Do you know someone may be watching you?

Download Report

Transcript Do you know someone may be watching you?

Wilber R. Rivas
Del Rio High School
San Felipe Del Rio CISD
Dr. Guofei Gu
Director of SUCCESS laboratory
Secure Communication and Computer Systems
Computer Science & Engineering
 Identifying
sources that are
hacking into your system by
using various techniques in
computer science and
mathematics.
 To
solve practical security
problems
◦ networking and system techniques
◦ applied cryptography
◦ machine learning
◦ probability/statistics
◦ information theory
◦ graph theory


Assistant professor in the Department
of Computer Science & Engineering
PhD Georgia Tech, 2008


Automated collection and analysis of webbased bot malware infections
Interests include all aspects of network and
system security.
◦
◦
◦
◦
Internet malware detection, defense, and analysis
Intrusion detection and anomaly detections
Network security
Web and social networking security

Short for malicious software,
consists of programming
(code, scripts, active content,
and other software)
 Loss
of privacy
In malware, a botnet is
a collection of infected
computers or bots

Secret writing

Ciphertext

The conversion of information from a
readable state to apparent nonsense
◦ ATM cards
◦ Computer passwords

Technique

A branch of artificial intelligence

Design and development of algorithms

Recognize complex patterns

Bachelors degree in Computer Science

PhD student
◦ Intrusion detection systems for enterprises
◦ Design graph related algorithms to detect abnormal
traffic

PhD student

Wireless Network Security
◦ Detect Rogue Access Point

Online Social Networking Website Security
◦ Detect malicious/spam accounts
◦ Analyze cyber criminal ecosystem

Chao Yang, Robert Harkreader, Guofei Gu.
"Die Free or Live Hard? Empirical
Evaluation and New Design for
Fighting Evolving Twitter
Spammers."
To appear in Proceedings of the 14th International Symposium
on Recent Advances in Intrusion Detection
(RAID 2011),

Malware Analysis

How to categorize malware and what they do

Static analysis and dynamic analysis of
malware
Malware encryption and decryption

Malware detection


Communicating securely over an insecure
channel
 Computer
Network Security
 Cryptography
 Mathematics
 Encryption and Decryption of data
Encryption function
◦ E(P)=C
Decryption Function
◦ D(C)=P
◦ Inverse functions
 D(E(P)) = P and E(D(C)) = C
