People

Alumni-Master


2022

  • Yung-Ting Lin, Balancing Security and Android Accessibility Service with Package Name Whitelist
  • Ann Tene Low, On the Privacy and Security Risks of In-app Browsers
  • Yung-Chun Lin, Locating Anti-Emulator Code in Android Malware
  • Yu-Ming Hsu, “CRAB: Client-Rebuttable Anonymous Broadcast”
  • Chia-Chien Wu, Detecting Compositional DeFi Attacks using Context-aware Analysis on Mutated Smart Contracts
  • Kan-Hsuan Lai, Distributed Regular Expression Matching for Privacy-Preserving URL Checking
  • Jing-Jie Wang, Securing Fair Loot Box Games: An Efficient Approach to Verifying Loot Box Probability Statement Without Source Code Disclosure
  • Che-Kuan Sung, IoT Blackbox Fuzzing Guided by App and Packet Analysis
  • Chang-Ming Yang, Recurring Vulnerability Detection Guided by Taint Analysis

2021

  • Chen-Yu Li, Accelerating IoT Firmware Analysis Using State Snapshots
  • Cheng-Ting Huang, On the Effectiveness of Mandatory Password Changing
  • Wen-Yi Chu, Investigating New Security Issues Introduced by Ethereum Proxy Contracts
  • Chi-Jen Hsieh, Toward Reproducible Fuzzing
  • Chun-Ming Chang, Tor Browser Setting Identification via Network Traffic Analysis
  • Jonathan J. Mao, Mitigating Pulsing DDoS Attack with Flow Grouping and Latency Randomization
  • Ping-Lun Wang, Attacking and Protecting View Synchronizers of Byzantine Fault-Tolerant Protocols
  • Su-Chin Lin, A Comprehensive Analysis of Evading Domains in Ad-block Circumvention

2020

  • Shu-Po Tung, Detecting IP Prefix Mismatches on SDN Data Plane by Test Packet Generation
  • Wei Loon Mow, Bypassing ASLR with Dynamic Binary Analysis for Automated Exploit Generation
  • Yu-Chuan Liang, icLibFuzzer: Isolated-context libFuzzer for Improving Fuzzer Comparability
  • Chien-Yuan Wang, 3S-­Fuzz: Selective Seed Synchronization in Parallel
  • Yuan Chang, yFuzz: Data-Driven Fuzzing

2019

  • Jan-Jiun Hu, Enhancing Parallel Fuzzing by Stuck-­Edge Classification
  • Yung-Chi Huang, Anonymous WiFi Authentication against Honest-but-curious Administrators
  • Peng Lo, Android IME Privacy Leakage Analyzer

2018

  • Ting-Wei Lai, Differentially private and consistent hierarchical data counting in distributed settings
  • Yu-Hsi Chiang, Privacy-Enhancing Technologies for Trigger-Action IoT Platforms
  • Chin-Jui Pai, Anonymous and Capability-based Authorization in the Internet of Things Environment
  • Tzu-Wei Chao, A Security Simulator and Evaluation for Voting-BasedConsensus Algorithms
  • Che-Yu Wu, Core Router Overuse Flow Tracer (CROFT): An Efficient Algorithm for Detecting Overuse Flows

2017

  • Shao-Chuan Lee, Practical and Secure IoT Device Management using Visible Light
  • Wei-Ning Chen, Pause and Teleport: Mitigating Path Explosion in Symbolic Execution
  • Sheng-Han Wen, Enhancing Symbolic Execution by Machine Learning Based Solver Selection
  • Chih-Chun Liu, Detecting JavaScript-based Cyber Attack Using Website Fingerprint

2016

  • Meng-Huan Yu, A Lightweight Security-oriented AJAX Crawler
  • Kai-Hsiang Hsu, VeriIoT: Verifying Trigger-Action Automation Rules in IoT
  • Yu-Ming Ku, The Investigation of Current Practice for HTTPS Adoption on Taiwan Government Websites
  • Yi-Hsuan Kung, An Efficient Key Management Scheme for Dynamic Users and Devices in Internet of Things
  • Yu-Ming Ke, SDNProbe: Securing SDN Data Plane with Active Probing

2015

  • Chih-Wei Chen, Efficient Filtering of Pulsing DDoS using Incremental Clustering
  • Edwin Lupito Loe, SandUSB: An Installation-Free and User-Controllable Sandbox For USB Peripherals
  • Ying-Shen Chen, Dynamic Path Pruning in Symbolic Execution
  • Ting-Wei Chen, Fuzzing Regular Expression Implementations for Fun and Profit

2014

  • Jia-Rung Yeh, Migrant Attack: A Multi-Resource DoS Attack on Cloud Virtual Machine Migration Schemes