性别:女
职称:研究员
电子邮件:dlp@iscas.ac.cn
所在部门:中国科学院软件研究所基础软件国家工程研究中心
通讯地址:北京市海淀区中关村南四街4号(北京8718信箱)中国科学院软件研究所5号楼1216
电话号码:无
邮政编码: 100190
研究方向/领域:主要从事计算机取证、系统安全方面的研究。具体包括电子证据的获取、分析和司法鉴定;操作系统安全机制研发、分析、测试、评估等;网络安全、云安全、物联网安全等。 She is now a professor at National Fundamental Software Research Center
-
1984-1988 山东大学数学系 运筹学专业
1999-2002北京科技大学信息学院 软件与理论专业
2003-2006 中国科学院软件研究所 软件与理论专业
-
1988-1994铁道部第十六工程局
1994-2008北京人民警察学院2008至今 中科院软件所
-
中国电子学会高级会员
中国电子学会计算机取证专家委员会主任
中国人民大学法学院证据学研究所兼职研究员
中国人民大学物证鉴定中心司法鉴定人
-
主要从事计算机取证和系统安全及相关领域的研究,在电子证据的标准规范、取证的模型、电子证据的分析鉴定技术、操作系统安全技术、系统安全的检测技术和评估技术方面有一定的研究积累。在计算机取证的研究方面,对计算机取证的过程模型做了详细的分析。区分了它们的使用对电子证据的完整性保护及法律上的可采用性的不同影响。在这基础上提出了基于操作系统的实时取证的理念并研发了原型系统。在应用方面,研发了基于电话记录的取证系统,获得了很好的应用。在系统安全方面,主要研究了高安全等级操作系统的实现技术和方法以及基于静态代码分析和系统运行时的动态分析的系统脆弱性分析、抵抗力分析、渗透测试技术等。多次获得公安部科技成果奖和有关省部级科技进步奖。
-
论文:
-
Liping Ding, Yifei Guo, Jian Gu, andJingzheng Wu. Proceedings of 2011 International Conference on Information andIndustrial Electronics (ICIIE 2011) of IEEE.Pp.V2-262-V2-267. Chengdu,2011,China.
-
Liping Ding, Gujian, Yongji Wang, andJingzheng Wu. Analysis of Telephone Call Detail Records Based on Fuzzy DecisionTree. Proceedings of ICST Conference on Forensics Applications and Techniquesin Telecommunications , Information and Multimedia. Shanghai, 2010, China.
-
Jingzheng Wu, Yongji Wang, Liping Ding, Xiaofeng Liao. Improving Performanceof Network Covert Timing Channel through Huffman Coding. The 2010 FTRAInternational Symposium on Advances in Cryptography, Security and Applicationsfor Future Computing (ACSA 2010). Gwangju, Korea. Dec 9-11, 2010.
-
Yasen Aizezi, Liping Ding, Dilixiati Maimaiti, Qiong Wan .Research on the Helper of EnCase for Digital Evidences in Uyghur-Kazak-Kyrgyz.Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree.Proceedings of ICST Conference on Forensics Applications and Techniques inTelecommunications , Information and Multimedia. Shanghai, 2010, China.
-
Jianchun Jiang, WeifengChen, Liping Ding. On Estimating Cyber Adversaries'Capabilities: A Bayesian Model Approach. RAID 2010: 502-504.
-
Yongji Wang, Jingzheng Wu,Haitao Zeng, Liping Ding, Xiaofeng Liao. Research onconvert channel, 2010,21(9):2262-2288.(in Chinese)
-
Ennan Zhai1, Qingni Shen1;Yonggang Wang; Tao Yang;Liping Ding; Sihan Qing; SecGuard: Secure and Practical IntegrityProtection Model for Operating Systems. Proceedings of APWeb 2011. April 18-20,2011 Beijing, China.
-
Ding Liping, Yang Qiusong ,Sun Liang, Tong Jie, Wang Yongji. Evaluation of the Capability of PersonalSoftware Process Based on Data Envelopment Analysis. M.Li, B.Boehm, and L.J.Osterweil(Eds.): SPW2005, LNCS3840, Springer-Verlag Bferlin Heidelberg. (2005):235 – 248 DING Liping, WANGYong-Ji. Research on relevant law and technology issues about computerforensics, Journal of Software, Vol.16, 2005(2):260-275. (in Chinese) DINGLi-Ping, ZHOU Bo-Wen, WANG Yong-Ji. Capture and Storage of Digital EvidenceBased on Security Operating System, Journal of Software,Vol.18No.7,(2007):1715-1729(in Chinese)
-
DING Liping, WANG Yong-Ji.Computer Forensics Survey. Journal of Communication and Computer,Vol.8,(2005):1-10(in Chinese)
-
Liping Ding.Computer CrimesInvestigation Need High Quality Polices. Journal of Beijing People's Police College,Vol.6,(2000):12-16(in Chinese)
-
Liping Ding. The Application ofInformation Mining in Computer Crimes Investitation. JOURNAL OF CHINESEPEOPLE'S PUBLIC SECURITY UNIVERSITY SCIENCE AND TECHNOLOGY,Vol.3,( 2002):47-50.(in Chinese)
-
Liping Ding. Study on the Risk Controlof Public Security Information Systems. JOURNAL OF CHINESE PEOPLE'S PUBLICSECURITY UNIVERSITY SCIENCE AND TECHNOLOGY,Vol.4, ( 2004):71-73 (in Chinese)Liping Ding, Zong Wang. Study on theInformation Leak through Mobile Phones and Public Security InformationAssurance. Journal of Beijing People's Police
-
College, Vol.4,( 2004):42-44 (in Chinese)
LipingDing.The principles and steps of computer forensics. JOURNAL OF CHINESE PEOPLE'SPUBLIC SECURITY UNIVERSITY SCIENCE AND TECHNOLOGY,Vol.1,( 2005): 71-73(in Chinese) -
Liping Ding. Study on the ComputerForensics Curriculums in Public Security Schools and Colleges. Journal ofBeijing People'sPolice College, Vol.2, (2005):25-28(in Chinese)
-
Liping Ding, Yongji Wang. Theverification and test of computer forensics tools. CHINA INFORMATION SECURITY,Vol.8,(2005):60-63. (in Chinese)
-
Liping Ding. Computer ForensicsTechnologies on Network Data Stream. NETINFO SECURITY,Vol.6,( 2005):74-77(inChinese)
-
Liping Ding. The technological methodof computer forensics and the research on its tools. CHINA INFORMATION SECURITY,Vol.8,( 2005):32-36(in Chinese)
-
Liping Ding. Research onMulti-Dimension Forensics Model, NETINFO SECURITY,Vol.10,( 2005):73-75 & Network andComputer Security(tansship),Vol.11,(2005):25-27(in Chinese)
书籍:
1. Liping Ding. ComputerForensics:Real-time Forensics OS Theory and Practice. Quanzhong Press, June,2006. (in Chinese)
2. Jie Zhang, Liping Ding. Police Command Theory and Practice ofemergency. Quanzhong Press. December, 2004. (in Chinese)
-