Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Degang Sun is active.

Publication


Featured researches published by Degang Sun.


international conference on information and communication security | 2014

Method for Determining Whether or not Text Information Is Leaked from Computer Display Through Electromagnetic Radiation

Degang Sun; Jun Shi; Dong Wei; Meng Zhang; Weiqing Huang

Confidential information might be leaked through electro-magnetic radiation from a computer display. To detect the electromagnetic radiation that contains text information, this paper proposed an evaluation method without reconstructing the displayed image. In this method, sparse decomposition in wavelet is used to describe the characteristics of electromagnetic radiation signals contain text information. By using this method, it is easy to detect text information leakage in electromagnetic radiation from a computer display.


international conference on information security | 2016

Enhanced Correlation Power Analysis by Biasing Power Traces

Changhai Ou; Zhu Wang; Degang Sun; Xinping Zhou; Juan Ai; Na Pang

Biasing power traces with high Signal to Noise Ratio (SNR) proposed by K. Yongdae et al. can significantly improve the efficiency of the CPA. But it is still a problem to be solved that how to efficiently select power traces with high SNR. Through the analysis of the statistical characteristics of power traces, we propose three methods to better solve this problem in this paper. We bias power traces by using the Minkowski distance (i.e. Euclidean distance or Manhattan distance) between each power trace and mean power trace. Biasing power traces can also be carried out by using probability density function values of power consumption of interesting points, or even directly using power consumption of interesting points. Our schemes can blindly select power traces with high SNR in a high probability. The efficiency of the CPA by using the three of our methods is significantly improved. Thus, our schemes are more effective compared to the one proposed by K. Yongdae et al.


advances in social networks analysis and mining | 2014

A novel method for computer video leaking signal detection

Jun Shi; Weiqing Huang; Dong Wei; Degang Sun

Video leaking signal detection is an important part of TEMPEST, which is the technologies research focus on the investigations and studies of compromising emanations. A novel video leaking signal detection algorithm based on spectral centroid has been developed. Using the property that spectral centroid can accurately identify the signal energy center in frequency domain, the proposed algorithm can detect the display video leaking signal automatically. The uniformity degree of spectral centroid spacing distribution is defined to distinguish the video leaking signal and clutter signal automatically. Furthermore, the ant-jamming and ant-noise performance of the developed algorithm is analyzed in a practical attack scenario.


international symposium on electromagnetic compatibility | 2016

Network transmission of hidden data using smartphones based on compromising emanations

Degang Sun; Di Wei; Ning Zhang; Zhiqiang Lv; Xi Yin

In this paper, we proposes a method to obtain the stored in the air-gapped computer with the help of nearby smartphones by intentionally generating loud physical emanations. We can construct a big transmission network connecting a computer and many cell phones by using different kinds of physical emanations. We further demonstrate the scenario by implementing a system using electromagnetic waves and acoustical signals. In this system, convert transmission channels are established between the computer and the cell phones. The microphone and FM receiver of the mobile phone are used to obtain the information. This kind of hidden data transmission method has the characteristics of strong concealment.


international symposium on electromagnetic compatibility | 2016

A new efficient interesting points enhanced electromagnetic attack on AT89S52

Changhai Ou; Zhu Wang; Degang Sun; Xinping Zhou; Juan Ai

Electromagnetic attacks are non-invasive attacks and pose serious threats to the security of cryptographic devices. However, its environment is complex and the noise on electromagnetic traces is often large. Thus, traditional differential electromagnetic analysis (DEMA) and correlation electromagnetic analysis (CEMA) require a lot of electromagnetic traces to recover the key used in the cryptographic devices. In order to reduce the number of electromagnetic traces required in our attacks, two high efficiency side channel distinguishers named multiple interesting points combined differential electromagnetic analysis (MIP-DEMA) and multiple interesting points combined correlation electromagnetic analysis (MIP-CEMA) are proposed in this paper. Experimental results on AES algorithm targeting an AT89S52 microcontroller show that, to get success rates of 0.80 and 1.00, only 40% ~ 60% of electromagnetic traces are needed in our MIP-DEMA and MIP-CEMA.


international conference on information and communication security | 2016

Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System

Wei Fan; Zhujun Zhang; Tingting Wang; Bo Hu; Sihan Qing; Degang Sun

Live migration of virtual machine is the process of moving VMs from one physical server to another server keeping services running in VMs, and facilitates load balancing, energy saving, hardware dependent, remote migration and so on. This novel technology brings a huge convenience, and also presents new security challenges that the security concern is the major factor effecting this technology widely adopted in IT industry. Live migration exposes VM’s data as plaintext to the network as a result of vulnerabilities in the migration protocol. The traditional protection way is using the SSL protocol, but that consume too much time and not as safe as it used to be, few users adopt this way. So we design a security algorithm based original migration algorithm making up for the lack of security. In this paper, firstly, we analyze and verify security threats to live migration. Secondly, through the analysis on the live migration mechanism, the bottom driver, and the source code of KVM virtualization system, we design a security algorithm for live migration to meet the security needs of different users. Thirdly, the new security algorithm which we innovatively add three functions to the original algorithm to ensure migration data to remain confidential and unmodified during the transmission. The security algorithm make up the security vulnerabilities of original migration mechanism and take less time than the SSL. Finally, a series of experiments validate the algorithm that could solve the balance of the security and performance in live migration process.


international conference on systems | 2014

A low-cost and efficient method of determining the best frequency band for video leaking signal reconstruction

Degang Sun; Jun Shi; Dong Wei; Meng Zhang

Determining the best frequency band for reconstructing display video leaking signal is the key problem in TEMPEST, which is the technology of electromagnetic leaking research. To solve such problem, a novel algorithm based on spectral centroid has been developed. Using the property that spectral centroid can accurately identify the signal energy center in frequency domain, the proposed algorithm can find best frequency band automatically. The uniformity degree of spectral centroid spacing distribution is defined to find the best frequency band which has the highest signal to noise ratio (SNR). Thus the video leaking signal reconstruction can be realized efficiently without expensive equipment.


wireless communications and networking conference | 2017

A Novel Method for Specific Emitter Identification Based on Singular Spectrum Analysis

Degang Sun; Yiwei Li; Yanyun Xu; Jianlin Hu

As wireless platforms grow in popularity and store valuable information, their security becomes increasingly important. Specific emitter identification (SEI) is a novel means of enhancing the security of wireless networks. Thus, an automatic SEI system with good performance is meaningful. In this paper, a novel method for SEI based on singular spectrum analysis (SSA) is proposed. It uses SSA to analyze the transient signals and extract features for identification of mobile phones. A complete identification system is presented and its performance is evaluated by volume experiments, which show that the proposed method is efficient even at a reduced signal to noise ratio.


wireless algorithms systems and applications | 2017

Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest

Degang Sun; Kun Yang; Zhixin Shi; Yan Wang

Flooding Distributed Denial of Service (DDoS) attacks could cause huge damages to Internet, which has much similarity with Flash Crowds (FC). Traditional Machine learning methods usually have a better performance for offline processing, however, they cannot process huge volume data which cannot be loaded in memory at one time and can’t auto-update model in time. In this paper, a streaming detection mechanism based on Online Random Forest-Mondrian Forest is proposed to solve this problem. Firstly, a deep analysis has been done on client’s characteristics of DDoS and FC to find anomaly traffic behaviors in network layer. Based on the analysis, a new feature set has been concluded to describe the client behavior of DDoS and FC. Then a streaming detecting mechanism employed with online Random Forest based on the new feature set has been proposed. To evaluate this method, a comparison with the traditional offline batch process method-Random Forest has been done on two public real-world datasets. The results show that even though this method has a bit lower accuracy around 93% on Test Data, it can be trained like a streaming way which doesn’t need load all data in memory at one time and can update itself automatically with time, which is more applicable for Big Data situations.


trust security and privacy in computing and communications | 2017

A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior

Degang Sun; Kun Yang; Zhixin Shi; Yan Wang

Discriminating Distributed Denial of Service (DDoS) from Flash Crowds (FC) is a tough and challenging problem, because there are many similarities between each other existed in network layer. In this paper, according to an extensive analysis of user traffic behavior of DDoS and FC, it can be found that some traffic abnormalities are existed between Bots and legitimate users. So a behavior-based method employed Data Mining isproposed to distinguish each other, and two public real-world datasets are used to evaluate the method. Whats more, simulated traffic are produced to evaluate the method further, which is based on statistical parameters took from the two datasets and combined with two popular and common distributions together, Gaussian Distribution and Pareto Distribution. And two types of simulations are considered: Novice Simulation and Veteran Simulation. The result in Novice Simulation has almost 100% accuracy, while in Veteran Simulation, the result has a more than 98% accuracy, less than 15% FRP and 3% FNR, all of them show the proposed method could have a good accuracy and robustness. In addition, compared it with traditional methods-Entropy and Threshold methods in Veteran Simulation, the results indicate that both of them could hardly distinguish DDoS and FC, whilethe proposed method could achieve a better distinguished effect.

Collaboration


Dive into the Degang Sun's collaboration.

Top Co-Authors

Avatar

Xinping Zhou

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Zhu Wang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Changhai Ou

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Juan Ai

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Jun Shi

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Meng Zhang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Weiqing Huang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Dong Wei

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Kun Yang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Zhixin Shi

Chinese Academy of Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge