QUICKLOOK: Strategic Synergy: The SSF's Collaboration with Peking University in Advancing China's Information Warfare Capabilities (PART 3)
Unraveling the Nexus between China's Elite Cyber Force and Premier Academic Institution in the Digital Age
Contact Address
Peking University Network and Software Security Key Laboratory
Room 1533N, Science Building No.1, Peking University, Haidian District, Beijing, 100871.
Affiliated Links
Peking University
Institute of Software, Chinese Academy of Sciences
Beijing University of Posts and Telecommunications
School of Software & Microelectronics, Peking University
Peking University Information Security Laboratory
Common Services
Peking University Campus Portal
Peking University Network Services
Peking University Email
Peking University Teaching Network
Peking University Cloud Storage
WeChat Public Account
Software and Network Security
Breaking Down the Sections:
Past Group Leaders
A quick glance.
Chen Xiarun:陈夏润:
Chen Xiarun is an academic researcher affiliated with Peking University, one of China's premier institutions. His research contributions, as found on platforms like ResearchGate and DeepAI, predominantly revolve around code obfuscation, a technique used to increase the difficulty of understanding programs, thereby enhancing software security. One of his notable works includes the enhancement of OLLVM, a tool that offers the possibility of cross-platform code obfuscation.
Given the strategic importance of cybersecurity in today's digital age, the expertise of researchers like Chen Xiarun is invaluable. The collaboration between academic institutions like Peking University and the government or military entities can lead to the development of advanced cybersecurity tools and techniques. Such capabilities, when harnessed by state actors, could potentially be on par with the sophisticated tactics observed in Nation State Advanced Persistent Threat (APT) activities. The government's inclination to tap into academic talent underscores the symbiotic relationship between academia and national security in the realm of cyber warfare.
Li Jingwei:李经纬:
University of Electronic Science and Technology of China (UESTC) [电子科技大学]: Jingwei Li is identified as a researcher at the School of Computer Science and Engineering at UESTC. He is based in Chengdu, Sichuan, P.R. China. His contact details include an email address associated with UESTC and a Gmail address. Source
Tsinghua University [清华大学]: Another individual named Jingwei Li is mentioned as a first-year Ph.D. student at the Institute for Interdisciplinary Information Sciences (IIIS) at Tsinghua University. His research interests include reinforcement learning and parameter-free optimization.
Google Scholar: A profile for Jingwei Li is available on Google Scholar, where he is associated with the University of Electronic Science and Technology of China. His publications and research contributions can be found on this platform. Source
Zhang Han:张汉: Georgia Tech Establishes China Foundation
Zhang Han at the Department of Info Systems & Cyber Security: Dr. Zhang's research focuses on the economics of information technology, online trust and reputation, online word-of-mouth, and the evolution of electronic markets. Source
Zhang Han's Research at Tsinghua University: Han Zhang has conducted research on various topics, including a High-Performance FaaS Platform for Network Functions. The mention of practical security analysis suggests that Zhang Han might have expertise in this area. Source
Zhang Han's Research on Cybersecurity Event Detection: Zhang Han has worked on cybersecurity event detection, aiming to detect and classify the occurrence of cybersecurity events from vast amounts of data. The research indicates the use of trigger mechanisms for event detection. Source
Zhang Chi:张弛:
Chi Zhang (张弛) at Nanjing University: A Chi Zhang is identified as a Ph.D. student of Nanjing University. He has contributed to the Journal of Cyber Security (信息安全学报) in 2021. Source
Chi Zhang (张弛) at Microsoft: There's a profile for a Chi Zhang (张弛) on Microsoft's MVP platform, but the details provided do not specifically mention cybersecurity. Source
Chi Zhang (张弛) at Chinese Academy of Sciences: Another Chi Zhang is associated with the Beijing Institute of Nanoenergy and Nanosystems at the Chinese Academy of Sciences. However, this profile seems to be more related to nanotechnology rather than cybersecurity. Source
Chi Zhang (张弛) at China Media University: There's a mention of a Chi Zhang associated with China Media University. The profile suggests expertise in computer software system design, data mining, and media information data digitization. Source
LinkedIn Profiles: There are multiple profiles named "张 (zhang)弛 (chi)" on LinkedIn, but without specific details, it's challenging to identify which, if any, are related to cybersecurity. Source
Zi Ya:子芽:
Zhang Tao (张涛), is a renowned figure in China's cybersecurity landscape. Hailing from Jiujiang, Jiangxi Province, he pursued his academic endeavors at the prestigious Peking University [北京大学]. Today, he stands as the Founder and CEO of Xuanjing Security (悬镜安全), a company that emphasizes the innovative "code vaccine" technology. This unique technology aims to serve various industries, including finance, connected vehicles, the broader internet, smart manufacturing, telecommunications, and energy.
Zi Ya's research in the digital supply chain security domain is noteworthy. He has delved deep into the "code vaccine" algorithm and has been a pioneer in introducing concepts such as the "DevSecOps Adaptive Threat Management System" and the "DevSecOps Agile Security Technology Pyramid". These concepts are pivotal in addressing the security challenges that arise from the agile nature of software development and the open-source nature of the software supply chain.
In addition to his research and entrepreneurial ventures, Zi Ya is also an author. He penned the book "DevSecOps Agile Security", which offers a systematic perspective on the practical aspects of DevSecOps agile security. This book is a valuable resource for enterprises seeking solutions to the ever-evolving security challenges. Furthermore, Zi Ya is a regular at various cybersecurity conferences, often sharing his insights on emerging technologies and their applications in the DevSecOps domain.
Mei Rui:梅瑞:
A distinguished cybersecurity expert, currently undertaking his Ph.D. at the University of Chinese Academy of Sciences. His professional background spans roles in government data management and internet-listed companies, where he has made significant contributions to national-level information security projects. These projects have led to advancements in binary vulnerability discovery and granular data security systems. At iFlytek Group, Mei Rui played a pivotal role in shaping corporate information security management systems, with a keen focus on R&D and data security. As a senior security expert, he has offered IT risk consulting to industry leaders like Railway 12306 and Tangshan Bank. His expertise is frequently showcased at conferences, such as ISC 2013 and NSC 2013, and he has also contributed to literature in the field with an information security book. Currently, Mei Rui's research delves into areas like targeted attack tracing, malicious code monitoring, and cloud application security.
Zhou Husheng:周虎生: Confucius Institute UT Dallas poss. connection
University of Texas at Dallas: Zhou Husheng is associated with the Department of Computer Science at the University of Texas at Dallas (UTD). He has been cited in numerous publications and has made significant contributions to the field. Source
VMware: Zhou Husheng has been identified as a Member of the Technical Staff at VMware. He has previously worked in the vSphere Bitfusion group, focusing on GPU virtualization. Source
ACM Digital Library: Husheng Zhou is mentioned in the ACM Digital Library in association with the University of Texas at Dallas, Department of Computer Science. He has collaborated with other researchers on various topics. Source
Research Contributions: Zhou Husheng has been involved in research related to Graphics processing units (GPUs) and their application in various domains. He has also contributed to research on CUDA synchronization bugs and their detection. Source
Google Scholar: A profile for Zhou Husheng is available on Google Scholar, where he is associated with the University of Electronic Science and Technology of China. His publications and research contributions can be found on this platform. Source