2021
- Published on Digital Investigation (Impact Factor 1.66)
- Forensic Analysis of Instant Messaging Apps: Decrypting Wickr and Private Text Messaging Data
- Published on Electronics (Impact Factor 2.412)
- Magniber v2 Ransomware Decryption: Exploiting the Vulnerability of a Self-Developed Pseudo Random Number Generator
2020
- Conference on Information Security and Cryptolography-Winter Awarded
- Shifting Retracing Boomerang Attack on ARIA
- 2020 Journal of Digital Forensics Awarded
- Forensic Analysis of Xiaomi Smart Home Artifacts
- Digital Forensic Challenge Tech Contest Awarded (2nd place)
- A Reused Key Attack on Encrypted Mobile App Database
- 2020 National Cryptography Contest Special Prize Awarded
- 2020 Side Channel Analysis Contest Awarded
- 2020 Crypto Analysis Contest Awarded (1st place)
- Published on Digital Investigation (Impact Factor 1.66)
- A Methodology for the Decryption of Encrypted Smartphone Backup Data on Android Platform: A Case Study on the Latest Samsung Smartphone Backup System
- Published on Electronics (Impact Factor 2.412)
- Smart Home Forensics: Data Analysis of IoT Devices
- 2020 Journal of Digital Forensics Awarded
- A Trend of Machine Learning for Android Malware Detection and Permission Based Android Malware Detection using ResNet
- Reported a Protonmail’s Bug Bounty
- Exploit encrypted DB using key reuse attack
- 2020 Conference on Information Security and Cryptolography-Summer Awarded
- Differential-Linear cryptanalysis of 12round RECTANGLE-80 using DLCT
- Published on Digital Investigation (Impact Factor 1.66)
- A Study on the Decryption Methods of Telegram X and BBM-Enterprise Database in Mobile and PC
2019
- Cyber investigation and digital forensic Contest
- Forensic Analysis of Google Home Hub-based SmartHome
- 2019 Journal of Digital Forensics Awarded
- Study on image distribution device identification using JPEG image compression information
- Digital Forensic Challenge Tech Contest Awarded (1st place)
- A Methodology for the Decryption of Encrypted Smartphone Backup Data
- Published on Digital Investigation (Impact Factor 1.771)
- Data Acquisition Methods using Backup Data Decryption of Sony Smartphones
- Journal of Digital Forensics Awarded
- Forensic Analysis of the Secure Instant Messenger Surespot
- DFRWS Forensic Challenge Awarded (1st place)
- IoT Forensic Challenge (2018-2019)
- Published on Multimedia Tools and Applications (Impact Factor 1.541)
- Cryptanalysis of Hash Functions Based on Blockciphers Suitable for IoT Service Platform Security
- Accepted on Peer-to-Peer Networking and Applications (Impact Factor 1.514)
- Weaknesses of Some Lightweight Blockciphers Suitable for IoT Systems and Their Applications in Hash Modes
- Published on Digital Investigation (Impact Factor 1.771)
- Decrypting password-based encrypted backup data for Huawei smartphones
2018
- Digital Forensic Challenge Tech Contest Awarded (2nd place)
- Forensic Analysis for IoT Fitness Trackers and its Application
- 2018 National Cryptography Contest Grand Prize, Special Prize Awarded
- 2018 The Workshop of Digital Forensics: Commissioner General Prize Awarded
- A Study of Decrypting Locked Files by LG Gallery Application
- Published on Digital Investigation (Impact Factor 1.771)
- How to Decrypt PIN-Based Encrypted Backup Data of Samsung Smartphones
- DFRWS Forensic Challenge Awarded (2nd place)
- IoT Forensic Challenge (2017-2018)
2017
- 2017 National Cryptography Contest Grand Prize Awarded
- The Collision Attacks on Hash Functions Instantiated with Blockciphers Using Weak Key-Schedules
- 2017 National Cryptography Contest Special Prize Awarded
- 2017 Crypto Contest Awarded
- 2017 Digital Forensic Challenge Awarded
- Study on Application of Windows Event Log (EVTX)
- Development of EVTX Parser
2016
- 2016 National Cryptography Contest Awarded
- When Provably Secure Blockcipher-Based Hash Functions Meet Blockciphers Having Related-Key Linear Properties
2015
- 2015 National Cryptography Contest Awarded
- New Efficient Padding Methods Secure Against Padding Oracle Attacks
2014
- 2014 Digital Forensic Challenge Awarded
- Study of Windows Event Log (EVTX) file recovery
- Development of deleted EVTX file or record recovery module
- 2014 National Cryptography Contest Awarded
- Differential Fault Analysis of the Block Cipher LEA
2013
- 2013 National Cryptography Contest Awarded
- Performance of Converged Secure Socket Layer and CMVP Cryptographic Modules
- Improved Related-key Attack against Recent Lightweight Block Cipher PRINCE