laitimes

Cyberspace Data Security and Governance | YEF2024

author:CCFvoice

Scan the QR code:

(Scan the QR code to register)

At present, the importance and urgency of global data security governance are increasing, and there is an urgent need for both theory and practice to continue to carry out in-depth research and scientific exploration. The mainland also attaches great importance to data security protection, and under the guidance of the overall national security concept, data security work is being further promoted. However, data security governance is still a complex system project, and the shortcomings of the governance system are also worthy of attention.

Relying on the "14th Five-Year Plan" National Key R&D Program "Cyberspace Security Governance", the forum invited project chief experts to share the latest achievements and progress of each project, discuss security pain points, share governance experience, and seek common development concepts. By building an academic bridge between theory and practice, experience and exchange and sharing, the new direction of the development of data security in the mainland, the technology and trend of data element circulation, and the pain points of data security implementation will be discussed, so as to promote the cyberspace security technology of the mainland to a new level.

Forum arrangement

Introduction topic Keynote speaker unit
1 Cloud-network-device collaborative security of wireless networks: a perspective on data security Ma Jianfeng Xidian University
2 Data element circulation and security Li Fenghua Institute of Information Engineering, Chinese Academy of Sciences
3 Traffic compliance testing for autonomous driving systems Yang Min Fudan University
4 Intelligent malware detection and combat Discipline collar Zhejiang University
5 Data Security & Privacy Computing Li Jianhua Shanghai Jiao Tong University
6 Panel link Roundtable guests ——

Executive Chairman

Cyberspace Data Security and Governance | YEF2024

Xie Xue

Deputy Director of the Sixth Research Institute of China Academy of Aerospace Systems Science and Engineering

He is a member of the Standing Committee of the Computer Security Committee of the CCF, a member of the Digital Media Forensics and Security Committee of the CSIG, and an associate editor-in-chief of the Journal of Cyberspace Security. He has won the first prize of the National State-owned Enterprise Management Innovation Award, the first China Science and Technology Youth Forum Award, the Qian Xuesen Youth Innovation Fund of China Aerospace Science and Technology Corporation, the Advanced Individual of Science and Technology Group of China Aerospace Science and Technology Corporation, the Qian Xuesen Award of China Academy of Aerospace System Science and Engineering, the first prize of excellent papers, and the Outstanding Individual Award.

Co-Executive Chairman

Cyberspace Data Security and Governance | YEF2024

Li Hongwei

Professor of University of Electronic Science and Technology of China, Deputy Dean of the School of Computer Science and Engineering (School of Cyberspace Security).

IEEE Fellow, Distinguished Professor of the National Major Talent Project (2019), Director of the National Data Security Governance Discipline Innovation and Intelligence Introduction Base, Member of the Key Special Expert Group of the Ministry of Science and Technology of the 14th Five-Year Plan for "Cyberspace Security Governance", Vice Chairman of the Security Branch of the IEEE Communications Society, Distinguished Speaker of the IEEE Internet of Vehicles Society, Editorial Board Member of the Journal of Cyberspace Security, Associate Editor of the IEEE Internet of Things Journal. His research direction is data security, and he has presided over the National Key R&D Program and the National Natural Science Foundation of China.

Forum Speaker

Cyberspace Data Security and Governance | YEF2024

Ma Jianfeng

Fellow of CCF

Professor, School of Network and Information Security, Xidian University

Deputy Director of the Editorial Board of the Journal of Cyberspace Security, National High-level Talent, Internet Foundation Outstanding Talent in Cybersecurity, Leader of the Innovation Team of the Ministry of Education of "Network and Information Security", and Leader of the Innovation Team of Sanqin Scholars of "Network and Information Security" in Shaanxi Province. He has successively served as the Dean of the School of Computer Science and the Director of the Department of Cyberspace Security of Xidian University. He is a member of the "Cyberspace Security" Discipline Evaluation Group of the Academic Degrees Committee of the State Council, and the deputy director of the Shaanxi Provincial Network Security and Informatization Expert Advisory Committee. He has won the second prize of the National Technological Invention Award twice as the first completer.

Title: Cloud-Network-Device Collaborative Security of Wireless Networks: A Perspective on Data Security

Summary:

The integration of communication and computing and cloud-network integration has become the mainstream technical route of wireless networks, and the integration of wireless networks and cloud computing has produced a "cloud-network-end" collaborative service architecture, and information services have become a typical data sharing mode of wireless networks. Based on the "cloud-network-device" collaborative security architecture, with data security as the core, the establishment of a systematic security protection mechanism has become an inevitable trend in the development of wireless network security, and "cloud-network-device" collaborative security has become a new paradigm of wireless network security. Focusing on the "cloud-network-device" collaborative security architecture, the report focuses on the computing security and communication security of wireless networks, and realizes the organic integration of semantic communication security and service computing security through information service security, so as to meet the systematic security requirements of wireless networks.

Cyberspace Data Security and Governance | YEF2024

Li Fenghua

CCF Distinguished Member

Researcher and deputy chief engineer of the Institute of Information Engineering, Chinese Academy of Sciences

Second-level researcher, deputy chief engineer of technology, Institute of Information Engineering, Chinese Academy of Sciences, distinguished researcher and doctoral supervisor of the Chinese Academy of Sciences, director of the National Engineering Research Center for Disaster Recovery Technology, scholar of the "Hundred Talents Program" of the Chinese Academy of Sciences, and deputy director of the editorial board of the Journal of Cyberspace Security Science. He is a member of the Cyberspace Security Discipline Evaluation Group of the Academic Degrees Committee of the State Council, a member of the Cloud Computing Service Security Assessment Expert Group of the Cyberspace Administration of the People's Republic of China, the chief engineer of a security protection system of the National Science and Technology Innovation 2030 Major Project, the project leader of the "13th Five-Year Plan" and "14th Five-Year Plan" of the National Key R&D Program, the chief expert of the theme project of the National 863 Program, and the key project leader of the NSFC-General Joint Fund. Standing Director of Chinese Information Society of China, Director of Big Data Security and Privacy Computing Professional Committee, Director of China Communications Society, Deputy Director of Journal and Publishing Committee, Member of Academic Work Committee, etc.; He is the executive editor-in-chief of the Journal of Network and Information Security, and the editorial board member of WWW, CJE, Acta Electronica Sinica, Journal of Communications, and Journal of Electronics and Information Technology. He has won the 2018 Network Security Outstanding Talent Award, the 2001 State Council Special Government Allowance, and has won 1 second prize of the National Technological Invention Award and 5 first prizes of the Provincial and Ministerial Science and Technology Progress (or Technological Inventions) in recent years.

Title: Circulation and Security of Data Elements

Summary:

Data has become one of the core production factors of the digital economy, and data has evolved from traditional sharing to factor circulation in the DT era, and circulation is an important way to release the value of data elements, so the digital economy is heavily dependent on the circulation of data elements. The security service for the circulation of data elements focuses on the determination of data ownership, the transfer of rights and interests, the control of use, and the arbitration of disputes. In view of the new challenges in the circulation of data elements and their data security and privacy protection, this report introduces the essential differences between data sharing and data circulation, the criteria for data elements, and focuses on the concepts and academic connotations of data rights confirmation, extended use control, and low-overhead monitoring, as well as the new challenges and academic boundaries of data security and privacy protection from the perspective of data element circulation. The key technologies and development trends of data element circulation are also expounded.

Cyberspace Data Security and Governance | YEF2024

Yang Min

CCF Distinguished Member

Professor of Fudan University, Dean of the School of Computer Science and Technology

He is a member of the Cyber Security Discipline Evaluation Group of the Academic Degrees Committee of the State Council, a Changjiang Scholar Distinguished Professor of the Ministry of Education, and the Chief Scientist of the National 973 Project. He has published more than 40 papers in the four top conferences of network security, S&P, CCS, Security, and NDSS, and has found that it has been approved by the central leadership for many times, and the results have been selected as 973 major achievements and outstanding progress, and the 13th Five-Year Plan National Scientific and Technological Innovation Achievements.

Title: Traffic Compliance Testing for Autonomous Driving Systems

Summary:

At present, L2 autonomous driving has become a standard function of cutting-edge models, and L3 autonomous driving has gradually opened the curtain of market access under the traction of policies. With the acceleration of the intelligent process of vehicles, the expected driving scenarios of autonomous driving are also showing a trend of complexity and diversification (for example, from relatively controllable high-speed cruise scenarios to complex urban driving scenarios). Compliance with traffic laws, as one of the expected functional safety principles clearly pointed out by domestic and foreign standard policies, is the basic premise for the implementation of autonomous driving systems in such complex driving scenarios. As a result, manufacturers and regulators urgently need effective testing methods to identify defects in autonomous driving systems that could lead to traffic violations. However, there are a large number of scene elements in driving scenarios, and different traffic rules represent completely different driving behavior constraints. In this context, the core challenge of autonomous driving violation detection is how to quickly and effectively combine key scenario elements to generate driving scenarios that are likely to lead to specific violations. This report mainly introduces how to generate potential high-risk driving scenarios based on the formal modeling of traffic regulations and the simulation fuzz testing of violation orientation, and introduces the practical results of traffic violation defect mining in autonomous driving systems.

Cyberspace Data Security and Governance | YEF2024

Discipline collar

Qiushi Distinguished Professor/Tenured Professor, School of Computer Science and Technology, Zhejiang University

Qiu Shi Distinguished Professor/Tenured Professor, Doctoral Supervisor, Director of Trustworthy Artificial Intelligence Research Center, School of Computer Science and Technology, Zhejiang University, Ph.D. in Electrical and Computer Engineering from Georgia Institute of Technology, Ph.D. in Computer Science from Georgia State University, Selected as Changjiang Scholar of the Ministry of Education, High-level Scientific and Technological Innovation Talent, National Youth Distinguished Expert, etc., and Editorial Board Member of the Journal of Cyberspace Security Science. He has presided over a number of key projects of the National Key R&D Program, the National Natural Science Foundation of China, and published more than 40 papers in four major conferences: IEEE S&P, ACM CCS, USENIX Security, and NDSS security, and has developed a number of systems that have been deployed and applied on large-scale platforms. He has won 10 best paper awards, including the ACM CCS 2021 Best Paper Award, and was nominated for the Most Innovative Research Award at the Pwnie Awards.

Title: Intelligent Malware Detection and Confrontation

Summary:

This report discusses the work and progress of intelligent malware detection represented by the data-driven paradigm, and analyzes the research challenges of intelligent malware detection from the data and model levels. At the same time, based on the new background of the current large model, the new threats and new opportunities that the large model may bring to malware detection are discussed.

Cyberspace Data Security and Governance | YEF2024

Li Jianhua

CCF Distinguished Member

Distinguished Professor of Shanghai Jiao Tong University

He is currently the Honorary Dean/Dean of the School of Cyberspace Security of Shanghai Jiao Tong University, the Director of the National Engineering Center for Information Content Analysis Technology, the Director of the Engineering Technology Research Center for Network Security Management, Monitoring and Service of the Ministry of Education, and the Director of the Shanghai Key Laboratory of Information Security Comprehensive Management Technology. He has won more than 10 awards, including the second prize of the National Excellent Teaching Achievement Award, the second prize of the National Science and Technology Progress Award, the first prize of the Ministry of Education Science and Technology Progress Award, the first prize of the Shanghai Teaching Achievement Award, and the first prize of the Shanghai Science and Technology Progress Award, and has published more than 300 SCI/EI papers, including 9 highly cited papers, 15 textbook monographs, and served as an editorial board member and reviewer for many journals at home and abroad. In 2022 and 2023, he was consecutively selected as one of the top 2% scientists in the world.

Title: Data Security and Privacy Computing

Summary:

In the ubiquitous intelligent connected environment, data is widely disseminated and grows explosively, and at the same time, frequent cross-border, cross-system, and cross-ecosystem interaction of massive network data has become the norm, giving rise to greater data security and privacy protection issues. The report first conducts an in-depth analysis and discussion on the connotation and extension of data security, revealing the evolution trend of data security technology, policies and laws and regulations, security risks and threats, security capacity building and other aspects. This paper deeply analyzes the basic concepts and design principles of privacy-preserving computing technology for big data, analyzes the frontiers of big data security and privacy-preserving computing, including the development and application of technologies such as homomorphic encryption, multi-party secure computing, federated learning and blockchain. Finally, some research progress in the field of data security and privacy computing is introduced, including multi-party secure and trusted data storage of consortium blockchain, data security collaborative sharing of searchable encryption and blockchain, and data intelligent analysis of differential privacy federated learning.

Read on