Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University
-
Upload
coleen-clarke -
Category
Documents
-
view
230 -
download
0
description
Transcript of Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University
![Page 1: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/1.jpg)
Comprehensive Laboratory Practice of Information Security
Kai BuZhejiang University
http://list.zju.edu.cn/kaibu/infosec2015/
![Page 2: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/2.jpg)
Welcome
![Page 3: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/3.jpg)
InstructorKai Bu 卜凯Assistant Professor, College of CS, ZJUPh.D. from Hong Kong PolyU, 2013
Research Interestsnetworking and security(RFID, Software-Defined Networking…)
http://list.zju.edu.cn/kaibu/
![Page 4: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/4.jpg)
What do u think ofinformation security?
![Page 5: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/5.jpg)
What did u think ofthis course?
![Page 6: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/6.jpg)
Might be a bit different…
![Page 7: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/7.jpg)
beyond practicinghacking tools and skills
![Page 8: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/8.jpg)
Train Your Security Mindset
![Page 9: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/9.jpg)
Hack to Securehttps://www.youtube.com/watch?v=phElxf6MUkU
![Page 10: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/10.jpg)
Group-Project Orientedhttps://www.youtube.com/watch?v=phElxf6MUkU
![Page 11: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/11.jpg)
Tentative Projects• RFID Authentication• Hacking Taxi-Hailing Apps• Moving Target Defense
![Page 12: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/12.jpg)
Projects• Is Being Secret Enough?: Efficiency and
Privacy for RFID Authentication
• Goalattack current designs;design/implement newones with improvedefficiency/privacy.
#1s
![Page 13: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/13.jpg)
Projects• Is Being Secret Enough?: Efficiency and
Privacy for RFID Authentication
• Reference• Privacy and security in library RFID: issues, practices, and
architectures, CCS 2004, [video: https://archive.org/details/Microsoft_Research_Video_103482]• RFID Traceability: A Multilayer Problem, FC 2005• A Lightweight RFID Protocol to protect against Traceability and
Cloning attacks, SecureComm 2005• An efficient forward private RFID protocol, CCS 2009
#1s
![Page 14: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/14.jpg)
Projects• Hacking Taxi-Hailing Services for Profits
• Goalexploit taxi-hailing apps & driver-passenger collusion for profits;design/implement detection/prevention
• News• http://www.aliyun.com/zixun/content/2_6_1907774.html • http://www.chejiwang.com/news/news-14857.html
#2s
![Page 15: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/15.jpg)
• Catch Me If You Can: Meet the So Called Moving Target Defense
• Goaldesign/implement MTD against classic attack like DDoS
Projects#3s
![Page 16: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/16.jpg)
• Catch Me If You Can: Meet the So Called Moving Target Defense
• Reference• SDN - Moving Target Defense Controller (POX) [video:
https://www.youtube.com/watch?v=E4KqQkcJlqw ]• OpenFlow Random Host Mutation: Transparent Moving Target
Defense using Software Defined Networking, HotSDN 2014cn post: http://drops.wooyun.org/tips/4966
• First ACM Workshop on Moving Target Defense (MTD 2014) http://csis.gmu.edu/MTD2014/
Projects#3s
![Page 17: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/17.jpg)
• Open call
• How you want to WOW this class?
Projects#?s
![Page 18: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/18.jpg)
Schedule• Week 2: Sep 21
project proposal presentationgrouping: 5-6/groupproject assignment
• Week 3-7discuss, design, implement… ENJOY
• Week 8: Nov 2demo, presentation, report
![Page 19: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/19.jpg)
Grading• 40% Demo• 40% Report• 20% Presentation• 10%+ Research-oriented project
![Page 21: Comprehensive Laboratory Practice of Information Security Kai Bu Zhejiang University](https://reader036.fdocuments.net/reader036/viewer/2022062302/5a4d1af77f8b9ab059982359/html5/thumbnails/21.jpg)
Ready?