Yin Pan Headshot

Yin Pan

Dean’s Office
Golisano College of Computing and Information Sciences

Office Mailing Address
152 Lomb Memorial Drive Rochester, NY 14623

Yin Pan

Dean’s Office
Golisano College of Computing and Information Sciences


BS, MS, Shanghai Normal University (China); MS, Ph.D., State University of New York at Binghamton


Yin Pan is a Professor in the Computing Security department. She received her Ph.D. in Systems Science and M.S. degree in Computer Science from Binghamton University. Dr. Pan holds four US patents in the areas of Network Quality of Services, Voice over IP and Artificial Intelligence. Since joining RIT in 2002, Dr. Pan has been actively involved in the IT security area, especially in security audits and computer forensics. Her current research interests include game-based digital forensics and memory-based malware detection using machine learning. She has published over 45 papers and presentations in research conferences and journals. She received grants from NSF, US Air Force Research Lab, and RIT. Dr. Pan teaches both undergraduate and graduate courses in digital forensics.

Areas of Expertise

Currently Teaching

2 Credits
Teaching is a valuable and desirable skill for PhD students. This workshop course provides an introduction to the concepts and skills needed for quality teaching in higher education. Students will be provided with lecture, reading, and class activities centered on building skills in educational analysis, design, and assessment. Prerequisites: Limited to students in the Ph.D. program. Class 2, Credit 2 (F)
3 Credits
An investigation of the tasks of incident response and computer system forensics will be pursued. Students will learn the basic procedure for incident response as well as the tools needed to uncover the activities of computer users (deleted and hidden files, cryptographic steganography, illegal software, etc). Students will also learn to employ the activities needed to gather and preserve this evidence to ensure admissibility in court.
3 Credits
This course provides students with the latest techniques and methods needed for extracting, preserving and analyzing volatile and nonvolatile information from digital devices. Students will gain exposure to the spectrum of available computer forensics tools along with developing their own tools for “special need” situations. The core forensics procedures necessary for ensuring the admissibility of evidence in court, as well as the legal and ethical implications of the process, will be covered on both Unix and Windows platforms, under multiple file systems. Therefore, students must possess a knowledge of available filesystems on both platforms.
1 - 3 Credits
A student works with a faculty member to devise a plan of study on a topic in various areas of computing security. Deliverables, evaluation methods, and number of credits need to be specified in a written proposal. A final report and presentation in the form of a poster session is expected and graded at the end of the term.

Select Scholarship

Published Conference Proceedings
Mosli, Rayan, et al. "They Might NOT Be Giants: Crafting Black-Box Adversarial Examples Using Particle Swarm Optimization." Proceedings of the ESORICS 2020. Ed. N/A. Virtual, Virtual: n.p., 2020. Print.
Willis, Peter, et al. "Root Redundancy in Meshed Tree Bridged Networks." Proceedings of the 2020 IEEE 45th Conference on Local Computer Networks (LCN). Ed. N/A. Virtual, Virtual: n.p., 2020. Print.
Pan, Yin, Sumita Mishra, and David Schwartz. "Gamifying Cybersecurity Course Content for Entry Level Students." Proceedings of the 2017 ASEE Annual Conference & Exposition, Columbus, Ohio, June, 2017. Ed. ASEE Conference Proceeding. Columbus, Ohio: ASEE, 2017. Print.
Mosli, Rayan, et al. "A Behavioral-Based Approach for Malware Detection." Proceedings of the Thirteenth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, 2017. Ed. IFIP WG 11.9 Conference Proceeding. Orlando, FL: Proceeding, 2017. Web.
Pan, Yin, Sumita Mishra, and David Schwartz. "Gamifying Course Modules for Entry Level Students." Proceedings of the 2017 ACM Special Interest Group for Computer Science Education (SIGCSE), Seattle, Washington, 2017. Ed. SIGCSE Conference Proceeding. Seattle, Washington: ACM, 2017. Print.
Mosli, Rayan, et al. "Automated malware detection using artifacts in forensic memory images." Proceedings of the IEEE International Conference on Technologies for Homeland Security. Ed. IEEE Conference. Waltham, Massachusetts: n.p., 2016. Print.
Pan, Yin, David Schwartz, and Sumita Mishra. "Gamified Digital Forensics Course Modules for Undergraduates." Proceedings of the IEEE Integrated STEM Education Conference. Ed. ISEC. Princeton, NJ: n.p., 2015. Print.
Madiraju, Tarun, et al. "Passwords in Public: Dictionary Attacks, Password Selection and Password Meters." Proceedings of the 18th Colloquium for Information Systems Security Education. Ed. CISSE. San Diego, CA: n.p., 2014. Web.
Pan, Yin and Sumita Mishra. "Advanced Forensics Labs to Meet Computer Forensics Challenges Due to Technological Advancements." Proceedings of the 17th Colloquium for Information Systems Security Education. Mobile, Alabama: CISSE, 2013. Print.
Huba, Bill, et al. "Towards A Web Tracking Profiling Algorithm." Proceedings of the 2013 IEEE International Conference on Technologies for Homeland Security. Waltham, Massachusetts: IEEE, 2013. Print.
Xiong, Kaiqi and Yin Pan. "Understanding ProtoGENI in Networking Courses for Research and Education." Proceedings of the Second GENI Research and Educational Experiment Workshop (GREE2013). Ed. Conference. Salt Lake City, Utah: n.p., 2013. Print.
Pan, Yin, et al. "Game-based Forensics Course For First Year Students." Proceedings of the ACM SIGITE 2012, October. Ed. ACM SIGITE. Calgary, Alberta: ACM, 2012. Print.
Sanders, Aaron, et al. "Correlating Risk Findings to Quantify Risk." Proceedings of the 4th IEEE International Conference on Information Privacy, Security, Risk and Trust, September. Ed. Conforence Proceeding. Amsterdam, Netherlands: IEEE, 2012. Print.
Hirwani, Manish, et al. "Forensics Acquisition and Analysis of VMware Virtual Hard Disks." Proceedings of the 2012 World Congress in Computer Science, Computer Engineering, and Applied Computing. Albany, NY: WorldComp, 2012. Print.
Polatcan, Onur, Sumita Mishra, and Yin Pan. "Invisible Witness Tool for Email Behavior Profiling." Proceedings of the 6th Annual Symposium on Information Assurance (ASIA \'11), June, 2011, Albany, NY. Ed. ASIA '11. Albany, NY: ASIA, 2011. Print.
Pearson, David, Sumita Mishra, and Yin Pan. "Dynamic Treat-resistant Node Identification in Sensor Networks." Proceedings of the Cyber Security Education - 2011 International Conference on Security & Management World Congress in Computer Science, July, 2011, Las Vegas, NV. Las Vegas, NV: UCMSS, 2011. Print.
Peer Reviewed/Juried Poster Presentation
Pan, Yin, Sumita Mishra, and Micheal Yacci. "Assessing the Modular-based Digital Forensics Game for Entry Level Students." Proceedings of the ASEE Annual Conference & Exposition. Ed. None. Salt Lake City, Utah: n.p..
Mosli, Rayan, Bo Yuan, and Yin Pan. "On the Viability of Data Collection Using Google Rapid Response for Enterprise-level Malware Research." Proceedings of the Digital Forensics Workshop (DFRWS). Ed. None. Rhode Island, Providence: n.p..
Pan, Yin. Associate Professor. By Ryan McGlinn. 22 Oct. 2015. 2015 ATE Principal Investigators Conference, Washington DC. Exhibit.
Pan, Yin. Gamified Digital Forensics Course Modules for Entry-Level Students Demonstration. By Sumita Mishra and David Schwartz. May 2015. the 24th Annual Conference on Instruction & Technology (CIT 2015), SUNY Geneseo. Performance.
Book Chapter
Pan, Yin, Bo Yuan, and Sumita Mishra. "Network Security Auditing." Network Security, Administration and Management: Advancing Technologies and Practices. Ed. Dulal Chandra Kar and Mahbubur Rahman Syed. Hershey, PA: IGI Global, 2011. 131-157. Print.