- National Engineering Research Center for New Technology of E-Publishing
- Center for Chinese Font Design and Research
- Network and Information Security Laboratory of Peking University
- Key Laboratory of Intelligent Press Media Technology
Network and Information Security Laboratory of Peking University
Network and Information Security Laboratory of Peking University (Zhongguancun Open Laboratory), as a part of ICST, contributes to research and development on network and information security technology. The lab is a key department of information security research center of Peking University Advanced Technology Research Institute.
The lab focuses on both research and industry applications, specifically, software vulnerability analysis, malicious code detection and prevention, new forms of network security threat monitoring, multimedia content security, digital rights management, digital watermarking, etc. At the same time, our lab undertakes state and industrial projects, and transfers research outcome to industrial applications.
The lab focuses on network and information security. Current research areas include:
• Software Vulnerability Mining: security vulnerability discovery, analysis and protection for generic computing systems, embedded systems, and mobiles. Specific topics include decompiler technology for security analysis, path feasibility verification, context-sensitive and flow-sensitive execution space traversal technology.
• Malicious code detection and prevention: the detection, analysis and defense for computer viruses, network worms, Trojans, bots, spyware, rogue software, rootkits and other malicious codes. Topics include botnet code analysis, mobile and P2P malicious code analysis, static and dynamic analysis for malicious codes, malicious code behavior analysis and attack scene reconstruction, malicious code detection and feature extraction technology, high-performance malicious code detection and filtering technology, etc.
• New forms of network security threat monitoring: active and passive monitoring methods and support technology on new forms of network threats for large-scale network systems and backbone networks. Topics include the honey-net and honey-field key technology and application, botnet monitoring technology, P2P system security threat monitoring technology, application traffic classification and identification technology, network data flow analysis and feature extraction technology, network malicious behavior detection technology, security threat tracking and active defense technology.
• Multimedia content security: content search, content identification, semantic analysis and security analysis for images, video, audio and other multimedia information including streaming media.
• Digital Rights Management: supporting technologies of DRM, including rights expression and enforcement , rights granting and transferring, key management technology, etc.; research on technologies of DRM for digital publishing, such as digital content secure distribution and authorization, trusted counting mechanism in DRM, offline usage control of digital content; research on technologies of digital rights management for multi-mode applications, including dynamic rights enforcement, content key binding technologies under a variety of hardware environments, fine grained multi-level security control over digital content, etc.
• Digital watermarking: high security image watermarking and steganography technology, shading-based secure printing technology; text document information tracking, electronic document format identification; research on adaptive security steganography, targeted and generic steganalysis, reversible information hiding, document file encryption and security protection technology. These provide technical support to multimedia file copyright protection, secret data communication, important documents and digital signature authentication and other information security issues.