1 / 4

Research Profile

Research Profile. Fauzan Mirza. Overview. Ph.D., Information Security School: Royal Holloway, University of London (RHUL), UK Graduation Date: May 2002 Thesis Title: Analysis of Some Modern Symmetric Ciphers Over 15 years Experience and Skills:

fleur
Télécharger la présentation

Research Profile

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Research Profile Fauzan Mirza

  2. Overview • Ph.D., Information Security • School: Royal Holloway, University of London (RHUL), UK • Graduation Date: May 2002 • Thesis Title: Analysis of Some Modern Symmetric Ciphers • Over 15 years Experience and Skills: • Forensic Computing / Digital Evidence Investigation • Computer Viruses / Malware Analysis • Data Recovery • Network / Internet Security • System Programming on DOS, Windows, and Linux • Software Reverse Engineering / Security Analysis • Cryptography / Cryptanalysis / Password Recovery • At SEECS: • Assistant Professor in Communication Systems Engineering department • Co-Director: Information Security Research Group (ISRG)

  3. Research Work • Refereed Publications: • F. Mirza and S. Murphy, “An Observation on the Key Schedule of Twofish”, 2nd Advanced Encryption Standard (AES) Workshop Proceedings, NIST, 1999. • S. R. Blackburn, K. Brincat, F. Mirza, and S. Murphy, “Cryptanalysis of ‘Labyrinth’ Stream Cipher”, Electronics Letters, IEE, 38(12):1220-1221, 1998. • Research & Development Projects initiated at SEECS: • Generic Technique for Detection of Malicious Software • Development of Digital Evidence Acquisition & Analysis Toolkit • Techniques for Information Hiding • Research Papers Co-authored at SEECS: • Low-Complexity Malicious Executable Detection (with HK and SAK) • Looking for Digital Evidence in Windows • Covert Channel in Mass Storage Devices (with HK and SAK) • A Covert Channel Using Multiple Active Connections (with HK and SAK) • Covert Channel using TCP Checksum (with HK)

  4. Current Projects • Project Supervisor at SEECS: • Malicious software analysis toolkit • Enterprise solution for forensic computer investigations • Digital evidence from digital cameras and mobile phones • Active forensic analysis of Windows-based computers • Penetration detection and network incident response toolkit • Software-based disk write blocker and forensic imager • Application and OS fingerprinting techniques in network security • Network security attacks and defence • Co-PI on Externally-Funded Projects: • An Artificial Immune System Based General Purpose Intrusion Detection System • Funding Agency: Pakistan National ICT R&D Fund • Amount: 10.9 million rupees • Network-Embedded Security using In-Network Packet Marking • Submitted to Pakistan National ICTR&D Fund

More Related