Wooyeon Jo

ORCID: 0000-0002-6595-0117
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Digital and Cyber Forensics
  • Smart Grid Security and Resilience
  • Network Security and Intrusion Detection
  • User Authentication and Security Systems
  • Digital Media Forensic Detection
  • Security and Verification in Computing
  • Cloud Data Security Solutions
  • Anomaly Detection Techniques and Applications
  • Digital Rights Management and Security
  • Internet Traffic Analysis and Secure E-voting
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Software Reliability and Analysis Research
  • IoT and Edge/Fog Computing
  • Software Testing and Debugging Techniques
  • Customer churn and segmentation
  • Network Time Synchronization Technologies
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Data Storage Technologies
  • Health and Wellbeing Research
  • Diet and metabolism studies
  • Liver Disease Diagnosis and Treatment
  • Innovation in Digital Healthcare Systems
  • Complex Network Analysis Techniques
  • Diet, Metabolism, and Disease

Virginia Commonwealth University
2022-2024

Ajou University
2015-2022

Nanjing Institute of Railway Technology
2018

New Technology (Israel)
2018

The proliferation of various connected platforms, including Internet things, industrial control systems (ICSs), cars, and in-vehicle networks, has resulted in the simultaneous use multiple protocols devices. Chaotic situations caused by usage different types devices, such as heterogeneous implemented differently vendors renders adoption a flexible security solution difficult, recent deep learning-based intrusion detection system (IDS) studies. These studies optimized learning model for their...

10.3390/electronics9071151 article EN Electronics 2020-07-16

Various Internet of Things (IoT) devices, such as AI speakers, are being released with different functions to improve user convenience and better life. An speaker ecosystem is a cloud-based IoT system built around an devices. In the near future, citizens in whole countries worldwide will be helped real life when AI-equipped devices deployed their homes. Typically, because speakers always operating, they can used provide vital evidence for digital forensics; however, privacy issues may arise....

10.1016/j.diin.2019.04.013 article EN cc-by-nc-nd Digital Investigation 2019-07-01

10.1007/s11227-021-03992-1 article EN The Journal of Supercomputing 2021-07-15

AI Speakers are typical cloud-based internet of things (IoT) devices that store a variety information regarding users on the cloud. Although analyzing encrypted traffic between these and cloud, as well artifacts stored there, is an important research topic from perspective IoT forensics, studies directly cloud remain insufficient. In this study, we propose forensic model can collect analyze Speaker based certificate injection. The proposed consists porting image Android device, using QEMU...

10.1016/j.fsidi.2020.301010 article EN cc-by-nc-nd Forensic Science International Digital Investigation 2020-07-01

Vehicle systems have been one of the fastest-growing fields in recent years. Vehicles are extremely helpful for understanding driver behaviors and received significant attention from a forensic perspective. Extensive research was previously conducted on on-board vehicle systems, such as an event data recorders, located electronic control unit or manufacturer-based infotainment systems. However, unlike previous vehicles that used only most today equipped with Android Auto Apple CarPlay. These...

10.3390/s22197196 article EN cc-by Sensors 2022-09-22

A smart grid is nationwide industrial control system that combine IT and traditional electric system. The main hindrance to security. To solve this problem we propose a novel approach for vulnerability analysis of protocols using fuzzing test. test widely used analysis, however, these studies do not consider the cross-protocol are suitable network. Therefore, case generation method Before creating cases, classify protocol fields into three categories by its characteristics. Based on...

10.1109/itnec.2016.7560424 article EN 2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference 2016-05-01

In industrial control systems (ICS), programmable logic controllers (PLCs) directly and monitor physical processes in real-time such as nuclear plants, power grid stations. Adversaries typically transfer malicious to PLCs over the network sabotage a process. These attacks are well-understood containing machine instructions packets likely be detected by intrusion detection (IDS). On other hand, return-oriented programming (ROP) reuses blocks (or gadgets) of existing code computer memory...

10.1109/host55118.2023.10132957 article EN 2023-05-01

The Android platform accounts for 85% of the global smartphone operating-system market share, and recently, it has also been installed on Internet-of-Things (IoT) devices such as wearable vehicles. These Android-based store various personal information user IDs, addresses, payment device usage data when providing convenient functions to users. Insufficient security management deletion stored in can lead cyber threats leakage identity theft. Therefore, research protection is very important....

10.3390/s22113971 article EN cc-by Sensors 2022-05-24

Several cases of Industrial Internet Things (IIoT) attacks with zero-day vulnerabilities have been reported. To prevent these attacks, it is necessary to apply an abnormal behavior detection method; however, there are three main problems that make hard. First, various industrial communication protocols. Instead IT environments, many unstandardized protocols, which usually defined by vendors, used. Second, legacy devices commonly used, not only EOS (End-of-service), but also EoL...

10.3390/electronics13081520 article EN Electronics 2024-04-17

A cyber-physical infrastructure system (CPIS) is a that controls and manages critical such as smart manufacturing, water treatment facilities, power generation, distribution facilities. Although these CPISs focus on the security of air-gapped network environments, strict isolation from outside difficult to achieve, leading various attacks. also comprise devices proprietary communication protocols are used exclusively for each domain site. Therefore, experts have adopt customized strategy...

10.1109/access.2021.3080081 article EN cc-by-nc-nd IEEE Access 2021-01-01

Recently, the number of Internet Things (IoT) devices, such as artificial intelligence (AI) speakers and smartwatches, using a Linux-based file system has increased. Moreover, these devices are connected to generate vast amounts data. To efficiently manage generated data improve processing speed, function is improved by updating version or new systems, an Extended File System (XFS), B-tree (Btrfs), Flash-Friendly (F2FS). However, in process existing system, metadata structure may be changed...

10.3390/electronics10182310 article EN Electronics 2021-09-20

Modern forensic-based investigations to analyze and extract data from digital devices are rapidly increasing due the evolution of criminals with IT technologies devices. A variety for usually volatile key evidence files easily removed by criminal. Currently a large scale system like cloud big solution prevalent in our life. Thus we need study about file UNIX aspect forensics. Among forensic technologies, one important issues is recover deleted system. In this paper, structure UFS, suggest...

10.1109/itnec.2016.7560423 article EN 2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference 2016-05-01

Digital Forensics, not only for the computers of suspect, needs to collect various digital evidences especially in many different kinds mobile devices and operating systems. Moreover, case acquiring evidences, recovering a deleted file is more meaningful that it can find concealed evidence by suspect. In this paper, phase recovery Tizen system suggested certified with experiment.

10.1109/icitcs.2015.7292924 article EN 2015-08-01

10.1007/s11227-016-1909-2 article EN The Journal of Supercomputing 2016-11-30

Programmable logic controllers (PLCs) in industrial control systems (ICS) run a program to monitor and critical infrastructures real-time, such as nuclear plants power grids. Attackers target PLC remotely sabotage or disrupt physical processes. Network intrusion detection (IDS) are increasingly used detect malicious logic. This paper demonstrates that standard IDS features protocol message header payload not resilient for detecting (control logic) binary programs, entropy, n-gram,...

10.1109/host55342.2024.10545392 article EN 2024-05-06

모바일 포렌식은 스마트폰의 대중화와 다양한 기기의 증가로 인해 그 중요성 및 필요성이 급격히 증가하고 있다. 하지만 방안 절차는 아직 포렌식의 특성에 충분히 맞게 적용되고 있지 않다. 이에 따라 본 논문에서는 현재 포렌식이 직면한 문제점을 파악하기 위해 법 제도 기술적 관점에서의 분석을 수행하였으며 이를 통해 기기에 대해서는 디지털 포렌식 수사과정에서 큰 이슈가 되고 있는 선별압수에 있어서 제약사항이 있음을 확인하였다. 또한 포렌식에서 증거 수집 방안에 대한 분석 실사용 도구의 무결성 연구를 진행함으로써 기술의 적합성 검증 추후 발생될 문제점에 대해 분석하였으며 결과적으로 수집된 데이터가 증거능력을 확보할 수 방안을 전반적인 고려사항을 제시하였다. Because of the evolution mobile devices such as smartphone, necessity forensics is increasing. In spite this necessity, does not...

10.13089/jkiisc.2016.26.1.135 article EN Journal of the Korea Institute of Information Security and Cryptology 2016-02-29

Programmable logic controllers (PLCs) have design features to enable operations, such as real-time control of physical processes. These weaknesses, making PLCs vulnerable attacks (network/firmware based). We study these and suggest security requirements for designing a PLC.

10.1109/msec.2023.3271273 article EN IEEE Security & Privacy 2023-05-23
Coming Soon ...