- Ph.D. in cryptography, Xidian University, 1998
- M.S. in cryptography, Xidian University, 1995
- B.S. in applied mathematics, Xidian University, 1992
- "Principal of Provable Security", for PhD students, spring semester.
- "Cryptographic Algorithms and Protocols", for MS students, fall semester.
- Seminar of Crypto and Computer Security, for young teachers and graduates.
1. Jeroen DELVAUX, Roel PEETERS, Dawu GU, Ingrid VERBAUWHEDE. A
Survey on Lightweight Entity Authentication with Strong PUFs. ACM
Computing Surveys, accepted.
2. Zhiqiang Liu, Bing Sun, Qingju Wang, Kerem
Varici, Dawu Gu. Improved Zero-Correlation Linear Cryptanalysis
of Reduced-round Camellia under Weak Keys. IET Information Security , accepted.
3. Ya Liu, Anren Yang, Zhiqiang Liu, Wei Li,
Qingju Wang, Liang Song, Dawu Gu. Improved Impossible
Differential Attack on Reduced Version of Camellia with FL/FL-1 Functions. IET Information Security, accepted.
4. Shifeng Sun, Dawu Gu,
Shengli Liu. Public Key Cryptosystems Secure against Memory Leakage Attacks. IET
Information Security, accepted.
5. Shi-Feng Sun, Dawu Gu, Zhengan Huang. Fully Secure Wicked Identity-Based
Encryption against Key Leakage Attacks. The Computer Journal,
accepted.
6. Chen Lyu, Dawu Gu, Yunze Zeng, Prasant Mohapatra. PBA:
Prediction-based Authentication for Vehicle-to-Vehicle Communications. IEEE
Trans. on Dependable and Secure Computing (TDSC), accepted.
7. Fan Zhang, Shize Guo, Xinjie Zhao, Tao
Wang, Jian Yang, Francois-Xavier Standaert, Dawu Gu. A Framework
for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block
Ciphers. IEEE Trans. on Information Forensics and Security (TIFS),
accepted.
8. Wei Li, Wenwen Zhang, Dawu Gu, Yanqin Cao, Zhi Tao, Zhihong Zhou, Ya Liu, Zhiqiang
Liu. Impossible Differential Fault Analysis on the LED Lightweight
Cryptosystem in the Vehicular Ad-hoc Networks. IEEE Trans. on Dependable and
Secure Computing (TDSC), 13(1):84-92, 2016.
9. Yikun Hu, Yuanyuan Zhang, Juanru Li and Dawu
Gu. Cross-Architecture Binary Semantics Understanding via Similar Code
Comparison. 23rd IEEE International Conference on Software Analysis,
Evolution, and Reengineering (SANER 2016), Osaka, Japan, Mar 14-18,
2016.
10. Yu Yu, Dawu Gu, Xiangxue Li,
Jian Weng. (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular
One-way Functions and Beyond. CRYPTO 2015, pp.209-229,
Santa Barbara, USA, August 16-20, 2015.
11. Wen Xu, Juanru Li, Junliang Shu, Wenbo
Yang, Tianyi Xie, YuanyuanZhang, Dawu Gu. From Collision To
Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel. CCS
2015, Denver, USA, October 12-16, 2015.
12. Jeroen Delvaux, Dawu Gu,
Dries Schellekens, Ingrid Verbauwhede. Helper Data Algorithms for PUF-Based Key
Generation: Overview and Analysis. IEEE Trans. on Computer-Aided
Design of Integrated Circuits and Systems (TCAD), 34(6):889-902,
2015.
13. Yu Yu, Dawu Gu, Xiangxue Li,
Jian Weng. The Randomized Iterate Revisited - Almost Linear Seed Length PRGs
from A Broader Class of One-way Functions. TCC 2015,
pp.7-35, Warsaw, Poland, March 23-25, 2015.
14. Weijia Wang, Yu Yu, Junrong Liu, Zheng
Guo, Francois-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu.
Evaluation and Improvement of Generic-Emulating DPA Attacks. CHES 2015,
Saint Malo, France, September 13-14, 2015.
15. Hui Wang, YuanyuanZhang, Juanru Li, Hui
Liu, Wenbo Yang, Bodong Li, Dawu Gu. Vulnerability Assessment of
OAuth Implementations in Android Applications. ACSAC 2015,
Los Angeles, USA, December 7–11, 2015.
16. Wenbo Yang, YuanyuanZhang, Juanru Li,
Bodong Li, Junliang Shu, Wenju Hu, Dawu Gu. AppSpear: Bytecode
Decrypting and DEX Reassembling for Packed Android Malware. RAID 2015,
Kyoto, Japan, November 2–4, 2015.
17. Junrong Liu, Yu Yu, Francois-Xavier
Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Xinjun Xie.
Small Tweaks do Not Help: Differential Power Analysis of MILENAGE
Implementations in 3G/4G USIM Cards. ESORICS 2015, Vienna,
Austria, September 23-25, 2015.
18. Chen Lyu, Amit Pande, Xinlei Wang, Jindan
Zhu, Dawu Gu, Prasant Mohapatra. CLIP: Continuous Location
Integrity and Provenance for Mobile Phones. Proceedings of the 12th IEEE
International Conference on Mobile Ad hoc and Sensor Systems (MASS
2015). Dallas, USA, Oct 19-22, 2015.
19. Qingju Wang, Zhiqiang Liu, Deniz Toz,
Kerem Varici, and Dawu Gu. Related-Key Rectangle Cryptanalysis of
Rijndael-160 and Rijndael-192. IET Information Security,
9(5): 266-276, 2015.
20. Zhiqiang Liu, Ya Liu, Qiangju Wang, Dawu
Gu, Wei Li. MitM Fault Analysis on Word-oriented SPN Block Ciphers. Security
and Communication Networks, 8(4): 672-681, 2015.
21. Haihua Gu, Dawu Gu, Wenlu
Xie & Ray C.C.Cheung. Efficient Pairing Computation on Huff
Curves. Cryptologia, 39(3): 270-275, 2015.
22. Jeroen Delvaux, Dawu Gu, Dries
Schellekens, Ingrid Verbauwhede. Secure Lightweight Entity Authentication with
Strong PUFs: Mission Impossible? CHES 2014, Springer Berlin
Heidelberg, Busan, Korea, September 23-26, 2014.
23. Wenbo Yang, Juanru Li, Yuanyuan Zhang,
Yong Li, Junliang Shu and Dawu Gu. APKLancet: Tumor Payload Diagnosis and
Purification for Android Applications. ASIACCS 2014,
Kyoto, Japan. June 2014.
24. Hui Liu, Yuanyuan Zhang, Hui Wang, Wenbo
Yang, Juanru Li and Dawu Gu. TagDroid: Hybrid SSL Certificate Verification in
Android. ICICS2014, Hong Kong,China. December 16-17, 2014.
25. Xinjie Zhao, Shize Guo, Fan Zhang, Tao
Wang, Zhijie Shi, Dawu Gu. Algebraic Fault Analysis on GOST for Key Recovery
and Reverse Engineering. FDTC 2014, Busan, Korea,
September 23, 2014.
26. Juanru Li, Yuanyuan Zhang, Wenbo Yang, Junliang
Shu, Dawu Gu. DIAS: Automated
Online Analysis for Android Applications. 14th IEEE International Conference on
Computer and Information Technology (IEEE CIT 2014), Xi’an, 2014.9.11-2014.9.13.
27. Yong Li, Yuanyuan Zhang, Juanru Li, Dawu Gu. iCryptoTracer: Dynamic
Analysis on Misuse of Cryptographic Functions in iOS Applications. 8th
International Conference on Network and System Security (NSS 2014), Xi’an, 2014.10.15-2014.10.17.
28. Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu. Android App Protection
via Interpretation Obfuscation. 12th IEEE International Conference on
Dependable, Autonomic and Secure Computing (DASC2014), Dalian,
2014.8.24-2014.8.27.
29. 谷大武. Side Channel Attack on Crypto System of
Smart Card, 台湾第24届资讯安全会议, 台北, 2014.5.30-2014.5.31.
30. Gu Dawu, Jiang Xuxian, Xue Yibo, Zou Wei, Guo Li. PROTECTING
COMMUNICATIONS INFRASTRUCTURE AGAINSTCYBER ATTACKS. China Communications,
11(8):I-II, 2014.
31. 郁昱, 谷大武. 抗泄露可证明安全流密码研究. 密码学报, 1(2):134-145, 2014.
32. Guo Zheng, Gu Dawu, Yuan Kan, Liu Junrong, He Yuming. A Novel Method
for Power Analysis Based on Combinational Logic in Block Cipher Circuit. Chinese
Journal of Electronics, 23(1):151-156, 2014.
33. Liu Ya, Gu Dawu, Li Bailan, Qu Bo. Legitimate-reader-only attack on
MIFARE Classic. Mathematical and Computer Modelling, 58(1-2):219-226, 2013.
34. Qu Bo, Gu Dawu, Guo Zheng, Liu Junrong. Differential power analysis
of stream ciphers with LFSRs. Computers and Mathematics with
Applications, 2013, 65(9):1291-1299.
35. 谷大武. 智能卡芯片中的密码系统--攻击和防护技术概况. 第27次中国科技论坛--智能卡芯片安全技术和产业发展论坛, 北京, 2013.8.28-2013.8.28.
36. Shifeng Sun, Dawu Gu, Shengli Liu. Efficient Leakage-Resilient
Identity-Based Encryption with CCA-Security. 6th International Conference on
Pairing-Based Cryptography (Pairing2013), Beijing, 2013.12.22-2013.12.24.
37. Ruoxu Zhao, Dawu Gu, Juanru Li, Yuanyuan Zhang. Automatic Detection and
Analysis of Encrypted Messages in Malware. 9th China International Conference
on Information Security and Cryptology (Inscrypt 2013), Guang Zhou, 2013.11.27-2013.11.30.
38. Chen Lyu, Dawu Gu, Xiaomei Zhang, Shifeng Sun, Yinqi Tang. Efficient,
Fast and Scalable Authentication for VANETs. Proceedings of IEEE Wireless
Communications and Networking Conference (WCNC2013), Shanghai, 2013.4.7-2013.4.10.
39. Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen, Wei Li. New
Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia.
19th International Workshop on Fast Software Encryption (FSE 2012), CCF-B类, Washington DC, March 19-21, 2012.
40. Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li. Improved Results on
Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256. Journal
of Systems and Software (JSS), 85(11):2451-2458, 2012.
41. Zhao Jianjie, Gu Dawu. Provably secure three-party password-based
authenticated key exchange protocol. Information Sciences, 184(1):310-323,
2012.
42. Zhiqiang Liu, Dawu Gu, Ya Liu, Wei Li. Linear Fault Analysis of Block
Ciphers. 10th International Conference on Applied Cryptography and Network
Security (ACNS 2012), 241-256, Singapore, June 26-29, 2012.
43. Ning Ding, Dawu Gu. On Constant-Round Precise Zero-Knowledge. 14th
International Conference on Information and Communications Security (ICICS
2012), Hong Kong, 2012.10.29-2012.10.31.
44. Ruoxu Zhao, Dawu Gu, Juanru Li, Liu Hui. Detecting Encryption Functions
via Process Emulation and IL-based Program Analysis. 14th International
Conference on Information and Communications Security (ICICS 2012), Hong
Kong, 2012.10.29-2012.10.31.
45. Qingju Wang, Dawu Gu, Vincent Rijmen, Ya Liu, Jiazhe Chen, Andrey
Bogdanov. Improved Impossible Differential Attacks on Large-Block Rijndael. 15th
Annual International Conference on Information Security and Cryptology (ICISC
2012), Seoul, 2012.11.28-2012.11.30.
46. Dawu Gu, Juanru Li, Sheng Li, Zhouqian Ma, Zheng Guo, Junrong
Liu. Differential fault analysis on lightweight block ciphers with statistical
cryptanalysis techniques. 2012 Workshop on Fault Diagnosis and Tolerance in
Cryptography (FDTC 2012), 27-33, Leuven, 2012.9.9-2012.9.9
47. Yinqi Tang, Dawu Gu, Ning Ding, Haining Lu. Phrase Search over Encrypted
Data with Symmetric Encryption Scheme. 32nd International Conference on
Distributed Computing Systems Workshops(ICDCS-w2012), Macau, 2012.6.18-2012.6.21.
48. Juanru Li, Dawu Gu, Yuhao Luo. Android Malware Forensics:
Reconstruction of Malicious Events. 32nd International Conference on
Distributed Computing Systems Workshops(ICDCS-w2012), Macau, 2012.6.18-2012.6.21.
49. Haining Lu , Dawu Gu, Chongying Jin, Yinqi Tang. Reducing Extra Storage
in Searchable Symmetric Encryption Scheme. The 2014 IEEE International
Conference on Cloud Computing Technology and Science (CloudCom 2012), Taipei,
2012.12.3-2012.12.6.
50. Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li. Impossible Differential
Attacks on Reduced-Round LBlock. 8th International Conference on Information
Security Practice and Experience (ISPEC2012), 97-108, Hangzhou,
2012.4.9-2012.4.12.
51. Zhao Jianjie, Gu Dawu, Zhang Lei. Security analysis and enhancement for
three-party password-based authenticated key exchange protocol. Security
and Communication Networks(SCN), 5(3):273-278, 2012.