Fengwei Zhang. Research Interest. Education. Employment History



Similar documents
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes!

Graduate Student Orientation. Meeting Agenda

M.S. in Computer Science

How To Teach Economics

End to End Defense against Rootkits in Cloud Environment Sachin Shetty

Best Poster Award: International Congress on Child and Adolescent Psychiatry 2012

Graduate Student Orientation

August Emory University, Atlanta, GA Double major: Sociology and Political Science December 2005

Dong "Michelle" Li. Phone: +1 (413)

Chapter 2 Addendum (More on Virtualization)

June Zhang (Zhong-Ju Zhang)

PROFESSIONAL EXPERIENCE: Associate Professor of Management, Graduate School of Management, University of California, Davis, CA. July 2008 present.

ELLEN E. ENGEL. Education Stanford University, Graduate School of Business, Ph.D. - Accounting, 1997.

Christian Murphy Dept. of Computer & Information Science, University of Pennsylvania 3330 Walnut Street, Philadelphia, PA cdmurphy@cis.upenn.

Verfahren zur Absicherung von Apps. Dr. Ullrich Martini IHK,

Frontiers in Cyber Security: Beyond the OS

Virtualization Technologies (ENCS 691K Chapter 3)

Xianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA (857)

5/03/2014. EDUCATION 2005 Ph.D. in Computers and Information Systems

Curriculum Vitae -- Yuan Zhang

ADAM MACNEIL BATES. Areas of specialization. Current Academic Appointment. Education. Honors & Awards

Michael B. Imerman. Princeton University Postdoctoral Research Associate July 2011 June 2012

Teaching in School of Electronic, Information and Electrical Engineering

YUNTAO DONG. Assistant Professor, School of Business, University of Connecticut

CURRICULUM VITAE OF NANCY L. MARTIN, PH.D. I. PROFESSIONAL AFFILIATION AND CONTACT INFORMATION

Graduate Student Orientation

How To Get A Job At A Major Business School

Bob Boothe. Education. Research Interests. Teaching Experience

Uni-directional Trusted Path: Transaction Confirmation on Just One Device

JINGQUAN LI, PH.D. Education

Graduate Student Orientation

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013

Drew P. Cingel Doctoral Candidate Department of Communication Studies School of Communication Northwestern University

Valerie Hannah Part-time Lecturer College of Education California State University, Fullerton Fullerton, CA

Curriculum Vitae. March 2012

ANYI LIU. 125M, 2101 E. Coliseum Blvd. Tel: 1-(260) Indiana Univ. Purdue Univ. Fort Wayne Web:

Ningzhong Li. University of Chicago, Booth School of Business, Chicago, IL MBA, Ph.D. in Accounting 2009

Storm Clouds Rising: Security Challenges for IaaS Cloud Computing

RESEARCH INTERESTS Modeling and Simulation, Complex Systems, Biofabrication, Bioinformatics

Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC

Muhammad K. Ghanbari, Computer Science dept.

Robert L. Bjorklund, Ph. D., Professor Woodbury University, School of Business. Office:

CURRICULUM VITAE. Jesse Bull. Game Theory, Contract Theory, Law and Economics, Microeconomics

Yampolskiy, Analysis of Cyber Infrastructure Authentication Failure Vulnerabilities to Inform Security Decisions

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

G. Bradley Bennett, CPA, Ph.D.

René F. Kizilcec. Curriculum Vitae

Shana K. Carpenter Curriculum Vitae October, 2007

Thomas S. Heydt-Benjamin

A Multi-layer Tree Model for Enterprise Vulnerability Management

Jonathon T. Giffin. Research Interests. Education

Curriculum Vitae Jennifer Merluzzi

Best Paper Award, Hawaii International Conference on System Sciences, HICSS-36 (2003)

ANANDHI S. BHARADWAJ

9700 South Cass Avenue, Lemont, IL URL: fulin

Z. JANE GU EMPLOYMENT

Doctor of Philosophy in Clinical Psychology Master of Science in Clinical Psychology Bachelor of Arts Graduate Research Assistant/Lab Manager

University of California, Los Angeles PhD Candidate, Critical Studies, Department of Architecture and Urban Design Expected Completion, 2015

Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )

AVIGAIL SACHS 222 E. Oklahoma Ave Knoxville, TN

Bradley, A. (2013). [Book Review: Will Our Children Have Faith by John Westerhoff II]. Journal of Education and Christian Belief. Vol 17, edition 1.

ADAM L. DOUPÉ. University of California, Santa Barbara. Advisor: Giovanni Vigna Topic: Black-Box Web Vulnerability Scanners

Towards a Secure and Efficient System for End-to-End Provenance

Adina Crainiceanu. Ph.D. in Computer Science, Cornell University, Ithaca, NY May 2006 Thesis Title: Answering Complex Queries in Peer-to-Peer Systems

MADISON NGAFEESON, Ph.D.

WEI CHEN. IT-enabled Innovation, Online Community, Open-Source Software, Startup Angel Funding, Interactive Marketing, SaaS Model

DOMAIN EXPERTISE METHODOLOGY SKILLS

EDUCATION: EXPERIENCE: Ph.D. Iowa State University, Fall 1998 Fields: Public Economics, Environmental Economics, Microeconomic Theory

North Georgia College and State University, Mike Cottrell College (School) of Business

Assistant Professor Boca Raton, FL Exercise Science & Health Promotion Office: (561)

Research Publications and Submissions

CURRICULUM VITAE Herbert L. Dershem

Survey on virtual machine security

Gender, crime, and victimization; social inequalities; intersectionality; fear of crime; campus crime; mixed methods research

Virtualization System Security

Jeffery L. Guyse. L. Robin Keller (Chair), R. Duncan Luce and Imran Currim. Decision Analysis and Decision Support Systems Behavioral Decision Making

PhD Student Temple University, Finance, August 2014 to Present. MA Renmin University of China, International Trade, July 2004

Angela Overton. Georgia State University Atlanta, GA Curriculum Vitae

WENDY L. FRASER, PhD 9628 Regency Loop SE Olympia, Washington Curriculum Vita

Lei (Edward) Gao. Phone (C): (517) Website:

Haiyi ZHU Curriculum Vitae

Curriculum Vitae: Gideon Mazambani

LI XU December, address: Contact Phone:

Software Defined Cloud Security Architectures

Diane Byrd 3138 Wedgewood Drive Macon, Ga

Dissertation title: Boards as strategy makers: The antecedents and consequences of board involvement in strategic decision making

SARAH E. IGO. Department of History 2302 Spruce Street #2

Jacqueline Amber Scherer, M.A.

DAVID KEITH JONES. December 10, 1962; Santa Monica, CA. Marital Status: Married to Marjorie Kathleen Smith: October 6, 2002

Todd D. Kravet. University of Washington, Foster School of Business Ph.D. in Accounting, August 2009 M.S. in Business Administration, June 2008

Information Security Attack Tree Modeling for Enhancing Student Learning

Online Remote Data Backup for iscsi-based Storage Systems

LI XU, PhD, CFE January, address: Contact Phone:

Xiaopeng (Paul) Wang Assistant professor. University of South Florida St. Petersburg th Avenue South, FCT 204 St. Petersburg, FL 33710

Assistant Professor, Department of Landscape Architecture and Urban Planning, Texas A&M University, August 2012 present.

EDUCATION. PhD. in Social Work Major: Social Policy Analysis Minor: Political Science. Master of Social Work Major: Direct Practice

JUN YU School of Business Emporia State University Phone: (620)

Meg Elizabeth Rithmire Morgan Hall 262, Soldiers Field Boston MA

CSE543 Computer and Network Security Module: Cloud Computing

Karthik Ramachandran

Transcription:

Fengwei Zhang Wayne State University 5057 Woodward Avenue, Suite 3010 Detroit, Michigan 48202 fengwei@wayne.edu http://fengwei.me Research Interest My primary research interests are in the areas of systems security, with a focus on trustworthy execution, memory introspection, system integrity checking, and transparent malware debugging. Education 08/2010 04/2015 Ph.D. in Computer Science, George Mason University, Department of Computer Science, Volgenau School of Engineering, Fairfax, VA, USA. Thesis: Using Hardware Isolated Execution Environments for Securing Systems Advisor: Prof. Angelos Stavrou 08/2008 05/2010 M.S. in Computer Science, Columbia University, Department of Computer Science, Fu Foundation School of Engineering and Applied Science, New York, NY, USA. Computer Security Track Advisor: Prof. Salvatore J. Stolfo 08/2006 05/2008 B.S. in Computer Science, Southern Polytechnic State University, Department of Computer Science,School of Computing and Software Engineering, Marietta, GA, USA. 2+2 Dual Bachelor Program Honor Thesis: Information Security Metrics Advisor: Prof. Andy Ju An Wang 09/2004 07/2008 B.S. in Computer Science, North China University of Technology, Department of Computer Science, College of Information Engineering, Beijing, China. 2+2 Dual Bachelor Program 08/2015 present Employment History Assistant Professor, Department of Computer Science, Wayne State University, Detroit, Michigan, USA. 01/2014 01/2015 Research Assistant, Center for Assurance Research & Engineering, George Mason University, Fairfax, VA, USA. 08/2011 01/2014 Research Assistant, Center for Secure Information Systems, George Mason University, Fairfax, VA, USA. 05/2011 08/2011 Research Intern, Advanced Technology Center, Microsoft Corporation, Beijing, China. 08/2010 05/2011 Teaching Assistant, Department of Computer Science, George Mason University, Fairfax, VA, USA. 01/2010 05/2010 Software Engineer Intern, Talkmi, New York, NY, USA. 1/6

Publications Patents 62/170,155 Fengwei Zhang, Kevin Leach, Angelos Stavrou, and Haining Wang. Using Hardware Features for Increased Debugging Transparency. Filed on June 03, 2015, Under U.S. Patent Application Number 62/170,155. TDSC 14 ACSAC 15 CSCloud 15 S&P 15 AsiaCCS 15 ESORICS 14 DSN 13 Refereed Journal Articles Fengwei Zhang, Jiang Wang, Kun Sun, and Angelos Stavrou. HyperCheck: A Hardware-Assisted Integrity Monitor. In IEEE Transactions on Dependable and Secure Computing, Vol.11, No.4, pp.332-344, July-August 2014. Refereed Conference Proceedings Bing Chang, Zhan Wang, Bo Chen, and Fengwei Zhang. MobiPluto: File System Friendly Deniable Storage for Mobile Devices. To appear in Proceedings of The 2015 Annual Computer Security Applications Conference (ACSAC 15), Los Angeles, CA, December 2015. [Acceptance rate: 24%] Dan Fleck, Sharath Hiremagalore, Stephen Reese, Liam McGhee, and Fengwei Zhang. Class-Chord: Efficient Messages to Classes of Nodes in Chord. To appear in Proceedings of The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 15), New York, NY, November 2015. Fengwei Zhang, Kevin Leach, Angelos Stavrou, Haining Wang, and Kun Sun. Using Hardware Features for Increased Debugging Transparency. In Proceedings of The 36th IEEE Symposium on Security and Privacy, San Jose, CA, May 2015. [Acceptance rate: 13%] Fengwei Zhang, Kevin Leach, Haining Wang, and Angelos Stavrou. TrustLogin: Securing Password-Login on Commodity Operating Systems. In Proceedings of The 10th ACM Symposium on Information, Computer and Communications Security, Singapore, April 2015. [Full paper acceptance rate: 18%] Fengwei Zhang, Haining Wang, Kevin Leach, and Angelos Stavrou. A Framework to Secure Peripherals at Runtime. In Proceedings of The 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 2014. [Acceptance rate: 24.79%] Fengwei Zhang. IOCheck: A Framework to Enhance the Security of I/O Devices at Runtime. In Proceedings of The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Budapest, Hungary, June 2013. [Student Paper] DSN 13 Fengwei Zhang, Kevin Leach, Kun Sun, and Angelos Stavrou. SPECTRE: A Dependable Introspection Framework via System Management Mode. In Proceedings of The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Budapest, Hungary, June 2013. [Acceptance rate: 22%] NDSS 12 Kun Sun, Jiang Wang, Fengwei Zhang, and Angelos Stavrou. SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes. In Proceedings of The 19th Annual Network & Distributed System Security Symposium, San Diego, CA, February 2012. [Acceptance rate: 18%] 2/6

IIC 07 SADFE 11 CSIIRW 08 Andy Ju An Wang, Min Xia, and Fengwei Zhang. Metrics for Information Security Vulnerabilities. In Proceedings of Intellectbase International Consortium, Atlanta, GA, October 2007. Referred Workshop Proceedings Jiang Wang, Fengwei Zhang, Kun Sun, and Angelos Stavrou. Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensic. In Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering, In conjunction with IEEE Symposium on Security and Privacy, Oakland, CA, May 2011. Andy Ju An Wang, Fengwei Zhang, and Min Xia. Temporal Metrics for Software Vulnerabilities. In Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, TN, May 2008. Technical Reports TR 11 Kun Sun, Jiang Wang, Fengwei Zhang, and Angelos Stavrou. SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes. Technical Report GMU-CS-TR-2011-8, Department of Computer Science, George Mason University, Fairfax, VA, August 2011. Research Experience 2011 2015 Research Assistant, Center for Assurance Research & Engineering and Center for Secure Information Systems, George Mason University. Advisor: Prof. Angelos Stavrou Transparent Malware Debugging [S&P 15]: Traditional malware analysis relies on virtualization or emulation technology. However, virtual machines and emulators inevitably create artifacts in the execution environment. I developed MalT [S&P 15], a debugging framework that employs System Management Mode to transparently study armored malware. MalT reduces the attack surface at the software level, and advances state-of-the-art debugging transparency. System Integrity Checking [ESORICS 14,TDSC 14]: Ensuing code integrity is critical for securing systems. I designed and implemented IOCheck [ESORICS 14], a framework to quickly check the integrity of I/O configurations and firmware at runtime. HyperCheck [TDSC 14] is a hardware-assisted tampering detection framework, that aims to protect the code integrity of hypervisors and kernels running on commodity hardware. Secure Password-Login [AsiaCCS 15]: Login credentials are easily stolen by attackers using keyloggers. I designed and implemented TrustLogin [AsiaCCS 15], a system to securely perform login operations on commodity operating systems. It does not modify underlying applications and OS on the target system and is able to prevent rootkits and stealthy malware from stealing sensitive data at local host. 3/6

Summer 2011 Spring 2010 Memory Introspection [DSN 13]: Virtual Machine Introspection (VMI) systems have been widely adopted for malware detection and analysis. I designed and implemented SPECTRE [DSN 13], a dependable framework that leverages System Management Mode (SMM) to inspect the state of a system. It can detect memory attacks including heap spray, heap overflow, and rootkits. Isolated Execution Environment [NDSS 12]: Trustworthy isolated computing environments can segregate different activities to lower the risk of untrusted computing environments. I co-developed SecureSwitch [NDSS 12], a BIOS-assisted mechanism to enable secure instantiation and management of isolated computing environments, tailored to separate security-sensitive activities from untrusted ones on x86 architecture. Research Intern, Advanced Technology Center, Microsoft Corporation. Advisor: Dr. Hongjiang Zhang ARM TrustZone: Microsoft Windows 8 started to support ARM architecture, and TrustZone technology is a security extension in the ARM processor. I studied several use cases of TrustZone in Windows 8, including software license management and secured PIN entry for enhanced user authentication in mobile payments & banking. Project Assistant, Intrusion Detection System Laboratory, Columbia University. Advisor: Prof. Salvatore J. Stolfo Vulnerable Embedded Device Scan: I co-developed an efficient scan system to assess the vulnerability rate of embedded devices such as routers, switches, and printers. It first scan a target network to identify the services running in the network, and then use the default credentials to login and gain the root privilege. 2007-2008 Research Assistant (undergraduate), Information Security Research Group, Southern Polytechnic State University. Advisor: Porf. Andy Ju An Wang Security Vulnerabilities Metrics [IIC 07,CSIIRW 08]: Metrics are important to information security because they can be an effective tool for information security professionals to measure, control, and improve their security mechanisms. Common Vulnerability Scoring System (CVSS) is a popular tool that quantifies the severity and risk of a vulnerability. I co-analyzed several issues in CVSS and co-proposed the solutions [IIC 07,CSIIRW 08]. A prototype of the proposed solutions, CVSSWizzard, is implemented as result of this work. Fall 2015 Spring 2011 Spring 2011 Teaching Experience Instructor CSC 6991 Advanced Computer Security, Wayne State University. Teaching Assistant CS 571 Operating Systems, George Mason University. Instructor: Prof. Hakan Aydin ISA 562 Information Security Theory and Practice, George Mason University. Instructor: Prof. Ahmed Alazzawe 4/6

Fall 2010 CS 310 Data Structures, George Mason University. Instructor: Prof. Richard Carver TDSC ICM Professional Service Reviewer IEEE Transactions on Dependable and Secure Computing IEEE Internet Computing Magazine External Reviewer S&P IEEE Symposium on Security and Privacy, 2015 DSN IEEE/IFIP International Conference on Dependable Systems and Networks, 2013, 2015 Talks and Presentations Invited Talks July 2015 TrustLogin: Securing Password-Login on Commodity Operating Systems, Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China. Host: Prof. Zhan Wang July 2014 May 2015 Using Isolated Execution Environments for Securing Systems, Summer Faculty Workshop, Southern Illinois University, College of Applied Sciences and Arts, Carbondale, IL. Host: Prof. Andy An Ju Wang Conference Presentations Using Hardware Features for Increased Debugging Transparency, The 36th IEEE Symposium on Security and Privacy, San Jose, California. Session Chair: Prof. Farinaz Koushanfar April 2015 TrustLogin: Securing Password-Login on Commodity Operating Systems, The 10th ACM Symposium on Information, Computer and Communications Security, Singapore. Session Chair: Prof. Yingjiu Li June 2013 June 2013 IOCheck: A Framework to Enhance the Security of I/O Devices at Runtime, The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Budapest, Hungary. Session Chair: Prof. Yair Amir SPECTRE: A Dependable Introspection Framework via System Management Mode, The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Budapest, Hungary. Session Chair: Prof. Marco Vieira Honors and Awards April 2015 Outstanding Graduate Student Award, George Mason University, Department of Computer Science. 5/6

October 2014 June 2013 June 2012 May 2008 Dissertation Completion Grant, George Mason University. Grant amount: $8,000 Term of award: Spring 2015 semester Travel Grant, Trusted Infrastructure Workshop, Pennsylvania State University, University Park, PA. Travel Grant, Joint Summer Schools on Cryptography and Principles of Software Security, Pennsylvania State University, University Park, PA. Magna Cum Laude, Graduated from Southern Polytechnic State University, Marietta, GA. 2007 2008 Honors Program Member, Southern Polytechnic State University, Marietta, GA. 2007 2008 Alpha Chi Member, National College Honors Scholarship Society. 2006 2008 Dean s List, Southern Polytechnic State University, Marietta, GA. Membership Association for Computing Machinery (ACM) Institute of Electrical and Electronics Engineers (IEEE) The Advanced Computing Systems Association (USENIX) 6/6