Information Security Research of Taiwan

Download Report

Transcript Information Security Research of Taiwan

我國資安人才培育之現況與未來
TWISC’s Information Security Research Today
and Tomorrow:
Ubicomp, Usability and SecUrity
D. T. Lee
TWISC, Center for Info. Tech. Innovation
Academia Sinica
資通安全研究與教學中心@台灣科技大學
National Taiwan University of Science & Technology
Oct. 17, 2006
Outline
• Ubiquitous Computing
– Usability
– Security
•
•
•
•
2/60
TWISC & Secure Ubicomp
Research & Activities in TWISC
Cooperation & Collaboration: iCAST
Security Research in TWISC—2006~2008
Ubiquitous Computing -- Ubicomp
“Each person is continually interacting with hundreds of …
interconnected computers”
-- “Some computer science issues in
Ubiquitous computing.”, CACM, 1993.
Everyware: The Dawing
What is ubiquitous computing? Age of Ubicomp by
Adam ubiqcomp)
Greenfield
>> Ubiquitous computing (ubicomp, or sometimes
integrates
computation into the environment, rather than having computers which are
distinct objects -- Wikipedia
which ideally “weave themselves into the fabric of everyday life
until they are indistinguishable from it”
-- Mark Weiser, “The computer of the 21st
century.”, Scientific American, 1991.
3/60
Ubiquitous Computation, Ubiquitous Network
and IT Revolutions
Broadband connection
Mobil communication
Always-On connection
Source: “Toward Realization of the Ubiquitous Society”, NRI, April 2005
4/60
Everyday Computing:
Things to be Considered
• Dynamic, ad hoc and shared environment
– Multiple activities operate concurrently
– No clear beginning & end to all activities
– Interruption is expected
• Usability
– Interface between human and Ubicomp (Ubiquitous computing)
environment?
– Human becomes the core of ubicomp environment.
• Security
– What are the changes in this new type of digital environment?
– Effectiveness vs. Simplicity
• How to secure new environment easily?
5/60
From Old School to New School
Internet
• Layer 3 & 4 attack
• Virus, OS-level
• Firewall and basic
IDS
6/60
Mobile &
Wireless
• IPS, Application
firewall
• Google hacking
• XML Security
• Web Services & Web
applications
• Wireless Security
• VoIP Security
Everywhere
computation
• Past + Present
• RFID & Sensor
Network
• Web 2.0 & live
personal content
• Wireless anywhere
• Security request in
next generation?
Security & Privacy Issues
• Old Model:
– Places permanent firewall to secure traffic
between intranet and internet
– Requires a piece of running code to actively
validate usage/access
– Requires heavy computation resource to
provide encryption/ decryption functionality
– Presents weak protection in wireless
environment
• Not easy for people to secure their wireless data
• Inadequate for Ubiquitous computing
7/60
Demo
DST Tags by TI: (Steve Bono, et al. Johns Hopkins Univ. Jan. 2005)
At left, an ExxonMobile SpeedPass for electronic payment
At right, an immobilizer equipped car key.
The small chip is embedded into the plastic head of the key.
Courtesy: http://rfidanalysis.org
Scenario 1. Sniffing a DST tag in a victim's pocket.
Active attack: scanning
Scenario 2. Cracking the key in a DST tag.
Parallel cracker 16-FPGAs. Sniffed data is entered using the
keyboard, and results are read off the LEDs on each board.
needed
Scenario 3. Starting a carEquipment
using the DST
simulator.
8/60
to clone a DST tag at close range.
Passive attack: eavesdropping
A microreader, laptop, & a serial cable.
Security and Privacy Issues
•
Characteristics relevant to UbiComp security :
–
–
Variability & capabilities of devices introduce
complexities to security framework
Heterogeneity of security & privacy
1) Ad-hoc device communication with different protocols
- The technology of content encoding becomes critical
–
•
Without good protection, the severity of security
breach and data leakage would worsen!!
–
9/60
Location-awareness in policy management
Users would be forced to turn off ubicomp features
because of lack of protection, thus the benefit of
ubicomp environment diminishes
TWISC & Secure Ubicomp
Cryptography
Sensor Network
Digital Signature
Data Privacy Protection
Software Security
Mobile Commerce
P2P
RFID
Smart Card
Hardware Security
Intrusion Detection System (IDS)
OS Security
Wireless Security
Anti-SpamMail
E-Cash
Digital Rights Protection
Graph Theory
Combinatorial Computing
Formal Methods
Operating Systems
Grid Computing
10/60
Compiler
Programming Languages
Fault-Tolerant
Computing
VoIP &
Wireless
QoS
PKI
Anti-Spyware
Algorithms
Data Mining
Bioinformatics
Mobile IP
VOIP
…
Computation Theory
Machine Learning
Computer Vision
SOC Design
Expertise & Knowledge
Virus
Robotics
Introduction to TWISC
http://www.twisc.org/
• Officially founded on April 1st, 2005
» Funded by the National Science Council, Taiwan
• An integrated effort to boost research and development activities in
information security, promote public awareness and foster
partnership among government, academia and private sectors in
information security.
• Headquarters of TWISC at the Center for Information
Technology Innovation, Academia Sinica (soon-to-be established)
• We have established three Centers in Northern, Central and
Southern Taiwan at Taiwan University of Science and Technology
(TWISC@NTUST), Chiao-Tung University (TWISC@NCTU) and
Cheng-Kung University (TWISC@NCKU)
11/60
Objectives/Missions
• Advance the research and development of technologies
in information security and related areas.
• Provide education and training, help build human
resource capacity, and promote public awareness in
information security.
• Collaborate with private sector to enhance local
information security industry in security management
and applications software development.
• Seek international collaborations to build a ubiquitous
secure community.
12/60
Strategies
• Integrate resources and expertise among government,
industry and academia to make comprehensive plans on
how to foster security-related research effort, and
help promote public awareness and capacitybuilding in information security
• Strive for excellence in research and development of
technologies in information security & keep abreast with
the top-notch leading research institutions worldwide
• Serve as a bridge for partnership among government,
industry and academia, and as a catalyst of technology
transfer in information security sector, and promote
university-industry cooperative research in securityrelated applications
• Build a framework for national/international collaboration,
including exchange of scholars, researchers and
students, and hosting of workshops and conferences
13/60
•技術交流
資
安
構
面
術
軟 •系統驗證
硬 •I C卡系統安全
體
安 •嵌入式系統
全
網
路
安
全
•網路安全協定
•無線網路安全
•生物特徵識別
•入侵偵測/ 防火牆
資通安全
研究與教學
中心
軟
•IC卡系統應用 硬
•嵌入式系統應用 體
安
•軟硬體檢測
全
產
業
支應
援用
能
量
構
•入侵偵測協防
•防火牆建置
•身分識別系統
學術研發能量
種子培訓與
教育推廣
•前瞻講座
•資安種子研習營
14/60
資
•資通安全學程
•全民資安認知列車
•ISMS認證
•風險分析
•異常事件處理
網
路
安
全
資
安
管
理
安
面
實
務
)
)
資
安 •資安政策
管 •隱私權保護
理 •智財權保護
學術研發能量
學
術
提研
昇發
能
量
資
料
安
全
•加解密設計
•數位簽章設計
•PKI應用
建構
國際合作平台
(
(
學
資
•密碼學理論
料
•破密分析
安
•資料保護
全
•人才交換 •科技外交
行政院
科技顧問組
•支援重要機構資料庫防護
•支援管理資訊系統防護
•支援資安事件通報工作
•
•
•
育
培
才
人
室
台 驗
平 實
享 安
共 資
源 校
資 院
安 專
資 大
立 各
•建 助
•協
資通安全會報
資安小組
支國全
援際民
資合教
安作育
技 推
術 廣
研
發
資通安全
研究與教學中心
•支
•培 援
育 電
所 腦
需 犯
之 罪
工 與
程 網
應 路
用 犯
與 罪
管 之
理 查
人 緝
才
國安局
協提安培
助昇管育
資既理技
安有等術
關研專研
鍵發業發
技人人、
術員才工
移能 程
轉量 應
用
、
作
工
護 才
防 人
全 行
安 執
信 策
通 政
路 之
網 需
援 所
•支 育
•培
15/60
•支援密式邏輯設備之研製、
剖析、檢測等工作
•培育所需之技術研術人才
•
•
•
調查局
刑事警察局
研考會
主計處
•支
•培 援
育 資
所 安
需 法
之 規
政 制
策 訂
執 、
行 安
與 全
管 管
理 理
人 與
才 稽
核
國內各大專院校
產業
(經濟部技術處、工研院、
資策會、電信研究所)
交通部
電信總局
Organization
External
Advisory
Committee
16/60
TWISC
Dr. D. T. Lee
Operations Management
Division
Technology
R&D Division
Collaboration &
Exchange Division
Prof. C. L. Lei
Prof. H. M. Lee
Faculty
from
TWISC
TWISC@NTUST
TWISC@NCTU
TWISC@NCKU
Education &
Training Division
Prof. T. C. Wu
Principal Investigators
• Dr. Der-Tsai Lee 李德財
Director, Institute of Information Science, Academia Sinica
Director of TWISC
E-mail: [email protected]
• Professor Tzong-Chen Wu 吳宗成
Department of Information Management
National Taiwan University of Science & Technology
CEO, TWISC@NTUST and Director, Div. Education & Training
E-mail: [email protected]
• Professor Hahn-Ming Lee 李漢銘
Department of Computer Science & Information Engineering
National Taiwan University of Science & Technology
Director, Div. Exchange & Collaboration, TWISC@NTUST
E-mail: [email protected]
• Professor Chin-Laung Lei 雷欽隆
Department of Electrical Engineering
National Taiwan University
Director, Div. Technology Research & Development, TWISC@NTUST
E-mail: [email protected]
17/60
Technology R&D Division
Headed by Professor Chin-Laung Lei 雷欽隆
EE, National Taiwan University
• To do advanced research in information
security
• To develop information security technologies
and applications software for research and
education
• To plan and conduct university-industry
cooperative research
• To help realize technology transfer to industry
18/60
R&D in TWISC
Cryptography
Digital Signature
Electronic Cash
PKI
Digital Rights Protection
Virus
Smart Card
OS Security
Data Privacy Protection
IDS/ IPS
Sensor Network
19/60
AAA
RFID
Software Security
Spyware/ Malware
VOIP
Mobile Commerce
Hardware Security
P2P Security
Foundation of Cryptography
• Collaborators:
– Dr. Chi-Jen Lu, et al., IIS, Academia Sinica
• Motivation: To invent randomness research tools with
applications to cryptography
• Publications in
– Journal of Cryptology
– Theoretical Computer Science
– IEEE Transactions on Information Theory
• Major results:
– Efficient construction of randomness extractors
• Extract almost perfect randomness from slightly random
sources
– Application of randomness extractors in cryptography
20/60
• Achieve encryption with everlasting security against
adversaries of bounded storage
Multivariate Public-Key Cryptosystems
• Collaborators:
– Dr. Bo-Ying Yang, Dr. Jiun-Ming Chen, TKU, Dr. L-C. Wang, NDHU;
Messrs Y-H Chen, S-H Kao, Y-H Hu, NTU
• Motivation: Find a more robust and efficient alternative to
PKCs
– RSA depends on infeasibility of factoring a large integer
– ECC depends on difficulty of taking Discrete Log
– But both of RSA and ECC can be solved efficiently by Shor’s
Quantum Computing Algorithm
• Multivariate PKCs
– An alternative PKC whose public key is represented by multivariate
polynomials over a finite field
• Provides much more solid system that can’t be broken in poly-time by
Quantum Computer
• Also very efficient to handle key generation/authentication
• Publications
21/60
– A "Medium-Field" Multivariate Public-Key Encryption Scheme,
Cryptographer Track, RSA2006 (Feb. 13-17, 2006)
– Another in 3rd conference in Security in Pervasive Computing (York,
Apr. 18-21, 2006).
Low Resource PKCs
• Collaborators:
– Dr. Bo-Ying Yang, Dr. Jiun-Ming Chen, Y-H Chen, Sam
Tsai (NTU), Doug Cheng (Harvard)
• Motivation: Implement PKCs efficiently to facilitate
pervasive / ubiquitous computing
– Traditional PKCs on embedded systems
•
•
Very slow and require dedicated hardware
e.g. A lab in Austria is trying to implement ECC on a
low-cost RFID
– They are unable to satisfy the low power
requirements
– RSA would be hopeless
• TTS and similar schemes are being ported to sensors and
small ASICs (for RFID use).
– High Speed Signatures on Low-Cost Smart Cards
22/60
Digital Signature and Its Applications
•
Collaborators:
– Dr. Tzong-Chen Wu et al., NTUST
•
Motivation:
– To improve the performance of verifying digital signatures
•
Achievements:
– T. C. Wu and Y. C. Lin, “Self-certified Approach for
Authenticated Key Agreement," Book Chapter, in Computer
Security in the 21st Century, Lee, D.T.; Shieh, S.P.; Tygar,
J.D. (Eds.), Springer, 2005.
– Lin, C.Y., Wu, T.C., Zhang, F., and Hwang, J.J., “New identitybased society oriented signature schemes from pairings on
elliptic curves”, Applied Mathematics and Computation, Vol.
160, 2005, pp. 245-260. (SCI, EI)
– Patent:
• The method of wording correctness output for anti-forgery
of e-document, Patent No. 108925
• Centralized self-certified mark, Patent No. I255627
• The secure subscribing system of e-publications, Pub.
23/60
Notice No. 200417220
Database Privacy Protection 2
• Collaborators (1998 - ):
– Da-Wei Wang, Tsan-sheng Hsu, Churn-Jung Liau, IIS, Academia
Sinica
• Funding: Academia Sinica, NSC, National Health Insurance Bureau
• Motivation:
– How to release data while protecting individual privacy
– Database privacy protection of National Health Insurance
Bureau(健保局)
• Representative Achievements:
– A logic framework for data privacy protection
– Quantifying privacy leakage
– CellSecu: a prototype privacy gateway
– A logic framework for knowledge acquisition
24/60
Database Privacy Protection 1
• A logic framework for data privacy protection
– Privacy breach formally defined
• Quantifying privacy leakage
– It’s important to address potential tradeoffs between privacy
leakage and computational complexity
– Quantify privacy leakage by economic model, information
theory framework, etc.
• CellSecu: a prototype privacy gateway
– Queries to the database can be automatically checked for
privacy compliance
– Built on our logic framework with quantitative measurements of
privacy leakage incorporated
• A logic framework for knowledge acquisition
- From the scenario of one static query to the knowledge
acquisition process via database queries
25/60
Hardware Security
• Collaborators:
– Dr.Jung-Hui Chiu, Yuan-Hung Lien, Sung-Shiou Shen, LiLun Lin, Sheng-Ho Lin
• Motivation:
– New testing techniques for Smart Card
SPA/DPA/DFA attacks
• Contribution to industry/ academia:
– Smart Card Protection :
• A balancing and masking method to prevent from timing
attacks and SPA/DPA/DFA attacks
– Secure GPRS/3G/WLAN authentication :
• A feasible SIM/USIM reconnection authentication via the
current built-in hash functions
26/60
Intrusion Detection & Prevention System
• Collaborators:
– Hahn-Ming Lee, Yuh-Jye Lee, Hsing-Kuo Pao, Wei-Chung Teng,
Tien-Ruey Hsiang, Lin-Kuei Yang, Kuo-Hua Yang, Yu-Shan Hsu
• Representative Achievements:
– A new detection/ prevention technique based on Data Mining and
Neural Networks
– Performance outperforms #1 of KDD Cup and
– Low false positive and low false negative rates for detecting DoS
and RS21 attacks
• Contribution:
– An efficient cascading intrusion detection framework that combines
OCSVM with SSVM.
– Chunking technique was introduced to deal with massive dataset in
the training process
• Low Memory Usage!
27/60
Web Application Security
• Collaborators:
– Dr. D. T. Lee, Yao-Wen Huang, Chung-Hung Tsai, Fang-Yu, Christian
Hang, Sy-Yen Kuo, Shih-Kun-Huang, Tsung-Po Lin
• Motivation:
– Build systematic and automatic mechanisms for detecting/protecting web
application vulnerability
• Representative Achievements:
– WAVES (Web Application Vulnerability and Error Scanner):
•
•
•
•
Remote, dynamic, black-box testing (PT)
Found bugs in Furtune500 websites
WWW2003 Best Paper Finalist
Appeared in Journal of Computer Networks special issue on web
and network security, 2005
– WebSSARI (Web Application Security via Static Analysis and Runtime
Inspection):
• to perform compile-time verification and runtime enforcement of web
application security
• Downloaded and verified 230 open source Web applications from
SourceForge.net.
• Identified 69 as vulnerable; 38 projects ack’d our findings
28/60
• WWW2004 Best Paper Finalist
SDLC, Software Testing, and Software Verification
• In the software development
life cycle (SDLC), cost of
remediation is 20 times more
towards production phase!
29/60
VoIP QoS and Security
• Collaborators:
– Dr. Chin Laung Lei, Dr. Wen Shenq Juang, Dr. Ren Junn Hwang,
Kuan Ta Chen
• Motivation: Study the security and QoS issues of the VoIP system
–
–
–
–
•
30/60
Analyze Skype packet trace
Propose sophisticated QoS and User Satisfaction Model
Analyze the security system and possible weaknesses of Skype system
Develop technique to attack Skype system
Publication:
– "Quantifying Skype User Satisfaction,“ Proc. ACM SIGCOMM 2006
(Sept. 2006)
Content & Digital Rights Protection 5
• Collaborators:
– Mark Hong-Yuan Liao, C. S. Lu, C. C. Shih, G. J. Yu, IIS
• Funding (1998 - ): Academia Sinica, NSC
• Motivation:
– Protect IP rights of multimedia (images and video)
– National Digital Archives Program
NSC (2002-2006)
• Representative Achievements:
– Watermarking algorithms
– Patent & Tech. Transfer
31/60
Content & Digital Rights Protection 4
• Watermarking: Image Protection (NPM)
• Resulting image of embedding of watermark:
=>
+
Locking
• Result of detecting watermark in an unattacked image:
=>
+
32/60
Detecting
Content & Digital Rights Protection 3
• Visible watermark is plainly visible across
the body of the image or situated on the
side
33/60
Content & Digital Rights Protection 2
• Cocktail watermarking- robust
blurring
negative
positive
34/60
JPEG 5%
histogram
equalization
sharpening 85%
Content & Digital Rights Protection 1
Invisible watermarking- Fragile
original image
watermarked image
altered image
What you see is NOT what it really is.
2nd level
35/60
3rd level
4th level
More Active Research Topics
• Algebraic Cryptanalysis
• Identification and Authentication Schemes and related
applications
• QoS for IPSec VPN
• RFID Security
• Wireless & Sensor Network Security
• Remote Authentication
36/60
Collaboration & Exchange Division
Headed by Professor Hahn-Ming Lee 李漢銘
CSIE, NTUST
• To draft technology and scholar exchange plans
• To establish information security-alliance program among
local universities and with international organizations
• To establish channels for exchange of researchers and
students between collaboration partners
• To host international workshops and conferences in
information security and related areas
• To organize Distinguished Lecture Series, Workshops on
Advanced Information Security Technology, and
Information Security Summer School (Aug. 10~24, 2006)
37/60
Host International Workshops and
Conferences - SADFE 2005
SADFE 2005 (First International Workshop
on Systematic Approaches to Digital
Forensic Engineering) Nov. 7-10, 2005,
Taipei, Taiwan
http://conf.ncku.edu.tw/sadfe/
Invited Speakers:
– Prof. George Mohay , Queensland
University of Technology
– Prof. Steve Schroeder , Seattle University,
a pioneer in Cyber crime law enforcement
– Dr. Ming-Yuh Huang: Boeing Associate
Technical Fellow
38/60
Host International Workshops and
Conferences - AsiaCCS'06
• ACM Symposium on Information, Computer
and Communications Security (AsiaCCS'06)
March 21-23, 2006, Taipei, Taiwan
http://www.iis.sinica.edu.tw/asiaccs06/
39/60
Distinguished Lecture Series
3
• Date: 2005/10/27
• Prof. Kentaro Kato
CHUO University
• Topic: Y-00 protocol: Quantum
Cryptography for Optical Fiber
Networks
• Date: 2005/12/16
• Professor Hideki IMAI,
Information and Systems Dept. of
Institute of Industrial Science,
University of Tokyo
• Topic: Trends and Challenges for
Securer Cryptography
40/60
Distinguished Lecture Series 2
Date: 2006/3/20
Topics:
(1) Open problems and promising approaches in computer security (Prof. Tygar)
(2) Software Security and Solutions : A Stony Brook Perspective ( Prof. Chiueh)
Prof. Tzi-cker Chiueh
Computer Science Department
State University of New York at Stony Brook
41/60
Prof. Doug Tygar
Computer Science Department
UC Berkeley
Distinguished Lecture Series 1
Date: 2006/5/1 in NTUST
Topic: General Method for Enhancing Security
of Multivariate Public Key Cryptosystems
Prof. TSUJII Shigeo,
President, Institute of Information Security
Japan
Date: 2006/6/1 in NCKU and NTUST
Topic: Security Challenges in Ubiquitous Society
Prof. Kwangjo Kim
Director, International Research Center of
Information Security
Information and Communications University
Korea
42/60
Workshop on Advanced Information Security Technology
Date: 2006/01/20-21 at NTUST
Topic: Multivariate PKC
Multivariate PKC
Prof. Jintai Ding, University
Prof. Christopher Wolf, Ecole
of Cincinnati, USA
Normal Superieure, France
43/60
Prof. Bo-Yin Yang,
Tamkang University
Taiwan
Information Security Summer School (ISSS)
Aug. 10~24, 2006
• Lectures: Prof. Tzong-Chen Wu (NTUST), Prof.
Chi-Sung Laih (NCKU), Prof. Bo-Yin Yang
(Academia Sinica), and invited lecturers from
UK(ISG), Japan(RCIS), Denmark, Germany, and
many known scholars in Information Security
• Venue: National Taiwan University of Science and
Technology (NTUST)
• For more information see http://www.twisc.org
44/60
International Collaboration for Advancing
Security Technology (iCAST)
Security Technologies &
Applications in Wireless
Sensor Networks
Investigation on Intrusion
Detection/Prevention
Information Security and
Privacy Protection
Technology in RFID
Applications
Static Analysis/Software
Verification System
Research & Development
of High Security Remote
Authentication Technology
45/60
High Speed IDS Expert
System and Privacypreserving Information
Protection Management
International Collaboration in TWISC
46/60
Education & Training Division
Headed by Professor Tzong-Chen Wu 吳宗成
Computer Science, NTUST
47/60
• To organize and prepare curricula or educational
programs for information security
• To offer training courses and promote information
sharing and public awareness of information
security
• To provide incentives for researchers/faculty
members in terms of awards, recognition, and
promotion
• To host training workshops in information security
for academic and industrial professionals
TWISC@NTUST
• TWISC established its first physical center on Nov. 10, 2005 at the
National Taiwan University of Science and Technology
(TWISC@NTUST) in northern Taiwan
• Motivation:
– Integrate the resources and expertise scattered among the
universities and research institutes in northern Taiwan
– Promote public awareness and foster partnership among
government, academia and private sector in information security
• Core Members:
– More than 20 professors and 30 PhD/MS students
– Tzong-Chen Wu, Hahn-Ming Lee, Chin-Laung Lei, Da-Wei
Wang, Wei-Hua He, Chi-Jen Lu, Chien-Lung Hsu, Bo-Yin Yang,
Churn-Jung Liau, Feipei Lai, Yuh-Jye Lee, Tyng-Ruey Chuang,
Tien-Ruey Hsiang, Chuan-Kai Yang, Wei-Chung Teng, HsingKuo Pao, Nai-Wei Lo, Wei-Hua He, Jung-Hui Chiu, Shi-Jinn
Horng, Tsan-Sheng Hsu, Chien-Lung Hsu, Yuan-Cheng Lai
48/60
TWISC@NTUST
•
Research Topics:
– Security technologies and applications for low-resource devices
• Wireless network security
• Sensor network security
• RFID security
– Quantum cryptography
• Post-Quantum cryptography
• Multivariate Public Key Cryptography
– Web application security assessment
• Software security
• Formal verification
– Visual cryptography
• Data hiding
• Multimedia protection
–
Intrusion detection and prevention
• Firewall
• Intrusion detection
• Anti-virus, anti-spam or anti-spyware
•
49/60
Major Activies:
– Integrate all academia and research institutes in northern Taiwan
– Hold weekly seminars and monthly distinguished lecture series in information security
– Promoted information security awareness
– Research advanced information security topics
TWISC@NCTU
• TWISC at National Chiao-Tung University
• Former group founded by RDEC in 1997 to establish GSNCERT (Government Service Network – Computer Emergency
Response Team) : Protect Taiwan government’s network and
websites
• Physical center (TWISC@NCTU) was established on
Oct. 4, 2006, involving academia and research
institutions in central Taiwan including Hsinchu
Science Park and Central Taiwan Science Park.
• Research Topics:
– Wireless network security
• Intrusion detection/prevention
– Computer and information security
– Cryptography
50/60
TWISC@NCTU
• Core members:
– More than 16 professors and 30 PhD/MS students
– Shiuhpyng Shieh, Wen-Guey Tseng, Rong-Jae Chen,
Shih-Kun-Huang, Yi-Shiung Yeh, S.J. Tsai, Y.D. Lin,
Yu-Lun Huang, T.Y. Hsu, John Zao, Wen-Nun Tsai,
H.M. Sun, J.K. Jan, M.S. Hwang, C.H. Lin
• Major Accomplishments:
– Designed and developed intrusion detection system
(A-IDS), remote security scanner (R-SCAN)
– Served over 3,000 government agencies, and scanned
over 200,000 computers in a week
51/60
TWISC@NCKU
• TWISC at National Cheng-Kung University
• The physical center (TWISC@NCKU) is to be established on Nov. 23, 2006,
involving academia and research institutions in southern Taiwan, including
Southern Taiwan Science Park.
• Facilities and Objectives:
– A well established security testbed for Taiwan information security research
– Prevent attacks in IPv6 network, e.g.: 6to4 DDoS
– Protect SIP-based application
• Traditional firewall/IDS can’t fully provide the protection
• Research Topics:
– Network Security Testbed
– IPv6-Enabled IDS
– IPS for SIP VoIP System
– DNS Server Protection
• Core members:
– C. S. Laih, L.M. Tseng, C.H. Lee, D.M. Ko, C.H. Cheng, W.K. Kuo, P.Z
Cheng , W.Z. Kuo, L. Tsen
52/60
TWISC@NCKU
53/60
• Major Accomplishments:
– Testbed:
• An Internet topology close to real world
• More than 290 tools
• More than 20 testing scenarios
• Integrate Eurecom Honeypot network security statistics
database
– IPv6 IDS:
• Taiwan’s first IPv6 IDS that supports 6to4 and tunnel
broker
• Immune to Nmap FingerPrinting
• Ready for technology transfer
– Protection mechanism for SIP-based applications:
• Won an award in CC2005, Ministry of Education
• Ready for technology transfer
TWISC & Ubicomp Security
Cryptography
Sensor Network
P2P
Data Privacy Protection
IIS,
NTUST
NTU
Digital Signature
Academia
SinicaSoftware Security Mobile Commerce RFID
Smart Card
Hardware Security
Intrusion Detection System (IDS)
OS Security
Wireless Security
Anti-SpamMail
TKU
SCU
Virus
CGU
E-Cash
Digital Rights Protection
Graph Theory
Combinatorial Computing
Formal Methods
PKI
Anti-Spyware
Algorithms
VOIP
…
Computation Theory
Compiler
Data Mining
Machine Learning
Languages
MembersProgramming
from other
universities
and institutions
Fault-Tolerant
NCTU / NCKU/
…
Operating Systems
Bioinformatics
Computer Vision
Computing
TWISC@NCTU, TWISC@NCKU
Grid Computing
54/60
Wireless
VOIP
Mobile IP
SOC Design
Expertise & Knowledge
Robotics
Security Research in TWISC—2006~2008
RFID
Wireless Security
Cryptography
Intrusion Detection System (IDS) /IPS
Smart Card
E-Cash
Software Security
Mobile Commerce
Virus
Anti-Spyware
Digital Signature
Digital Right Protection
PKI
P2P
OS Security
Sensor Network
Cryptographic Protocol Design
55/60
AAA
Data Privacy Protection
Anti-SpamMail
Hardware Security
4
Security Research in TWISC—2006~2008
RFID
Wireless Security
Cryptography
Intrusion Detection System (IDS) /IPS
Smart Card
E-Cash
Software Security
Mobile Commerce
Virus
Anti-Spyware
AAA
Data Privacy Protection
Anti-SpamMail
Hardware Security P2P
P2P/ Web Security
56/60
Digital Signature
Digital Right Protection
PKI
3
OS Security
Sensor Network
Security Research in TWISC—2006~2008
Cryptography
Digital Signature
Intrusion Detection System (IDS) /IPS
Smart Card
E-Cash
Software Security
Mobile Commerce
Virus
Anti-Spyware
Wireless Security
RFID
Digital Rights Protection AAA
PKI
Data Privacy Protection
Anti-SpamMail
Hardware Security
P2P
Software Protection
57/60
2
OS Security
Sensor Network
Security Research in TWISC—2006~2008
Cryptography
Digital Signature
Intrusion Detection System (IDS) /IPS
Smart Card
E-Cash
Software Security
Mobile Commerce
Virus
Anti-Spyware
Wireless Security
Anti-SpamMail
Hardware Security
AAA
Data Privacy Protection
P2P
Any Possibility!
New Opportunity!
58/60
RFID
Digital Right Protection
PKI
1
OS Security
Sensor Network
Conclusion
• In Ubicomp environment, secUrity will be KEY toward
Usability
• TWISC is to serve as an R&D resource center to
enhance technical competence, including Ubicomp
security
• TWISC is to enlarge human resource capacity and
promote public awareness in information security
• TWISC is to be a window for university-industry
partnership and international collaboration in
information security
• TWISC represents integrated research capabilities in
Taiwan, aiming to establish itself as a power house in
information security, working closely with other
renowned centers or laboratories worldwide.
59/60
Thank you for your attention
60/60