School of Electrical Engineering & Computer Science National University of Sciences & Technology (NUST), Pakistan Research Profile Fauzan Mirza.

Slides:



Advertisements
Similar presentations
5 th Annual Workshop on the Teaching Computer Forensics Virtualising Computer Forensics Dr. Jianming Cai Mr. Ayoola Afonja
Advertisements

Professor Nigel Linge Computer Networking and Telecommunications Research Group University of Salford.
Windows Vista Serious Challenges for Digital Investigators Authors: Darren Hayes Shareq Qureshi Presented By: Prerna Gupta.
WINDOWS FORENSICS FOR INCIDENT RESPONSE CHRISTIAN KOPACSI CISSP CISM CEH CHFI SECURITY+
2 Language of Computer Crime Investigation
Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications.
Wilber R. Rivas Del Rio High School San Felipe Del Rio CISD Dr. Guofei Gu Director of SUCCESS laboratory Secure Communication and Computer Systems Computer.
Mobile Computing Dorota Huizinga Department of Computer Science.
Part 4  Software 1 Conclusion Part 4  Software 2 Course Summary  Crypto o Basics, symmetric key, public key, hash functions and other topics, cryptanalysis.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
IST DEVELOPMENT IN LATVIA
Conclusion 1 Conclusion Conclusion 2 Course Summary  Crypto o Basics, symmetric key, public key, hash functions and other topics, cryptanalysis  Access.
Chapter 8 Operating Systems and Utility Programs By: James Granahan.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Passwords, Encryption Forensic Tools
Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU.
A First Course in Information Security
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
Using cryptography to protect data in networks. Summary National Taras Shevchenko University of Kiev Ukraine Vsevolod Ievgiienko.
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
CS 1308 Computer Literacy and the Internet. Introduction  Von Neumann computer  “Naked machine”  Hardware without any helpful user-oriented features.
CONTENTS Sending and receiving devices Mobile devices connected to networks – Smart phones – Personal digital assistants – Hand-held computers – Netbook.
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Dr. Alireza Ghorshi Dr. Mohammad Mortazavi Dr. Mohammad Khansari Dr. Alireza Nemany Pour.
Software.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Lecture 2 Title: Computer Software By: Mr Hashem Alaidaros MIS 101.
School of Electrical Engineering & Computer Science National University of Sciences & Technology (NUST), Pakistan Research Profile Dr. Nazar Abbas Saqib.
Introduction University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
School of Electrical Engineering & Computer Science National University of Sciences & Technology (NUST), Pakistan Research Profile Rehan Hafiz.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Csci5233 Computer Security1 Bishop: Chapter 11 An Overview of Cipher Techniques (in the context of networks) ( )
Chapter 4 Application Level Security in Cellular Networks.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Lecture 8: 9/19/2002CS149D Fall CS149D Elements of Computer Science Ayman Abdel-Hamid Department of Computer Science Old Dominion University Lecture.
Research Profile Dr. N. D. Gohar NUST School of Electrical Engineering and Computer Science A center of excellence for quality education and research.
School of Electrical Engineering & Computer Science National University of Sciences & Technology (NUST), Pakistan Research Profile Aamir Shafi.
School of Electrical Engineering & Computer Science National University of Sciences & Technology (NUST), Pakistan Research Profile Tahir Azim.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
School of Electrical Engineering & Computer Science National University of Sciences & Technology (NUST), Pakistan Research Profile: Adeel Baig.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
Network Security and Security in Industry Paul Curtis.
Information Systems Design and Development Security Precautions Computing Science.
1 Item 3 - Research and Development of High Security Remote Authentication Technology Item 3 - Research and Development of High Security Remote Authentication.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
Detect Malware No One Else Can… Rapidly Identify it’s capabilities, Mitigate the Threat with Actionable Risk Intelligence.
Systems Security Keywords Protecting Systems
Outline Desirable characteristics of ciphers Uses of cryptography
Types of Software.
Information Assurance & Network Security Certificate
Vaal university of technology
Presentation transcript:

School of Electrical Engineering & Computer Science National University of Sciences & Technology (NUST), Pakistan Research Profile Fauzan Mirza

Overview  Ph.D., Information Security –School: Royal Holloway, University of London (RHUL), UK –Graduation Date: May 2002 –Thesis Title: Analysis of Some Modern Symmetric Ciphers  Over 15 years Experience and Skills: –Forensic Computing / Digital Evidence Investigation –Computer Viruses / Malware Analysis –Data Recovery –Network / Internet Security –System Programming on DOS, Windows, and Linux –Software Reverse Engineering / Security Analysis –Cryptography / Cryptanalysis / Password Recovery  At SEECS: –Assistant Professor in Communication Systems Engineering department –Co-Director: Information Security Research Group (ISRG) 2

Research Work  Refereed Publications: –F. Mirza and S. Murphy, “An Observation on the Key Schedule of Twofish”, 2nd Advanced Encryption Standard (AES) Workshop Proceedings, NIST, –S. R. Blackburn, K. Brincat, F. Mirza, and S. Murphy, “Cryptanalysis of ‘Labyrinth’ Stream Cipher”, Electronics Letters, IEE, 38(12): ,  Research & Development Projects initiated at SEECS: –Generic Technique for Detection of Malicious Software –Development of Digital Evidence Acquisition & Analysis Toolkit –Techniques for Information Hiding  Research Papers Co-authored at SEECS: –Low-Complexity Malicious Executable Detection (with HK and SAK) –Looking for Digital Evidence in Windows –Covert Channel in Mass Storage Devices (with HK and SAK) –A Covert Channel Using Multiple Active Connections (with HK and SAK) –Covert Channel using TCP Checksum (with HK) 3

Current Projects  Project Supervisor at SEECS: –Malicious software analysis toolkit –Enterprise solution for forensic computer investigations –Digital evidence from digital cameras and mobile phones –Active forensic analysis of Windows-based computers –Penetration detection and network incident response toolkit –Software-based disk write blocker and forensic imager –Application and OS fingerprinting techniques in network security –Network security attacks and defence  Co-PI on Externally-Funded Projects: –An Artificial Immune System Based General Purpose Intrusion Detection System Funding Agency: Pakistan National ICT R&D Fund Amount: 10.9 million rupees –Network-Embedded Security using In-Network Packet Marking Submitted to Pakistan National ICTR&D Fund 4