首页 > 机构概况 > 创新班 > 创新班导师简介

创新班导师 丁丽萍

丁丽萍

性别:女

职称:研究员

电子邮件:dlp@iscas.ac.cn

所在部门:中国科学院软件研究所基础软件国家工程研究中心

通讯地址:北京市海淀区中关村南四街4号(北京8718信箱)中国科学院软件研究所5号楼1216

电话号码:无

邮政编码: 100190

研究方向/领域:主要从事计算机取证、系统安全方面的研究。具体包括电子证据的获取、分析和司法鉴定;操作系统安全机制研发、分析、测试、评估等;网络安全、云安全、物联网安全等。 She is now a professor at National Fundamental Software Research Center

1984-1988?山东大学数学系?运筹学专业
1999-2002北京科技大学信息学院?软件与理论专业
2003-2006?中国科学院软件研究所?软件与理论专业?

1988-1994铁道部第十六工程局
1994-2008北京人民警察学院2008至今?中科院软件所

中国电子学会高级会员
中国电子学会计算机取证专家委员会主任
中国人民大学法学院证据学研究所兼职研究员
中国人民大学物证鉴定中心司法鉴定人

主要从事计算机取证和系统安全及相关领域的研究,在电子证据的标准规范、取证的模型、电子证据的分析鉴定技术、操作系统安全技术、系统安全的检测技术和评估技术方面有一定的研究积累。在计算机取证的研究方面,对计算机取证的过程模型做了详细的分析。区分了它们的使用对电子证据的完整性保护及法律上的可采用性的不同影响。在这基础上提出了基于操作系统的实时取证的理念并研发了原型系统。在应用方面,研发了基于电话记录的取证系统,获得了很好的应用。在系统安全方面,主要研究了高安全等级操作系统的实现技术和方法以及基于静态代码分析和系统运行时的动态分析的系统脆弱性分析、抵抗力分析、渗透测试技术等。多次获得公安部科技成果奖和有关省部级科技进步奖。

论文:

  1. Liping?Ding,?Yifei?Guo,?Jian?Gu,?andJingzheng?Wu.?Proceedings?of?2011?International?Conference?on?Information?andIndustrial?Electronics?(ICIIE?2011)?of?IEEE.Pp.V2-262-V2-267.?Chengdu,2011,China.

  2. Liping?Ding,?Gujian,?Yongji?Wang,?andJingzheng?Wu.?Analysis?of?Telephone?Call?Detail?Records?Based?on?Fuzzy?DecisionTree.?Proceedings?of?ICST?Conference?on?Forensics?Applications?and?Techniquesin?Telecommunications?,?Information?and?Multimedia.?Shanghai,?2010,?China.

  3. Jingzheng?Wu,?Yongji?Wang,?Liping?Ding,?Xiaofeng?Liao.?Improving?Performanceof?Network?Covert?Timing?Channel?through?Huffman?Coding.?The?2010?FTRAInternational?Symposium?on?Advances?in?Cryptography,?Security?and?Applicationsfor?Future?Computing?(ACSA?2010).?Gwangju,?Korea.?Dec?9-11,?2010.

  4. Yasen?Aizezi,?Liping?Ding,?Dilixiati?Maimaiti,?Qiong?Wan?.Research?on?the?Helper?of?EnCase?for?Digital?Evidences?in?Uyghur-Kazak-Kyrgyz.Analysis?of?Telephone?Call?Detail?Records?Based?on?Fuzzy?Decision?Tree.Proceedings?of?ICST?Conference?on?Forensics?Applications?and?Techniques?inTelecommunications?,?Information?and?Multimedia.?Shanghai,?2010,?China.

  5. Jianchun?Jiang,?WeifengChen,?Liping?Ding.?On?Estimating?Cyber?Adversaries'Capabilities:?A?Bayesian?Model?Approach.?RAID?2010:?502-504.

  6. Yongji?Wang,?Jingzheng?Wu,Haitao?Zeng,?Liping?Ding,?Xiaofeng?Liao.?Research?onconvert?channel,?2010,21(9):2262-2288.(in?Chinese)

  7. Ennan?Zhai1,?Qingni?Shen1;Yonggang?Wang;?Tao?Yang;Liping?Ding;?Sihan?Qing;?SecGuard:?Secure?and?Practical?IntegrityProtection?Model?for?Operating?Systems.?Proceedings?of?APWeb?2011.?April?18-20,2011?Beijing,?China.

  8. Ding?Liping,?Yang?Qiusong?,Sun?Liang,?Tong?Jie,?Wang?Yongji.?Evaluation?of?the?Capability?of?PersonalSoftware?Process?Based?on?Data?Envelopment?Analysis.?M.Li,?B.Boehm,?and?L.J.Osterweil(Eds.):?SPW2005,?LNCS3840,?Springer-Verlag?Bferlin?Heidelberg.?(2005):235?–?248?DING?Liping,?WANGYong-Ji.?Research?on?relevant?law?and?technology?issues?about?computerforensics,?Journal?of?Software,?Vol.16,?2005(2):260-275.?(in?Chinese)?DINGLi-Ping,?ZHOU?Bo-Wen,?WANG?Yong-Ji.?Capture?and?Storage?of?Digital?EvidenceBased?on?Security?Operating?System,?Journal?of?Software,Vol.18No.7,(2007):1715-1729(in?Chinese)

  9. DING?Liping,?WANG?Yong-Ji.Computer?Forensics?Survey.?Journal?of?Communication?and?Computer,Vol.8,(2005):1-10(in?Chinese)

  10. Liping?Ding.Computer?CrimesInvestigation?Need?High?Quality?Polices.?Journal?of?Beijing?People's?Police?College,Vol.6,(2000):12-16(in?Chinese)

  11. Liping?Ding.?The?Application?ofInformation?Mining?in?Computer?Crimes?Investitation.?JOURNAL?OF?CHINESEPEOPLE'S?PUBLIC?SECURITY?UNIVERSITY?SCIENCE?AND?TECHNOLOGY,Vol.3,(?2002):47-50.(in?Chinese)

  12. Liping?Ding.?Study?on?the?Risk?Controlof?Public?Security?Information?Systems.?JOURNAL?OF?CHINESE?PEOPLE'S?PUBLICSECURITY?UNIVERSITY?SCIENCE?AND?TECHNOLOGY,Vol.4,?(?2004):71-73?(in?Chinese)Liping?Ding,?Zong?Wang.?Study?on?theInformation?Leak?through?Mobile?Phones?and?Public?Security?InformationAssurance.?Journal?of?Beijing?People's?Police

  13. College,?Vol.4,(?2004):42-44?(in?Chinese)
    LipingDing.The?principles?and?steps?of?computer?forensics.?JOURNAL?OF?CHINESE?PEOPLE'SPUBLIC?SECURITY?UNIVERSITY?SCIENCE?AND?TECHNOLOGY,Vol.1,(?2005):?71-73(in?Chinese)

  14. Liping?Ding.?Study?on?the?ComputerForensics?Curriculums?in?Public?Security?Schools?and?Colleges.?Journal?ofBeijing?People'sPolice?College,?Vol.2,?(2005):25-28(in?Chinese)

  15. Liping?Ding,?Yongji?Wang.?Theverification?and?test?of?computer?forensics?tools.?CHINA?INFORMATION?SECURITY,Vol.8,(2005):60-63.?(in?Chinese)

  16. Liping?Ding.?Computer?ForensicsTechnologies?on?Network?Data?Stream.?NETINFO?SECURITY,Vol.6,(?2005):74-77(inChinese)

  17. Liping?Ding.?The?technological?methodof?computer?forensics?and?the?research?on?its?tools.?CHINA?INFORMATION?SECURITY,Vol.8,(?2005):32-36(in?Chinese)

  18. Liping?Ding.?Research?onMulti-Dimension?Forensics?Model,?NETINFO?SECURITY,Vol.10,(?2005):73-75?&?Network?andComputer?Security(tansship),Vol.11,(2005):25-27(in?Chinese)

书籍:

????1.?Liping?Ding.?ComputerForensics:Real-time?Forensics?OS?Theory?and?Practice.?Quanzhong?Press,?June,2006.?(in?Chinese)

????2.?Jie?Zhang,?Liping?Ding.?Police?Command?Theory?and?Practice?ofemergency.?Quanzhong?Press.?December,?2004.?(in?Chinese)