Digital Forensics

  • Domestic Papers

[50] Sumin Shin, Soram Kim, Byungchul Youn, Jongsung Kim, “Acquiring Credential and Analyzing Artifacts of Wire Messenger on Windows“, Journal of The Korea Institute of Information Security & Cryptology, 31(1), pp. 61-71, 2021.

[49] Soojin Kang, Sehoon Lee, Soram Kim, Jongsung Kim, “A Study on the Data Decryption of Ragnar Locker Ransomware”, Conference on Information Security and Cryptography-Winter, 2020

[48] Soojin Kang, Sumin Shin, Soram Kim, Giyoon Kim, Jongsung Kim, “Forensic Analysis of Xiaomi Smart Home Artifacts”, The Workshop of Digital Forensics, 2020.

[47] Sumin Shin, Soram Kim, Byungchul Youn, Uk Hur, Daeun Kim, Kimoon Kim, Jongsung Kim, “Analysis of Encryption Processes of 5ss5c and Immuni Ransomware, and Their Data Recovery”, Journal of Digital Contents Society, 21(10), pp. 1895-1903, 2020

[46] Giyoon Kim, Soram Kim, Yongjin Jeon, Jongsung Kim, “A Trend of Machine Learning for Android Malware Detection and Permission Base Android Malware Detection using Deep Learning”, Journal of Digital Forensics, 14(3), pp. 316-326, 2020.

[45] Wonil Kim, Hyunjae Kim, Subin Kim, Minjeong Lee, Sumin Shin, Jongsung Kim, “Analysis of log on smart speaker and NAS using Raspberry Pi“, Conference on Information Security and Cryptography-Summer, 2020.

[44] Sumin Shin, Soojin Kang, Giyoon Kim, Jongsung Kim, “Study on SNS Application Data Decryption and Artifact“, Journal of The Korea Institute of Information Security & Cryptology, 30(4), pp. 583- 592, 2020.

[43] Eunhu Park, Soram Kim, Jongsung Kim, “Analysis of WeChat Messenger Artifact on Windows and Android Platforms”, Journal of Digital Forensics, 14(2), pp. 205-220, 2020.

[42] Soojin Kang, Sumin Shin, Giyoon Kim, Jongsung Kim, “Forensic Analysis of Locking Pictures, Hiding Photos/Video and Safe Gallery/Camera Applications”, Journal of Digital Forensics, 14(2), pp. 125-138, 2020.

[41] Byungchul Youn, Soram Kim, Jongsung Kim, “Study on MalangMalang Talkafe Database Encryption Process and Recovering Its Deleted Messages on Windows“, Journal of The Korea Institute of Information Security & Cryptology, 30(3), pp. 397- 403, 2020.

[40] Hur Uk, Myungseo Park, Jongsung Kim, “Study on Improved Decryption Method of WeChat Messenger and Deleted Message Recovery Using SQLite Full Text Search Data”, Journal of The Korea Institute of Information Security & Cryptology, 30(3), pp. 405-415, 2020.

[39] Byungchul Youn, Myungseo Park, Jongsung Kim, “Analysis of Encryption and Decryption Processes of Realm Database and Its Application”, Journal of The Korea Institute of Information Security and Cryptology, 30(3), pp. 369-378, 2020.

[38] Sumin Shin, Eunhu Park, Soram Kim, Jongsung Kim, “Artifacts Analysis of Slack and Discord Messenger in Digital Forensic”, Journal of Digital Contents Society, 21(4), pp. 799-809, 2020.

[37] Sehoon Lee, Myungseo Park, Giyoon Kim, Uk Hur, Jongsung Kim, “A Study on The Decryption of Encrypted SNS Application Data : KakaoTalk Channel, Purple, TongTong”,  Journal of Digital Forensics, 14(1), pp.87-96, 2020.

[36] Uk Hur, Soram Kim, Eunhu Park, Sumin Shin, Jongsung Kim, “Study on image distribution device identification using JPEG image compression information”,  Journal of Digital Forensics, 14(1), pp.33-44, 2020.

[35] Eunhu Park, Sujin Kang, Soram Kim, Jongsung Kim, “System Log Analysis and Forensic Application Technique of Latest Samsung Smartphones by Data Acquisition Methods”,  Journal of Digital Forensics, 14(1), pp.1-20, 2020.

[34] Sehoon Lee, Byungchul Youn, Soram Kim, Giyoon Kim, Yeongju Lee, Daeun Kim, Haeryong Park, Jongsung Kim, “A Study on Encryption Process and Decryption of Ransomware in 2019”, Journal of The Korea Institute of Information Security & Cryptology, 29(6), pp.38-48, 2019.

[32] Uk Hur, Soram Kim, Eunhu Park, Sumin Shin, Jongsung Kim, “Image distribution path tracking using JPEG image compression information”,  The Workshop of Digital Forensics, 2019.

[30] Giyoon Kim, Uk Hur, Sehoon Lee, Jongsung Kim, “Forensic Analysis of the Secure Instant Messenger SureSpot”,  Journal of Digital Forensics, 13(3), pp.175-188, 2019.

[29] Byungchul Youn, Sehoon Lee, Soram Kim, Daeun Kim, Yeongju Lee,
Haeryong Park, Jongsung Kim, “Analysis of Encryption Process of Maze Ransomware”, Chungcheong Branch Conference on Information Security and Cryptography, 2019.

[28] Eunhu Park, Soram Kim, Jongsung Kim, “Forensic Analysis of System Logs for Xiaomi Smartphones”, Journal of Digital Forensics, 13(2), pp. 45-62, 2019.

[27] Giyoon Kim,  JongHyeok Lee, Sumin Shin, Joungsung Kim,  “Study on The Decryption Method and Analysis of MalangMalang Talkcafe Application Databse”, Journal of The Korea Institute of Information Security & Cryptology, 29(3), pp.541-547, 2019.

[26] Sehoon Lee, Soram Kim, Giyoon Kim, Daeun Kim, Haeryong Park, Joungsung Kim, “A Study on the Decryption of Donut Ransomware through Memory Analysis”,  Journal of Digital Forensics, 13(1), pp. 13-22, 2019.

[25] Eunhu Park, Soram Kim, Jongsung Kim, “Analysis on System Log of Huawei Smartphone”, Journal of Digital Forensics, 12(3), pp. 9-25, 2018.

[24] Giyoon Kim, Sumin Shin, Jonghyeok Lee, Jongsung Kim, “Study on Database Decryption Method of MalangMalang Talkcafe”, Conference on Information Security and Cryptography-Winter, 2018.

[23] Jieun Ryu, Subin Kim, Eunju Kim , Hyeji Jang, Jiwon Choi, Jongsung Kim, “The Need of Digital Forensics about Smart Band and Smart Watch”, Conference on Information Security and Cryptography-Winter, 2018.

[22] Giyoon Kim, Sungwoo Jang, Jongsung Kim, “Study on Decrypting Files Encryted by the LG Gallery Application”, Journal of Digital Forensics, 12(2), pp. 31-38, 2018.

[21] Myungseo Park, Eunhu Park, Kiyoon Kim, Soram Kim, Jongsung Kim, “Log of Huawei smartphone and Analysis of  backup data”, The Workshop of Digital Forensics, 2018

[20] Myungseo Park, Hangi Kim, Jongsung Kim, “Study on Improved Recovery Method of LG Smartphone Backup Data”, Journal of Digital Forensics, 12(1), pp. 1-7, 2018.

[19] Serim Kang, Soram Kim, Myungseo Park, Jongsung Kim, “Study on Windows Event Log-Based Corporate Security Audit and Malware Detection”, Journal of The Korea Institute of Information Security & Cryptology, VOL.28, NO.3, pp.591-603, 2018.

[18] Soram Kim, Jihun Kim, Myungseo Park, Daeun Kim, Jongsung Kim, “Study on Cryptographic Analysis of Erebus Ransomware”, Journal of The Korea Institute of Information Security & Cryptology, VOL.28, NO.2, pp.339-346, 2018.

[17] Jaehyung Lee, Jaehyung Cho, Kiwon Hong, Jongsung Kim, “The Research on Data Concealing and Detection of SQLite Database”,  Journal of The Korea Institute of Information Security & Cryptology, VOL.27, NO.6, pp.1347-1359, 2017.

[15] Eunhu Park, Seyoung Lee, Jonghyeok Lee, Chungwoo Kim, Sangbeom Lee, Hyeongseok Choi, Yeonghyo Kim, Keonhee Choi, Hangi Kim, Jongsung Kim, “Forensic Application of Volume Shadow Copy”, Conference on Information Security and Cryptography-Winter, 2017.

[14] Serim Kang, Soram Kim, Myungseo Park, Jongsung Kim, “Application of Windows Event Log in Corporation Audit”, The Workshop of Digital Forensics, 2017.

[13] Myungseo Park, Hangi Kim, Jongsung Kim, “Mobile Backup Data, Is it Safe?”, The Workshop of Digital Forensics, 2017.

[12] Jaehyung Cho, Jaehyoung Lee, Soram Kim, Jaehyeong Lee, Seungjae Yang, Changhoon Lee, Jongsung Kim, “Analysis on Non-Volatile System Log of Android Based Smartphone”, Journal of Digital Forensics, 11(2), pp. 19-42, 2017.

[11] Soram Kim, Jaehyung Cho, Yonghak Shin, Jongsung Kim, “Study on iOS Log Analysis and its Applications in Forensic”, Journal of Digital Forensics, 11(1), pp. 47-60, 2017.

[10] Serim Kang, Soram Kim, Jaehyung Cho, Jongsung Kim, “Development of Integrated Jump Lists Parser and Its Utilization in Forensic”, Journal of Digital Forensics, 11(1), pp. 1-16, 2017.

[9] Kiwon Hong, Jaehyung Cho, Soram Kim, Jongsung Kim, “Improved Data Concealing and Detecting Methods for OOXML Document”, Journal of The Korea Institute of Information Security & Cryptology, VOL.27, NO.3, pp. 489-499, 2017.

[8] Serim Kang, Soram Kim, Jaehyung Cho, Jongsung Kim, “The Analysis of 2017 Ransomware Trend”, The Workshop of Digital Forensics, 2017.

[7] Serim Kang, Boin Kim, Haeun Kim, Soram Kim, Jaehyung Cho, Jongsung Kim, “The Analysis of Jump Lists Forensic Tools”, The Workshop of Digital Forensics, 2016.

[6] Kiwon Hong, Soram Kim, Yongjin Jeon, Jooyoung Kim, Seoyeon Jang, Jongsung Kim, “Accident Cases and Countermeasures of the Internet of Things”, The Workshop of ICT Platform Society, 2016.

[5] Soram Kim, Yonghak Shin, Jongsung Kim, “Study on iPhone log analysis”, The Workshop of Digital Forensics, 2016.

[4] Kiwon Hong, Yonghak Shin, Jongsung Kim, “Study on Data Recovery for Recent SSDs”, The Workshop of Digital Forensics, 2016.

[3] Hangi Kim, Dowon Kim, Jongsung Kim, “Study on Forensic Analysis with Access Control Modification for Registry”, Journal of The Korea Institute of Information Security & Cryptology, VOL.26, NO.5, pp. 1131-1139, 2016.

[2] Yonghak Shin, Dowon Kim, Changhoon Lee, Jongsung Kim, “Improving the Efficiency of the EWF-file Imaging Time from a Cryptographic Perspective”, Journal of The Korea Institute of Information Security & Cryptology, VOL.26, NO.4, pp. 911-919, 2016.

[1] Yonghak Shin, Junyoung Cheon, Jongsung Kim, “Study on Recovery Techniques for the Deleted or Damaged Event Log(EVTX) Files”, Journal of The Korea Institute of Information Security & Cryptology, VOL.26, NO.3, pp. 387-396, 2016.

  • International Papers

[12]  Myungseo Park, Soram Kim, and Jongsung Kim. “Research on Note-Taking Apps with Security Features.” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications Vol.11(4),(2020):63-76

[11] Sehoon Lee, Myungseo Park, and Jongsung Kim. “Magniber v2 Ransomware Decryption: Exploiting the Vulnerability of a Self-Developed Pseudo Random Number Generator.” Electronics Vol.10(1), (2020): 16.

[10] Myungseo Park , Okyeon Yi, and Jongsung Kim. “A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system.” Forensic Science International: Digital Investigation 35 (2020): 301026.

[9] Soram Kim, Myungseo Park, Sehoon Lee, Jongsung Kim, “Smart Home Forensics—Data Analysis of IoT Devices“, Electronics, Vol.9(8), (2020): 1215.

[8] Giyoon Kim, Myungseo Park, Sehoon Lee, Younjai Park, Insoo Lee, Jongsung Kim “A study on the decryption methods of telegram X and BBM-Enterprise databases in mobile and PC“, Forensic Science International: Digital Investigation Vol.35 (2020): 300998.

[7] Uk Hur, Myungseo Park, Giyoon Kim, Younjai Park, Insoo Lee, Jongsung Kim, “Data acquisition methods using backup data decryption of Sony smartphones”, Digital Investigation, Vol. 31, (2019).

[6] Myungseo Park, Giyoon Kim, Younjai Park, Insoo Lee, Jongsung Kim, “Decrypting password-based encrypted backup data for Huawei smartphones”, Digital Investigation, Vol. 28, pp. 119-125, (2019).

[5] Serim Kang, Soram Kim, Jongsung Kim, “Forensic analysis for IoT fitness trackers and its application”, Peer-to-Peer Network Applications, Vol.11(50) , pp. 1-10, Springer, (2018).

[4] Myungseo Park, Hangi Kim, Jongsung Kim, “How to Decrypt PIN-Based Encrypted Backup Data of Samsung Smartphones”, Digital Investigation, Vol. 26, pp. 63-71, (2018).

[3] Muhammad Yasin, Junaid Ahmad Qureshi, Firdous Kausar, Jongsung Kim, Jungtaek Seo, “A granular approach for user-centric network analysis to identify digital evidence”, Peer-to-Peer Networking and Applications, Vol. 8 (5), pp. 911-924, Springer, (2015).

[2] Muhammmad Yasin, Firdous Kausar, Eisa Aleisa, Jongsung Kim, “Correlating messages from multiple IM networks to identify digital forensic artifacts”, Electronic Commerce Research, Vol. 14 (3), pp. 369-387, Springer, (2014).

[1] Kyung-Soo Lim, Yongseok Choi, Jongsung Kim, Changhoon Lee, Sangjin Lee, “CFES: Comprehensive Framework for Forensic Analysis of Embedded Systems”,Journal of Internet Technology, Vol. 10(5), pp. 549-562, (2009).