Yong Guan

Professor

 

Department of Electrical and Computer Engineering

Iowa State University, Ames, IA 50011.

 

Associate Director for Research, Information Assurance Center

Cyber Forensics Coordinator, NIST Center of Excellence in Forensic Sciences - CSAFE

 

Office: 309 Durham Center
Phone: (515) 294-8378  Fax: (515) 294-8432

E-mail: yguan (at) iastate.edu

 


News 1: EviHinter : Our "EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis" paper has been accepted and will be presented at the 25th ACM Conference on Computer and Communications Security (ACM CCS 2018), Toronto, Canada, October 15-19, 2018. EviHunter will also be presented and demo'ed at Forensics@NIST on November 5-6, 2018.

News 2: QTAB-KE "An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol" presented at the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2018), Stockholm, Sweden, June 18 - 20, 2018.

News 3: SADFE Best Paper Award: Zhen Xu, Chen Shi, Chris Cheng, Neil Gong and Yong Guan, "A Dynamic Taint Analysis Tool for Android App Forensics," 12th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE 2018), Held in Conjunction with the 39th IEEE Symposium on Security and Privacy (SP 2018), San Francisco, CA, USA, May 24, 2018.

 

 


 

Research Interests

Computer and distributed systems, with focuses on security issues, including digital forensics, wireless security, privacy-enhancing technologies, blockchain applications, hardware-assisted security, and secure real-time computing for cyber-physical systems.

Academic Background

I am a Professor in Electrical and Computer Engineering at Iowa State University and the Associate Director for Research, Iowa State University's NSA-designated Information Assurance Center. Meanwhile, I am the Cyber Forensics Coordinator for NIST Center of Excellence in Forensic Sciences - CSAFE, and an Ames Lab associate for Midwest Forensics Resource Center at U.S. DoE's Ames Lab. I joined Iowa State in 2002 as an assistant professor, and in 2007, received the National Science Foundation CAREER Award and was honored as the Litton Chair Assistant Professor. Our recent research work have received a 2018 SADFE Best Paper Award and been featured in Science Daily, Technology News Daily, NSF News, NASA Tech Briefs, and Channel 13 News (Who-TV).

 

I received a Ph.D. degree (2002) in Computer Science from Texas A&M University under the advisement of Dr. Wei Zhao, M.S. degree in Computer Science (advised by Prof. Baojue Chen) and B.S. degree in Computer Science (advised by Profs. Shiwei Tang and Dongqing Yang) from Peking University.

Teaching

CprE 536: Computer and Network Forensics, (every Fall, starting in 2002)

CprE 450/550: Distributed Systems and Middleware, (every Spring, starting in 2003)

CprE 308: Operating Systems, (2007F, 2008F, and every Spring, starting in 2010)

Research Projects

Digital Forensics

Verifiable Computation

Biometrics Security

Accountability and Anonymity

Security Protocol Design and Verification

Secure Network Coding

Online Frauds

Wireless Security (low-cost protocols for RFID, NFC, and mobile platforms, time-advantage-based pairing protocols)

Research Projects while I was at Texas A&M University:

NetCamo: NetCamo (stands for Network Camouflaging) aims to prevent traffic analysis in mission-critical QoS-guaranteed networks. Funded by DARPA ITO Fault Tolerant Networks program.

NetEx: NetEx (stands for Network Express) enables user applications to participate in delay guaranteed communications. Funded by DARPA ITO Quorum program.

Selected Research Supports

National Science Foundation, "CAREER: Practical Scheme Design for Supporting Secure and Resilient Resource-constrained Wireless Networks", Yong Guan (PI), 01/2007-12/2013.

National Institute of Standards and Technology (NIST), "NIST Center of Excellence in Forensic Science and Statistics (Center for Statistics and Applications in Forensic Evidence (CSAFE))", $20M, 06/01/2015 - 05/31/2020. PI: Alicia Carriquiry (ISU), Co-PIs: Karen Kafadar (University of Virginia), Stephen E Fienberg (CMU) and Hal S Stern (UC Irvine). Yong Guan (a budgeted senior personnel), serves as the Cyber Forensics Coordinator for Digital Evidence area, one of the two focused areas in the center project (Pattern Evidence and Digital Evidence).

EviHunter (Mobile App Forensic Analysis): EviHunter (stands for Evil/Evidence Hunter ) aims to develop effective automated app forensic analysis tools using both static and dynamic approaches, and with it, to establish a large mobile app evidence database to assist law enforcement practitioners' mobile device forensic investigations. Yong Guan (PI) and Neil Gong (co-PI). Funded by NIST-CSAFE.

StegoDB: StegoDB aims to develop a statistically-designed image dataset for benchmarking stego-detection/steganalysis algorithms. Jennifer Newman (PI), Yong Guan (co-PI) and Min Wu (UMD, co-PI). Funded by NIST-CSAFE.

National Science Foundation (NSF), "SBE: Small: Continuous Human-User Authentication by Induced Procedural Visual-Motor Biometrics", Yong Guan (PI), Daji Qiao, George Amariucai, and Ann Smiley-Oyen, 09/01/2016 - 08/31/2019.

National Science Foundation (NSF), "TWC:Small: Time Advantage-based Key Agreement Protocols for Low-cost Wireless Systems", Yong Guan (PI) and George Amariucai, 09/01/2015 - 08/31/2019.

Iowa State University, ERP Program, "A Wearable Patient Monitoring System Based on Noninvasive Epidermal Biosensors, Multi-Sensor Data Fusion, and Predictive Decision Making", Meng Lu (PI) and Yong Guan, 12/15/2016 - 08/31/2017.

National Science Foundation (NSF), "II-EN: IoT Event Emulation Environment (IoTE^3) based on Cyber-Physical Integration", Daji Qiao (PI), Yong Guan, and Doug Jacobson, 08/2017-08/2020.

BBN/GENI, "APRA-GENI: Applying a Project-Based Approach to Understanding Multiple GENI Resources for Networking Research and Education", Kaiqi Xiong (RIT), Yin Pan (RIT), Yong Guan(ISU), and Bing Wang (University of Connecticut), 11/2011-10/2014.

Boeing, "Mission Assurance Modeling and Performance Impact Analysis", Yong Guan (PI), Jennifer Davidson, Johnny Wong, and Sang Kim, 01/2012 - 05/2013.

National Science Foundation (NSF), "Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks", Yong Guan (PI), 09/2008-08/2012.

National Science Foundation, "Secure Network Coding and Cooperative Relaying", Yong Guan (PI), Ahmed Kamal and Sang Kim, 10/2006-9/2010.

Intelligence Advanced Research Projects Activity (IARPA) (formerly, Disruptive Technology Office (DTO) / Advanced Research and Development Activity (ARDA)), "Advanced Attack Attribution", Yong Guan (PI), Julie Dickerson and Tom Daniels, 10/2003-8/2007.

National Science Foundation, "Cyberspace Forensics: Research, Course Development, and Laboratory Development", Yong Guan (PI), Jim Davis and Doug Jacobson, 7/2003-8/2007.

Carver Trust Foundation, "Adaptive Reputation-based Access Control and Resource Scheduling for Distributed Computing Systems", Yong Guan (PI), 4/2003-7/2004.

Honors and Awards

SADFE Best Paper Award: "A Dynamic Taint Analysis Tool for Android App Forensics," 12th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE 2018), Held in Conjunction with the 39th IEEE Symposium on Security and Privacy (SP 2018), San Francisco, CA, USA, May 24, 2018.

Outstanding Community Service Award, IEEE Technical Committee on Security and Privacy, May 2008. (for the joint work with Patrick McDaniel, Avi Rubin, David Du, David Shambroom, and Deborah Shands in organizing the 2008 Oakland Conference. We had 3 award papers and a record high number (292) of attendees.)

The Litton Industries Professorship, 2007.

Iowa State University Award for Early Achievement in Research, 2007. (One at ISU per year. Photo with Iowa State President Gregory Geoffroy at ISU 2007 Fall Convocation)

NSF Career Award, 2007.

Second Place Graduate Winner, 10th ACM International Student Research Contest,  Northern Kentucky/Cincinnati, OH, March 1, 2002. See the photo of the top 3 winners.

Best Student Paper Award, IEEE National Aerospace and Electronics Conference, Dayton, OH, 1998.

Professional Activities and Services

Member of IFIP TC-11 WG 11.9: Digital Forensics.

Cipher Associate Editor, IEEE Computer Society's Technical Committee on Security and Privacy.

Treasurer, IEEE Computer Society's Technical Committee on Security and Privacy, 2013 - present.

Editor, IEEE/AVM Transactions on Networking (ToN), 2016 - present.

Editor, IEEE Transactions on Wireless Communication (TWC), 2009 - 2017.

Editor, IEEE Transactions on Information Forensics and Security (TIFS), 2009 - 2013.

Editorial Board Member, International Journal of Security and Networks (IJSN), 2008 - 2015.

Steering Committee Member, IEEE International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE), 2008-present.

Planning Committee for American Academy of Forensic Sciences (AAFS) - Digital and Multimedia Forensics Section (DMS), 2017 - present.

Security and Privacy Chair Emeritus, IEEE Computer Society's Technical Committee on Security and Privacy, 2008-2009.

General Chair, 29th IEEE Symposium on Security and Privacy (SP 2008, a.k.a., the Oakland Conference), Berkeley, California, May 18-22, 2008.

Vice Chair and Registration Chair, 28th IEEE Symposium on Security and Privacy (SP 2007), Berkeley, California, May 20-23, 2007.

Co-organizer, NIST Digital Forensics Workshop, Arlington, VA, USA, May 8-9, 2017.

Co-organizer, ARO Workshop on Device Fingerprinting, Salt Lake City, Utah, USA, November 30 - December 2, 2011.

Coordinator, Digital Forensics Working Group, Annual NSA/DHS CAE Principals Meeting, 2009-2012.

Co-organizer, ARO Workshop on Digital Forensics, Arlington, VA, USA, September 10-11, 2009.

Program co-Vice Chair for the area of Security and Privacy, 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China, June 17-20, 2008.

TPC Area Chair, 2nd IEEE International Conference on Conference on Communications and Network Security (CNS 2014), San Francisco, CA, USA, October 29-31, 2014.

General Chair, 7th IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2012), Vancouver, Canada, September 28, 2012.

Program Chair, 6th IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2011), Held in conjunction with the IEEE Symposium on Security and Privacy (Oakland 2011), The Claremont Resort, Oakland, CA, USA, May 26, 2011.

Sponsorship Co-Chair, 18th ACM Conference on Computer and Communications Security (CCS 2011), Chicago, IL, USA, October 17-21, 2011.

Program co-Chair, 2nd ACM Northeast Forensics Exchange (NeFX 2010), Georgetown University, Washington DC., September 13-14, 2010.

Program co-Chair, Computer Network Forensics Research Workshop (CNFR 2005), held in conjunction with the 1st IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks (SECURECOMM 2005), Athens, Greece, September 5-9, 2005.

Serves/served as technical program committee (TPC) and/or organizing committee (OC) member for over a hundred conferences/workshops in security, digital forensics, networking and distributed systems, including ACM CCS, DFRWS, IFIP 11.9 Digital Forensics, SADFE, eCrime, ICDF2C, INFOCOM, ICDCS, ICNP, AsiaCCS, CNS, Securecomm, WISTP, SafeConfig, GLOBECOM, ICC, etc.

Students

Current Ph.D. Students:

Payas R. Awadhutkar (co-advised by Suraj Kothari and Yong Guan)

Wenhao Chen (co-advised by Jennifer Newman, Morris Chang (USF), and Yong Guan)

Chris Cheng (co-advised by Neil Gong and Yong Guan)

Ben Holland (co-advised by Suraj Kothari and Yong Guan)

Zhonghao Liao

Li Lin (co-advised by Jennifer Newman and Yong Guan)

Dong Qin (co-advised by Daji Qiao and Yong Guan)

Stephanie Reinders(co-advised by Jennifer Newman and Yong Guan)

Shahnewaz Sakib

Kerui Tan (co-advised by Daji Qiao and Yong Guan)

Current MS. Students:

Brody Concannon, Sunantha Rini Chandramoorthy, Spoorthy Chiranjeevi, Kaihang Fu, Shivika Garg, Rui Li, John Park, Chen Shi, Brett Weiss, and Chenliang Xu.

Graduated Ph.D. Students:

Wenji Chen, PhD, September 2009-December 2016, Dissertation: "Data Streaming Designs for Forensic Investigation of Large Data", degree granted December 2016. Received ISU Graduate Student Research Excellence Award. First job at Google (Federated Identity Management)

Gang Xu, PhD, September 2009-December 2014, Dissertation: "Towards practical verifiable computation: verification outsourcing, linear arguments without linearity tests, and repeated structures", degree granted December 2014. Received ISU Graduate Student Research Excellence Award. First job at VMWare.

Yang Liu, PhD, September 2007-May 2013, Dissertation: "Data Streaming Algorithms for Rapid Cyber Attack Detection", Received ISU Graduate Student Research Excellence Award. degree granted May 2013. First job at Facebook.

Ramzi Saifan (Ahmed Kamal, co-major professor), PhD, January 2009-December 2012, Dissertation: "Sensing Strategies in Cognitive Radio Networks: Optimization and Ramifications on Routing", degree granted December 2012. Now Assistant Professor at University of Jordan, Jordan.

Bibudh Lahiri (Srikanta Tirthapura, co-major professor), PhD, April 2009-May 2012, Dissertation: "Detecting exploit patterns from network packet streams", degree granted May 2012. First job at Siemens Corporate Research.

Yawen Wei, Ph.D., September 2004-May 2011, Dissertation: "Design for Secure Location-aware Communications in Resource-constrained Wireless Networks", degree granted May 2011, First job at LinkedIn.

Zhen Yu, Ph.D., September 2003 - May 2009, Dissertation: "Practical Security Scheme Design for Resource-constrained Wireless Networks", degree granted May 2009. Received ISU Graduate Student Research Excellence Award. First job at Ericsson, Boulder, Colorado.

Linfeng Zhang, Ph.D., January 2004 - December 2008, Dissertation: "Techniques for Monitoring and Attributing Complicated Attacks in Real-world Networks", degree granted December 2008. Received ISU Graduate Student Research Excellence Award. First job, a Senior Algorithm Engineer at Vidyo, Inc. Hackensack, New Jersey.

Graduated MS. Students:

Ziji Guo, MS, January 2015 - May 2018, Thesis Topic: "Passive DNS Traffic Analysis for Fast-Fluxing Domain Detection", granted May 2018. Now at Aurfy Inc., a FinTech Company, San Jose, CA.

Sanchita Barman, January 2016 - December 2017, Thesis: "An Algebraic Time-Advantage-Based Key Establishment Protocol", degree granted December 2017. Now at a startup company, San Jose, CA.

Zhen Xu, January 2016 - December 2017, Thesis: "Dynamic taint analysis tool for forensic analysis", granted December 2017. Now at Biotechnology High Performance Computing Software Applications Institute (BHSAI), Frederick, MD.

Anvesh Katukuri, January 2015 - December 2017, Create Component: "Analysis of Android Applications using FlowDroid: Fundamental Limitations and Possible Improvements", degree granted December 2017. Now at an insurance company, Boston, MA.

Darius Mohammadi, November 2016 - May 2017, Create Component: "An Investigation of Bitcoin Mixer Services", degree granted May 2017. Continue to pursue a Ph.D. in Data Science in Kingston University London.

Ahmed Shaik, May 2015 - May 2017, Thesis: "Secure Data Sharing with Restricting User to One-time Access", degree granted May 2017. Now at Cerner Corporation, Kansas City, MO.

Sarat Chandra Velijala, MS, October 2014 - August 2016, Thesis: "Forwarding Loop Attacks in Content Centric Networking", degree granted August 2016. Now at a start-up company, California.

Jialue Fang, MS August 2014 - August 2016, Thesis: "Voice Traffic Pattern Hiding in VoIP Communication", degree granted August 2016. Now at a startup company, New Jersey.

Mouhamadou Diallo, Co-advised by George Amariucai and Yong Guan, January 2015 - - August 2016, Creative Component: "Multi-modal biometric authentication using Bayesian networks", degree granted August 2016. Now at Federal Communications Commission (FCC), Washington DC.

Chee Kang Tan, MS, January 2014-December 2015, Thesis: "Memoryless Authentication Key and Random Number Generation Schemes Using SRAM Power-On State Randomness", degree granted December 2015. Now at Maytag.

Xuantong Zhang, October 2014 - May 2015, Thesis: "Human User Authentication Based on Mouse Dynamics: A Feasibility Study", degree granted May 2015. Now at Medtronics.

Tsolmon Otgonbold, MS, January 2014 - December 2014, Thesis: "ADAPT: Anonymous, distributed, active probing technique (ADAPT) for detecting malicious fast-flux domains", degree granted December 2014. Now at Thinix. Fullbright Scholar from Mongolia.

Chen Zhao, MS, September 2013 - December 2014, Thesis: "Graph-based Forensic Investigation of Bitcoin Transactions", degree expected December 2014, continue Ph.D. study in Japan.

Pengqing Xie, MS, January 2013 - December 2014, Thesis: "Facial Movement Based Person Authentication", degree granted December 2014. First job at Intersil Corporation.

Shelby Kobes, MS, September 2012 - May 2014, Thesis: "Security implications of implantable medical devices", degree granted May 2014. Now at QMed.

Andrew Schmitz, ME, January 2013 - present, Project: "Cloud Security", degree granted May 2014. Now at Hormel Foods, Rochester, MN.

Jeff Kramer, MS, November 2012 - August 2013, Thesis: "DROIDSPOTTER: A Forensic Tool for Android Location Data Collection and Analysis", degree granted August 2013. Now at Federal Research Board, Washington DC.

Jin-Ning Tioh, MS, September 2011 - August 2013, Thesis: "FishEye: A Forensic Tool for the Visualization of the Change-Over-Time in Windows VSS", degree granted December 2013. Now at Malaysia.

Kenneth Johnson, MS, September 2011-August 2013, Thesis: "Windows 8 Forensics: Journey through the Impact of the Recovery Artifacts in Windows 8", degree granted August 2013. Now at KPMG (Forensics and Incident Response Team) in Chicago, Illinois.

Ellen Hartstack, MS, January 2012 - May 2013, Thesis: "VMIFF - Visualization Metrics for the Identification of File Fragments", degree granted May 2013. First job at DoD.

Jingzhou Luo, MS, January 2012 - December 2012, Creative Component: "A Location Privacy Protocol for Mobile Applications", degree granted December 2012. First job at Amazon (Web Service Team).

Ben Holland, MS, September 2010 - May 2012, Thesis: "Enabling Open Source Intelligence (OSINT) in private social networks", degree granted May 2012. First job at EnSoft.

Ben Kallal, MS, September 2008 - May 2012, Thesis: "First Responder Assistance Tool for Mobile Device Forensics", degree granted May 2012. First job at DoD.

Teja Myneedu, MS, August 2010 - December 2011, Thesis: "Evidence Collection for Forensic Investigation in Peer to Peer Systems", granted December 2011. First job at Union Pacific.

Leonardo Aguilera, MS, September 2010 - December 2011, Thesis: "An Implementation of Accountable Anonymity", degree granted December 2011. First job at Rockwell Collins

Timothy Meyer, MS, December 2010 - August 2011, Thesis: "A Study on Trading Scams in Massively Multiplayer Online Role-Playing Games and Risk Mitigation Techniques", granted August 2011. First job at Lockheed Martin.

Oliverio Covarrubias, MS, September 2008 - December 2009, Creative Component: "A Cursor Movement-based Embedded Tag Tracking Method for Online Click Fraud Detection", granted December 2009, now at Rockwell Collins.

Chunwang Gao, MS, (Steven Russell, co-major professor),September 2006 - December 2009, Thesis: "A Statistical Indoor Localization Method for Supporting Location-based Access Control", granted December 2009. First job at Virginia Commonwealth University.

Mike Blasi, MS, January 2008 - August 2009, Thesis: "Techniques for detecting zero day phishing websites", granted August 2009. First job at Ames Engineering.

Lars Kulseng, MS, September 2007 - May 2009, Thesis: "Lightweight Mutual Authentication, Ownership Transfer and Secure Searchfor Low-cost RFID Systems", granted May 2009, now at Wireless Trondheim, Trondheim, Norway.

Bhuvaneswari Ramkumar, MS, September 2006 - August 2008, Thesis: "Encrypted Malware Detection", granted August 2008, now at Cisco.

Paul Miller, MS, (Johnny Wong, co-advisor), September 2007 - May 2008, Thesis: "Visualization for Network Forensic Analyses: Extending the Forensic Log Investigator (FLI)", granted May 2008, now at FBI.

Thieu Pham, MS, September 2005 - December 2007, Thesis: "Forensic Log Investigator (FLI) - A Log Analysis and Visualization Tool", granted December 2007, now at Cisco.

Anthony Persaud, MS, September 2004 - May 2006, Thesis: "The Use of Wavelet Watermarking and Statistical Classification Techniques for Collusion Detection and Identification in Multimedia Forensics", granted May 2006, now a PhD student at Carnegie Mellon University.

Douglas Houghton, MS, (Doug Jacobson, co-advisor), September 2004 - December 2005, Thesis: "Design and Development of Network Traffic Simulator", granted December 2005, now at Mitre.

William Sears, MS, (Tom Daniels, co-advisor), May 2003 - August 2005, Thesis: "PeerCredential: A Support Reputation-based Trust Framework for Peer-to-Peer Applications", granted Augutst 2005, now at U.S. DoE's Ames Lab.

Wale Martins, MS, (Tom Daniels, co-advisor), September 2003 - August 2005, Thesis: "Affecting IP Traceback with Recent Internet Topology Maps", granted August 2005, now at Microsoft.

Graduated Undergraduate RA Students:

Joel Cardo, BS, Undergraduate RA, September 2003 - December 2004, Lightweight Statistical Authentication Protocol for Access Control in Wireless LANs, now at Rockwell Collins.

Alan Johnson, BS, Undergraduate RA, Stepping Stone Attack Attribution, September 2003 - May 2006, now a PhD student at Princeton University.

Selected Recent Publications

Zhonghao Liao and Yong Guan, "The Cell Dependency Analysis on Learning SRAM Power-Up States," in Proceedings of Asian Hardware Oriented Security and Trust Symposium (AsianHOST 2018), Hong Kong, December 17-18, 2018.

Chris Chao-Chun Cheng, Chen Shi, Neil Zhenqiang Gong, and Yong Guan, "EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis," in Proceedings of the 25th ACM Conference on Computer and Communications Security (ACM CCS 2018), Toronto, Canada, October 15-19, 2018.

Li Lin, Wenhao Chen, Yangxiao Wang, Stephanie Reinder, Min Wu, Yong Guan, and Jennifer Newman, "The Impact of Exposure Settings in Digital Image Forensics," in Proceedings of the 25th IEEE International Conference on Image Processing (ICIP 2018), Athens, Greece, October 7-10, 2018.

Sanchita Barman, George Amariucai, and Yong Guan, "An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol," in Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2018), Stockholm, Sweden, June 18 - 20, 2018.

Zhen Xu, Chen Shi, Chris Cheng, Neil Gong and Yong Guan, "A Dynamic Taint Analysis Tool for Android App Forensics," in Proceedings of the 12th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE 2018), Held in Conjunction with the 39th IEEE Symposium on Security and Privacy (SP 2018), San Francisco, CA, USA, May 24, 2018 (Best Paper Award).

Li Lin, Jennifer Newman, Stephanie Reinders, Yong Guan, and Min Wu, "Domain Adaptation in Steganalysis," in Proceedings of IS&T International Symposium on Electronic Imaging (EI 2018), Media Watermarking, Security, and Forensics Conference, Burlingame, California, USA, January 28 - February 1, 2018.

Wenhao Chen, Yangxiao Wang, Yong Guan, Jennifer Newman, Li Lin, and Stephanie Reinders, "Forensic Analysis of Steganography Apps on Android", in Proceedings of the 13th IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India, January 3 - 5, 2018.

Zhonghao Liao, George T. Amariucai, Raymond K. W. Wong, and Yong Guan, "The Impact of Discharge Inversion Effect on Learning SRAM Power-Up Statistics," in Proceedings of the Asian Hardware Oriented Security and Trust Symposium (AsianHOST 2017), Beijing, China, October 19-20, 2017.

Jialue Fang, Ye Zhu, and Yong Guan, "Voice Pattern Hiding for VoIP Communications," in Proceedings of the 25th International Conference on Computer Communication and Networks (ICCCN 2016), Waikoloa, Hawaii, USA, August 1-4, 2016.

Nicholas Ruffing, Ye Zhu, Rudy Libertini, Yong Guan, and Riccardo Bettati, "Smartphone Reconnaissance: Operating System Identification", in Proceedings of the 13th Annual IEEE Consumer Communications and Networking Conference (CCNC 2016), Las Vegas, NV, USA, January 9-12, 2016.

Wenji Chen and Yong Guan, "Distinct Element Counting in Distributed Dynamic Data Streams," in Proceedings of the 34th Annual IEEE International Conference on Computer Communications (INFOCOM 2015), Hong Kong, April 27-30, 2015.

Gang Xu, George Amariucai, and Yong Guan, "Block Programs: Improving Efficiency of Verifiable Computation for Circuits with Repeated Substructures," in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (AsiaCCS 2015), Singapore, April 14-17, 2015.

Chen Zhao and Yong Guan, "Graph-based Forensic Investigation of Bitcoin Transactions," in Proceedings of the IFIP 11.9 Digital Forensics Conference, Orlando, FL, USA, January 26-28, 2015.

Ye Zhu, Anil Vikram, Huirong Fu, and Yong Guan, "On Non-Cooperative Multiple-Target Tracking with Wireless Sensor Networks," IEEE Transactions on Wireless Communications, Vol. 13, Issue 11, Pages: 6496 - 6510, Nov. 2014.

Wenji Chen and Yong Guan, "Identifying Global Hot Items in Distributed Dynamic Data Streams," in Proceedings of the IEEE Conference on Communications and Network Security (CNS 2014), San Franscisco, CA, USA, October 29-31, 2014.

Gang Xu, George Amariucai, and Yong Guan, "Verifiable Computation with Reduced Informational Costs and Computational Costs," in Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS 2014), Wroclaw, Poland, September 7-11 2014.

Pengqing Xie, Yang Liu, and Yong Guan, "Facial Movement Based Person Authentication," Who are you?! Adventures in Authentication: WAY Workshop, held in conjunction with the 10th Symposium On Usable Privacy and Security (SOUPS 2014), Facebook Headquarters in Menlo Park, California, USA, July 9-11, 2014.

Gang Xu, George Amariucai, and Yong Guan, "Delegation of Computation with Verification Outsourcing using GENI Infrastructure," in Proceedings of the 3rd GENI Research and Educational Experiment Workshop (GREE 2014), held in conjunction with GEC19, Atlanta, GA, USA, March 19-20, 2014.

Jin-Ning Tioh and Yong Guan, "FishEYE: A Forensic Tool for the Visualization of Change-Over-Time in Windows VSS," in Proceedings of the 8th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2013), Hong Kong, November 21-22, 2013.

Gang Xu, George Amariucai, and Yong Guan, "A Lightweight Argument System with Efficient Verifier," in Proceedings of the IEEE Conference on Communications and Network Security (CNS 2013), Washington, D.C., USA, October 14-16, 2013.

Yang Liu, Wenji Chen, and Yong Guan, "Identifying High-Cardinality Hosts from Network-wide Traffic Measurements," in Proceedings of the IEEE Conference on Communications and Network Security (CNS 2013), Washington, D.C., USA, October 14-16, 2013.

Ramzi Saifan, Ahmed Kamal, and Yong Guan, "A Cross-Layer Routing Protocol (CLRP) for Cognitive Radio Network," in Proceedings of the Globecom 2013 - Cognitive Radio and Networks Symposium (GLOBECOM 2013), Atlanta, GA, USA, December 9-13, 2013.

Gang Xu, George Amariucai, and Yong Guan, "Delegation of Computation with Verification Outsourcing: Curious Verifiers," ACM Symposium on Principles of Distributed Computing (PODC 2013), Montreal, Quebec, Canada, July 22-24, 2013.

Wenji Chen, Yang Liu, and Yong Guan, "Cardinality Change-based Early Detection of Large-scale Cyber-Attacks," in Proceedings of the 32nd Annual IEEE International Conference on Computer Communications (INFOCOM 2013), Turin, Italy, April 14-19, 2013.

Yang Liu, Wenji Chen, and Yong Guan, "Near-optimal Approximate Membership Query over Time-decaying Windows," in Proceedings of the 32nd Annual IEEE International Conference on Computer Communications (INFOCOM 2013), Turin, Italy, April 14-19, 2013.

Gang Xu, Leonardo Aguilera, and Yong Guan, "Accountable Anonymity: A Proxy Re-Encryption Based Anonymous Communication System," in Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems (ICPADS 2012), Singapore, December 17-19, 2012.

Gang Xu, Leonardo Aguilera, and Yong Guan, "Pecan: A Circuit-less P2P Design for Anonymity," in Proceedings of the IEEE 2012 Global Communications Conference (GLOBECOM 2012), Communication and Information System Security Symposium, Anaheim, California, USA, December 3-7, 2012.

Yang Liu, Wenji Chen, and Yong Guan, "Monitoring Traffic Activity Graphs with Low-rank Matrix Approximation," in Proceedings of the 37th IEEE Conference on Local Computer Networks (LCN 2012), Clearwater, Florida, USA, October 22-25, 2012.

Ramzi Saifan, Ahmed Kamal, and Yong Guan, "Spectrum Decision for Efficient Routing in Cognitive Radio Network," in Proceedings of the 9th IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS 2012), Las Vegas, Nevada, USA, October 8-11, 2012.

Yang Liu, Wenji Chen, and Yong Guan, "A Fast Sketch for Aggregate Queries over High-Speed Network Traffic," in Proceedings of the 31st Annual IEEE International Conference on Computer Communications (INFOCOM 2012), Mini-Conference, Orlando, Florida, USA, March 25-30, 2012.

Kai Zhu, Yong Guan, and Lei Ying, "Detecting Hidden Communities in Online Auction Networks," in Proceedings of the 46th Annual Conference on Information Sciences and Systems (CISS 2012), Princeton, NJ, USA, March 21-23, 2012.

Teja Myneedu and Yong Guan, "Evidence Collection for Forensic Investigation in Peer to Peer Systems," 8th Annual IFIP WG 11.9 International Conference on Digital Forensics, University of Pretoria, Pretoria, South Africa, January 3-5, 2012.

Ramzi Saifan, Ahmed Kamal, and Yong Guan, "Efficient Spectrum Searching and Monitoring in Cognitive Radio Network", in the Proceedings of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2011), Valencia, Spain, October 17-22, 2011.

George Amariucai, Clifford Bergman, and Yong Guan, "Adopted-Pet (AP): An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID", in Proceedings of RFIDSec 2011, Northampton, Massachusetts, June 26-28, 2011.

Yawen Wei, Zhen Yu, and Yong Guan, "Efficient Weakly-Secure Network Coding Schemes against Wiretapping Attacks," in Proceedings of the IEEE International Symposium on Network Coding (NetCod 2010), Toronto, Canada, June 9-11, 2010.

Yang Liu, Linfeng Zhang and Yong Guan, "Sketch-based Streaming PCA Algorithm for Network-wide Traffic Anomaly Detection," in Proceedings of the 30th IEEE International Conference on Distributed Computing Systems (ICDCS 2010), Genoa, Italy, June 21-25, 2010.

Lars Kulseng, Zhen Yu, Yawen Wei, and Yong Guan, "Lightweight Mutual Authentication and Ownership Transfer for RFID Systems," in Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM 2010), mini-conference, San Diego, CA, USA, March 15-19, 2010.

Yanlin Peng, Linfeng Zhang, Morris Chang, and Yong Guan, "An Effective Method for Combating Malicious Scripts Clickbots," in Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint Malo, France, September 21-23, 2009.

Yawen Wei, Zhen Yu, and Yong Guan, "A Novel Architecture for Secure and Scalable Multicast over IP Network," in Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2009), Athens, Greece, September 14-18, 2009.

Lars Kulseng, Zhen Yu, Yawen Wei, and Yong Guan, "Lightweight Secure Search Protocols for Low-cost RFID Systems," in Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), Montreal, Quebec, Canada, June 22-26, 2009.

Zhen Yu, Yawen Wei, Bhuvaneswari Ramkumar, and Yong Guan, "An Efficient Signature Scheme for Securing XOR Network Coding against Pollution Attacks," in Proceedings of the 28th IEEE International Conference on Computer Communications (INFOCOM 2009), Rio de Janeiro, Brazil, April 19-25, 2009.

Yanlin Peng, Linfeng Zhang, and Yong Guan, "Detecting Fraud in Internet Auction Systems," in 5th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, January 25 - 28, 2009.

Chunwang Gao, Zhen Yu, Yawen Wei, Steve Russell, and Yong Guan, "A Statistical Indoor Localization Method for Supporting Location-based Access Control," ACM/Springer Mobile Networks and Applications (MONET), Vol. 14, Issue 2, pp. 253-263, 2009.

Xinwen Fu, Steve Graham, Shu Jiang, and Yong Guan, "On TCP Performance in Flow Based Anonymous Communication Networks," IEEE Transactions on Parallel and Distributed Systems, to appear.

Linfeng Zhang and Yong Guan, "Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks," in Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China, June 17-20, 2008.

Linfeng Zhang and Yong Guan, "Frequency Estimation over Sliding Windows," in Proceedings of the 24th IEEE International Conference on Data Engineering (ICDE 2008), poster paper, Cancun, Mexico, April 7-12, 2008. 

Yawen Wei, Zhen Yu, and Yong Guan, "Location Verification Algorithms for Wireless Sensor Networks," in Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), Toronto, Canada, June 25-29, 2007.

Linfeng Zhang and Yong Guan, "Variance Estimation over Sliding Windows," in Proceedings of the 26th ACM Symposium on Principles of Database Systems (PODS 2007), Beijing, China, June 11-14, 2007.

Zhen Yu, Yawen Wei, and Yong Guan, "Key Management for Wireless Sensor Networks," Handbook of Wireless Mesh & Sensor Networking, G. Aggelou (ed.), McGraw-Hill International, Accepted in February 2007.

Linfeng Zhang and Yong Guan, "TOPO: A Topology-aware Single Packet Attack Traceback Scheme," in Proceedings of IEEE International Conference on Security and Privacy in Communication Networks (SecureComm 2006), Baltimore, Maryland, USA, August 28-September 1, 2006.

Yawen Wei, Zhen Yu, and Yong Guan, "COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks," in Proceedings of IEEE/ACM International Conference on Distributed Computing in Sensor Systems (DCOSS 2006), San Francisco, California, USA, June 18-20, 2006.

Zhen Yu and Yong Guan, "A Dynamic En-route Scheme for Filtering False Data in Wireless Sensor Networks," in Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM 2006), Barcelona, Spain, April 23-27, 2006.

Linfeng Zhang, Anthony Persaud, Alan Johnson, and Yong Guan, "Stepping Stone Attack Attribution in Non-cooperative IP Networks," in Proceedings of the 25th IEEE International Performance Computing and Communications Conference (IPCCC 2006), Phoenix, Arizona, USA, April 10-12, 2006.

Jianqiang Xin, Linfeng Zhang, Brad Aswegan, Julie Dickerson, Tom Daniels, and Yong Guan, "A Testbed for Evaluation and Analysis of Stepping Stone Attack Attribution Techniques," in Proceedings of the 2nd International IEEE/Create-Net Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom 2006), Barcelona, Spain, March 1-3, 2006.

Anthony Persaud and Yong Guan, "Collusion Detection and Identification for Multimedia Forensics," in the second Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 29 - February 1, 2006. An extended version in Research Advances in Digital Forensics (Springer).

Haoli Wang, Joel Cardo, and Yong Guan, "Shepherd: A Lightweight Statistical Authentication Protocol for Access Control in Wireless LANs," Elsevier Computer Communications Journal, Special Issue on Applications and Services in Wireless Networks, Vol. 28, No. 14, pp. 1618-1630, September 2005.

William Sears, Zhen Yu, and Yong Guan, "An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications," in Proceedings of the 4th IEEE International Symposium on Network Computing and Applications (NCA 2005), Boston, Massachusetts, USA, July 27-29, 2005.

Zhen Yu and Yong Guan, "A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks," in Proceedings of the 4th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2005), Los Angeles, California, USA, April 25-27, 2005. An extended version will appear in IEEE Transactions on Parallel and Distributed Systems.

Anthony Persaud and Yong Guan, "A Framework for Email Investigations: Automated Information Extraction and Linkage Discovery," First Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, February 13-16, 2005. An extended version in Research Advances in Digital Forensics (Springer).

Yong Guan, Xinwen Fu, Riccardo Bettati, and Wei Zhao, "A Quantitative Analysis of Anonymous Communications," IEEE Transactions on Reliability, Vol. 53, No. 1, pp. 103-116, March 2004.

Dan Berleant, M.-P. Cheong, Chris Chu, Yong Guan, Ahmed Kamal, Gerald Sheble, S. Ferson, and J.F. Peters, "Dependable Handling of Uncertainty", Reliable Computing, Special Issue on Dependable Reasoning about Uncertainty, Vol. 9, No. 6, pp. 407-418, 2003.

Yong Guan, Xinwen Fu, Riccardo Bettati, and Wei Zhao, "An Optimal Strategy for Anonymous Communication Protocols," in Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems (ICDCS 2002), Vienna, Austria, July 2-5, 2002.

Yong Guan, Xinwen Fu, Dong Xuan, Prashanth Shenoy, Riccardo Bettati, and Wei Zhao, "NetCamo: Camouflaging Network Traffic for QoS-Guaranteed Mission Critical Applications," IEEE Transactions on System, Man, and Cybernetics, Special Issue on Information Assurance, Vol. 31, No. 4, pp. 253-265, July 2001.

Selected Talks

Tutorial, "Digital Forensics: Research Challenges and Open Problems", 13th ACM Conference on Computer and Communication Security (CCS 2006), Alexandria, VA, October 31, 2006.

Distinguished Lecturer, "Towards Accountable Anonymity, Cyber Crimes: The Transformation of Crime in Information Age," Distinguished Lecture Series, Department of Computer Science, Kansas State University, April 11, 2014.

"An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol for Securing Wireless/SmartX Networks," Hong Kong Polytechnic University, August 6, 2018.

Invited Talk, "Mobile App Forensic Analysis," Network Forensics Workshop, held in conjunction with IEEE Communication and Network Security Conference (CNS 2016), Philadelphia, PA, USA, October 17-19, 2016.

"Algorithmic Design for Large-scale Networked System Monitoring and Forensics," University of Hong Kong, Hong Kong, April 28, 2015.

"Towards Verifiable 3rd-party Computation," Chinese University of Hong Kong, Hong Kong, April 24, 2015.

"Accountable Anonymity," UI 2013 Computing Conference (along with four other invited speakers, Barbara Simons, Daniel Reed, Maria Gini, and Thomas Hornbeck), University of Iowa, Iowa City, Iowa, February 23, 2013.

"Cyber Crimes: The Transformation of Crime in Information Age," Information Systems Audit and Control Association (ISACA), Des Moines, Iowa, February 19, 2013.

" Algorithmic Designs for Rapid Attack Monitoring and Attribution - Digital Forensics: Challenges and Research Problems," Singapore A* (Agency for Science, Technology, and Research), December 21, 2012.

"Algorithmic Designs for Rapid Cyber Attack Detection and Impact Analysis," Army Research Lab, December 12, 2012.

"Fast Algorithms for Security Monitoring and Attribution," Department of Software and Information Systems, University of North Carolina, Charlotte, NC, April 12, 2012.

"Time-based Secure Pairing Protocol for Passive RFID," Department of Electrical and Computer Engineering, University of Waterloo, Canada, January 20, 2012.

"Techniques for Large-scale Network-wide Attack Monitoring and Attribution," Deakin University, Australia, July 13, 2011.

"Fraud Detection in the Internet Auction Systems", eBay, San Jose, CA, May 23, 2008.

"Cyber Crime: The Transformation of Crime in the Information Age", ISU Alumni @ Hamilton Co., Webster City, IA, March 30, 2008. (The title was the same as David S. Wall's book) (Photo with ISU Alumni).

"Digital Forensics: Research Challenges and Open Problems", University of Iowa, Iowa City, IA, December 4, 2007.

"Stepping Stone Attack Attribution in Non-Cooperative IP Networks", John Jay College of Criminal Justice, City University of New York, New York, NY, October 17, 2006.

"Practical Security Scheme Design for Sensor Networks", Telcordia Research, Piscataway, NJ, October 16, 2006.

"Open Source/Closed Source Software in Security Education", Invited panelist at the Annual Conference on Education in Information Security, Ames, IA. September 17-18, 2006.

"A Dynamic En-route Scheme for Filtering False Data Injection inWireless Sensor Networks," Department of Computer Science, Peking University, Beijing, China, June 1, 2006.

"Key Pre-distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks", Department of Computer Science and Engineering, Ohio State University, Columbus, OH, June 8, 2005.

"Topology-aware Single Packet Attack Traceback", Northrop Grumman, Omaha, NE, March 16, 2005.

Keynote Speech, "Cyber Crime Scene Reconstruction", Symposium on Computer Forensics 2004: Research, Education, and Practice, St. Paul, MN, October 15, 2004.

"Stepping Stone Attack Attribution in Non-Cooperative IP Networks", Computer Forensics Working Group Meeting (CFWG), Baltimore, MD, August 9, 2004.

"Keep Kids Safe On-Line", Annual meetings of Iowa Mother of Multiples, Boone, IA, May 1, 2004.

"NetCamo: Camouflaging Traffic Pattern in QoS-guaranteed Mission Critical Networks," IEEE Information Assurance and Security Workshop, West Point, NY, June 5, 2000.

Patents

Yong Guan and Linfeng Zhang, "Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks", US Patent Application, No. 12/187,055, August 6, 2008.