School of Cyber Security

  • Name:邹福泰
  • Title:Assosicate Professor
  • Office:
  • Office Phone:
  • Email:zoufutai@sjtu.edu.cn
  • Website:

Research Field

network attack and defense technology, software and system security

Education

Ph.D in Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China

Work experience

Research

Awards and Honors

IEEE Senior Member

Teaching

Cyber Attack and Defense Practical Techniques (IS317)
Cyber Security Frontier Technologies (NIS8015)

Publications

Book
1. Futai Zou,Ping Yi,Siyu Zhang,Yuzong Hu. Botnet Detection: Principles, Methods, and Practices. Beijing: Tsinghua University Press, 2023.

Journal Papers
1.Zehui Zhang, Futai Zou*,Jianan Hong, Libo Chen, Ping Yi. 2024."Detection and Analysis of Broken Access Control Vulnerabilities in App-Cloud Interaction in IoT". IEEE Internet of Things Journal.
2.Yuelin Hu, Futai Zou*,Jiajia Hang, Xin Sun,Yilei Wang. 2024."LLM-TIKG: Threat Intelligence Knowledge Graph Construction Utilizing Large Language Model". Computers & Security.
3.Bolun Wu, Futai Zou*, Chengwei Zhang, Tangda Yu, Yun Li. Multi-field relation mining for malicious HTTP traffic detection based on attention and cross network. Journal of Information Security and Applications,
4.Bolun Wu, Futai Zou*, Ping Yi,Yue Wu, Liang Zhang. “SlicedLocator: Code Vulnerability Locator Based on Sliced Dependence Graph”, Computers & Security, 2023.
5.Bolun Wu, Futai Zou*," Code Vulnerability Detection Based on Deep Sequence and Graph Models: A Survey", Security and Communication Networks. Volume 2022.
6.Futai Zou*, Linsen Li, Yue Wu, and Jianhua Li,Siyu Zhang,Kaida Jiang*. "Detecting Domain-Flux Malware using DNS Failure Traffic." International Journal of Software Engineering and Knowledge Engineering, Vol.28, No.2, pp. 151-173,2018.
7.Futai Zou, Siyu Zhang, Linsen Li, Li Pan, and Jianhua Li. "Detecting Malware based on Expired Command-and-Control Traffic" International Journal of Distributed Sensor Networks.Vol.13, No. 7, 2017.
8.Futai Zou, Siyu Zhang, Weixiong Rao, and Ping Yi, "Detecting Malware Based on DNS Graph Mining", International Journal of Distributed Sensor Networks, Volume 2015 ,2015.
9.Futai Zou, Shiyu Zhang, Weixiong Rao. "Hybrid Detection and Tracking of Fast-Flux Botnet on DNS Traffic". China Communication, Vol.10, No.11, pp. 58-69, November 2013.

Conference Papers
1.Bolun Wu, Futai Zou*, Mingyi Huang, Xin Sun, and Jiajia Han. 2024. "Enhancing Runtime Application Self-Protection with Unsupervised Deep Learning". 20th EAI International Conference on Security and Privacy in Communication Systems (SecureComm 2024), Dubai,United Arab Emirates,28-30 October, 2024.
2.Yi Qin, Jiahe Wu, Futai Zou*, Yue Wu*, “Breaking Tor’s Anonymity by Modifying Cell’s Command”, Proceeding of The 27th IEEE Symposium on Computers and Communications (IEEE ISCC 2022),Rhodes,Greece,2022.
3.Chengwei Zhang, Yunlu Xu, Zhanzhan Cheng, Shiliang Pu*, Yi Niu, Fei Wu, Futai Zou*, "SPIN: Structure-Preserving Inner Offset Network for Scene Text Recognition", Proceedings of the 35th AAAI Conference on Artificial Intelligence (AAAI 2021), 2021.
4.Yuheng Wei, Futai Zou*, "Automatic Generation of Malware Threat Intelligence from Unstructured Malware Traces", EAI 17th International Conference on Security and Privacy in Communication Systems (SecureComm 2021), 2021.
5.Bolun Wu, Yuanhang Xu, Futai Zou*. "Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs", IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom2021).
6.Futai Zou, Qianying Shen, and Yuzong Hu. "Word-Map: Using Community Detection Algorithm to Detect AGDs", The 24th Information Security Conference (ISC2021).
7.Yuzong Hu, Futai Zou*, Linsen Li, Ping Yi. "Traffic Classification of User Behaviors in Tor, I2P,ZeroNet, Freenet", IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom2020), Guangzhou, China ,IEEE, pp.418-424, 2020.
8.Jiachen Zhu,Futai Zou*, “Detecting Malicious Domains Using Modified SVM Model”, Proceeding of The 21th IEEE International Conference on High Performance Computing and Communications (HPCC2019), Zhangjiajie, China, August 2019.

Others