為了讓我國網(wǎng)絡(luò)空間安全相關(guān)領(lǐng)域的青年科研工作者,、青年高校教師及博士生更好地分享和學(xué)習(xí)國內(nèi)外該領(lǐng)域的科研工作和學(xué)術(shù)動態(tài),暨南大學(xué)將于2016年6月13日至7月8日在暨南大學(xué)廣州本部校內(nèi)舉辦第一期 “ 網(wǎng)絡(luò)空間安全研究國際暑期學(xué)校 ”,,該暑期學(xué)校將采取為期一個月時間的封閉式學(xué)習(xí)和交流方式,主要目的是分享國內(nèi)外密碼學(xué)與網(wǎng)絡(luò)空間安全領(lǐng)域的科研工作經(jīng)驗和學(xué)術(shù)論文發(fā)表經(jīng)驗,重點訓(xùn)練和提高我國該領(lǐng)域青年科研工作者,、青年高校教師及博士生發(fā)表國 際高層次期刊和高水平會議學(xué)術(shù)論文的水平,,屆時多位從事網(wǎng)絡(luò)空間安全領(lǐng)域科研工作的專家學(xué)者,尤其是在國際高層次期刊和高水平會議學(xué)術(shù)論文發(fā)表方面具有豐富經(jīng)驗,,論文發(fā)表成果豐碩的海外一線教授將就網(wǎng)絡(luò)空間安全領(lǐng)域中的多個重要課題進行集中式授課,,并指導(dǎo)學(xué)員進行封閉式強化訓(xùn)練和學(xué)習(xí)。
一,、招收對象
暨南大學(xué)網(wǎng)絡(luò)空間安全研究國際暑期學(xué)校面向全國信息安全相關(guān)專業(yè)的高等院校和科研機構(gòu)的博士研究生,、高校青年教師、青年科研工作者,、有志于攻讀博士研究生的優(yōu)秀碩士研究生,。各高校和科研機構(gòu)信息安全類專業(yè)的青年科研工作者、青年高校教師和博士(碩士)研究生,,經(jīng)所在單位或?qū)熗扑],,向暨南大學(xué)網(wǎng)絡(luò)空間安全學(xué)院提交申請。由于名額有限,,我們將優(yōu)先錄取在密碼學(xué)和網(wǎng)絡(luò)空間安全領(lǐng)域有研究成果(包含正式發(fā)表的高層次學(xué)術(shù)論文,、發(fā)明專利、科研獎項等)的候選人,。
二,、時間安排
報名:2016年4月1日-5月15日,采取電子郵件報名方式
報到:2016年6月12日下午15:00,,地點:暨南大學(xué)曾憲梓科學(xué)館515室
開班儀式:2016年6月13日上午10:00,,地點:暨南大學(xué)校友樓四樓
開課: 2016年6月13日-7月8日,地點:暨南大學(xué)廣州本部校內(nèi)
三,、擬邀授課老師
組委會主席:
翁 健 ( 暨南大學(xué),、廣東省網(wǎng)絡(luò)安全檢測與防護工程技術(shù)研究開發(fā)中心 )
任 奎 ( 暨南大學(xué)、紐約州立大學(xué)布法羅分校 )
特約指導(dǎo)教授 (排名不分先后按姓氏排序):
Xinwen Fu ( 美國馬薩諸塞大學(xué)Lowell分校 )
Xiaodong Lin ( 加拿大安大略科技大學(xué) )
Yao Liu ( 美國南弗羅里達大學(xué) )
Rongxing Lu ( 新加坡南洋理工大學(xué) )
Kun Sun ( 美國威廉與瑪莉大學(xué) )
Cong Wang ( 香港城市大學(xué) )
Lingyu Wang ( 加拿大Concordia 大學(xué) )
Bingsheng Zhang ( 英國蘭卡斯特大學(xué) )
四,、學(xué)習(xí)認證
修完全部課程將獲暨南大學(xué)網(wǎng)絡(luò)空間安全學(xué)院頒發(fā)結(jié)業(yè)證書,,證書僅于課程結(jié)業(yè)的當(dāng)日發(fā)放。
五,、費用及食宿安排
暑期學(xué)校收費為人民幣3000元/半個月(任選一或多門課程),;人民幣5000元/一個月(八門課程任選),該費用僅用于學(xué)員的住宿費和培訓(xùn)費,。交通費及餐費自理,。
六、報名與錄取
請愿意參加暑期學(xué)校的老師,、同學(xué)寫一份個人學(xué)術(shù)簡歷于2016年6月10日前發(fā)送至暑期學(xué)校專用信箱[email protected],,郵件主題統(tǒng)一命名為“2016年暨南大學(xué)網(wǎng)絡(luò)空間安全研究國際暑期學(xué)校-單位-姓名”,。國際暑期學(xué)校組織委員會將在2016年5月31日前使用上述專用郵箱直接回復(fù)個人郵件告知錄取結(jié)果,通過錄取的學(xué)員將發(fā)正式電子邀請函(正式紙質(zhì)邀請函報道時發(fā)放),,請學(xué)員密切關(guān)注,。所有錄取學(xué)員,,須按時到暑期學(xué)校報到,,報到時需攜帶身份證原件及復(fù)印件,、學(xué)生證(或工作證)原件及復(fù)印件、個人學(xué)術(shù)簡歷,。在報到現(xiàn)場領(lǐng)取學(xué)員證及有關(guān)學(xué)習(xí)資料,。
七、學(xué)員管理
在暑期學(xué)校學(xué)習(xí)期間,,學(xué)員參加每堂課程須佩戴學(xué)員證,,無故不得遲到早退,如當(dāng)天課程不能參加需提前一天請假,。要求學(xué)員認真學(xué)習(xí),,積極參加暑期學(xué)校的學(xué)術(shù)活動和課外活動,遵守暨南大學(xué)以及暑期學(xué)校的紀(jì)律和規(guī)章制度,。暑期學(xué)習(xí)期間學(xué)員應(yīng)注意人身安全和財產(chǎn)安全,。
八、聯(lián)系方式
暨南大學(xué)網(wǎng)絡(luò)空間安全學(xué)院/信息科學(xué)技術(shù)學(xué)院網(wǎng)站http://xxxy.jnu.edu.cn/ 暑期學(xué)校專用郵箱[email protected],;聯(lián)系電話:020-85225956
九,、特約指導(dǎo)教授介紹(排名不分先后按姓氏排序)
Bio: Dr. Xinwen Fu is an associate professor in the Department of Computer Science, University of Massachusetts Lowell. He received B.S. (1995) and M.S. (1998) in Electrical Engineering from Xi'an Jiaotong University, China and University of Science and Technology of China respectively. He obtained Ph.D. (2005) in Computer Engineering from Texas A&M University. Dr. Fu's current research interests are in network security and privacy, network forensics, computer forensics, information assurance, system reliability and networking QoS. Dr. Fu has been publishing papers in conferences such as IEEE Symposium on Security and Privacy (S&P), ACM Conference on Computer and Communications Security (CCS), ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), ACM Sensys (ACM Conference on Embedded Networked Sensor Systems), IEEE International Conference on Computer Communications (INFOCOM) and IEEE International Conference on Distributed Computing Systems (ICDCS), journals such as ACM/IEEE Transactions on Networking (ToN), IEEE Transactions on Dependable and Secure Computing (TDSC), IEEE Transactions on Parallel and Distributed Systems (TPDS), IEEE Transactions on Computers (TC), IEEE Transaction on Mobile Computing (TMC) and IEEE Transactions on Vehicular Technology (TVT), book and book chapters. He spoke at various technical security conferences including Black Hat. His research is supported by NSF. Dr. Fu won the best paper award at International Conference on Communications (ICC) 2008, 2013 and International Conference on Wireless Algorithms, Systems, and Applications (WASA) 2013. His students won the silver medal at the ACM Student Research Competition at ACM MobiCom 2011. His paper was chosen as the spotlight paper for the February 2014 issue of the IEEE Transactions on Mobile Computing (TMC) and July 2010 Issue of IEEE Transactions on Parallel and Distributed Systems (TPDS). His research was reported by various Media including CNN, Wired, Huffington Post, Forbes, Yahoo, MIT Technology Review, PC Magazine and aired on CNN Domestic and International and the State Science and Education Channel of China (CCTV 10).
Research theme: IoT Security and Privacy
This short course introduces students to Internet of Things (IoT) concepts, systems, applications, security and privacy issues associated with IoT. The recited topics include introduction to IoT, introduction to basic security and privacy concepts and techniques needed to understand IoT, Amazon AWS IoT, Raspberry Pi and its programming with various sensors, interconnecting Rspberry Pi with AWS IoT, smart home with IoT, sensor networks with IoT, smart grid with IoT, smart city with IoT and other IoT application scenarios. Students are encouraged to preform creative research work. Cryptography background is desirable but not necessary to follow this course.
Bio: Xiaodong Lin received the PhD degree in Information Engineering from Beijing University of Posts and Telecommunications, China, and the PhD degree (with Outstanding Achievement in Graduate Studies Award) in Electrical and Computer Engineering from the University of Waterloo, Canada. He is currently an Associate Professor of Information Security with the Faculty of Business and Information Technology, University of Ontario Institute of Technology (UOIT), Canada. His research interests include wireless communications and network security, computer forensics, software security, and applied cryptography. Dr. Lin serves as an Associate Editor for many international journals. He has served or is serving as a guest editor for many special issues of IEEE, Elsevier and Springer journals and as a symposium chair or track chair for IEEE/ACM conferences. He also served on many program committees. He currently serves as Chair of Communications and Information Security Technical Committee (CISTC) – IEEE Communications Society. He is a senior member of the IEEE.
Research theme: Security and Privacy in Emerging Wireless Networks
This short course will focus on security and privacy in emerging wireless networks. In the first portion of this short course, learners will be exposed to various cryptographic and privacy enhancing techniques, and most importantly, their applications are also discussed. In other words, leaners will also learn how these techniques are applied to solve some classic research issues that have been well studied in the past.
In the rest of the course, the course covers how to use these cryptographic and privacy enhancing techniques to achieve security and privacy in emerging wireless networks. The second part is mainly focusing on emerging research issues on security and privacy in various emerging wireless networks, for example, Vehicular ad hoc network (VANET), mobile social network, mobile crowdsensing network and fog networking. Also, learners are expected to become engaged in case studies (or specific security and privacy issues) in emerging wireless networking paradigms and discuss how to incorporate the techniques we learned in the course to solve these problems. We will also discuss many other important considerations when designing secure and privacy-preserving schemes, for example, efficiency in terms of communication overhead and computational cost.
Bio: Dr. Yao Liu is an Assistant Professor in the Department of Computer Science and Engineering, University of South Florida. She received her Ph.D in Computer Science from North Carolina State University in 2012. Dr. Liu's research is related to computer and network security, with an emphasis on designing and implementing defense approaches that protect emerging wireless technologies from being undermined by adversaries. Her research interest also lies in the security of cyber-physical systems, especially in smart grid security. Dr. Liu's research work has appeared in premier journals and conferences including TDSC, TISSEC, IEEE S&P, CCS, MobiCom, and INFOCOM. Dr. Liu is a recipient of NSF CAREER award 2016.
Research theme: Advanced Computing and Network Security
This course covers advanced cryptography and authentication techniques to be applied in modern distributed and networked systems. By the end of this course, students will be able to list the common threats and vulnerabilities of networked systems, describe emerging network security tools, and understand cryptographic and non-cryptographic techniques towards security. Student will also learn recent advances in smartphone, wireless, and cyber-physical security.
Bio: Rongxing Lu has been an assistant professor at the School of Electrical and Electronic Engineering, Nanyang Technological University (NTU), Singapore, since May 2013. Before that, he worked as a Postdoctoral Fellow at the University of Waterloo from May 2012 to April 2013. Rongxing Lu was awarded the most prestigious “Governor General’s Gold Medal”, when he received his PhD degree from the Department of Electrical & Computer Engineering, University of Waterloo, Canada, in 2012; and won the 8th IEEE Communications Society (ComSoc) Asia Pacific (AP) Outstanding Young Researcher Award, in 2013. He is presently a senior member of IEEE Communications Society. His research interests include big data security and privacy, cloud and fog computing security, smart grid security, and applied cryptography. He has published extensively in his areas of expertise (with H-index 41 from Google Scholar currently), and was the recipient of the Student Best Paper Award, ITS Summit Singapore 2015, the IEEE IES Student Best Paper Award 2014, the Best Paper Awards of TSINGHUA Science and Technology Journal 2014, IEEE ICCC 2015, IEEE WCNC 2013, BodyNets 2010, and IEEE ICCCN 2009. He was/is on the editorial boards of several international referred journals, e.g., IEEE Networks, and currently serves the technical symposium co-chair of IEEE Globecom’16, and many technical program committees of IEEE and others international conferences, including IEEE INFOCOM and ICC. In addition, he is currently organizing a special issue on “security and privacy issues in fog computing” in Elsevier Journal “Future Generation Computer Systems” and a special issue on “big security challenges in big data era” in IEEE Internet of Things Journal. Dr. Lu currently serves as the Secretary of IEEE ComSoc CIS-TC (Communications and Information Security Technical Committee).
Research theme: Security and Privacy Techniques in Cyber Physical Systems
In this short course, we focus on discussing security and privacy techniques in Cyber Physical Systems(CPS). We first introduce the background of CPS security, including foundation of cryptography, privacy enhancing technique I and II. Then, we discuss security and privacy in various CPS scenarios including vehicular ad hoc network, mobile social network, eHealthcare, smart grid and big data. We will also discuss enterprise wireless network security and protection, and location privacy enhanced techniques.
Bio: Dr. Kun Sun is an assistant professor in the Department of Computer Science at College of William and Mary. He received his Ph.D. in Computer Science from North Carolina State University in 2006. His research focuses on systems and network security. Dr. Sun has more than 10 years working experience in both industry and academia. Before joining W&M, he was a Research Professor in George Mason University. He has published more than 50 peer-reviewed papers on conferences and journals including IEEE S&P, ACM CCS, NDSS, IEEE EuroS&P, IEEE DSN, ESORICS, ACSAC, ACM AsiaCCS, IEEE Infocom, IEEE TDSC, IEEE TIFS, etc.
Research theme: Systems and Network Security
This two-week short course introduces both basic principles and practices of cryptography and advanced security topics. In the first week, we will cover security policies, models, and mechanisms for secrecy, integrity, and availability; basic cryptography and number theory; secret key cryptography; hash functions; public key cryptography; trusted intermediaries; IPSec and SSL/TLS. In the second week, we will introduce several cutting-edge research topics including trusted execution environments on both X86 and ARM processors, moving target defence/adaptive cyber defence; and password security.
Bio: Dr. Cong Wang has been an Assistant Professor at the Department of Computer Science, City University of Hong Kong, since Fall 2012. His research interests are in the areas of cloud and network security, computer and mobile social networks, as well as secure and practical systems. He has published more than 40 peer-reviewed journal and conference papers, including those at IEEE JSAC, TC, TIFS, TMC, TPDS, IEEE Internet Computing, IEEE Network, IEEE INFOCOM, ICDCS, ACM Multimedia, ASIACCS, ESORICS, and 2 conference best paper awards. The total citations of his works are over 8,000 times according to Google Scholar, with H-index 19. His research has been supported by multiple funding agencies, including National Natural Science Foundation of China, Research Grants Concil of Hong Kong, Microsoft Azure, and Amazon.
Research theme: Building Secure and Practical Applications and Systems
In this short course, the students are expected to be exposed to various security challenges and related security designs in different system settings, including networks, cloud, web, smartphones, etc. The intensive syllabus will help students to get full exposure on the wide range of research topics that they can possibly follow up and continuously work on. It will also present to the students many interesting examples on how to identify and formulate good research problems on security.
Bio: Dr. Lingyu Wang is an Associate professor in the Concordia Institute for Information Systems Engineering at Concordia University, Montreal, Canada. He received his Ph.D. degree in Information Technology from George Mason University, USA. His research interests include security metrics, attack graph, cloud computing security, malware analysis, and data privacy. He has published over 100 research articles including papers at top-tier journals/conferences, such as TIFS, TDSC, TMC, JCS, IEEE S&P, ESORICS, etc.
Research theme: Threat Modeling and Cloud Security
In this short course, the students will be exposed to two related research areas: threat modeling and cloud security. In particular, we first review some traditional defense mechanisms, such as vulnerability analysis and IDS. We then introduce threat modeling using attack graphs and various applications, such as network hardening and alert correlation. After that, we will discuss security metrics, including those for measuring known vulnerabilities (e.g., CVSS) and those for dealing with 0day attacks. Later, the students will learn the basics of cloud and Google’s approach to cloud computing (e.g., GFS and MapReduce). Finally, we will discuss various attacks and defense mechanisms in cloud.
Bio: Dr. Bingsheng Zhang is a lecturer (a.k.a. assistant professor) in Security of Cyber-Physical Systems in the School of Computing and Communications at Lancaster University and member of Security Lancaster research centre since September 2015. Dr. Zhang specialises in cryptography and has extensive research experience in symmetric key cryptanalysis, two/multi-party computation, (non-interactive) zero knowledge proofs, privacy preserving data mining, and end-2-end verifiable e-voting systems. His research papers have been accepted in many top-tier security and cryptography journals/conferences, such as IEEE Transactions on Mobile Computing, TIFS, ACM CCS, EUROCRYPT, Financial Cryptography, etc.
Research theme: Cryptographic Protocols
In this short course, the students are expected to be confronted with a range of cryptographic primitives, different levels of security that can be achieved and some available cryptographic techniques that can be used. In particular, we first introduce modern cryptographic primitives such as encryption and signature schemes, hash functions etc. We then explain how the security of cryptographic schemes is defined and proven. After that, we will study zero-knowledge proofs and non-interactive zero-knowledge proofs. Later, the students will learn how to utilise learned knowledge to construct complex cryptographic protocols, such as private information retrieval, oblivious transfer, multi-party computation, privacy preserving data mining, and verifiable e-voting, etc.
Cryptography background is desirable but not necessary to follow this course.
暨南大學(xué)網(wǎng)絡(luò)空間安全學(xué)院
廣東省網(wǎng)絡(luò)安全檢測與防護工程技術(shù)研究開發(fā)中心
廣州市勤思網(wǎng)絡(luò)科技有限公司 (協(xié)辦)
二〇一六年三月十日