Beijing Information Security Test and Evaluation Center

Beijing, China

Beijing Information Security Test and Evaluation Center

Beijing, China
SEARCH FILTERS
Time filter
Source Type

Liang H.,Beijing University of Posts and Telecommunications | Zhao Q.,Beijing University of Posts and Telecommunications | Wang Y.,Beijing University of Posts and Telecommunications | Liu H.,Beijing Information Security Test and Evaluation Center
2016 IEEE/ACIS 17th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2016 | Year: 2016

Operating system (OS) plays an important role in the efficiency and security of service in Internet of Things (IOT). Considering the limited storage resources and power utilization mechanism in IOT OS, we explore the performance bugs and security bugs of three open source IOT OS (Contiki, TinyOS and RIOT OS), including the features of bugs cause, bugs mitigation, bugs detection rules and bugs fixing in them. We present Rulede, a tool built on LLVM compiler framework to find bugs. Experimental results show that Rulede can effectively detect performance bugs and security bugs in target IOT OSes. © 2016 IEEE.


Liu H.,Beijing Information Security Test and Evaluation Center | Liang H.,Beijing University of Posts and Telecommunications | Zhang X.,Beijing Information Security Test and Evaluation Center | Zhao Q.,Beijing University of Posts and Telecommunications | Wang L.,Beijing University of Posts and Telecommunications
Electronics, Communications and Networks IV - Proceedings of the 4th International Conference on Electronics, Communications and Networks, CECNet2014 | Year: 2015

The security of the Operating System (OS) is the basis of a complex computer system. OS used in key institutions of government and economics must be tested and certified according to the national/international standards. Several security standards and criteria related to operating system security are analyzed. Following with the standards and criteria, a test and evaluation method that combines static and dynamic test techniques is proposed. By creating and managing target properties database, test samples database, knowledge database and task database, an evaluation system is designed and implemented, which can make the test and evaluation of operating system functions automatic and effective. Experiments show that our system can reduce the workload of test and evaluation and keep the objectivity and authority. © 2015 Taylor & Francis Group, London.


Tang Y.,Henan Polytechnic University | Wang Z.,Henan Polytechnic University | Zhang W.,Henan Polytechnic University | Liu H.,Beijing Information Security Test and Evaluation Center | Guo Y.,Beijing University of Posts and Telecommunications
Shuju Caiji Yu Chuli/Journal of Data Acquisition and Processing | Year: 2014

Randomness tests of cryptographic algorithm is analyzed. In order to test and identify Zigbee protocol security of cryptographic algorithm in the internet of things (IOT), test modes are organized and divided combining with the characteristics of Zigbee networks and binary matrix rank theory test, and randomness tests method of Zigbee protocol are proposed based on matrix probability test. The method solves the one-sidedness of binary matrix rank test to simply judge random sequence by linear correlation. It can determine whether the Zigbee protocol encryption mechanism and encryption strength are implemented or not. Simulation results show that this algorithm has less errors, and higher reliability, which is much more convincing. The proposed method provides theoretical and practical guidance for information security evaluation of IOT. ©, 2014, Nanjing University of Aeronautics an Astronautics. All right reserved.


Liang H.,Beijing University of Posts and Telecommunications | Wu D.,Beijing University of Posts and Telecommunications | Liu S.,Beijing University of Posts and Telecommunications | Dai H.,Beijing University of Posts and Telecommunications | Liu H.,Beijing Information Security Test and Evaluation Center
International Journal of Distributed Sensor Networks | Year: 2016

With an increasing number of applications appearing, smartphones with powerful processors and a variety of sensors are ideal mobile devices at hand. On one hand, various applications which are able to provide personalization functions that provide the service of interest to users rely on gathering and analyzing the sensor data and other sensitive information. On the other hand, attackers can accurately classify activities of mobile users from these data. As a result, the risk of users compromising their privacy has risen exponentially. Mobile users currently cannot control how various applications handle the privacy of their sensor data. To address the issue, we present P3Android whose architecture can support applications' personalization functions in Android according to users' personae and use the concept of profile to prevent sensitive information fromunauthorized access. Furthermore, we provide a privacy protection service for legacy apps. which can enforce different protection policies according to the risk level of apps. All of these cooperate to provide both personalization awareness and privacy protection in Android. Experiments show that P3Android is feasible and effective. Copyright © 2016 Hongliang Liang et al.


Tang Y.,Henan Polytechnic University | Zhao W.,Henan Polytechnic University | Liang B.,Beijing Information Security Test and Evaluation Center | Zhao Z.,Beijing Information Security Test and Evaluation Center
Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology | Year: 2015

In order to effectively identify and test the encryption measures of ZigBee protocol, this paper studies secure working mode with ZigBee protocol and proposes a new security testing method based on randomness detection. This method synthetically considers the randomness of test sequences and test effectiveness, and uses the typical randomness detection algorithm to construct a reasonable testing program. By analyzing the characteristics of data frame structure in ZigBee network layer and application layers and testing ZigBee protocol data of different encryption mechanisms, this paper can effectively identify whether the transmission data are encrypted or not. By analyzing the encryption positions of load byte data, this paper can determine the encryption level of the ZigBee protocol data. The experimental results show that this method can accurately identify whether the ZigBee protocol data are encrypted and use the encryption level and can effectively test the encryption strength. ©, 2015, Nanjing University of Science and Technology. All right reserved.


Liu G.,Beijing Information Security Test and Evaluation Center | Qian X.,Beijing Information Security Test and Evaluation Center | Yan T.,Beijing Information Security Test and Evaluation Center | Huang S.,Beijing Information Security Test and Evaluation Center
Advances in Intelligent Systems and Computing | Year: 2013

Problems of current method for measuring firewall throughput are analyzed, and a new method for measuring firewall throughput is given. Samples are measured by the two methods, the results are compared, and the advantages of the new method are reached. © 2013 Springer-Verlag.


Yan J.,CAS Institute of Software | Ying L.-Y.,CAS Institute of Software | Liu H.-F.,Beijing Information Security Test and Evaluation Center | Su P.-R.,CAS Institute of Software | Feng D.-G.,CAS Institute of Software
Ruan Jian Xue Bao/Journal of Software | Year: 2014

Network measurement is the foundation for the in-depth research on P2P network. It's a prerequisite for the P2P protocol design, shared content searching, situational awareness as well as research on the security of P2P network. In structured P2P network with decentralized peer to peer relationship, high dynamics and unpredictable instantaneous disturbance, achieving highly accurate and near-complete information retrieval is much more difficult. This paper formalizes the search (or crawl) process of structured P2P network, studies the relationship between the node's route spreadness in the whole network and the query response rate in the midst of crawling, derives some improved search strategies from the knowledge of historic measurements and characteristics of specific P2P network, and proposes a improved search method with much lower bandwidth consumption, fast crawling speed as well as relatively high coverage of nodes in structured peer-to-peer network. KAD network is among the few of structured P2P networks that are extensively deployed. This research mainly concentrates on KAD network and develops a search tool called KadCrawler, upon which large amounts of measurements and analysis are conducted. The result shows that the proposed method is both feasible and effective. Lastly, an analysis on the topology and phenomenon of ID repetition reveals that KAD network has changed significantly over the years. © 2014 ISCAS.

Loading Beijing Information Security Test and Evaluation Center collaborators
Loading Beijing Information Security Test and Evaluation Center collaborators