I have more than four years of development experience in Python and research experience in network security, cyber-physical system security, machine learning, and BlockChain. I discovered vulnerabilities in power system communication protocol and developed mitigations methods. I have reviewed 14 papers, published 11 papers and received 141 citations. You can find my sample code here
and sample tutorial here
Ph.D. in Computer Engineering
The Holcombe Department of Electrical and Computer Engineering, Clemson University, USA
Estimated to graduate in Aug 2018
M.S. in Computer Science
Department of Computer Science, University of Texas-Pan American, USA
Graduated in Aug 2013
B.S. in Information and Computational Science
College of Mathematics, Jilin University, China
Graduated in June 2010
Languages: Proficient: Python; Prior experience: SQL, C++, C
Libraries: scapy, numpy, pandas, PyTorch, OpenMPI
Operating System: Cent OS, Mac OS, Debian, Fedora, Kali, Metasploit, Windows XP
Software and Tools: Wireshark, nmap, MySQL, Hex-Rays IDA, Anaconda, Git, Floodlight, Matlab, vShpere
Hardwares: SEL Relays and Security Gateways, Cisco VPNs, PICA8 SDN Switches, AirTight Wireless IDS
Other Skills: Traffic Analysis, Machine Learning, BlockChain, Reverse Engineering, IDS, IPS
Situational Intelligence for Smart Grid Optimization and Intelligent Control
NSF Grant: IIP-1312260, With Prof. G. Kumar Venayagamoorthy and Prof. Richard R. Brooks
2014 - Present
Discovered side-channel vulnerabilities of the synchrophasor network protocol that can differentiate data packets from other packets in an encrypted VPN tunnel. Discovered a vulnerability that can trigger a security gateway to send clear text packages. Designed and implemented side-channel based DoS attacks against above protocol and devices. Developed protocol camouflage method and transformed a segment of Zeus bot-net traffic into the above protocol and injected the fake traffic into a legitimate data receiver. Designed and implemented a set of neural networks trained with the dynamic of the power grid and used the trained neural networks to infer missing data during DoS attacks. Implemented BGP hijacking experiments on the Internet and now developing a method to detect BGP hijacking attacks using side-channels.
Open Source Synchrophasor Protocol Parser and Client
2016 - Present
Designed and developed the first open source synchrophasor protocol client
available on Github using Python3 with asynchronous programming and a customized parser. The package fully supports the IEEE C37.118.2-2011 standard including all packet formats, communication methods, and performance requirements. The package helped reduced the development time of synchrophasor applications from weeks to days and now used by dozens of researchers for experimenting and prototyping.
Security of Distributed Cyber-Physical Systems with Connected Vehicle Applications
NSF Grant: CNS-1544910, With Prof. Pierluigi Pisu and Prof. Richard R. Brooks
2017 - Present
Developed a software simulation of a connected vehicle platooning system using Python and Matlab. Developed both centralized and decentralized controller that allows the platooning vehicles automatically follows the leading vehicle. Analyzed the impact of sensor noise on the control system. Now developing a control strategy to mitigate damage caused by a malicious vehicle in the platoon.
Provenance Assurance Using Currency Primitives
NSF Grant: OAC-1547164, With Prof. Richard R. Brooks
Implemented the data serialization, transmission, and deserialization module of the data provenance system using C++. The module is used for communications and file transmissions between block chian mining servers and clients.
Explorations of Theoretical Models of Self-Assembly
NSF Grant: CCF-1117672, With Prof. Robert Schweller and Prof. Matthew J. Patitz
2011 - 2013
Designed a parallel binary adding algorithm, a parallel shear sorting algorithm, and a self-replication system using the DNA self-assembly model.
Teaching Assistant for ECE8930 DDoS Attack Class - Clemson University, USA
2017 - Present
Implemented the Dynamic DDoS Mitigation System
that automatically scales up the CDN during DDoS attacks and scales down the CDN during light load to save energy. Developed lectures, slides, labs, and lab instructions
. Updated the network topology for different labs using Floodlight SDN. Instructed lectures, labs. Graded assignments.
Teaching Assistant for ECE6490/ECE4490 Network Security Class - Clemson University, USA
2015 - Present
Built the network security lab on two campuses connected through VPN. Wrote a variety of automation scripts. Set up Fedora, LDAP, VirtualBox, Motion, Floodlight SDN and a variety of other software. Installed and configured Synology NAS, Dell PowerEdge servers, and workstations, PICA8 SDN switches, AirTight wireless IDS, APC UPS, and a variety of other hardware. Instructed lectures, labs. Graded assignments.
Database Administrator - China Huaneng Group, Beijing, China
2010 - 2011
Worked with IBM and Huaneng's subsidiary companies to deploy SAP system. Maintained human resource and payroll system database.
INVITED REVIEWS(14 reviews in total as of June 2018)
Computers & Security - Elsevier Journal
2016 - 2018
International Journal of Electrical Power & Energy Systems - Elsevier Journal
IEEE Symposium Series on Computational Intelligence - IEEE Conference
Clemson University Power Systems Conference - IEEE Conference
FEATURED PUBLICATIONS(11 publications in total as of June 2018)
Denial of service attack on tie-line bias control in a power system with pv plant
X Zhong, I Jayawardene, GK Venayagamoorthy, R Brooks
IEEE Transactions on Emerging Topics in Computational Intelligence
Stealthy malware traffic-Not as innocent as it looks
X Zhong, Y Fu, L Yu, R Brooks, GK Venayagamoorthy
10th International Conference on Malicious and Unwanted Software
Side-channels in electric power synchrophasor network data traffic
X Zhong, P Arunagirinathan, A Ahmadi, R Brooks, GK Venayagamoorthy
10th Annual Cyber and Information Security Research Conference