- Digital and Cyber Forensics
- Advanced Malware Detection Techniques
- Energy Efficient Wireless Sensor Networks
- Security and Verification in Computing
- Digital Media Forensic Detection
- Video Surveillance and Tracking Methods
- Opportunistic and Delay-Tolerant Networks
- Mobile Ad Hoc Networks
- Biometric Identification and Security
- Face recognition and analysis
- Innovation in Digital Healthcare Systems
- Internet of Things and Social Network Interactions
- User Authentication and Security Systems
- Advanced Data Storage Technologies
- Network Security and Intrusion Detection
- Video Analysis and Summarization
- Face and Expression Recognition
- Religion, Spirituality, and Psychology
- Energy Harvesting in Wireless Networks
- Physical Unclonable Functions (PUFs) and Hardware Security
- Biblical Studies and Interpretation
- Distributed and Parallel Computing Systems
- Wireless Body Area Networks
- Religious Studies and Spiritual Practices
- Elevator Systems and Control
Electronics and Telecommunications Research Institute
2011-2024
Daegu University
2013-2014
Korea University
2004-2010
Cheonan Yonam College
2002
Wonju Severance Christian Hospital
1996
Yonsei University
1996
In modern society, rapid increase in using mass storage devices, and it makes forensic examiners find important evidence hardly the focus of time-consuming. Examiners spend much time to search files related case variety devices. Recently, NIST(National Institute Standards Technology) has developed a new database, called NSRL(National Software Reference Library), which contains hash values trusted operating systems programs(1). As establishing this database service public, NIST contribute...
Running a large-scale HLA-based simulation in distributed environment may require large amounts of computing resources at geographically different locations. A running for long period time result imbalance load levels hosts, hence leading to degradation performance. Performance typically improves if the workload can be equally among hosts. However, Run Time Infrastructure (RTI) does not have any facilities perform distribution alleviate this problem. This paper describes an architecture that...
While traditional digital investigation is limited to cyber crimes, now it an essential procedure on most of civil and criminal case. With the proliferation in this situation, need for timely identification, analysis interpretation evidence becoming more crucial. The general method investigating suspect's computer laborious, time-consuming, complicated tasks requires specialty part forensic experts. In particular cases, such as child abduction, missing or exploited persons, time essence...
An embedded system is a special-purpose computer designed to perform one or few dedicated functions, for example, just portable devices such as MP3 players, cell phone, PDA, telemetric like car navigation etc. The more systems are diversifying various types, the forensic community concentrating on efforts of research correspond all kinds systems. Forensic analysis will become an area increasing significance in near future. Clearly, growing use and ubiquitous age required advanced digital...
A virtual disk encryption tool is a privacy protection that uses an method by generating images. It cannot mount encrypted without any authentication, such as key, passphrase, and etc. Thus, it can be used anti- forensic makes difficult to process digital investigation because the content of identified mounting disk. This study investigates installation, runtime, deletion behaviors tools in Windows XP SP3 environment through experiments. Also, this organizes traces related elements are able verify
The law enforcement agencies in Korea are confiscating or retaining computer systems involved a case, if there any, at the preliminary investigation stage, even though case does not involve cyber-crime. They collecting evidences of crimes from suspects' and using them essential process. It requires much time, though, to collect disc image general crime cases other than cybercrimes investigate them, especially which quick action must be taken. Therefore, it is efficient selectively only...
As the Internet of Things (IoT) has developed, emerging sensor network (ESN) that integrates technologies, such as autonomous driving, cyber-physical systems, mobile nodes, and existing networks been in limelight. Smart homes have researched developed by various companies organizations. Emerging some issues providing secure service according to a new environment, smart home, problems low power low-computing capacity for previous were equipped with. This study classifies sensors used into...
Recently, the advancement of development technologies for smart sensor nodes that are small, low-power devices with abilities environment sensing, data computing and wireless communication facilitates research network. Wireless networks (WSN) composed such have to monitor control physical from remote locations. Such make many applications possible in scientific, medical, commercial, military domains, example, surveillance, home offices, monitoring, others. We present network architecture....
Existing sustainable IT services have several problems related to user authentication such as the inefficiency of managing system security, low and usability. In this paper, we propose a Fast IDentity Online (FIDO) authenticator that performs continuous with implicit based on context multimodal authentication. The proposed FIDO authenticator, context-aware (CAMFA) method, combines information context, state mobile device, biometrics, then applies explicit methods meet level required by...
The advance in mass data processing technology allowed companies to possess various computer resources, including database, regardless of the companies' scale. When investigating companies, it is crucial for investigators search database server that contains accounting and HR. However, detecting inside many resources often obstructed by noncooperation target companies. Thus, study methods efficient detection. So that, In this paper, we propose client-based analyzing connection information...
In digital forensics investigation, a general method of investigating the suspect's computer was to duplicate storage media or image and then obtain case-related data from these. However, increase in capacity made this take much longer time. Also, implies that more can exist so finding relevant will lot time efforts. Moreover, case where imaging entire disk is not possible due legal matters, selective acquisition needed. paper, we propose methods for file system metadata, registry & prefetch...