TAEKYU KIM
Professor
Department of Smart Security, Gachon University, ROK
Email : tkim@gachon.ac.kr
Phone : +82-31-750-5796
Office : #427 AI Engineering B/D, Gachon University, 1342 SeongnamDaero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea
EDUCATION
Ph.D Department of Electrical and Computer Engineering, the University of Arizona, USA
M.S. Department of Electrical and Computer Engineering, the University of Arizona, USA
B.S. Department of Computer Engineering, Chung-Ang University, ROK
RESEARCH AREA
Cyber Electronic Warfare
Breach and Attack Simulation
Automated Penetration Test
PUBLICATION
JOURNAL(International)
GyungMin Lee, ShinWoo Shim, ByoungMo Cho, TaeKyu Kim, and Kyounggon Kim, “Fileless cyber attacks; Analysis and classification,” ETRI Journal, Vol.43, No.2, p.332-343, 2021
Jione Choi, Hwiwon Lee, Younggi Park, Huy Kang Kim, Junghee Lee, Youngjae Kim, Gyuho Lee, Shin-Woo Shim, and Taekyu Kim, “PhantomFS-v2: Dare You to Avoid This Trap,” IEEE Access, Vol.8, p.198285-198300, Oct. 2020
Junghee Lee, Jione Choi, Gyuho Lee, Shin-Woo Shim, and Taekyu Kim, “PhantomFS File-Based Deception Technology for Thwarting Malicious Users,” IEEE Access, V o l . 8 , p.32203-32214, Feb. 2020
Taekyu Kim and Young Shin Han, “Network Behavior Analysis Simulation Using Ontology Methodology,” International Information Institute, Information, Vol.14 No.10, Oct 2011
Young-Shin Han, Soyoung Kim, Taekyu Kim, and Jason Jung, “Automatic Classification System in Semiconductors EDS Test Based on System Entity Structure Methodology,” IEICE Transactions of Information and System, Vol.E93-D, No.7, July 2010
Taekyu Kim, Chungman Seo, and Bernard P. Zeigler, “Web Based Distributed Network Analyzer Using SES Over Service Oriented Architecture,” SIMULATION: Transactions of the Society of Modeling and Simulation International, Vol.86, No.3, p.155-180, March 2010
Taekyu Kim, Moon Ho Hwang, and Doohwan Kim, “DEVS/NS-2 Environment; An Integrated Tool for Efficient Networks Modeling and Simulation,” Journal of Defense Modeling and Simulation (JDMS), Vol.5, No.1, 2008
JOURNAL(Domestic)
임선영, 김상수, 심신우, 구성모, 조병모, 김광수, 김태규, “로그인 로그를 활용한 이상 탐지 성능 향상을 위한 기능화 방법,” 한국통신학회논문지, Vol.47 No.01, p58-p65, 2022
심신우, 김상수, 임선영, 구성모, 조병모, 김광수, 김태규, “대용량 인증 로그를 활용한 Lateral Movement 탐지 연구,” 한국통신확회논문지, Vol.46 No.11, p1862-1872, 2021
홍수연, 김광수, 김태규, “사이버전 훈련을 위한 상태 저장 트래픽 발생 Architecture 설계 및 구현,” 군사과학기술학회(Journal of the KIMST), Vol.23, No.3, p.267-276, 2020
심신우, 임선영, 류한얼, 전성구, 김태규, “위협 모델링을 이용한 스마트 도어락 위협 분석,” 한국통신학회논문지, Vol.45, No.11, p.1868-1877, Nov. 2020
이경민, 심신우, 조병모, 김태규, 김경곤, “파일리스(Fileless) 사이버공격의 분류 모델,” 정보과학회논문지, Vol.47, No.5, p.454-465, May 2020
홍수연, 김광수, 김태규, “사이버전 훈련을 위한 ATT&CK 기반 모의 위협 발생기 설계 및 구현,” 군사과학기술학회(Journal of the KIMST), Vol.22, No.6, p.1-9, 2019
유정도, 김태규, 김인성, 김휘강, “멀티모달 기반 악성코드 유사도 계산 기법,” 정보보호학회논문지, Vol.29, No.2, p.347-363, April 2019
이규호, 유재관, 김인성, 김태규, “무기체계 안티탬퍼링을 위한 소프트웨어 소스코드 난독화 도구 구현,” 정보과학회논문지, Vol.46, No.5, p.448-456, May 2019
한규석, 김태규, 심신우, 전성구, 윤지원,“기계학습을 이용한 네트워크 전장정보 수집,” 정보과학회논문지, Vol.45, No.10, p.1096-1103, Oct. 2018
한규석, 윤지원, 김태규, 박영우, 한정규, “효율적인 네트워크 고립을 위한 공격기법에 대한 연구,” 정보과학회논문지, Vol.45, No.5, p.489-501, May 2018
문주연, 김태규, 김인성, 김휘강, “동적 네트워크 환경에 적용 가능한 Attack Graph 모델 연구,” 정보보호학회논문지,” Vol.28, No.2, p.485-500, April 2018
한영신, 김태규, 정재은, 이칠기, 정찬기, “데이터 엔지니어링 방법론을 기반으로한 네트워크 트래픽 분석 시스템,” 한국시뮬레이션학회논문지, Vol.18, No.1, p.27-34, 2009
PATENT
호스트 침입 탐지를 위한 파일 기반 제어방법 및 장치, 10-2309695, 2021.09.30
무선 프로토콜 자동 분석 방법 및 그를 위한 장치, 10-2014234, 2019.08.20
API 호출 시퀀스를 이용한 악성코드의 기능 분석 방법 및 장치, 10-2005107“, 2019.07.23
자바스크립트 파일 재작성을 통한 자바스크립트 해석 엔진 테스트 방법 및 장치, 10-2132449, 2020.07.03
기계 학습을 이용한 자바스크립트 해석 엔진 테스트 방법 및 장치, 10-2132450, 2020.07.03
토폴로지 행렬 기반 네트워크 내 공격 노드 식별 장치 및 방법, 10-1847965, 2018.04.05
평면 해수면 모델을 이용하여 지구타원체의 해양 환경을 가시화하기 위한 방법, 10-1422821, 2014.07.17
평면 해수면 모델을 이용하여 지구타원체의 해양 환경을 가시화하기 위한 장치, 10-1422822, 2014.07.17
지휘통제 모델 제작 및 검증시스템 및 이의 운용방법, 10-1299137, 2013.08.16
지식 기반의 객체 명세를 이용한 네트워크 분석장치 및 그 분석 방법, 10-1038507, 2011.05.26
PROFESSIONAL EXPERIENCE
Vice President at Cyber Electronic Warfare R&D, LIG Nex1, ROK (2010 ~ 2025)
Cyber Battle Management System, Defense Acquisition Program Administration, ROK
Active Response Research for Unmanned Weapon Systems, Korea Research Institute for defense Technology planning and advancement. ROK
Weapon system Antitamper, Korea Research Institute for defense Technology planning and advancement. ROK
System Memory Analysis for Anomaly Detection, Agency for Defense Development, ROK
Integrated Situation Awareness and Analysis for Insider Attack, Agency for Defense Development, ROK
Cyber Range, Cyber Operations Command, ROK
Battlefield for Cyberwarfare Training, Agency for Defense Development, ROK
Tactics, Techniques, and Procedures(TTPs) for Cyber Range, Agency for Defense Development, ROK
Strategy for Cyberwarfare Proactive/Reactive Systems based on Cyber Kill Chain, Agency for Defense Development, ROK
Cybersecurity Threat Traffic Generator, Agency for Defense Development, ROK
Active Response Tactics and Techniques for Cyberwarfare, Agency for Defense Development, ROK
Modeling and Simulation for Analysis and Validation on Cyberwarfare, Agency for Defense Development, ROK
Strategy for Cyber Range, Ministry of National Defense, ROK
Modeler for Command and Control System, Agency for Defense Development, ROK
Virtual Reality System for Group Training, Agency for Defense Development, ROK
Simulation System for Analyzing Counter Fire Battle, Agency for Defense Development, ROK
Simulation System for Analyzing Effectiveness and Performance of Air Defense Command and Control System, Agency for Defense Development, ROK
Simulation System for Analyzing C4ISR Effectiveness, Defense Acquisition Program Administration, ROK
Integrated Modeling and Simulation Lab for C4I Systems, Agency for Defense Development, ROK
Simulator for Joint Tactical Datalink Systems, Agency for Defense Development, ROK
Hybrid Simulation Framework for Weapon Systems, Agency for Defense Development, ROK
Senior Researcher at Security Management Institute, ROK (2008 ~ 2010)
Research on Reusability of Avionic Embedded System, Korea Aerospace Institute, ROK
Strategy for Improving Technology and Policy of Wargame Model Reusability, Ministry of National Defense, ROK
Cost Estimation Method for Embedded Software of Weapon System, Defense Acquisition Program Administration, ROK
Strategy for Enhancing Intellectual Search and Data Quality of ROK Defense Logistic Information System, Defense Acquisition Program Administration, ROK
Research Engineer at SK C&C Co. Ltd. ROK (2008)
Consulting Project - Common Platform Integration, SK Telecom, ROK
Common Business Hub; Integrative Business Process Solution through Web Service Paradigm, SK Telecom, ROK
e-Government Framework, the Ministry of Public Administration and Security, South Korea, ROK
BIZ IT; Information Technology Asset Management Service System and Method, SK C&C, ROK
Research Assistant at ACIMS in ECE Dept., the University of Arizona, Tucson, AZ. USA
The GenetSCOPE (Generic Network Model for Systems Capable of Planned Expansion) is an object-oriented discrete-event system modeling and simulation (M&S) environment to support simulation and analysis of voice and data communication scenarios for High Frequency Global Communication Systems (HFGCS), August 2006 to May 2007, USA
LINK11 Gateway for conventional LINK11 audio signal based on FFT: a real time duplex(sending and receiving) gateway for converting between analog signal and digital bit streams, August 2006 to May 2007, USA
Modeling and Simulation of TENA SSEGW behaviors in the OPNET/NETWARS Modeler Environment, Interoperability Test and Evaluation Capability (InterTEC), December 2005 to August 2006, USA
Network communication Design and Development through TENA AMO middleware in the Test Configuration Management (TCM) project of the Joint Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (JC4 ISR) Interoperability Test and Evaluation Capability (InterTEC), May 2005 to August 2005, USA
Award
Award Certificate of Defense Acquisition Program Administration, ROK, 2018
Who’s Who in the World, Marquis 31st Edition, 2014