Yepeng Pan

Yepeng Pan

Biography

Interests
  • Cryptography
  • Blockchain
  • Access Control
  • Privacy Enhancing Technology
  • Network Security
Education
  • MSc in Information Security, 2022

    University College London

  • BEng in Information Security, 2020

    Hunan University

Programming Skills

C & C++
VHDL & Verilog
Python & Go

Work Experience

 
 
 
 
 
Internship(Information Security R&D Engineer)
NIO Inc
Nov 2020 – Apr 2021 Shanghai China
  • Managed security devices (including the management of DLP, firewall, fortress machine, etc.);
  • Developed terminal management application;
  • Developed automation scripts;
 
 
 
 
 
Internship(Information Security R&D Engineer)
Heetian Ltd
Jul 2019 – Aug 2019 Changsha China

Implemented three online courses on the Heetian lab platform:

  • Basic web security problems (XSS, CSRF, SQL injection and click hijack);
  • Basic reverse analysis (Stack overflow vulnerabilities and existing solutions);
  • C++ vulnerabilities analysis (Virtual function vulnerability, Heap vulnerabilities, Vulnerable functions);

Award

First class scholarship
2/62
Postgraduate recommendation
6/62
Third prize of programming competition
10/230

Research Experience

*
Privacy preserving cloud image retrival system

Feb. 2020 - June. 2020

Followed up and improved a recent research about encrypted image retrieval system working on the cloud that could preserve user privacy.

Brief introduction of system:

  • This system aims to solve the problem that in a cloud image retrieval system, the cloud server could analyse user’s requests and damage user privacy.
  • This system uses compressed binary CNN fully connected layer outputs to represent image features, and uses the distance among image features as the classification basis to generate a tree for retrieval. By encrypting the tree and user’s requests with random matrix, the cloud server can only use encrypted features to calculate distance between user’s request and tree nodes during the retrieval process, and thus the system can preserve user privacy.

Completed improvements:

  • Because the original system’s tree generation process only merges nodes with high similarity, the subtrees of the generated tree may have obvious height differences, and it will leads to low accuracy since the features of nodes with small depth in the tree will become vague. By involving new threshold and check process, the system will get a chance to merge nodes with low similarity at the right time. Experiments show that the accuracy of the modified system is 8% higher than that of the original system on average, and when more categories of images are used, the accuracy gap between the modified system and the original system is more obvious.
  • The original system’s retrieval process will only pick one node which has the smallest distance with user’s request at each level, so the original system doesn’t perform well when there are similar nodes at the same level. By involving more (Experiments shows that the maximum of 3 nodes perform the best) similar nodes into consideration, modified system could reach higher accuracy.

Further improvements:

  • It is inevitable that the features of nodes will become more vague during the tree generation process, and it will get worse if there are more categories of images involved, so that using tags during the tree generation process may achieve higher accuracy and it can also simplify the retrieval process.
An investigation on the security of DNS servers in China

Apr. 2019 - May. 2019

Analysed 500 DNS servers’ responses towards 20 different domain names with traceroute, nslookup and wireshark.

Brief introduction:

  • This research tests 500 DNS servers provided by Hunan university, google, and different ISPs in China. The 20 tested domain names include 15 common domain names in China, 3 domain names of google and 2 inexistent domain names. By analysing these DNS servers’ reply, a series of DNS security problems has been found.

Conclusion:

  • Different ISPs in China have different strategies toward inexistent domain names. DNS server provided by China Mobile will direct user to its ads page if requested domain name doesn’t exist while other ISPs will not.
  • ISPs used to use DNS hijack to direct users to a new website with iframe that contains the original page to feed ads, which has become rare, possibly due to the wide use of content security policy and X-Frame-Options.
  • A small amount(3 out of 28) of DNS servers provided by China railway telcom and DNS servers provided by Hunan university can resolve all domain names correctly, while all DNS servers provided by other ISPs will give false replies toward domain names of google.
  • When users assign ”8.8.8.8” as their DNS server and query domain names of google, ISPs will analyse their requests and reply a false IP before the real DNS server
  • Though DoH(DNS over Https) can stop ISPs from analysing users' queries, due to the small amount of DNS servers that accept DoH, it is still easy for ISPs to ban or substitute these DNS servers.