| Home | | Research Summary | | Publications | | Research interests | | Curriculum Vitae | | Friends | | Teaching |
http://www.zhichunli.org |
My research interests span the areas of security, networking and networked systems with an emphasis on network security, smartphone security, web security, enterprise security with a big-data approach, cloud security, social network security, network measurement and distributed system diagnosis.
2004.08 ― Present | Northwestern University, Evanston, IL 60201,
USA Ph.D. in Computer Science (Dec 2009) Dissertation topic: Router-based Anomaly/Intrusion Detection and Mitigation Advisor: Prof. Yan Chen GPA: 4.0/4.0 |
2000.09 ― 2003.07 | Tsinghua University, Beijing, P.R. China M.S. in Computer Science |
1997.09 ― 2000.07 | Tsinghua University, Beijing, P.R. China B.S. in Applied Physics Finished the four-year undergraduate program in three years |
2010.08 ― Present | NEC Research Labs, Princeton, NJ 08536, USA |
Research Staff
Member in the Robust and Secure Systems group at NEC Research Labs,
Princeton
|
|
2004.08 ― 2010.07 | Northwestern University, Evanston, IL 60201, USA |
2009.12 ― 2010.07 Research Associate for Yan Chen,
Department of EECS 2004.08 ― 2009.12 Research Assistant for Yan Chen, Department of EECS I have worked on many different security and networking
projects – all motivated by the need to improve security and robustness
of network services on the Internet.
|
|
2008.06 ― 2008.09 | Microsoft Research, Redmond, WA98052, USA |
Research Intern
mentored by Ming Zhang, Albert Greenberg and Yi-min Wang
|
|
2006.06 ― 2006.09 | ICSI Center for Internet Research, Berkeley, CA94704, USA |
Research Intern
mentored by Vern Paxson (ICSI & UC Berkeley)
|
|
2003.08 ― 2004.08 | Tsinghua University, Beijing P.R. China |
Researcher
in IP Monitoring and Accounting Group, National Network Center of CERNET
|
|
2000.3 ― 2003.07 | Tsinghua University, Beijing P.R. China |
Graduate
Research Assistant in IP Monitoring and Accounting Group, CERNET
|
NetShield. A software prototype of the NetShield vulnerability signature based intrusion detection system.
We intend to build the software prototype of NetShield as a better alternative to the popular open source tool Snort.
(http://www.nshield.org)
Hamsa. A C++ implementation of the Hamsa polymorphic worm signature
generator that includes a fast token extraction library and the Hamsa core
engine. When given suspicious traffic as input and normal traffic as reference,
Hamsa generates the token conjunction signatures for possible worms in the
suspicious traffic. Upon the requests from various institutions such as Columbia
Univ., UT Austin, Purdue Univ., Georgia Tech and UC Davis, I released the Hamsa
system and its related testing polymorphic worms in 2006.
(http://www.zhichunli.org/software/download.php?file=CHamsa-1.0.tar.gz)
RevSketch. A C++ implementation of the k-ary reversible sketch data structure and its heavy key recovery algorithm. RevSketch is capable of recording a large number of flows. It has APIs to combine multiple reversible sketches linearly and then to recover the heavy keys. (http://www.zhichunli.org/software/download.php?file=RevSketch-1.0.tar.gz)
Linuxflow. A passive network measurement facility which is faster than the standard AF_PACKET in the Linux kernel. It includes a set of Linux kernel modules designed for high-speed networks such as gigabit networks. It provides APIs for users to write packet-filter code and to manipulate packets in Linux kernel space, and also provides capability to send packet information to user-space applications by a socket interface. This tool has been used in the IP Accounting System of CERNET (China Education and Research Network), and has stably run for more than five years. (http://www.zhichunli.org/linuxflow)
2013 | Program Committee, IEEE/ACM International Symposium on Quality of Service (IWQoS) |
2013 | Program Committee, ACM Symposium on Information, Computer & Communications Security (ASIACCS) |
2013 | Program Committee, Network & Distributed System Security Symposium (NDSS) |
2013 | Program Committee, IEEE INFOCOM |
2012 | Program Committee, International Conference on Availability, Reliability and Security (AReS) |
2012 | Program Committee, ACM Symposium on Information, Computer & Communications Security (ASIACCS) |
2012 | Program Committee, International World Wide Web Conference (WWW), the Security, Privacy, Trust and Abuse track |
2012 | Program Committee, IEEE INFOCOM |
2012 | Program Committee, IEEE International Conference on Computing, Networking and Communications, Cloud Computing and Networking Symposium (ICNC-CLD) |
2011 | Web Chair, ACM Conference on Computer and Communication Security (CCS) |
2011 | Program Committee, ACM Conference on Computer and Communication Security (CCS) Poster & Demo Session |
2011 | Program Committee, IEEE ICC Next-Generation Networking and Internet Symposium (ICC NGNI) |
2011 | Program Committee, IEEE GLOBECOM Next-Generation Networking (NGN) Symposium |
2011 | Program Committee, IEEE International Workshop on Security in Computers, Networking and Communications (SCNC) |
2010 | Program Committee, IEEE International Workshop on Quality of Service (IWQoS) |
2010 | Program Committee, IEEE GLOBECOM Next-Generation Networking (NGN) Symposium |
2010 | Program Committee, IEEE Vehicular Technology Conference: VTC2010-Fall |
2009 | Program Committee, International ICST Conference on Security and Privacy in Communication Networks (SecureComm) |