ShuangHe Peng
School of Computer and Information Technology
Beijing Jiaotong University


Chinese Version (HTML )

Contact Information

Office: East D309 Mechanical Engineering Building
Phone: (8610) 5168-2592
Email:
shhpeng@bjtu.edu.cn
Curriculum Vitae: pdf
Biography: html

Active Research Areas

  • System Security
  • Trusted Computing Technology
  • Cloud Computing

Honor and Awards

  • the Second Prize in China Undergraduate Information Security Competition, 2018.7 (PDF )
  • Outstanding Teaching Award, School of Computer and Information Technology, Beijing Jiaotong University, 2017.4--.
  • Outstanding Teaching Award, School of Computer and Information Technology, Beijing Jiaotong University, 2014.3--2017.3
  • Excellent Teachers in Charge of a Class, School of Computer and Information Technology, Beijing Jiaotong University, 2014.
  • Excellent Teachers in Charge of a Class, School of Computer and Information Technology, Beijing Jiaotong University, 2013.
  • Journal Articles

    • Zeyu Mi, Haibo Chen,Yinqian Zhang, Shuanghe Peng , Xiaofeng Wang, and Michael Reiter. CPU Elasticity to Mitigate Cross-VM Runtime Monitoring, In Transactions on Dependable and Secure Computing (TDSC), 2018.
    • PENG Shuanghe , ZHOU Qiaofeng, LIU Peiyao. A Way to Improve the Key Recovery Accuracy based on Dynamic Programming, Wuhan University Journal of Natural Sciences, 2018.
    • ShuangHe Peng , Tuergong.Maitisabier, Zhuan Jin. Research on Xen virtual machine scheduling strategy to mitigate covert side attacks, Engineering Journal of Wuhan University, 51(4):195-204, 2018.
    • ShuangHe Peng , Tuergong.Maitisabier, Qiaofeng Zhou. Research on Deduplication Technique of Chinese Text with Simhash, Computer Technology and Development, 27(11):137-145, 2017.(PDF )
    • ShuangHe Peng , ZhiGe Chen, DeEn Chen. Membership Proof and Verification in Authenticated Skip Lists based on Heap, China Communications, 13(6):195-204, 2016. ( PDF )
    • ShuangHe Peng , ZhiGe Chen, DeEn Chen. Performance analysis and comparison of data integrity authentication for authenticated skip lists, Journal of Beijing Jiaotong University, 40(2):58-62, 2016. ( PDF )
    • Rui Zhang, JiQian Liu, ShuangHe Peng . Research and Implementation of trust transition based on EFl, Computer Applications, 27(9):2174-2176, Sep.2007. ( PDF )
    • ShuangHe Peng , Zhen Han. Enhancing PC Security with a U-Key, IEEE Security & Privacy, 4(5):34-39, 2006. ( PDF )
    • ShuangHe Peng , Zhen Han, ChangXiang Shen. Security protocol and scheme for inter-realm information accessing, Journal of Computer Research and Development, 42(9):1587-1593, 2005. ( PDF )
    • ShuangHe Peng , Zhen Han. A Way to Extend the Authentication Capability of Application Boundary Security Device, Journal of Beijing Jiaotong University, 28(5):6-10, 2004. ( PDF )
    • ShuangHe Peng . The design and implementation of T=0 protocol of smart card based on USB control chip, Journal of computer applications, Vol.24, 2004.
    • ShuangHe Peng , GenXing Yang. The design and implementation of pseudo-SPI technology under 32-bits micro-processor, Journal of micro-computer and its applications, 21(2):25-27, 2002. ( PDF )
    • Bailu Guo,ShuangHe Peng , Xun Chen. Commercial Confidential Information Protection Technology Research based on TCM, Information Security and Communications Privacy, pages:80-84, 2014.3. ( PDF )
    • WeiMin Tang, Lan Gao, ShuangHe Peng , Zhen Han, ChangXiang Shen. Trust Enhancement of General Personal Computer Based on Removable TPM, Journal of Wuhan University(Nat.Sci.Ed.),55(1):22-26,2009.2. ( PDF )
    • WeiMin Tang, ShuangHe Peng , Zhen Han, ChangXiang Shen. A Role-Based Mandatory Access Control Model, Journal of Beijing Jiaotong University 34(2):95-100, 2010,4. ( PDF )

    Publications in Conferences

    • ZiHao Wang, ShuangHe Peng, XinYue Guo, WenBin Jiang. Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks. The 11th International Conference on Security for Information Technology and Communications(SECITC 2018), Nov.2018, Bucharest, Romania.
    • ShuangHe Peng , Qiaofeng Zhou and Peiyao Liu. Detection Of Cache-based Side Channel Attack Based On Performance Counters, the 3rd International Conference on Artificial Intelligence and Industrial Engineering, AIIE2017, Pages: 377-381. ( PDF )
    • ShuangHe Peng , YingJie Qin and ZhiGe Chen. A Simple and More Versatile Authentication Path Computation Algorithm for Binary Hash Tree, the Third ASE International Conference on Cyber Security, CyberSecurity2014, Pages: 1-8. ( PDF )
    • ShuangHe Peng , Meng Fan, YingJie Qin and ZhiGe Chen. A Public-Verifiable Secure Logging Scheme on Chinese Trusted Platform, Proceedings of the International Conference on Cyber Science and Engineering, CyberSE 2013, Pages:324-330. ( PDF )
    • ShuangHe Peng , JiQiang Liu. Trust Verification of Booting File in Real Mode Using Portable TPM, Proceedings of 2011 Cross-Strait Conference on Information Science and Technology and iCube, Pages:239-242. ( PDF )
    • ShuangHe Peng , Zhen Han. A Trusted Boot System Using Portable TPM on EFI based BIOS, Proceedings of 2010 Cross-Strait Conference on Information Science and Technology, Pages:161-164. ( PDF )
    • ShuangHe Peng , Zhen Han. The Design and Implementation of Portable TPM Device Driver based on Extensible Firmware Interface, 2009 International Conference on Multimedia Information Networking and Security, Mines'09, Pages:342-345. ( PDF )
    • ShuangHe Peng , Zhen Han. Trust of user using U-Key on trusted platform, 2006 8th International Conference on Signal Processing, ICSP 2006, Pages:3023-3026. (PDF )
    • WeiMin Tang , ShuangHe Peng , Zhen Han. Design and Implementation of UsbKey Device Driver based on Extensible Firmware Interface, 8th International Conference on Signal Processing, ICSP 2008,( PDF )
    • ShuangHe Peng , Zhen Han. Proxy cryptography for secure inter-domain information exchanges, 11th Pacific Rim International Symposium on Dependable Computing, PRDC 2005, Pages:193-199. ( PDF )
    • ShuangHe Peng , Zhen Han, KeJun Sheng. ID-Based Proxy Signature and Designated verifier Proxy Signature Scheme from Bilinear Maps, CCICS'2005, (PDF)
    • ShuangHe Peng , Zhen Han, JiQiang Liu. Security enhancement for two remote user authentication schemes, ICSP'2004, (PDF)

    Software Copyrights

    • P.R.China Registration No. 2011SRBJ4103. Computer software (version 1.0) for the trusted verification of NTFS files in real mode. ShuangHe Peng , Zhen Han and JiQiang Liu, ( JPG).
    • P.R.China Registration No. 2008SRBJ5042. Computer software (version 1.0 ) of UKey driver in real mode. ShuangHe Peng , ( PDF)

    Patents

    • P.R.China Patent Number: 201310495388.2. A new method to get authentication path for SkipLists based on Heap. ShuangHe Peng , Zhen Han and JiQiang Liu. Awarded: 01-2017 (Inventor), ( PDF).
    • P.R.China Patent Number: 201310341001.8. Method to get authentication path for a signing scheme using Merkle tree. ShuangHe Peng , Zhen Han and JiQiang Liu. Awarded: 05-2016 (Inventor), ( PDF).
    • P.R.China Patent Number: 200810238938. Method to verify boot files based on portable Trusted Platform Module. ShuangHe Peng , Zhen Han and JiQiang Liu. Awarded: 10-2008 (Inventor), ( JPG).
    • P.R.China Patent Number: 201110355883.4. Method to build hypervisor using hardware assisted virtualization before operation system is booted. ShuangHe Peng . Submitted: 10-2011 (Inventor), ( PDF)
    • P.R.China Patent Number: 201310495388.2. Method to get authentication path for skip list based on max heap. ShuangHe Peng . Submitted: 10-2013 (Inventor).

    Teaching

    Spring 2017, 2018
    Teaching: Special Train on Program Design
    Fall 2016, 2017
    Teaching: Programming Language
    Fall 2014
    Teaching: Programming Language
    Spring 2014
    Teaching: Data Structure
    Fall 2013
    Teaching: Programming Language
    Fall 2012
    Teaching: Programming Language
    Spring 2011
    Teaching: Data Structure

    Graduated Students(Master)

    • Meng Fan (Now at Institute of Information Engineering, CAS )
    • YingJie Qin (Now at Alibaba)
    • ZhiGe Chen (Now at Meituan.com)
    • Zhuan Jin (Now at Iqiyi)
    • Maitisabier.TuerGong (Now at BJTU)
    • KeXiang Wang
    • Shuang Yao
    • QiaoFeng Zhou

    Current Graduate Students(Masters)

    • Peiyao Liu
    • Jiali Zhao
    • Jing Han
    • Kalsoom Bughio
    • Rui Xie
    • Yuqiao Huo
    • Zakaria Hasan


    Last modified: August 4 15:15:45 EDT 2018         © 2015-2018, ShuangHe Peng