CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

bg-inner
Shin-Ming Cheng

SPEAKER

Shin-Ming Cheng

National Taiwan University of Sciecne and Technology Professor, Department of Computer Science and Information Engineering

Shin-Ming Cheng received his B.S. and Ph.D. degrees in computer science and information engineering from the National Taiwan University, Taipei, Taiwan, in 2000 and 2007, respectively. Since 2012, he has been on the faculty of the Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei, where he is currently a professor. Since 2017, he has been with the Research Center for Information Technology Innovation, Academia Sinica, Taipei, as a joint assistant research fellow. Since 2014, he incubates cybersecurity talent with the support of the Ministry of Education and holds advanced information security summer schools (AIS3) each year. His current interests are mobile network security and IoT system security. Recently, he investigates malware analysis and AI robustness. He has received IEEE Trustcom 2020, CISC 2020/2021, TANET 2021 best paper awards due to his solid research in cybersecurity.

Speech

5G Security Forum

SEP 21

#

Security Challenges in 5G O-RAN

09/21 (Wed) 16:45 - 17:15 7F 701E
National Taiwan University of Sciecne and Technology Professor, Department of Computer Science and Information Engineering / Shin-Ming Cheng

With an open architecture and interface, O-RAN is designed to build the next-generation RANs with intelligent control. It can provide a certain degree of flexibility and customization and allow new communication interfaces between network components (e.g., O-CU, O-DU) and Radio Access Network Intelligent Controllers (RICs). Moreover, it can work with real-time detection, response, and management with machine learning (ML) algorithms on applications (xAPPs). However, the open architecture and interface also significantly increase the possibility of being attacked. This presentation not only explores the current development of the O-RAN alliance in information security, but also integrates O-RAN and Software Defined Radio (SDR) to realize an experimental network and explores the possible threats of new network components and interfaces in this experimental environment. Finally, we would also discuss the implementation of information security-related xAPP on O-RAN to enhance the security of O-RAN.

CyberLAB

SEP 22

# CyberLAB

Automatic IoT Firmware Emulation and Dynamic Analysis

09/22 (Thu) 09:30 - 11:30 4F 4D
National Taiwan University of Sciecne and Technology Professor, Department of Computer Science and Information Engineering / Shin-Ming Cheng
/

Dyanmic analysis is a useful solution for malware analysis while the complicated IoT hardware architecture and peripherals make automatic emulation of IoT devices challenging. This course will focus on how to apply recent firmware rehosting technologies (such as Firmadyne, FirmAE) to operate commerical firmware in emulated IoT systems. Moreove, we will introduce well known vulnerability discoverying tools to enable dynamic analysis to the emulated IoT devices.

CyberLAB

SEP 22

# CyberLAB

Automatic IoT Firmware Emulation and Dynamic Analysis

09/22 (Thu) 14:30 - 16:30 4F 4C
National Taiwan University of Sciecne and Technology Professor, Department of Computer Science and Information Engineering / Shin-Ming Cheng
/

Dyanmic analysis is a useful solution for malware analysis while the complicated IoT hardware architecture and peripherals make automatic emulation of IoT devices challenging. This course will focus on how to apply recent firmware rehosting technologies (such as Firmadyne, FirmAE) to operate commerical firmware in emulated IoT systems. Moreove, we will introduce well known vulnerability discoverying tools to enable dynamic analysis to the emulated IoT devices.