[8-18]Distinguishing MobileDevices Through General WiFi Monitoring
文章來源: | 發布時間:2016-08-16 | 【打印】 【關閉】
總體部暨基礎軟件工程研究中心舉辦學術報告講座活動,邀請了紐約市立大學教授紀平和英特爾實驗室的安全研究員/架構師李曉寧來做報告,報告的題目分別是《Distinguishing MobileDevices Through General WiFi Monitoring》和《New Intel SSDCapabilities and Disk Forensics》,請各位同事積極參加!
時間:8月18日(周四)下午3點至5點
地點:5號樓4層第四會議室
紀平教授:
簡介:博士畢業于美國麻省州立大學阿默斯特分校,本科畢業于中國清華大學。現任美國紐約市立大學研究生院計算機系教授、副系主任、博士生導師和美國紐約市立大學約翰金分校數學與計算機系教授。從事各種形式的計算機網絡研究,包括有線、無線及移動網絡的協議設計、分析,網絡通信數據、流量分析,網絡安全及偵探學,網絡數據采集、整合及分析。
演講題目:Distinguishing MobileDevices Through General WiFi Monitoring
演講摘要:Booming wireless technology makes personal mobile devices (i.e.,smartphone, tablet, etc) must-have gadgets in people’s lives. Along withthe broad deployment of WiFi channels, mobile devices can access the Internetnot only through cell phone networks, but more and more frequently through WiFi(802.11x) channels. As it is easier and legitimate in many circumstancesto monitor the network traffic in WiFi networks, an interesting question toanswer is whether Network Forensics practitioners can distinguish mobiledevices through general WiFi monitoring? In this work, we conduct our researchbased on a set of WiFi traces that covers months of network data in aschool environment and days of data from three busy locations onManhattan. Our goal is to find out that through general WiFi trafficmonitoring, how likely a mobile device can be distinguished from others. Thistalk introduces other related state-of-art research in this area as well.
李曉寧:英特爾實驗室安全研究員/架構師
簡介:Xiaoning Li is asecurity researcher and architect at Intel Labs and focuses onanalyzing/detecting/preventing 0 day/malware with existing/new processorfeatures. For the past 10+ years, his work has been focusing on bothhardware/software security system co-design and advanced threat research.Xiaoning holds 16 grant/filling patents in security areas includingprocessor/system security and has published more than 20+ conference/invitedtalks including BlackHat, CanSecWest, ShmooCon, Source etc.
演講題目:New Intel SSDCapabilities and Disk Forensics
演講摘要:To investigatecompromised hard drive, traditional disk forensics tools have to scan harddrive to address tampered data details if hard drive does not provide enoughmeta data. Whole disk scanning takes a lot of efforts to analyze disk. Tospeedup this tamper detection process and assist disk forensics usage, newlogging capability is proposed to provide additional information such as diskchange record meta data for software to leverage. This talk will present newIntel SSD capabilities and explain how they could impact on forensics andsecurity usages.