Digital Forensic & Cryptanalysis (DF&C)

2021

  • Published on Digital Investigation (Impact Factor 1.66)
    • Forensic Analysis of Instant Messaging Apps: Decrypting Wickr and Private Text Messaging Data
  • Published on Electronics (Impact Factor 2.412)
    • Magniber v2 Ransomware Decryption: Exploiting the Vulnerability of a Self-Developed Pseudo Random Number Generator

2020

  • Conference on Information Security and Cryptolography-Winter Awarded
    • Shifting Retracing Boomerang Attack on ARIA
  • 2020 Journal of Digital Forensics Awarded
    • Forensic Analysis of Xiaomi Smart Home Artifacts
  • Digital Forensic Challenge Tech Contest Awarded (2nd place)
    • A Reused Key Attack on Encrypted Mobile App Database
  • 2020 National Cryptography Contest Special Prize Awarded
  • 2020 Side Channel Analysis Contest Awarded
  • 2020 Crypto Analysis Contest Awarded (1st place)
  • Published on Digital Investigation (Impact Factor 1.66)
    • A Methodology for the Decryption of Encrypted Smartphone Backup Data on Android Platform: A Case Study on the Latest Samsung Smartphone Backup System
  • Published on Electronics (Impact Factor 2.412)
    • Smart Home Forensics: Data Analysis of IoT Devices
  • 2020 Journal of Digital Forensics Awarded
    • A Trend of Machine Learning for Android Malware Detection and Permission Based Android Malware Detection using ResNet
  • Reported a Protonmail’s Bug Bounty
    • Exploit encrypted DB using key reuse attack
  • 2020 Conference on Information Security and Cryptolography-Summer Awarded
    • Differential-Linear cryptanalysis of 12round RECTANGLE-80 using DLCT
  • Published on Digital Investigation (Impact Factor 1.66)
    • A Study on the Decryption Methods of Telegram X and BBM-Enterprise Database in Mobile and PC

2019

  • Cyber ​​investigation and digital forensic Contest
    • Forensic Analysis of Google Home Hub-based SmartHome
  • 2019 Journal of Digital Forensics Awarded
    • Study on image distribution device identification using JPEG image compression information
  • Digital Forensic Challenge Tech Contest Awarded (1st place)
    • A Methodology for the Decryption of Encrypted Smartphone Backup Data
  • Published on Digital Investigation (Impact Factor 1.771)
    • Data Acquisition Methods using Backup Data Decryption of Sony Smartphones
  • Journal of Digital Forensics Awarded
    • Forensic Analysis of the Secure Instant Messenger Surespot
  • DFRWS Forensic Challenge Awarded (1st place)
    • IoT Forensic Challenge (2018-2019)
  • Published on Multimedia Tools and Applications (Impact Factor 1.541)
    • Cryptanalysis of Hash Functions Based on Blockciphers Suitable for IoT Service Platform Security
  • Accepted on Peer-to-Peer Networking and Applications (Impact Factor 1.514)
    • Weaknesses of Some Lightweight Blockciphers Suitable for IoT Systems and Their Applications in Hash Modes
  • Published on Digital Investigation (Impact Factor 1.771)
    • Decrypting password-based encrypted backup data for Huawei smartphones

2018

  • Digital Forensic Challenge Tech Contest Awarded (2nd place)
    • Forensic Analysis for IoT Fitness Trackers and its Application
  • 2018 National Cryptography Contest Grand Prize, Special Prize Awarded
  • 2018 The Workshop of Digital Forensics: Commissioner General Prize Awarded
    • A Study of Decrypting Locked Files by LG Gallery Application
  • Published on Digital Investigation (Impact Factor 1.771)
    • How to Decrypt PIN-Based Encrypted Backup Data of Samsung Smartphones
  • DFRWS Forensic Challenge Awarded (2nd place)
    • IoT Forensic Challenge (2017-2018)

2017

  • 2017 National Cryptography Contest Grand Prize Awarded
    • The Collision Attacks on Hash Functions Instantiated with Blockciphers Using Weak Key-Schedules
  • 2017 National Cryptography Contest Special Prize Awarded
  • 2017 Crypto Contest Awarded
  • 2017 Digital Forensic Challenge Awarded
    • Study on Application of Windows Event Log (EVTX)
    • Development of EVTX Parser

2016

  • 2016 National Cryptography Contest Awarded
    • When Provably Secure Blockcipher-Based Hash Functions Meet Blockciphers Having Related-Key Linear Properties

2015

  • 2015 National Cryptography Contest Awarded
    • New Efficient Padding Methods Secure Against Padding Oracle Attacks

2014

  • 2014 Digital Forensic Challenge Awarded
    • Study of Windows Event Log (EVTX) file recovery
    • Development of deleted EVTX file or record recovery module
  • 2014 National Cryptography Contest Awarded
    • Differential Fault Analysis of the Block Cipher LEA

2013

  • 2013 National Cryptography Contest Awarded
    • Performance of Converged Secure Socket Layer and CMVP Cryptographic Modules
    • Improved Related-key Attack against Recent Lightweight Block Cipher PRINCE