People
Alumni-Master
2022
- Yung-Ting Lin, Balancing Security and Android Accessibility Service with Package Name Whitelist
- Ann Tene Low, On the Privacy and Security Risks of In-app Browsers
- Yung-Chun Lin, Locating Anti-Emulator Code in Android Malware
- Yu-Ming Hsu, “CRAB: Client-Rebuttable Anonymous Broadcast”
- Chia-Chien Wu, Detecting Compositional DeFi Attacks using Context-aware Analysis on Mutated Smart Contracts
- Kan-Hsuan Lai, Distributed Regular Expression Matching for Privacy-Preserving URL Checking
- Jing-Jie Wang, Securing Fair Loot Box Games: An Efficient Approach to Verifying Loot Box Probability Statement Without Source Code Disclosure
- Che-Kuan Sung, IoT Blackbox Fuzzing Guided by App and Packet Analysis
- Chang-Ming Yang, Recurring Vulnerability Detection Guided by Taint Analysis
2021
- Chen-Yu Li, Accelerating IoT Firmware Analysis Using State Snapshots
- Cheng-Ting Huang, On the Effectiveness of Mandatory Password Changing
- Wen-Yi Chu, Investigating New Security Issues Introduced by Ethereum Proxy Contracts
- Chi-Jen Hsieh, Toward Reproducible Fuzzing
- Chun-Ming Chang, Tor Browser Setting Identification via Network Traffic Analysis
- Jonathan J. Mao, Mitigating Pulsing DDoS Attack with Flow Grouping and Latency Randomization
- Ping-Lun Wang, Attacking and Protecting View Synchronizers of Byzantine Fault-Tolerant Protocols
- Su-Chin Lin, A Comprehensive Analysis of Evading Domains in Ad-block Circumvention
2020
- Shu-Po Tung, Detecting IP Prefix Mismatches on SDN Data Plane by Test Packet Generation
- Wei Loon Mow, Bypassing ASLR with Dynamic Binary Analysis for Automated Exploit Generation
- Yu-Chuan Liang, icLibFuzzer: Isolated-context libFuzzer for Improving Fuzzer Comparability
- Chien-Yuan Wang, 3S-Fuzz: Selective Seed Synchronization in Parallel
- Yuan Chang, yFuzz: Data-Driven Fuzzing
2019
- Jan-Jiun Hu, Enhancing Parallel Fuzzing by Stuck-Edge Classification
- Yung-Chi Huang, Anonymous WiFi Authentication against Honest-but-curious Administrators
- Peng Lo, Android IME Privacy Leakage Analyzer
2018
- Ting-Wei Lai, Differentially private and consistent hierarchical data counting in distributed settings
- Yu-Hsi Chiang, Privacy-Enhancing Technologies for Trigger-Action IoT Platforms
- Chin-Jui Pai, Anonymous and Capability-based Authorization in the Internet of Things Environment
- Tzu-Wei Chao, A Security Simulator and Evaluation for Voting-BasedConsensus Algorithms
- Che-Yu Wu, Core Router Overuse Flow Tracer (CROFT): An Efficient Algorithm for Detecting Overuse Flows
2017
- Shao-Chuan Lee, Practical and Secure IoT Device Management using Visible Light
- Wei-Ning Chen, Pause and Teleport: Mitigating Path Explosion in Symbolic Execution
- Sheng-Han Wen, Enhancing Symbolic Execution by Machine Learning Based Solver Selection
- Chih-Chun Liu, Detecting JavaScript-based Cyber Attack Using Website Fingerprint
2016
- Meng-Huan Yu, A Lightweight Security-oriented AJAX Crawler
- Kai-Hsiang Hsu, VeriIoT: Verifying Trigger-Action Automation Rules in IoT
- Yu-Ming Ku, The Investigation of Current Practice for HTTPS Adoption on Taiwan Government Websites
- Yi-Hsuan Kung, An Efficient Key Management Scheme for Dynamic Users and Devices in Internet of Things
- Yu-Ming Ke, SDNProbe: Securing SDN Data Plane with Active Probing
2015
- Chih-Wei Chen, Efficient Filtering of Pulsing DDoS using Incremental Clustering
- Edwin Lupito Loe, SandUSB: An Installation-Free and User-Controllable Sandbox For USB Peripherals
- Ying-Shen Chen, Dynamic Path Pruning in Symbolic Execution
- Ting-Wei Chen, Fuzzing Regular Expression Implementations for Fun and Profit
2014
- Jia-Rung Yeh, Migrant Attack: A Multi-Resource DoS Attack on Cloud Virtual Machine Migration Schemes