Taeshik Shon, Ph.D.


  • Professor

Department of Cyber Security

College of Information Technology

Ajou University


  • E-mail address : tsshon(at)ajou(dot)ac(dot)kr

  • Office : Industry-Univ. Cooperation Building 515

  • Phone : +82-31-219-3321

  • Fax : +82-31-219-1607

  • Mailing address : Department of Cyber Security, Ajou University 206 Worldcup-ro, Yeongtong-gu, Suwon 16449, Korea


  • Short Bio :

Dr. Taeshik Shon received his Ph.D. degree in Information Security from Korea University, Seoul, Korea in 2005 and his M.S. and B.S. degree in Computer Engineering from Ajou University, Suwon, Korea in 2000 and 2002, respectively. While he was working toward his Ph.D. degree, he was awarded a KOSEF scholarship to be a research scholar in the Digital Technology Center, University of Minnesota, Minneapolis, USA, from February 2004 to February 2005. From Aug. 2005 to Feb. 2011, Dr. Shon had been a senior engineer in the Convergence S/W Lab, DMC R&D Center of Samsung Electronics Co., Ltd. He was a visiting professor of Electrical Computer Engineering Department at Illinois Institute of Technology, Chicago, USA, in 2017. He is currently a professor at the Division of Cyber Security, College of Information Technology, Ajou University, Suwon, Korea. He was awarded the Gold Prize for the Sixth Information Security Best Paper Award from the Korea Information Security Agency in 2003, the Honorable Prize for the 24th Student Best Paper Award from Microsoft-KISS, 2005, the Bronze Prize for the Samsung Best Paper Award, 2006, the Second Level of TRIZ Specialist certification in compliance with the International TRIZ Association requirements, 2008, and the Silver, Bronze, Excellent Publication Prize for Ajou University Award, 2013, 2014, 2016. He is a senior member of the IEEE and serves as a guest editor, an editorial staff and review committee of Computers and Electrical Engineering - Elsevier, Mobile Network & Applications - Springer, Security and Communication Networks - Wiley InterScience, Wireless Personal Communications - Springer, Journal of The Korea Institute of Information Security and Cryptology, IAENG International Journal of Computer Science, and other journals. His research interests include Industrial Control Systems, Anomaly Detection Algorithms, and Digital Forensics.


About Me

[주요경력 ]

    • 現) 경찰청 디지털포렌식 자문위원

    • 산업부사이버안전센터/전략물자 자문위원

    • 한국전력 정보보안 자문위원,

    • 디지털 포렌식 표준화 포럼 자문위원,

    • 한국정보보호학회 이사, 한국정보처리학회 이사, 한국디지털포렌식학회 이사, 산업보안학회 이사

    • Senior Member, Institute of Electrical and Electronics Engineers(IEEE)

    • Associate Editor (Journal of Parallel, Emergent and Distributed Systems,Taylor and Francis)

    • 前) 국가정보원 정보보안 실태 평가위원,

    • 스마트그리드 핵심 보안기술 자문위원,

    • 원전 사이버보안 워킹그룹 위원,CC인증위원회 위원,

    • Associate Editor (Security and Communication Networks, Wiley)

    • Associate Editor (Computer and Electrical Engineering, Elsevier)


[Experience]

  • Professor, Department of Cyber Security, Ajou University, 2011-present

  • Visiting Professor, Department of ECE, Illinois Institute of Technology, IL, USA, 2017-2018

  • Senior Engineer, Digital Media & Communication R&D Center, Samsung Electronics, 2005-2011

  • Research Scholar, Digital Technology Center, University of Minnesota, MN, USA, 2004-2005

  • Research Staff, Center for Information Security Technologies, Korea University, 2002-2005

  • Technical Director, M-Storage Company, 2003


[Education]

  • Korea University, Seoul, Republic of Korea

    • Ph.D. (2002-2005) in Information Security

  • Ajou University, Suwon, Republic of Korea

    • M.S. (2000-2002) in Computer Engineering

    • B.S. (1996-2000) in Computer Engineering

[Awards/Grand/License]

    • Ajou Research Award(2014, 2015), Ajou Publication Award(2016, 2018, 2020, 2021), Ajou University

    • Best Paper Award, Korea Foundation for the Advancement of Science and Creativity, korea, 2012

    • Excellence Award, Hanium IT mentoring Competition, Hanium, Korea, 2011

    • Excellent Paper Award, The 36th Conference of the KIPS, Korea Information Processing Society, Korea, 2011

    • Best Paper Award, ITCON 2011 Summer, Jeju, Korea, 2011

    • Second Level TRIZ Specialist Certified, International TRIZ Association, Russia, 2008

    • Honorable Prize Awarded, 6th Samsung Best Paper Award, Samsung Advanced Institute of Technology, Samsung, 2006

    • Honorable Prize Awarded, 24th KISS-Microsoft Student Paper Award, Korea Information Science Society, Microsoft, 2005

    • IEEE SMC Scholarship Winner, Information Assurance Workshop 2005, NY, USA

    • IFIP TC6 Student Grant, INTELLCOMM 2004, Bangkok, Thailand

    • International Collaboration Research Selected, Korea Science and Engineering Foundation (KOSEF), Ministry of Science and Technology, 2003-2004

    • Gold Prize Awarded, 6th Information Security Best Paper Award, Korea Information Security Agency (KISA), 2003

    • Honorable Prize Awarded, A Competitive Exhibition of Information Communication Venture Start-up 2002, Ministry of Information and Communication, Korea

    • A Support Fund Granted, The 2nd half of the 2002 venture item support enterprise, Small and Medium Business Administration, Korea

[Teaching

    • Fall Semester in Ajou University, Graduate : Special Topics in Information Security Applications, Undergraduate : Software Application Security

    • Spring Semester in Ajou University, Graduate : Advanced Information Security, Digital Forensics, Undergraduate : Information Security, Cybersecurity Capstone Design Project

    • Apr. 2009 - Apr. 2009 in Korea University, Lecture: Special Topic in Mobile Solution

    • Mar. 2005 - Aug. 2005 in SungShin Women's University, Lecture: Computer Communication

    • Mar. 2005 - Aug. 2005 in Seoul Women's University, Lecture: Computer Network

    • May. 2003 - Aug. 2005 in Korea Information Security Education Center, Lecture: Intrusion Detection System

    • Sep. 2003 - Dec. 2003 in Seokyoung University, Lecture: Internet Programming and Server Construction (2nd semester 2003)

    • May. 2003 - Aug. 2005 in Advanced Institute of Information Technology, Lecture: Network Security, TCP/IP networks

    • Jul. 2003 - Oct. 2003 in the Supreme Prosecutor Office (Internet Crime Investigation Center), Lecture: TCP/IP protocol suites, Linux System Security

    • June. 2002 - Dec 2003 : Teaching Assistant, Korea University

    • Mar. 2000 - Dec 2001 : Teaching Assistant, Ajou Universtiy

Research interests

    • ICS (Intelligent Cyber forensicS), AI-based IoT Devices, Linux/Unix File System, Mobile platform, SmartGrid forensics

    • ICS (In-vehicle network Cyber Security), Mobility Cybersecurity/Forensics, Autonomous Vehicle Security

    • ICS (Industrial Control System) & Smart Grid Security (EMS, SCADA, FEP/RTU)

    • Network/System Intrusion, Behavioral Abnormal Detection

    • Network/System Penetration Test/Vulnerability Analyzing

    • Anti-dump, Memory Protection, Boot-image Protection

    • Abnormal Behavior Detection

    • Artificial Neural Network, Support Vector Machine

Projects

  • [Current Research Projects]

    • Digital Forensic Research with BK21plus, KRF, IITP and Various Goverment Agency

    • In-Vehicle Network Security Research with HMC, BK21plus, KRF, IITP

    • Industrial Control System Security Research with KPX, KEPCO, BK21plus, KRF, IITP

  • [Previous Research Projects]

    • Development on File System Forensic Tool, National Research Foundation of Korea, 10.2012 ~ 09.2016

    • Research on Development of Platform, Contents, and Service Security Technologies in Android-based Open Mobile Environment, National Research Foundation of Korea, 5.2012 ~ 04.2015

    • Research on Zombie Client Protection in Mobile Open Platform, Korea Sanhak Foundation, 06.2012 ~ 05.2013

    • Research on the Advanced Electronic Record Management based on Digital Forensics, National Archives of Korea, 04.2012 ~ 11.2012

    • Research on Intrusion Detection for Smartgrid, KEPCO, 09.2012 ~ 03.2013

    • Research on the Classification and Analysis of Public DataBase in Digital Forensics, Prosecution Service, 10.2012 ~ 12.2012

  • Research on the Classification and Analysis of Whiltelist-based Power Control System Security, National Security Research Institute, 10.2012 ~ 04.2013

    • Research on the Analysis of IEC 62351 standard, LS Industrial Systems, 08.2012 ~ 11.2012

    • Research on a Survey and Detection for Data Leakage based on Abnormal Network Connection, National Security Research Institute, 03.2012 ~ 10.2012

    • Research on Secure Charging Protocol for EV-to-EVSE, Hyundai Motor, 10.2011 ~ 03. 2012

    • Research on Digital Forensic for Grid Embedded Device, National Security Research Institute, 10.2011 ~ 03.2012

    • Research on System Memory Protection and Appstore Authentication for Smart Device Platform, Korea Sanhak Foundation, 06.2011 ~ 05.2012

    • Research on Security Technologies for Microgrid and GEV(Grid Enabled Vehicle) in Smartgrid 2.0, KIER, 10.2011 ~ 12.2011

    • Research on Network Interworking, Authentication and Encryption for Wireless Mesh Network, ETRI, 06.2011 ~ 12.2011

    • Research on DNS Query-based Cyber Attack Prelude Detection Platform Development, ETRI, 07.2011 ~ 01.2012

    • Research on Analysis and Response of Memory Dump Attacks, National Security Research Institute, 04.2011 ~ 10.2011

    • Field Key Provisioning for Smart Tablet Device, In Samsung, 2010.12 ~ 2011.02

    • Smart Connectivity and Sharing Device Solution Technology Development, In Samsung, 2009.11 ~ 2010.12

    • Wireless Mesh/Relay Technology Development for U-computing, In Samsung, 2009.02 ~ 2009.10

    • Distributed Authentication Technology Development for USN environment, with KAIST, 2008.01 ~ 2008.12

    • Interlocking Framework Development between WPAN and NEMO(Network Mobility), In Samsung, 2007.01 ~ 2007.12

    • Wibro micro RAS(Radio Access Station)/ACR(Access Control Router) Development, In Samsung, 2006.01 ~ 2006.12

    • Wibro PCMCIA Model Device Driver Development, In Samsung, 2005.08 ~ 2005.12

    • A Study on the Analysis of Internet Worm Propagation and Modeling , National Security Research Institute, 2005.04~2005.10

    • A study on the Advanced Network Intrusion Detection and Prevention Technology , University of Minnesota, 2004.02~2005.02

    • Development of Security Patch Management Framework in Multi-Platform Environment, National Security Research Institute, 2003.05~2004.10

    • Application Research of Machine Learning and Computer Forensics, ITRC, Ministry of Information and Communication, 2003.08~2004.07

    • Development of Security Patch Management Framework in Multi-Platform Environment, National Security Research Institute, 2003.05~2003.10

    • A Study on the Defense and Evasion of Information Security Solutions, Korea Information Security Agency, 2002.05~2002.11

    • A Study on the Automatic Distribution Method of Security Patch, National Security Research Institute, 2002.05~2002.10

    • Development of Broker and Agent based Integrated Single Sign On System, PrimeSecure, 2000.12 - 2001.05

    • A Study on the Security Threat Element Analysis and Security Architecture in Military Satellite Communication Environment, Agency for Defense Development, 1999.12 - 2001.06

    • SMIB-based Object-Oriented Operation and Management Systems for Integrated Information Security Engine, Ministry of Science and Technology, 1998. 12 - 2000. 10

Publications

    • [International Journal(SCI/SCIE)]

    • Mobility 1

    • Power IoT 1, 2

    • Hyunjin kim, jos

    • Yeonghun Shin, Info II, FS all

    • Wooyeon Jo, AD

    • Sungjin Kim, ASOC framework, jos

  • Yeonghun Shin, Hyungchan Kim, Sungbum Kim, Minju Kim, Wooyeon Jo and Taeshik Shon, Forensic Analysis of Open Vehicle Infotainment System,

  • Hyungchan Kim, Yeonghun Shin, Sungbum Kim, Minju Kim, Wooyeon Jo, Jino Lee and Taeshik Shon, Study and Analysis to Enhance Privacy Protection on Android Platform

  • Hyungchan Kim, et al, Ext4 and XFS File System Forensic Framework based on TSK, Submitted to IEEE Access

  • Minju Kim, et al, A Digital Forensic Model and Practices for Wearable devices, Submitted to IEEE IoT Journal

  • Sungbum Kim, et al, AI-enabled Device Digital Forensics for Smart Cities, Submitted to JoS

  • WooYeon Jo, et al, Automatic Whitelist Generation System for Ethernet based In-Vehicle Network, Submitted to IEEE Transactions on VT

  • SungJin Kim, WooYeon Jo, HyunJin Kim, Seokmin Choi, Da-I Jung, HyeonHo Choi, and Taeshik Shon, Two-phase Industrial Control System Anomaly Detection using Communication Patterns and Deep Learning, Submitted to IEEE IoT Journal

  • HyunJin Kim, SungJin Kim, WooYeon Jo, KiHyun Kim and Taeshik Shon, Unknown Payload Anomaly detection based on Format and Field Semantics Inference in Industrial Control Systems, Accepted to IEEE Access, 2021

  • Sungjin Kim, Wooyeon Jo, Taeshik Shon, Smart Seed Selection-based Effective Black Box Fuzzing for IIoT Protocol, JoS, Springer, December 2020

  • Sungmoon Kwon, Hyunguk Yoo, Taeshik Shon, IEEE 1815.1-Based Power System Security With Bidirectional RNN-Based Network Anomalous Attack Detection for Cyber-Physical System, IEEE Access, Volume 8, Dec 2020, 77572 - 77586

  • Wooyeon Jo, Sungjin Kim, Changhoon Lee, Taeshik Shon, Packet Preprocessing in CNN-Based Network Intrusion Detection System, MDPI, Electronics, July 2020

  • Yeonghun Shin, Wooyeon Jo, Hyungchan Kim, Dongkyun Yoo, Taeshik Shon, Certificate Injection-based Encrypted Traffic Forensics in AI Speaker Ecosystem, Digital Investigation, Elsevier, July 2020

  • Seokjun Lee, Soowoong Eo, Wooyeon Jo, Taeshik Shon, ExtSFR : Scalable File Recovery Framework based on Ext File System, MTAP, Springer, June 2020

  • Shehzad Chaudhry, Bandar Alzahrani, Ahmed Barnawi, Abdullah Al-Barakati, Taeshik Shon, An Anonymous Device to Device Authentication Protocol using ECC and Self Certified Public Keys usable in Internet of Things based Autonomous Devices, MDPI, Electronics, March 2020

  • Shehzad Ashraf Chaudhry , Taeshik Shon, Fadi Al-Turjman, Mohammed H.Alsharif, Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems, Elsevier, Computer Communications, Volume 153, 1 March 2020, Pages 527-537

  • Sungjin Kim, WooYeon Jo, Taeshik Shon, APAD: Autoencoder-based Payload Anomaly Detection for industrial IoE, Elsevier, Applied Soft Computing, Volume 88, March 2020

  • Wooyeon Jo, Yeonghun Shin, Hyungchan Kim, Dongkyun Yoo, Donghyun Kim, Cheulhoon Kang, Jongmin Jin, Jungkyung Oh, Bitna Na, Taeshik Shon, "Digital Forensic Practices and Methodologies for AI Speaker Ecosystems", Digital Investigation, Elsevier, July 2019

  • Myungjong Kim, Wooyeon Jo, Jaehoon Kim, Taeshik Shon, Visualization for internet of things: power system and financial network cases, MTAP, Springer, February 2019, Volume 78, Issue 3, pp 3241-3265

  • Jaehan Jung, Sungmoon Kwon, ManPyo Hong, Jin Kwak, Taeshik Shon, Adversarial Attack-based Security Vulnerability Verification using Deep Learning Library for Multimedia Video Surveillance, MTAP, Springer, Online Published, January 2019

  • Shehzad Ashraf Chaudhry, I Luk Kim, Seungmin Rho, Mohammad Sabzinejad Farash, Taeshik Shon, An Improved Anonymous Authentication Scheme for Distributed Mobile Cloud Computing Services, Cluster Computing, Springer, Online Published, Aug 2017

  • Sungmoon Kwon, Myungjong Kim, Jaehan Jung, Taeshik Shon, Towards Security Enhanced Provisioning in Industrial IoT Systems, MDPI, Sensors, 18(12), 4372, 2018

  • Sungjin Kim, Taeshik Shon, Field Classification based Novel Fuzzing Case Generation for ICS Protocols, JoS, Springer, Volume 74, Issue 9, pp 4434-4450, September 2018

  • Seokcheol Lee, Seokjun Lee, Hyunguk Yoo, Sungmoon Kwon, Taeshik Shon, Design and Implementation of Cybersecurity Test-bed for Industrial IoT Systems, JoS, Springer, Volume 74, Issue 9, pp 4506-4520, September 2018

  • Shehzad Ashraf Chaudhry,Husnain Naqvi, Mohammad Sabzingjad Farash, Taeshik Shon, Muhammad Sher, An improved and robust biometrics-based three factor authentication scheme for multiserver environments, Journal of Supercomputing, Springer, August 2018, Volume 74, Issue 8, pp 3504-3520

  • Seokcheol Lee, Sungjin Kim, Ken Choi, Taeshik Shon, Game Theory-based Security Vulnerability Quantification for Social Internet of Things, Future Generation Computer Systems, Elsevier, May 2018, Volume 82, pp 752-760

  • Sungmoon Kwon, Hyunguk Yoo, Taeshik Shon, Recovery Measure against Disabling Reassembly Attack to DNP3 Communication, IEICE Transactions on Information and Systems, Vol.E100-D, No.8 pp.1790 -1797

  • Myungwhan Choi, Areeya Rubenecia, Taeshik Shon, Hyo Hyun Choi, Velocity Obstacle Based 3D Collision Avoidance Scheme for Low-Cost Micro UAVs, Sustainability, MDPI, July 2017, 9(7), 1174

  • Shehzad Ashraf Chaudhry, Aiiad Albeshri, Naixue Xiong, Changhoon Lee, Taeshik Shon, A privacy preserving authentication scheme for roaming in ubiquitous networks, Cluster Computing, Springer, June 2017, Volume 20, Issue 2, pp1223-1236

  • Shehzad Ashraf Chaudhry, Mohammad S Farash, Husnain Naqvi, SK H Islam, Taeshik Shon, A robust and efficient privacy aware handover authentication scheme for wireless networks, Wireless Pervasive Computing, Springer, March 2017, Volume 93, Issue 2, pp 311-335

  • Tewodros Legesse Munea, I Luk Kim, Taeshik Shon, Design and Implementation of Fuzzing Framework based on IoT Applications, WPC, Springer,March 2017, Volume 93, Issue 2, pp 365-382

  • Hyo Hyun Choi, Su Hyun Nam, Taeshik Shon, Two Tier Search Scheme using micro UAV Swarm, WPC, Springer, March 2017, Volume 93, Issue 2, pp 349-363

  • Minki Cha, Jung-Hyok Kwon, SungJin Kim, Taeshik Shon, Eui-Jik Kim, Data Aggregation Gateway Framework for CoAP Group Communications, Symmetry, MDPI, November 2016, 8(12), 138

  • Tewodros Legesse Munea, Hyunwoo Lim, Taeshik Shon, Network Protocol Fuzz-testing for Information Systems and Applications : A Survey and Taxonomy, Multimedia Tools and Applications, Springer, November 2016, Volume 75, Issue 22, pp 14745-14757 (JCR 2015 Ranking 29%)

  • Seokcheol Lee, Taeshik Shon, User Privacy-Enhanced Security Architecture for Home Area Network of Smartgrid, MTAP, Springer, October 2016, Volume 75, Issue 20, pp 12749-12764(JCR 2015 Ranking 29%)

  • Myungwhan Choi, Paul Vincent S. Contreras, Taeshik Shon, Hyo Hyun Choi, Exploring an area by groups of UAVs in the presence of a refueling base, Journal of Supercomputing, Springer, September 2016, Volume 72, Issue 9, pp 3409-3427

  • Hyunguk Yoo, Taeshik Shon, Challenges and Research Directions for Heterogeneous Cyber Physical System based on IEC 61850:Vulnerability, Security Requirement, and Security Architecture, Future Generation Computing System, Elsevier, Volume 61, Pages 128-136, August 2016(JCR 2015 Ranking 10%)

  • Eui-Jik Kim, Jung-Hyok Kwon, Ken Choi, Taeshik Shon, Unified Medium Access Control Architecture for Resource-Constrained Machine-to-Machine Devices, ACM Transactions on Embedded Computing Systems, Volume 15 Issue 2, May 2016

  • Shehzad Ashraf Chaudhry, Husnain Naqvi, Taeshik Shon, A lightweight message authentication scheme for Smart Grid communications in power sector, CEE, Elsevier, Volume 52, May 2016, Pages 114-124

  • Jongbin Ko, Seokjun Lee, Taeshik Shon, Towards A Novel Quantification Approach based on Smart Grid Network Vulnerability Score, International Journal of Energy Research, Wiley, Volume 40, Issue 310 Pages 298-312, March 2016(JCR 2014 Ranking 2.9%)

  • Kyumin Cho, Hyunwoo Lim, Taeshik Shon, Seungjoo Kim, A Novel Security Architecture for Smart Grid Communication, Journal of Supercomputing, Springer, January 2016, Volume 72, Issue 1, pp 214-231

  • Jung-Hyok Kwon, Hyun Soo Chang, Taeshik Shon, Jai-Jin Jung, and Eui-Jik Kim, Neighbor stability-based VANET clustering for urban vehicular environments, Journal of Supercomputing, Springer,January 2016, Volume 72, Issue 1, pp 161-176

  • Sania Yaqoob, Taeshik Shon, A Hybrid EV Authentication Approach in Smart grid based Distributed Network, Ad hoc & Sensor Wireless Networks, Volume 31, Number 1-4, pp 89-99, 2016

  • Wooyeon Jo, Taeshik Shon, Digital Forensic Science Approach by File Recovery Research, JOS, Springer, Online Published November 2016

  • Yongmin Park, Hyunsoo Chang, Taeshik Shon, Data Investigation based on XFS File System Metadata, Multimedia Tools and Applications, Springer, November 2016, Volume 75, Issue 22, pp 14721-14743(JCR 2015 Ranking 29%)

  • Shehzad Ashraf Chaudhry, Husnain Naqvi, Taeshik Shon, Muhammad Sher, Mohammad Sabzinejad Farash, Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems, Journal of Medical Systems, Volume 39 Issue 6, June 2015 pages 1-11

  • Hyunhee Park, Seunghyun Park, Taeshik Shon, Eui-Jik Kim, Multi-Hop-based Opportunistic Concurrent Directional Transmission in 60 GHz WPANs, Multimedia Tools and Applications, Springer, March 2015, Volume 74, Issue 5, pp 1627-1644

  • JungTaek Seo,Sukjun Lee, Taeshik Shon, A Study on Memory Dump Analysis based on Digital Forensic Tools, Peer-to-Peer Networking and Applications, Springer, Volume 8, Issue 4, pp 694-703, July 2015

  • Kyusuk Han, Taeshik Shon, Authentication of Mobile Applications through Various Local Distributors, Multimedia Tools and Applications,Springer, March 2015, Volume 74, Issue 5, pp 1541-1555 (JCR 2013 Ranking 34%, IF=1.058)

  • Kangseok Kim, Wonjeong Ha, Okkyung Choi, Hongjin Yeh, Jai-Hoon Kim, Manpyo Hong, Taeshik Shon, An interactive pervasive whiteboard based on MVC architecture for ubiquitous collaboration, Multimedia Tools and Applications, Springer, March 2015, Volume 74, Issue 5, pp 1557-1576 (JCR 2013 Ranking 34%, IF=1.058)

  • Hyunguk Yoo, Taeshik Shon, Novel Approach for Detecting Network Anomalies for Substation Automation based on IEC 61850, Multimedia Tools and Applications, January 2015, Volume 74, Issue 1, pp 303-318, Springer(JCR 2013 Ranking 34%)

  • <More Publications>

    • [International Conference]

    • Wooyeon Jo, Yeonghun Shin, Hyungchan Kim, Dongkyun Yoo, Donghyun Kim, Cheulhoon Kang, Jongmin Jin, Jungkyung Oh, Bitna Na, Taeshik Shon, "Digital Forensic Practices and Methodologies for AI Speaker Ecosystems", Digital Forensic Research Workshop USA (DFRWS-USA), 2019

    • Hyungchan Kim, Donghyun Kim, Wooyeon Jo, Taeshik Shon, “Digital Forensic Analysis using Android Application Cache Data”, International Conference on Platform Technology and Service (PlatCon), 2019

    • Sungmoon Kwon, Jaehan Jeong, Taeshik Shon, “Digital Forensic Readiness for Financial Network”, International Conference on Platform Technology and Service (PlatCon), 2019

    • Dongkyun Yoo, Yeonghun Shin, SungJin Kim, HyunJin Kim, SungMoon Kwon, Taeshik Shon, “Digital Forensic Artifact Collection Technique using Application Decompilation”, International Conference on Platform Technology and Service (PlatCon), 2019

    • Hyunjin Kim, Sungjin Kim, Sungmoon Kwon, Wooyeon Jo, Taeshik Shon, “A Novel Security Framework for Industrial IoT Based on ISA 100.11a”, Quality, Reliability, Security and Robustness in Heterogeneous Systems (Qshine), 2018, pp61-72

    • Jaehan Jeong, Keunho Park, Wooyeon Jo, Taeshik Shon, “Backtracking and Visualization Techniques for financial network security”, International Conference on Computer Systems, Electronics and Control (ICCSEC), 2017,

  • Keunho Park, Taeshik Shon, Cvss Consideration in Healthcare Domain, PlatCon-17, 2017

    • Hyunguk Yoo, Taeshik Shon, Inferring State Machine using Hybrid Teacher, IEEE International Conference on Cyber, Physical, and Social Computing (CPSCom), 2016

    • Seokjun Lee, Jongwan Kim, Hyunguk Yoo, Taeshik Shon, Case Studies for Analyzing DLMS/COSEM-based Smart Meter Vulnerabilities in Korea, IEEE International Conference on Green Computing and Communications (GreenCom), 2016

    • Seokjun Lee, Hyunguk Yoo, Jungtaek Seo, Taeshik Shon, Packet Diversity-based Anomaly Detection System with OCSVM and Representative Model, CPSCom2016

    • Hyunguk Yoo, Taeshik Shon, Grammar-based Adaptive Fuzzing: Evaluation on SCADA Modbus Protocol, IEEE International Conference on Smart Grid Communications (SmartGridComm), 2016, pp. 557-563

    • Keunho Park, Sungmoon Kwon, Sungjin Kim, Taeshik Shon, Digital Forensic Consideration for Financial IT Security, Future Technologies Conference (FTC), 2016, pp. 1025-1029

    • Seokcheol Lee, Taeshik Shon, Open Source Intelligence base Cyber Threat Inspection Framework for Critical Infrastructures, Future Technologies Conference (FTC), 2016, pp. 1030-1033

    • SungJin Kim, WooYeon Jo, Taeshik Shon, A novel vulnerability analysis approach to generate fuzzing test case in industrial control systems, IEEE Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 2016, pp566-570

    • WooYeon Jo, Hyunsoo Chang, Taeshik Shon, Digital Forensic Approach for File Recovery in Unix Systems, IEEE Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 2016, pp562-565

    • HyunJin Kim, Seokcheol Lee, SungJin Kim, Taeshik Shon, Reliablity Enhanced Communication Guidance for Electric Utilities based on Regulatory standard, ICITCS, 2015, pp465-468

    • Soowoong Eo, Wooyeon Jo, Seokjun Lee, Taeshik Shon, A Phase of Deleted File Recovery for Digital Forensics Research in Tizen, ICITCS, 2015, pp362-364

    • Hyun Soo Chang, Seokjun Lee, Taeshik Shon, Security Threat Analysis Case Study: Using non-malicious Mobile Game and Messenger Applications, BAI, 2015, pp1665-1674

    • SungJin Kim, Taeshik Shon, The Intrusion Detection Method for MMS Protocol, PlatCon-15, 2015, pp146-147

    • Hyun Soo Chang, Taeshik Shon, Duplicated Session Authentication Vulnerability of Telegram Messenger, PlatCon-15, 2015, pp178-179

    • Hyunwoo Lim, Taeshik Shon, DLMS/COSEM Fuzzing for Vulnerability Detection, PlatCon-15, 2015, pp188-189

    • Eui-Jik Kim, Taeshik Shon, Medium Access Control Framework for M2M Devices, PlatCon-15, 2015, pp214-215

    • Seokcheol Lee, Hyunwoo Lim, Woong Go, Haeryong Park, Taeshik Shon, Logical Architecture of HAN-Centric Smartgrid Model, PlatCon-15, 2015, pp41-42

Activities

  • [Chair of International Committee]

  • International Liaison Chairs, 2016 International Conference on Platform Technology and Service, Jeju, Korea, 15-17 February 2016

    • Program Chair, The 2012 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-12), Jeju, Korea, December 12-15, 2012

    • Publicity Chair, Workshop in Information Security Theory and Practice 2012 (WISTP 2012), Egham, UK, June 19-22, 2012

    • Program Chair, The 7th International Conference on Future Information Technology (FutureTech 2012), Vancouver, Canada, June 26-28, 2012

    • Program Vice Chairs, The 26th IEEE International Conference on Advanced Information Networking and Applications (AINA-2012) Academy Hills, Roppongi, Tokyo, Japan, March 26-29, 2012

    • Program Chair, The 7th International Symposium on Wireless sensor network Technologies and Applications for Smart Space (WTA 2011), Jeju, Korea, December 12-15, 2011

    • Program Chair, The 2011 International Workshop on Mobile Cloud Computing Technologies and Applications (MCCTA-2011), Tirana, Albania, September 7-9, 2011, In Conjunction with NBiS 2011

    • Program Chair, The 2011 International Conference on Intelligent Robotics, Authmations, telecommunication facilities, and applications (IRoA - 11), Gwangju, Korea, Oct. 20-22, 201177

    • Program Chair, The 8th IEEE/FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2011), June 28-30, 2011, Aldemar Hotel, Crete, Greece, http://www.ftrai.org/sta2011/

    • Program Chair, The 5th International Symposium on Security and Multimodality in Pervasive Environments (SMPE-11) The workshop was held in conjunction with The 25th International Conference on Advanced Information Networking and Applications (AINA-2011) Biopolis, Singapore, March 22 - 25, 2011

    • Program Chair, the 2011 International Workshop on Smartphone Applications and Services (Smartphone 2010) will be held in Gwangju, Korea, December 9-11, 2010.

    • Session Chair, the 5th International Conference on Future Information Technology (FutureTech 2010), Busan, Korea, May 21-23, 2010.

    • Session Chair, The 2nd International Conference on Information Technology Convergence and Services (ITCS 2010), Cebu, Philippines, August 11-13, 2010

  • [International Committee Member]

    • Program Committee, IEEE Globecom'17 - CISS (2017 IEEE Global Communications Conference: Communication & Information System Security), Paris, France, May 21-25, 2017

  • Program Committee, 14th annual conference on Privacy, Security and Trust (PST 2016), Auckland, New Zealand, December 12-14, 2016

  • Program Committee, IEEE Globecom'16 - CISS (2016 IEEE Global Communications Conference: Communication & Information System Security), Washington, DC USA, December 4-8, 2016

  • Program Committee, Australasian Conference on Information Security and Privacy(ACISP-2016), Melbourne, Australia, July 4-6, 2016

  • Program Committee, The 3rd International Conference on Internet (ICONI 2011), Sepang, Malaysia, December 15-19, 2011

    • Program Committee, The 2011 IEEE International Conference on Internet of Things (IEEE iThings-2011), Dalian, China, Oct 19-22, 2011

    • Program Committee, The 3rd IEEE International Conference on Cloud Computing Technology and Science (IEEE CloudCom 2012), Athens, Greece, Nov 29-Dec 1, 2011

    • Program Committee, The 5th IEEE International Conference on Embedded and Multimedia Computing (EMC-10), Cebu, Philippines, Aug 11-13, 2010

  • [Editor on Journals, Books, and Proceedings]

    • Associate Editor, Computers and Electrical Engineering - Elsevier (SCIE), 12.2012 ~ 2015

  • Associate Editor, Security and Communication Networks - Wiley (SCIE), 08.2013 ~ 2016

  • Editorial Board, International Journal of Parallel, Emergent and Distributed Systems, 04.2012 ~ Present

    • Taeshik Shon et al, Theme issue on Smartphone applications and services for pervasive computing, Journal of Personal and Ubuqitous, Springer, 2012, DOI: 10.1007/s00779-011-0429-6O

  • Taeshik Shon et al, IT Convergence and Services, Lecture Notes in Electrical Engineering, Vol. 107, Springer, Oct 2011, ISBN 978-94-007-2597-3

  • Taeshik Shon et al, Advanced Technologies and Practices in Recent Wireless Sensor Networks, Wireless Personal Communications, Springer, Oct 2011, ISSN: 0929-6212, DOI: 10.1007/s11277-011-0296-5

  • Taeshik Shon et al, Secure and Trust Computing,Data Management and Applications, Springer, Communications in Computer and Information Science Vol. 186, June 2011, ISBN: 10.1007/978-3-642-22339-6

  • Taeshik Shon et al, Introduction to Cryptography with Java Applet(Korea Edition), Hong Publication Company, 2003, ISBN : 8972833886

  • Taeshik Shon et al, Advanced Information Security, Advanced Institute of Information (GSC-284-03V1), 2003

  • Special Issue on "Recent Advanced Technologies and Theories for Grid and Cloud Computing", Computers and Electrical Engineering - Elsevier (SCIE), 2012

    • Special Issue on "Advanced Technologies and Applicatons for Smart Robot and Intelligent Systems", Internatonal Journal of Advanced Robotc Systems (IJARS) - INTECH (SCIE),2011

    • Special Issue on "Advanced Information Security for Secure and Trust Computing", COMPUTERS & MATHEMATICS WITH APPLICATIONS (CMA)- Elsevier(SCI), 2011

    • Special Issue on "New Technologies and Applications for Wireless Communications & Mobile Cloud Computing", Mobile Network & Applications - Springer (SCIE), 2011

    • Special Issue on "Next Generation Communication and Network Security", Security and Communication Networks - Wiley InterScience (SCIE), 2011

    • Special Issue on "Advanced in High Performance, Algorithm, and Framework for Future Computing", The Journal of Supercomputing (JoS) - Springer (SCI) , 2011

    • Special Issue on "Recent Advanced Technologies and Theories in Ubiquitous Networks and Wireless Communications", International Journal of Ad Hoc and Ubiquitous Computing - Inderscience (SCIE), 2011

    • Special Issue on "Advanced Wireless and Mobile Sensor Network, Theory, System, and Application", INFORMATION - International Information Institute (SCIE), 2011

    • Special Issue on "Smartphone Applications and Services for Pervasive Computing", Journal of Personal and Ubiquitous Computing - Springer (SCIE), 2011

    • Special Issue on "Advanced Technologies and Practices in Recent Wireless Sensor Networks", Wireless Personal Communications - Springer (SCIE), 2011

    • Guest editor of the KICS

    • Editorial staff and review committee of the Journal of The Korea Institute of Information Security and Cryptology

    • IAENG International Journal of Computer Science and other journals.

  • [Journal Review Member]

    • Elsevier Information Science, Elsevier MCM, Springer MONET, JNCA, WPC, PUC, Wiley SCN, IJCS, etc,.