You are here
Colloquia: Dr. Peng Gao, University of California - Berkeley
Presenter: Dr. Peng Gao
Title: Building Trustworthy Systems for Fighting Modern Threats
Abstract: The increased opaqueness in computing systems makes them vulnerable to sophisticated cyber attacks (e.g., Advanced Persistent Threats). Consequently, many businesses have been plagued with huge losses (e.g., Equifax, Target, Yahoo). In addition, the success of emerging technologies such as online social networks and blockchain has come at the cost of new threats to security. How can we gain visibility into currently opaque computing systems and defend them from sophisticated attacks? How can we re-architect our computing for fighting new threats?
In this talk, I will cover multiple systems I have built for addressing these pressing issues. I will primarily discuss the advanced threat protection (ATP) stack, which brings transparency into computing systems (via ubiquitous system auditing) and connects the dots across system activities in various ways (forensically vs. real-time, manually vs. semi-automatically vs. automatically) to fight advanced threats. The ATP stack is multi-disciplinary, using techniques from system security, operating system, database, compiler, machine learning, and natural language processing. It includes multiple research efforts and has had real-world impact. I will also cover other systems on using AI for automated threat intelligence gathering and management and using network science and program analysis for securing online social networks and blockchain. I will conclude the talk by describing my future research agenda and long-term vision towards a secure and trustworthy cyberspace.
Bio: Peng Gao is a Postdoctoral Researcher in Computer Science at UC Berkeley. He received his Ph.D. in Electrical Engineering from Princeton University in 2019. His research interest lies in security and privacy issues in systems and networks. His work centers on creating scalable, secure, and trustworthy systems to solve real-world problems, with publications at multiple premier academic venues (e.g., USENIX Security, USENIX ATC, ACM CCS, ICDE, ICSE). His work on advanced threat protection has been successfully deployed in the real-world enterprise and commercialized, and has been selected as the Top-10 Finalist in the 2018 CSAW Best Applied Research Paper Competition. His proposals on threat intelligence and threat hunting have been selected as the winners of the 2020 Microsoft Security AI Research Award and the 2020 Amazon Research Awards. He also has rich industry experience through multiple internships at leading companies and research labs (e.g., Microsoft Research, Microsoft Research Asia, Facebook, etc.).
To join this Zoom Presentation, please click:
Join from a PC, Mac, iPad, iPhone or Android device:
Please click this URL to start or join. https://iastate.zoom.us/j/96673657512?pwd=d2FXS0k3MVRhTW5mQktFUGFVTktCQT09
Or, go to https://iastate.zoom.us/join and enter meeting ID: 966 7365 7512 and password: 031521
Join from dial-in phone line:
Dial: +1 301 715 8592 or +1 312 626 6799
Meeting ID: 966 7365 7512
Participant ID: Shown after joining the meeting
International numbers available: https://iastate.zoom.us/u/abrJs15ueM
After the presentation, there will be short time for discussion and questions.