Jinchun Choi

ORCID: 0000-0002-6882-2890
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Smart Grid Security and Resilience
  • Internet Traffic Analysis and Secure E-voting
  • Blockchain Technology Applications and Security
  • Spam and Phishing Detection
  • Information and Cyber Security
  • User Authentication and Security Systems
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Real-time simulation and control systems
  • Infrastructure Resilience and Vulnerability Analysis
  • Caching and Content Delivery
  • Advanced Data Storage Technologies
  • Energy Efficient Wireless Sensor Networks
  • Cryptography and Data Security
  • Water Quality Monitoring Technologies
  • Software Reliability and Analysis Research
  • Smart Grid Energy Management
  • Wireless Signal Modulation Classification
  • Telecommunications and Broadcasting Technologies
  • Electrostatic Discharge in Electronics
  • Privacy-Preserving Technologies in Data
  • Software Engineering Research
  • Market Dynamics and Volatility
  • Simulation Techniques and Applications

Electronics and Telecommunications Research Institute
2024

Texas A&M University – Kingsville
2021-2022

University of Central Florida
2018-2022

Texas A&M University
2022

Inha University
2003-2020

Korea University
2019

The steady growth in the number of deployed Internet Things (IoT) devices has been paralleled with an equal malicious software (malware) targeting those devices. In this paper, we build a detection mechanism IoT malware utilizing control flow graphs (CFGs). To motivate for our mechanism, contrast underlying characteristics to other types malware—Android malware, which are also Linux-based—across multiple features. preliminary analyses reveal that Android have high density, strong closeness...

10.1109/jiot.2019.2925929 article EN IEEE Internet of Things Journal 2019-07-12

Recently, the Blockchain-based cryptocurrency market witnessed enormous growth. Bitcoin, leading cryptocurrency, reached all-time highs many times over year to speculations explain trend in its In this article, we study Bitcoin and Ethereum explore features their network that price hikes. We gather data analyze user activity highly impact of these cryptocurrencies. monitor change activities time relate them economic theories. identify key help us determine demand supply dynamics a...

10.1109/jsyst.2019.2927707 article EN IEEE Systems Journal 2019-09-17

Cybersecurity of photovoltaic (PV) systems entails a much larger scope than just encryption and firewall communications. For instance, integrity data in transit between inverters cloud server can be compromised by authorized third-party, devices, internal network within security perimeter (i.e., man-in-the-middle (MITM) attack). To address this challenge, paper proposes blockchain-based MITM attack detection method for PV system. A breakthrough includes screening data, intrusion detection,...

10.1109/dmc51747.2021.9529949 article EN 2021-07-14

Biometric verification systems have security issues regarding the storage of biometric data in that a user's features cannot be changed into other ones even when system is compromised. To address this issue, it may safe to store biometrics on reliable remote server instead storing them local device. However, approach raise privacy issue. In paper, we propose where are stored an encrypted form and similarity user input registered computed domain using homomorphic encryption. We evaluated...

10.1109/dasc-picom-datacom-cyberscitec.2016.150 article EN 2016-08-01

Cybersecurity of power electronics (PE) is increasingly essential as more systems from renewable energy systems, storage and electric vehicle charging stations utilize PE devices to connect them into grids with complex communication computation for advanced control situational awareness improvement in smart grid environments. However, cybersecurity research development (R&D) networked hampered by the lack real-time security testbed incorporating real cyber events. This paper proposes a...

10.1109/pedg51384.2021.9494202 article EN 2022 IEEE 13th International Symposium on Power Electronics for Distributed Generation Systems (PEDG) 2021-06-28

The lack of security measures among the Internet Things (IoT) devices and their persistent online connection give adversaries a prime opportunity to target them or even abuse as intermediary targets in larger attacks such distributed denial-of-service (DDoS) campaigns. In this paper, we analyze IoT malware focus on endpoints reachable public Internet, play an essential part ecosystem. Namely, acting dropzones gain insights into underlying dynamics ecosystem, affinity between IP addresses,...

10.1145/3318216.3363379 article EN 2019-11-04

The importance of cybersecurity for inverters has been significantly increasing as become smarter by using advanced network and computing power from cyber systems. This paper explores potential attacks targeting firmware smart how blockchain technology can be applied to mitigate the modification attacks. A breakthrough method includes an automated integrity check, anomaly detection algorithm, recovery creating patch local distributed ledgers. proposed is implemented in Internet-of-Thing...

10.1109/apec42165.2021.9487468 article EN 2022 IEEE Applied Power Electronics Conference and Exposition (APEC) 2021-06-14

Quantum computing is a game-changing technology that will push the boundaries of cybersecurity and cryptography power infrastructures including distributed energy resources (DER). This paper explores new security vulnerabilities caused by potential quantum attacks defense strategies using key distribution (QKD) post-quantum (PQC) in DER network systems. be used as baseline reference toward quantum-safe system.

10.1109/pedg51384.2021.9494203 article EN 2022 IEEE 13th International Symposium on Power Electronics for Distributed Generation Systems (PEDG) 2021-06-28

Advanced Persistent Threat (APT) is a professional stealthy threat actor who uses continuous and sophisticated attack techniques which have not been well mitigated by existing defense strategies. This paper proposes an APT-style cyber-attack tested for distributed energy resources (DER) in cyber-physical environments. The proposed security testbed consists of: 1) real-time DER simulator; 2) cyber system using real network systems server; 3) penetration testing tools generating attacks as...

10.1109/dmc51747.2021.9529953 article EN 2021-07-14

As the traditional inverters are transforming toward more intelligent with advanced information and communication technologies, cyber-attack surface has been remarkably expanded. Specifically, securing firmware of smart from cyber-attacks is crucial. This paper provides expanded attack targeting inverters. Moreover, this proposes a security module for conventional inverter to built-in by preventing potential malware unauthorized update attacks as well fast automated recovery zero-day...

10.1109/ecce47101.2021.9595728 article EN 2022 IEEE Energy Conversion Congress and Exposition (ECCE) 2021-10-10

Increasing penetration of networked distributed energy resources (DER) in electric power systems managed by multiparty are expanding the system attack surface. An outstanding threat is sophisticated attackers who possess extensive knowledge and keep trying to DER systems, which have not been well mitigated existing defense strategies. This paper explores a cyber kill chain model for aggregation based on latest METRE's possible phases requirement defensive actions per each step, eventually...

10.1109/isgt49243.2021.9372209 article EN 2021-02-16

Proxy servers act as an intermediary and a gateway between users other on the Internet, have many beneficial applications targeting privacy of users, including bypassing server-side blocking, regional restrictions, etc. Despite proxies, they are also used by adversaries to hide their identity launch attacks. As such, websites restrict access from resulting in blacklists filter out those proxies aid blocking. In this work, we explore ecosystem understanding affinities distributions...

10.1109/access.2020.3000959 article EN cc-by IEEE Access 2020-01-01

In this paper, we analyze the Internet of Things (IoT) Linux malware binaries to understand dependencies among malware. Towards end, use static analysis extract endpoints that communicates with, and classify such into targets dropzones (equivalent Command Control). total, extracted 1,457 unique dropzone IP addresses target 294 1,018 masked addresses. We highlight various characteristics those targets, including spatial, network, organizational affinities. dropzones' interdependencies...

10.1109/dsc47296.2019.8937574 article EN 2019-11-01

IEEE 2030.5 standard is drawing special attention among communication protocols for smart inverters and distributed energy resources (DER). Moreover, California Rule 21 mandates new DER must be ready to communicate a host utility using the standard. Therefore, development of an effective real-time simulation method managing network crucial. This paper presents hardware-in-the-loop (HIL) system testbed The proposed co-simulation consists physical OP AL-RT simulator cyber including gateways...

10.1109/isgtasia49270.2021.9715595 article EN 2022 IEEE PES Innovative Smart Grid Technologies - Asia (ISGT Asia) 2021-12-05

Cybersecurity of inverters has been significantly important as become smarter in cyber-physical environments. However, firmware security smart against attacks from various attack vectors less studied. This paper proposes a secure update and device authentication method using blockchain-based public key infrastructure (PKI) management system physically unclonable function (PUF)-embedded module inverter. The proposed is validated by experiments.

10.1109/egrid52793.2021.9662155 article EN 2019 4th IEEE Workshop on the Electronic Grid (eGRID) 2021-11-08

Ransomware attacks are one of the most dangerous cyber-attacks which can disrupt operation photovoltaic (PV) systems and incur an enormous economic loss. This paper introduces a ransomware security threat modeling method that identifies potential vulnerabilities, threats, impacts targeting PV system. The consists three steps: 1) system identification, 2) finds existing 3) attack designs profiles to succeed attacks, 4) penetration testing performs authorized analyzes using real-time...

10.1109/egrid52793.2021.9662163 article EN 2019 4th IEEE Workshop on the Electronic Grid (eGRID) 2021-11-08

스마트기기가 보편화되고 있고 무선랜의 사용량이 증가함에 따라 로그 AP를 이용한 공격 가능성도 높아지고 있다. AP에 접속할 경우, AP는 중간자 공격(Man-in-the-middle attack)을 수행할 수 있으므로, 매우 쉽게 개인 정보를 획득할 있게 된다. 다양한 종류의 탐지하는 방법에 관해 많은 연구가 이루어지고 있고, 이 논문에서는 그 중, 정상 무선으로 연결하고 이를 중계해서 자신은 AP의 SSID를 보여줌으로써 AP인 것처럼 하여 사용자를 속이는 방법을 제안한다. 이런 데 있어서 기계 학습 알고리즘의 일종인 SVM(Support Vector Machine)을 사용하여, 사용자의 환경에 자동으로 탐지 기준을 설정하여 90% 이상의 확률로 알고리즘을 제안하고, 이의 성능을 실험을 통해 입증한다. Widespread use of smartphones and wireless LAN accompany a threat called rogue AP. When user...

10.13089/jkiisc.2013.23.3.431 article EN Journal of the Korea Institute of Information Security and Cryptology 2013-06-30

Log-Structured Merge (LSM) tree-based Key-Value Stores (KVSs) are widely adopted for their high performance in write-intensive environments, but they often face degradation due to write stalls during compaction. Prior solutions, such as regulating I/O traffic or using multiple compaction threads, can cause unexpected drops throughput increase host CPU usage, while hardware-based approaches FPGA, GPU, and DPU aimed at reducing duration introduce additional hardware costs. In this study, we...

10.48550/arxiv.2410.21760 preprint EN arXiv (Cornell University) 2024-10-29

Distributed energy resource management system (DERMS) is a supervision managing distributed resources (DERs) in distribution system. However, the centralized DERMS has potential risk of single point failure posed by cyber-attacks (e.g., denial service attacks and ransomware attacks). This will cause visibility control losses DER In this paper, blockchain (BC) technology leveraged to enhance resilience recovering operation during outage. The proposed BC governance platform for proving...

10.1109/smartgridcomm52983.2022.9961046 article EN 2022-10-25

The growth in the number of Android and Internet Things (IoT) devices has witnessed a parallel increase malicious software (malware), calling for new analysis approaches. We represent binaries using their graph properties Control Flow Graph (CFG) structure conduct an in-depth graphs extracted from IoT malware to understand differences. Using 2,874 2,891 corresponding samples, we analyze both general characteristics algorithmic properties. CFG as abstract structure, then emphasize various...

10.48550/arxiv.1902.03955 preprint EN other-oa arXiv (Cornell University) 2019-01-01

The centralized zone data service (CZDS) was introduced by the Internet Corporation for Assigned Names and Numbers (ICANN) to facilitate sharing access of new generic Top-Level Domains (gTLDs). CZDS aims improve security transparency naming system Internet. In this paper, we investigate CZDS's measurement evaluation. By requesting all gTLDs listed in portal, analyze various aspects CZDS, including status, responsiveness provided reasons granting or denial. Among other findings, find that...

10.1109/tnsm.2019.2941572 article EN IEEE Transactions on Network and Service Management 2019-09-17
Coming Soon ...