CYBERSEC 2021 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

May 4-6 at Taipei Nangang Exhibition Center, Hall 2

Shin-Ming Cheng

Shin-Ming Cheng

Associate Professor, Department of Computer Science and Infomration Engineering, National Taiwan University of Sciecne and Technology

Shin-Ming Cheng received his B.S. and Ph.D. degrees in computer science and information engineering from National Taiwan University, Taipei, Taiwan, in 2000 and 2007, respectively. Since 2012, he has been on the faculty of the Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei, where he is currently an associate professor. Since 2017, he has been with the Research Center for Information Technology Innovation, Academia Sinica, Taipei, as a joint assistant research fellow. Since 2014, he incubates cybersecurity talent with the support from Ministry of Education and holds advanced information security summer schools (AIS) each year. His current interests are telecommunications and mobile network security. Moreover, he investigates on IoT system security and development of cybersecurity platform. 

  • May 5th (Wed)
  • 14:45 - 15:15
  • 4F 4A 展區會議室

Enabling IoT EDR by Firmware Emulation and Re-hosting

The properties of constrained resource, unfriendly interface, and heterogeneous architectures for IoT endpoint devices make secure protection for them extremely difficult. The mature protection mechanisms for traditional desktops (e.g., Antivirus or EDR) cannot be directly applied into IoT scenario. By extracting firmware of a IoT physical endpoint device and executing it in an emulated IoT system, this speech discusses how to establish a virtual IoT device with high fidelity and leverage system-level monitoring and IDS to achieve EDR for IoT endpoint devices.

Endpoint Detection & ResponseEndpoint SecurityFirmware Security
Read More
Cyber Talent Forum 資安人才論壇
  • May 6th (Thu)
  • 10:40 - 11:10
  • 4F Cyber Talent 專區
5G Security Forum
  • May 6th (Thu)
  • 11:30 - 12:00
  • 7F 701B

Countermeasures against Rogue BS Attacks in 5G Non-public Networks.

Recently, industry could lease spectrum and non-public network to realize 5G killer applications such as intelligent factory. However, the popularity of 5G opensource and the occurrence of cheap software define radio (SDR) enable experimental base stations (BSs) possible. Adversary could easily adopt such BSs to launch malicious attacks against availability, integrity, and privacy of industrial IoT devices. In this speech, we deploy sensors with the aid of mobile edge computing (MEC) in 5G non-public network to detect rogue BS attack and mitigate its negative effects. 

5G SecurityMobile SecurityTelecom Security
Read More