSEM 2021): August 2021. PDF
- Xi Fang, Limin Liu, Shijie Jia, Xinyi Zhao, Yang Zhang. P-Shake: Towards Secure Authentication and Communication between Mobile Devices. 2021 IEEE Wireless Communications and Networking Conference (WCNC 2021): March 2021. PDF
- Jiawei Wan, Shijie Jia*, Limin Liu, Yang Zhang. Supporting Efficient Dynamic Update in Public Integrity Verification of Cloud Data. The 39th IEEE International Performance Computing and Communications Conference (IPCCC 2020): November 2020. PDF
- Yingjiao Niu, Lingguang Lei, Yuewu Wang, Jiang Chang, Shijie Jia, Chunjing Kou. SASAK: Shrinking the Attack Surface for Android Kernel with Stricter “seccomp” Restrictions. The 16th International Conference on Mobility, Sensing and Networking (MSN 2020): December 2020. PDF
- Yingjiao Niu, Yuewu Wang, Shijie Jia, Quan Zhou, Lingguang Lei, Qionglu Zhang, and Xinyi Zhao. Enhancing the Security of Mobile Device Management with Seccomp. The 6th Annual International Conference on Network and Information Systems for Computers(ICNISC 2020): August 2020. PDF
- Yang Zhang, Dongzheng Jia, Shijie Jia*, Limin Liu, Jingqiang Lin. Splitter: An Efficient Scheme to Determine the Geolocation of Cloud Data Publicly. The 29th International Conference on Computer Communications and Networks (ICCCN 2020): August 2020. PDF
- Dongzheng Jia, Yang Zhang, Shijie Jia*, Limin Liu, Jingqiang Lin. DPV-Geo: Delay-based Public Verification of Cloud Data Geolocation. The IEEE 25th symposium on Computers and Communications (ISCC 2020): July 2020. PDF
- Qionglu Zhang, Shijie Jia*, Junlin He, Xinyi Zhao, Luning Xia, Yingjiao Niu, Jiwu Jinig. Ensuring Data Confidentiality with a Secure XTS-AES Design in Flash Translation Layer. The IEEE 5th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA 2020): April 2020. PDF
- Biao Gao, Bo Chen, Shijie Jia*, and Luning Xia. eHIFS: An Efficient History Independent File System.The 14th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2019):July 2019. PDF
- Peiying Wang, Shijie Jia*, Bo Chen, Luning Xia and Peng Liu. MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer. The Ninth ACM Conference on Data and Application Security and Privacy (CODASPY 2019):March 2019. PDF
- Dongzheng Jia, Limin Liu, Shijie Jia, Jingqiang Lin. VoteGeo: An IoT-based Voting Approach to Verify the Geographic Location of Cloud Hosts. The 38th IEEE -International Performance Computing and Communications Conference (IPCCC 2019): October 2019. PDF
- Ming Yin, Shijie Jia*. A Technology to Prevent Ransomware Attacks Based on Solid State Drives in LAN. Netinfo Security: September 2019-09,19(9),14-19. PDF
殷明,贾世杰 *. 一种局域网中基于SSD防范勒索软件攻击的技术.信息网络安全:2019(9),14-19. - Qionglu Zhang, Shijie Jia*, Bing Chang and Bo Chen. Ensuring Data Confidentiality Via Plausibly Deniable Encryption and Secure Deletion–A Survey. CyberSecurity:5 June, 2018,1/1.PDF
- Shijie Jia, Luning Xia, Bo Chen, Peng Liu. DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer. 2017 ACM Conference on Computer and Communications Security (ACM CCS 2017), Dallas, Texas, USA: October 30 - November 03, 2017,2217-2229.(Acceptance rate: 151/836=18%) PDF
- Le Guan, Shijie Jia*, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia. Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. 2017 Annual Computer Security Applications Conference (ACSAC 2017), San Juan, Puerto Rico, USA, December 2017 (Acceptance rate: 48/244=19.7%).PDF 获会议最佳论文奖/Distinguished Paper Award, 获奖率0.8%
- Shengjun Tang, Shijie Jia*, Luning Xia. A secure data storage method of flash memory based on position shifting. Conference on Identification, Certification and Authentication, 2017, 2:68-74. PDF
汤胜军,贾世杰 *,夏鲁宁. 基于位置跳变的闪存数据安全存储方法.软件杂志.2017年第2期:68-74. - Bo Chen, Shijie Jia, Luning Xia and Peng Liu. Sanitizing Data is Not Enough! Towards Sanitizing Structural Artifacts in Flash Media. 2016 Annual Computer Security Applications Conference (ACSAC 2016), Los Angeles, California, USA, December 2016:496—507.PDF
- Guozhu Zhang, Luning Xia, Shijie Jia and Yafei Ji. “Star Drawing Operation”: A Method to Identify HF RFID Cloning Card Based on RF Fingerprinting. Journal of Cyber Security: 2016,2(2),33-47. PDF
张国柱,夏鲁宁,贾世杰,嵇亚飞.“牵星”法:一种基于射频指纹的高频RFID克隆卡检测方法.信息安全学报,2016,2(2),33-47. - Guozhu Zhang, Luning Xia, Shijie Jia and Yafei Ji. Physical-layer Identification of HF RFID Cards Based on RF Fingerprinting. International Conference on Information Security Practice and Experience (ISPEC 2016), 2016: 284-299. PDF
- Guozhu Zhang, Luning Xia, Shijie Jia and Yafei Ji. Identification of Cloned HF RFID Proximity Cards Based on RF Fingerprinting. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016): 2016,292-300. PDF
- Shuangshuang Gu, Luning Xia and Shijie Jia. A Program of Authentication and Key Protection for Hard Disk Encryption[J].Journal of Cryptologic Research: 2016, 3(2), 126-136. PDF
谷双双,夏鲁宁,贾世杰. 一种加密硬盘的身份鉴别和密钥保护方案[J]. 密码学报, 2016, 3(2): 126-136. - Shijie Jia, Luning Xia, Bo Chen and Peng Liu. NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer. The 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2016), Xian, China, May 30 - June 3, 2016 ,305-315. PDF
- Shijie Jia, Luning Xia, Zhan Wang, et al. Extracting Robust Keys from NAND Flash Physical Unclonable Functions. The 18th Information Security Conference (ISC 2015):2015,437-454. PDF
- Yafei Ji, Luning Xia, Jingqiang Lin, Jian Zhou, Guozhu Zhang, Shijie Jia. Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication. Information and Communications Security (ICICS 2015). 2015: 346-355. PDF
- Shijie Jia, Luning Xia and Nan Wen. Signature Private Key Generation Method Based on the Physical Characteristics of Nand Flash and its Application[J]. Journal of University of Chinese Academy of Sciences: 2015, 32(5), 695-700. PDF
贾世杰, 夏鲁宁, 闻楠. 基于Nand Flash物理特性的签名私钥产生方法及其应用[J]. 中国科学院大学学报, 2015, 32(5): 695-700. - Xiaolei Sun, Luning Xia, Shijie Jia. Enhancing location privacy for electric vehicles by obfuscating the linkages of charging events. The 5th International Conference on Electronics Information and Emergency Communication (ICEIEC 2015),2015: 155-158. PDF
Book
- [Book] Luning Xia, Shijie Jia, Bo Chen, Solid State Storage: Principle, architecture and data security, China Machine Press, 2017. ISBN 9787111580010
夏鲁宁,贾世杰,陈波. 固态存储:原理、架构与数据安全,机械工业出版社,2017. - [Book] Wei Huo, Qiquan Guo, Yuan Ma, Commercial cryptography application and security assessment, Publishing House of Electronics Industry, 2020. ISBN 978-7-121-35063-4
商用密码应用与安全性评估,电子工业出版社,2020.