網路安全實驗室‎ > ‎成員‎ > ‎

特聘教授

Shiuhpyng Winston Shieh                                                                                         


IEEE Fellow & ACM Distinguished Scientist
IEEE Reliability Society Vice President for Technical Activities, 2014-
Distinguished Professor, Dept. of Computer Science & Information Engineering, NCTU
Director, Taiwan Information Security Center (twisc@NCTU)
Director, NCTU DSNS Lab
Adviser, Investigation Bureau, Ministry of Justice


Contact
National Chiao Tung University, Hsinchu, Taiwan 300
Tel: +886 3 5731876 Fax: +886 3 5715407
E-mail: ssp@cc.nctu.edu.tw
URL: http://dsns.cs.nctu.edu.tw/ssp


For Prospective Student:

Please feel free to browse my website to get an idea what we are working on. Some of the webpages may be old, but they can still give an rough idea. Basically we now work mainly on two areas:

  1. Malware Analysis: This research work studies the malware behaviors on Windows and Android. The analysis is mainly conducted on the cloud with virtual machines.
  2. Network Security: This research work studies naming and authentication of Future Internet. Within Future Internet Architecture (FIT), DNSSEC (Domain Name Service Security Extension) and IoT (Internet of Things) will play the pivotal roles. In the research work, we will investigate the further extension of DNSSEC to support IoT naming, identification and authentication.

Past Postions
    Chair, Dept. of Computer Science & Information Eng, NCTU
    Visting Professor, Dept. of EECS, UC Berkeley
    Director, Computer and Network Center, NCTU
    Director, GSN-CERT/CC
    President, Chinese Crypto & Information Security Association
    Director, NCTU-Cisco Internet Technology Lab

Education

    Ph. D., Electrical & Computer Engineering, University of Maryland, College Park, May 1991 (Advisor: Virgil Gligor,
    currently the director of  CyLab, Carnegie Mellon University)
    M. S., Electrical
& Computer Engineering, University of Maryland, College Park, June 1986
    B.S., Electrical
& Control Engineering, National Chiao Tung University, June 1982

Directing Labs

  1. Network Security Lab
  2. Taiwan Information Security Center (twisc@NCTU)
Research Interests
  1. Wireless Security ( including Wi-Fi, Wi-Max, 3G/4G and Wireless Sensor Network )
  2. Network Security
  3. Distributed operation systems
  4. Cryptography
Course


          Major Awards and Honors

    • Ÿ  ACM Distinguished Scientist, 2010 (one of the 41 recipients in the world)
    • Ÿ  Excellent Teaching Award, National Chiao Tung University (NCTU), 2012
    • Ÿ  ACM SIGSAC Service Award, 2012
    • Ÿ  Distinguished patent award, ITRI, 2012
    • Ÿ  National Science Council Elite Research Project Award, 2011
    • Ÿ  2011 RS Chapter Award 1st place
    • Ÿ  Best Paper Award, Cryptology and Information Security Conference, 2010
    • Ÿ  2010 Taipei Section Outstanding Chapter Award.
    • Ÿ  2010 RS Chapter Award 1st place
    • Ÿ  2010 Taipei Section Outstanding Membership Development Award.
    • Ÿ  Outstanding Research Project Award, CSIST, 2009
    • Ÿ  2009 RS Chapter Award 1st place
    • Ÿ  2008 RS Chapter Award 3rd place
    • Ÿ  ACM Service Award, 2006
    • Ÿ  Excellent Research Award, National Science Council, 2005
    • Ÿ  Distinguished Information Technology Award (the highest honor for computer scientists in Taiwan), bestowed by State           Department, Taiwan, Dec. 2000 (presented by Taiwan Vice President).  
    • Ÿ  Outstanding Research Award, National Chiao Tung Univ., 2000.
    • Ÿ  Best Paper Award, International Workshop on Social and Legal Aspects under Emerging Computing Environments, held at       Athens, Greece, June 8-13, 2008 (published by IEEE Press).
    • Ÿ  Outstanding Research Award, National Science Council, runner-up, 2000.
    • Ÿ  Best paper award, Chinese Information Association/ACM Taipei Chapter, 1999.
    • Ÿ  Best paper award, Chinese Cryptology & Information Security Association, 2000.
    • Ÿ  Recipient of the 1999 National Distinguished Computer and Information Product of the Year, Taiwan.
    • Ÿ  Recipient of IBM IRAD (Independent Research and Development) of the Year, Maryland, USA,1990.
    • Ÿ  Best Honorary teacher, NCTU, runner-up (2nd place), 1998.
    • Ÿ  Program Chairs/General Chairs of numerous conferences.
    • Ÿ  New Star Award, Taipei Computer Expo, 1996
    • Ÿ  Gold Award, NCTU Research Contest, 1995.
    • Ÿ  Gold Award, Programming Contest, Ministry of Education, 1996
    • Ÿ  Invention Award, National Science Council, 2001
    • Ÿ  Gold Award, NCTU Research Contest, 2004
    • Ÿ  Gold Award, Research Contest, Ministry of Education, 2004
    • Ÿ  Invention Award, National Science Council, 2004

  Editorial Board

    • Ÿ  Editor-in-Chief, RS Newsletter, 2011/1-present
    • Ÿ  Associate Editor, Transactions on Reliability, 2008-present
    • Ÿ  Associate Editor, Transactions on Dependable and Secure Computing, 2007-2011
    • Ÿ  Editor, ACM Transactions on Information and System Security, 2003- 2008
    • Ÿ  Guest Editor, Internet Computing, “Security for P2P and Ad Hoc Networks,” 2004-2005.
    • Ÿ  Guest Editor, TR Special Section on Trustworthy Computing, 2013
    • Ÿ  Guest Editor, TR Special Section on Software, system and Information Reliability, 2013
    • Ÿ  Guest Editor, TR Special Section on Software Security and Reliability, 2012
    • Ÿ  Editor, Journal of Computer Security, IOS Press, 2002 - present.
    • Ÿ  Editor, Journal of Information Science and Engineering, 2000 - 2006.
    • Ÿ  Editor, Journal of Computer and Information Security, 2004 - 2006
    • Ÿ  Guest Editor, IEEE Internet Computing, 2004
    • Ÿ  Guest Editor, Electronics Magazine, special issue on Internetworking, May & June 2000.

           Conference Committees

    • Ÿ  Founding Steering Committee Chair, ACM Symposium on Information, Computer and Communications Security (AsiaCCS), 2006-2013
    • Ÿ  Program Chair, IEEE Conference on Software Security and Reliability (SERE), 2012, 2013
    • Ÿ  Program Chair, IEEE Workshop on Information Assurance, 2012
    • Ÿ  Student Program Chair, IEEE International Symposium on Software Reliability Engineering, 2012
    • Ÿ  Founding Steering Committee Member, IEEE Conference on Communications and Network Security, 2012-
    • Ÿ  Publicity Chair, IEEE Conference on Secure Software Integration and Reliability Improvement, 2009
    • Ÿ  Program Chair, IEEE Workshop on Advanced Development in Software and Systems Security, 2003
    • Ÿ  Publication Chair, IEEE Conference on Parallel and Distributed Systems, 1994.
    • Ÿ  ACM SIGSAC Election Committee Member, 2012
    • Ÿ  ACM SIGSAC Award Committee Member, 2011
    • Ÿ  Steering Committee member, ACM Special Interests Group on Security, Audit and Control (SIGSAC), 2005-2008
    • Ÿ  Founding Program Chair, ACM Symposium on Information, Computer and Communications Security, March 2006
    • Ÿ  Steering Committee member, Asiacrypt, 2003-2008
    • Ÿ  General Chair, Information Security Conference, June 2004, 2005.
    • Ÿ  Program Chair, 2003 IEEE International Workshop on Advanced Development in Software and System Security, Dec. 2003
    • Ÿ  Program Chair, IWAP’2002, Oct 30 – Nov. 1, 2002.
    • Ÿ  Program Chairman, 1999 Mobile Computing Conference, April 1999.
    • Ÿ  Program Chair, ICS’2002, Dec. 2002/11/4
    • Ÿ  Advisory Committee Member, TANET (1998-2001)
    • Ÿ  General Chair, Workshop on Network Security Technology, May 1998.
    • Ÿ  Program Chair, Information Security Conference, May 1997.
    • Ÿ  Publication Chair, International Conference on Computer Systems for Industrial Applications, April, 1996.
    • Ÿ  Publication Chair, International Conference on High Performance Computer Systems, July, 1995.
    • Ÿ  Publication Chair, IEEE International Conference on Parallel and Distributed Systems, Dec., 1994.
    • Ÿ  Publication Chairman, International Computer Symposiums, Dec., 1994.
    • Ÿ  Session Chairman, International Computer Symposiums, 1994
    • Ÿ  Session Chairman, IS'COMM, 1993
    • Ÿ  Panelist, RAM’98,
    • Ÿ PC member, CCS(Flagship conference of ACM; 1996, 2000, 2003, 2006-2009), AsiaCCS (2006-2013), IEEE/IFIP DSN2007, ISSRE2012; DSN(2005-2007); TSPUC(2005-2007); SUTC2006; SecComm2005; DCCS2005, ISPEC2005, IWAP2004, Asiacrypt2003, NSW2002, ICIST2002, ACMCIS2001, NCS1999, IWCTEC1999, ISC(1993-1997), ICS1996

          Representative Publication List (Journal)

    1.  Chia-Wei Wang, Chung-Kwan Chen, Shiuhpyng Shieh, “The Achilles Heel of Antivirus,” IEEE Reliability Digest, Nov. 2014
    2. Chi-Wei Wang, Chia-Wei Wang, Chu-An Hsieh, Shiuhpyng Shieh, “Cloudebug: An Online, Interactive, and Programmable Malware Testbed,” IEEE Computer, July 2014
    3. Michael Cheng Yi Cho, Pokai Chen, and Shiuhpyng Shieh, “Dmail: A Globally Authenticated Email Service,” IEEE Computer, May 2014
    4. Michael Cheng Yi Cho, Chia-Wei Hsu, Shiuhpyng Winston Shieh, Chi-Wei Wang, “Can Malware be Exterminated by Better Understanding its Roots?” accepted for publication, IEEE IT Professional2013.
    5.  Jia-Chun Lin, Shiuhyng Shieh, Chia-Wei Hsu, “Proactive Distributed Digital Evidence Preservation with Tamper Resistance, Perfect Secrecy and High Survivability,” accepted for publication, Journal of Information Science and Engineering, 2013.
    6.  Chi-Wei Wang, Chong-Kuan Chen,Chia-Wei Wang, Shiuhpyng Shieh, “MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern accepted for publication, Journal of Information Science and Engineering, 2013
    7. LY, Yeh, Y.L. Huang, S.P. Shieh, Anthony Joseph, “A Batch Authenticated and Key Agreement Framework for P2P-based Online Social Networks,” IEEE Transactions on Vehicular Technology, May 2012.
    8. Yu-Lung Huang, Chiya Shen, Shiuhpyng Shieh, "S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks," IEEE Transactions on Vehicular Technology, Volume 60, Issue 9, Nov. 2011, PP. 4509 – 4519.
    9. Vic Hsu, C.W. Wang, Shiuhpyng Shieh, “Reliability and Security of Large Scale Data Storage in Cloud Computing,” IEEE Reliability Society ATR, 2011.
    10. Pokai Chen, Shiuhpyng Shieh, “Security for Future Internet Architecture - Motivation from DNSSEC,” IEEE Reliability Society ATR, 2011.
    11. Minghao Yang, Shiuhpyng Shieh, “Tracing Anonymous Mobile Attackers in Wireless Network,” Journal of Digital Content Technology and its Applications, Volume 4, Number 4, pp. 161 ~ 173, July 2010
    12. Shih-I Huang, Shiuhpyng Shieh, “Secure Encrypted-Data Aggregation for Wireless Sensor Networks,” ACM Journal of Wireless Networks, Volume 16 Issue 4, pp. 915-927, May 2010
    13. Chi-Wei Wang, Shiuhpyng Shieh, “The Evolution of Fine-Grain Malware Behavior Analysis - From  Static to Dynamic,” IEEE Reliability Society ATR, 2010.
    14.  Shih-I Huang, Shiuhpyng Shieh, “Authentication and secret search mechanisms for RFID-aware wireless sensor networks,” International Journal of Security and Networks, Volume 5, Number1, pp. 15 – 25, 2010
    15. Jia-Ning Luo, Shiuhpyng Shieh, and Ji-Chiang Shen, “Secure Authentication Protocols Resistant to Guessing Attacks,” Journal of Information Science and Engineering, Vol.22 No. 5, September 2006, pp. 1125-1143.
    16. Fu-Yuan Lee, Shiuhpyng Shieh, "Packet Classification Using Diagonal-Based Tuple Space Search," Computer Networks. Volume 50, Issue 9 , 20 June 2006, Pages 1406-1423
    17.  Shiuhpyng Shieh, Dan Wallach, “Secure Overlay Network,” IEEE Internet Computing, Nov/Dec, 2005.
    18.  Yu-Lun Huang, Shiuh-Pyng Shieh, Jian-Chyuan Wang, "Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems," IEEE Transactions on Multimedia. Vol. 6, Oct. 2004, pp. 760- 769.
    19.  Shiuh-Pyng Shieh, Yea-Ching Tsai, Yu-Lun Huang, "Optimal Information Dispersal for Fault-Tolerant Communications over Burst Error Channel," IEEE Transactions on Reliability, Vol. 52, Issue 3, Sep. 2003, pp. 354-366.
    20. Shiuhpyng Shieh, Weng-Her Yang, “Protecting Network Users in Mobile Code Systems,” Journal of Parallel and Distributed Computing, Vol. 64, Issue 2, February 2004, pp.191 – 200.
    21. Fu-Yuan Lee, Shiuhpyng Shieh, “Scalable and lighterweight Key Distribution for Secure Group Communications,” ACM/PH International Journal of Network Management, Vol.  14, Issue 3, May 2004, pp. 167 – 176.
    22. Fu-Yuan Lee, Shiuhpyng Shieh, “Accelerating Network Security Services with Fast Packet Classification,” Computer Communications, 2004, pp.1637-1646
    23.  Shu-Min Cheng, Shiuhpyng Shieh, Weng-Her Yang, Fu-Yuan Lee, Jia-Ning Luo, “Designing Authentication Protocols for Third Generation Mobile Communications Systems,” Journal of Information Science and Engineering, Vol. 21 No. 2, March 2005, pp. 361-378
    24. C.F. Lu, Shiuhpyng Shieh, “Re-keying Protocols in Symmetric Cryptosystems,” , Journal of Discrete Mathematical Sciences and Cryptography.volume 7, 2004 , p23~p27. 
    25. C.F. Lu, Shiuhpyng Shieh, “Efficient Key Evolving Protocol for GQ Signature Scheme,” Journal of Information Science and Engineering. Vol. 20 No. 4, July 2004, pp.679-706.
    26.  C.F. Lu, Shiuhpyng Shieh, “Secure Key-Evolving for Public Key Cryptosystems Based on the Discrete Logarithm Problem,” Journal of Information Science and Engineering, Vol. 20 No. 2, March 2004, pp. 391-400.
    27.  Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh, Shen-Hsuan Wang, “Source-end Defense System against DDoS Attacks,” book chapter, Computer Security in the 21st Century, published by Springer, Feb. 2005, pp. 147-167.
    28.  Shih-I Huang, Shiuhpyng Shieh, Shang-Yen Wu, “Adaptive Random Key distribution Schemes for Wireless Sensor Network,” book chapter, Computer Security in the 21st Century, published by Springer, Feb. 2005, pp.91-102.
    29.  Wen-Her Yang, and Shiuh-Pyng Shieh, "Secure Key Agreement for Group Communications," ACM/PH International Journal of Network Management, Vol. 11, No 6, Nov-Dec 2001.
    30.  Wen-Her Yang, Kai-Wei Fan and Shiuh-Pyng Shieh, "A secure multicast protocol for the internets multicast backbone," ACM/PH International Journal of Network Management vol. 11, Issue 2, page 129-136, Mar/April 2001.
    31. S.P. Shieh, Y.L. Huang, F.S. Ho, J.N. Luo, "Network Address Translators: Effects on Security Protocols and Applications in the TCP/IP Stack," IEEE Internet Computing, Nov./Dec. 2000.
    32.  S.P. Shieh, C.T. Lin, W.B. Yang, H.M.Sun, "Digital Multisignature Schemes for Authenticating Delegates in Mobile Code Systems," IEEE Trans. on Vehicular Technology, August 2000, NSC-85-2622-E-009-006R.
    33.  Y.L. Huang, S.P. Shieh, F.S. Ho, "A Generic Electronic Payment Model Supporting Multiple Merchant Transactions," Vol 19, No. 5, Computers and Security, 2000, pp. 453-465.
    34. S.L. Chang, S.P. Shieh, C.H. Jong, "A Security Testing System for Vulnerability Detection," Vol. 12 No. 1, Journal of Computers, 2000, pp. 7-21.
    35.  C.T. Lin, S.P. Shieh, "Chain Authentication in Mobile Communication Systems," Vol. 13, Journal of Telecommunication Systems, 2000.
    36.  S.P. Shieh, C.T. Lin, W.H. Yang, "Information Protection in Dynamic Statistical Databases " Vo. 43, Encyclopedia of Computer Science and Technology, 2000, pp.97-112.
    37.  I.J. Shue, S.P. Shieh, “Playback dispatch and Fault Recovery for a Clustered Video System with Multiple Servers," Journal of Multimedia Tools and Applications, Vol. 9, Issue 3, Nov. 1999, pp. 277-294.
    38.  Hung-Min Sun and S. P. Shieh, "Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures," Journal of Information Science & Engineering, Vol. 15, No. 5, Sep.1999, pp. 679-690.
    39.  F.S. Ho, S.P. Shieh, Y.L. Huang, “An Efficient Authentication Protocol for Mobile Networks," Journal of Information Science and Engineering, Vol.15 No.4, July 1999, pp.505-520.
    40.  I.J. Shyu, S.P. Shieh, “A Distributed Fault-Tolerant Design for Multiple-Server VOD systems,” Journal of Multimedia Tools and Applications, March 1999, pp. 219-248.
    41. S.P. Shieh, C.T. Lin, “Auditing User Queries in Dynamic Statistical Databases," Journal of Information Science, Vol. 113, Jan. 1999, pp. 131-146, NSC 85-2213-E00 9-032.
    42.  S.P. Shieh, “Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems,” Journal of Information Science and Engineering, Vol.15 No.1, January 1999, pp.91-106, NSC85-2622-E-009-006R.
    43.  S.P. Shieh, C.T. Lin, S.Y. Wu, “Optimal Assignment of Mobile Agents for Software Authorization and Protection (COMCOM1223)," Computer Communications, Vol. 22, Jan. 1999, pp. 46-55.
    44. H.M. Sun, S.P. Shieh, "A note on breaking and repairing a secure broadcasting in large networks," Computer Communications, Vol. 22, 1999, pp. 193-194.
    45. C.T. Lin, S.P. Shieh, W.H. Yang, "Secure Authentication Protocols Resistant to Guessing Attacks," IICM, 1999.
    46. W.H. Yang, S.P. Shieh, "Password Authentication Schemes with Smart Cards," Computers and Security, Vol. 18, No. 8, 1999, pp. 727-734.
    47.  Hung-Min Sun and S. P. Shieh, "Secret Sharing Schemes for Graph-Based Prohibited Structures," Computers and Mathematics with Applications, Vol. 36, No. 7, Oct. 1998, pp. 131-140.
    48.  I.J. Shue, S.P. Shieh, “Balancing Workload and Recovery Load on Distributed Fault-Tolerant VOD Systems," IEEE Communications Letters,, Vol. 2, No. 10, Oct. 1998, pp. 288-290.
    49.  S.P. Shieh, I.J. Shyu, C.Y. Shen, “Wide Address Translation and Protection for Single Address Space Operating Systems,” Proceedings of the National Science Council, Vol. 22, No. 5, September 1998, pp. 601-616, NSC 85-2221-E009-039.
    50. H.M. Sun, S.P. Shieh, “Secure Broadcasting in Large Networks," Computer Communications, March 1998, pp. 279-283.
    51.  H.M. Sun, S.P. Shieh, “Optimal Information Dispersal for Increasing Reliability of a Distributed Service,” IEEE Transactions on Reliability, Dec. 1997, pp. 462-472, NSC 85-2213-E-009-032.
    52.  S.P. Shieh, F.S. Ho, “A Comment on A Total Ordering Multicast Protocol,” IEEE Transactions on Parallel and Distributed Systems, October 1997.
    53.  S.P. Shieh, V. D. Gligor,  “On a Pattern-Oriented Model for Intrusion Detection," IEEE Transactions on Data and Knowledge Engineering, Vol. 9, No. 4, August 1997, pp. 661-667, NSC 85-2213-E-009-032.
    54. S.P. Shieh, W.H. Yang, H.M. Sun, “An Authentication Protocol with Trusted Third Party,” IEEE Communications Letters, Vol 1, No. 3, May 1997, pp. 87-89.
    55. S.P. Shieh, V.D Gligor, “Detecting Illicit Information Leakage in Operating Systems," Journal of Computer Security, April 1997, pp. 123-148, NSC 85-2213-E-009-032. 
    56. H.M. Sun, S.P. Shieh, “Efficient Construct of On-Line Multiple Secret Sharing Schemes,” Journal of Computers, Dec. 1996, pp. 49-56.
    57. S.P. Shieh, W.H. Yang, “An Authentication and Key Distribution System for Open Network Systems," ACM Operating Systems Review, April 1996, pp 32-41, NSC 85-2213-E-009-032.
    58. H.M. Sun, S.P. Shieh, “An Efficient Construction of Perfect Secret Sharing Schemes for Graph-Based Access Structures," Computer & Mathematics with Applications, April 1996, pp. 129-135, NSC 84-2213-E-009-081. 
    59.  I.J. Shyu, S.P. Shieh, “Virtual Address Translation for Wide Address Architectures," ACM Operating Systems Review, Vol. 29, No. 2, October 1995, pp 37 - 46, NSC 84-2221-E-009-001.
    60.  S.P. Shieh, “A Distributed Intrusion Detection Model," Journal of Computers, Vol 6, No 4, December, 1994, pp 24-34, TL 83-5206.
    61. H.M. Sun, S.P. Shieh, “A Construction of Dynamic Threshold Schemes," Electronic Letters, November 1994, pp 2023 - 2025, NSC 84-2213-E-009-081.
    62.  H.M. Sun, S.P. Shieh, “On Dynamic Threshold Schemes," Information Processing Letters 52, 1994, pp 201-206, NSC 84-2213-E-009-081.
    63. S.P. Shieh, J.N. Cheng, “Specification, Validation and Verification of Time-Critical Systems," , Computer Communications, Vol. 21, No. 5, May 1998, pp. 460-469, NSC85-2213-E-009-032.
    64. H.M. Sun, S.P. Shieh, “Recursive Construction of Perfect Secret Sharing Schemes,” Computer & Mathematics with Applications, 1999, pp. 87-96.
          Books:
    1.  D.T. Lee, S.P. Shieh, Doug Tygar, “Computer Security in 21 Century,” Springer, Feb. 2005.
    2.  Shiuhpyng Shieh, et al, “Intrusion, Detection and Prevention, Illustrated,” published by NSC, Dec. 2004.
    3.  Shiuhpyng Shieh, et al, “System and Network Security,” published by NSC, Jan. 2004.
    4. Gligor, V. D., and Shieh, S. P., et al, A Guide to Understanding Covert Channel Analysis of Trusted Systems, NCSC-TG-030, National Computer Security Center, USA, November 1993
    5.  S.P. Shieh, et al, “Security Infrastructure for Government Document Exchange,” published by RDEC, 1996.
    6.  S.P. Shieh, “An Information and Privilege Flow Model for Intrusion Detection in Computer Systems," Ph.D. Dissertation, University of Maryland, College Park, MD, June 1991.
    7.  S.P. Shieh, “A Survey of Supercomputers," Technical Report, University of Maryland, College Park, March, 1986.
    8.  S.P. Shieh, J.S. He, “The Automation of Covert Channel Analysis," IBM Independent Research and Development report, 1990.
    9.  S.P. Shieh, “Intrusion Detection in Multilevel Secure Systems," IBM Independent Research and Development report, 1991.
         Patents: 
    1. C.W. Wang, S.P. Shieh, Y.R. Liu,Method for Decoupling System-Wide Information Flow Tracking for Malware Analysis and Its Applications,” Taiwan patent pending
    2. C.W. Wang, S.P. Shieh, Y.R. Liu, “Decoupled Method for Tracking Information Flow And Computer System Thereof,” US patent pending, 2012
    3.  C.W. Hsu, B.H. Lee, S.P. ShiehMethod and System for VM-Aware Malware Detection, Taiwan patent pending, 2012
    4.  S.I. Huang, S.P. Shieh, C.W. Wang, “Light-Weight Authentication and Secret Retrieval Scheme and Its Applications,” US patent pending no. US 2010/0042842 A1, Aug. 12, 2008.
    5. S.I. Huang, S.P. Shieh, C.W. Wang, “Light-Weight Authentication and Secret Retrieval Scheme and Its Applications,” ROC patent pending no. 097139529, 2008.
    6. S.I. Huang, S.P. Shieh, “Method and System for Secure Data Aggregation in Wireless Sensor Networks,” US patent no. 8027474, 2011.9.27
    7. S.I. Huang, S.P. Shieh, “Method and System for Secure Data Aggregation in Wireless Sensor Networks,” ROC patent no. I350086. 10, 2011
    8.  S.I. Huang, S.P. Shieh, “Method and System for Secure Data Aggregation in Wireless Sensor Networks,” China patent number ZL200710301500.9, 2011
    9. S.P. Shieh, "Multisignature Scheme with Message Recovery for Group Authorization in Mobile Networks,"  ROC patent no. 1248744, Feb. 2006.
    10.  S.P. Shieh, "Clustered Architecture for High Speed IPsec Gateway," ROC patent no. 1227082, Jan. 2005.
    11. S.P. Shieh, Y.L. Huang, “Smart Card-Based Key Distribution Schemes in Conditional Access Systems,” ROC patent no. 203525, May 2004 – Oct. 2022.
    12. S.P. Shieh, “Synchronous Method and System for Processing a Packet," US patent pending no. 101742064, 2004.
    13.  S.P. Shieh, "Clustered Architecture for High Speed IPsec Gateway," China patent pending no. 03148124.8, 2004.
    14.  S.P. Shieh, et al, “A Generic Secure Payment Method Supporting Multiple Merchants Transactions and Its Applications,” ROC patent no. 87148006, Dec.1999.
    15.  S.P. Shieh, et al, “An Authentication System for Computer Networks," ROC patent no. 079094, 1996. The patent includes four systems: secure Telnet system, secure Rlogin system, secure Ftp system, and the network monitor system.
          Conference Papers: 
    1.  Chung-Kwan Chen, Wei-Chi Chen, Vic Hsu, Shiuhyng Shieh, “Mutant Malware Discovery and Behavior Analysis for Cyber Crime Investigation,” Crypto and Information Security Conference, 2012.
    2.  Yun-Min Cheng, Bing-Han Li and Shiuhpyng Shieh, “Accelerating Taint-based Concolic Testing by Pruning Pointer Overtaint,” IEEE Conference on Software Security and Reliability (SERE), Washington DC, June 2012.
    3. Chia-Ming Fan, Bing-Han Li, Shiuhpyng Shieh, “On The Security of Password-Based Pairing Protocol in Bluetooth” The 13th Asia-Pacific Network Operations and Management Symposium, (APNOMS 2011), 2011
    4. Yen-Ru Liu, C.W. Wang, J.W. Hsu, T.C. Tseng, S.P. Shieh, “Extracting Hidden Code from Packed Malware based on Virtual Machine Memory Comparison,”  21th Cryptology and Information Security Conference (CISC 2011), 2011.
    5.  Bing-Han Li, Shiuhpyng Shieh, “RELEASE: Generating Exploits Using Loop-Aware Concolic Execution,” IEEE Conference on Secure Software Integration and Reliability Improvement, June 2011.
    6.  Wei Shi-Sue, Shiuhpyng Shieh, Bing-Han Li, Michael Cheng Yi Cho and Chin-Wei Tien, "A Framework Using Fingerprinting for Signal Overlapping-Based Method in WLAN," the International Computer Symposium on Computer Networks and Web Technologies (ICS 2010), Dec. 16-18, 2010..
    7. Chia-Wei Hsu, Shiuhpyng Shieh, "FREE: A Fine-grain Replaying Executions by Using Emulation", The 20th Cryptology and Information Security Conference (CISC 2010), 2010. (Best Student Paper Award)
    8. C.W. Wang, J.W. Wang, C.W. Hsu, S.P. Shieh, “FREE: A Fine-grain Replaying Executions by Using Emulation, " Cryptology and Information Security Conference, 2010 (Best paper award)
    9. Yu-Lung Huang, Chih-Ya Shen, Shiuhpyng Shieh, Hung-jui Wang, Cheng-Chun Lin, “Provable Secure AKA Scheme with Reliable Key Delegation in UMTS,” IEEE Conference on Secure Software Integration and Reliability Improvement, 2009
    10.  Yu-Lung, Hsiaoying Lin, Doug Tygar, Shiuhpyng Shieh, “SWOON: A Testbed for Secure Wireless Overlay Networks,” USENIX Workshop on Cyber Security Experimentation and Test (CSET 2008), 2008
    11.  Lian Lee, Shiuhpyng Shieh, “Protecting User Privacy with Dynamic Identity-Based Scheme for Low-cost Passive RFID Tags,” Information Security Conference, May 2008.
    12. Warren W. Lin, Shiuhpyng Shieh, Jia-Chun Lin, “Lightweight, Distributed Key Agreement Protocol for Wireless Sensor Networks,” IEEE Conference on Secure System Integration and Reliability Improvement, Yokohama, Japan, July 14-17, 2008 (co-sponsored by IEEE Reliability Society and IEEE System, Man, and Cybernetics Society, published by IEEE Press).
    13. Che-Cheng Lin, Shiuhpyng Shieh, Jia-Chun Lin, “A Pollution Attack Resistant Multicast Authentication Scheme Tolerant to Packet Loss,” IEEE Conference on Secure System Integration and Reliability Improvement, Yokohama, Japan, July 14-17, 2008 (co-sponsored by IEEE Reliability Society and IEEE System, Man, and Cybernetics Society, published by IEEE Press).
    14. Ming-Hao Yang, Shiuhpyng Shieh, "Tracing Mobile Attackers in Wireless Ad-hoc Network," IEEE International Workshop on Social and Legal Aspects under Emerging Computing Environments, held at Athens, Greece, June 8-13, 2008 (Best Paper Award, published by IEEE Press).
    15.  S.I. Huang, Shiuhpyng Shieh, “SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks,” IEEE International Conference on Computational Intelligence and Security (IEEE CIS), Dec. 2007.
    16. C.H. Jiang, Shiuhpyng Shieh, Rachel Liu, “Keystroke Statistical Learning Model for Web Authentication,” ACM Symposium on Information, Computer and Communications Security, Singapore, 2007.
    17. Tanya Roosta, Shiuhpyng Shieh, Shankar Sastry, “Taxonomy of Security Attacks in Sensor Networks and Countermeasures,” IEEE International Conference on System Integration and Reliability Improvements, Hanoi, Vietnam, 13-15 December 2006
    18.  Zhi-Kai Zhang, Tze-Yau William Huang, Shiuhpyng Shieh, “Controlling Various Platforms for Test Automation,” IEEE International Conference on System Integration and Reliability Improvements, Hanoi, Vietnam, 13-15 December 2006
    19. Yang Tzu-I and S. P. Shieh and WarrenWolfe-Jen Lin and Li-Joe Lin, “A Path Authentication Scheme for Routing Disruption Attack Prevention in Ad Hoc Networks,” 2006 IEEE International Conference on Systems, Man, and Cybernetics, Oct. 2006.
    20.  Shiuhpyng Shieh, “Defending against DDoS Attacks,” High Tech Forum – e-Security, Oct. 21-22, 2005.
    21. Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, “An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks,” ACM Symposium on Information, Computer and Communications Security, 2006.
    22. Ya-Jeng Lin, Shiuhpyng Shieh, “Lightweght, Pollution-Attack Resistant Multicast Authentication Scheme,” ACM Symposium on Information, Computer and Communications Security, 2006.
    23.  Shih-I Huang, Shiuhpyng Shieh, “Secret Searching in Wireless Sensor Networks with RFIDs,” Information Security Conference, June 2005, pp. 237 – 244.
    24. Kang_Hsien Chou, Shiuhpyng Shieh, Ming-How Yang, and Fu-Yuan Lee, “Marking-Based Source Identification Scheme for Defending Against DDoS Attacks,” Information Security Conference, 2004
    25. Fu-Yuan Lee, Shiuhpyng Shieh and Ming-How Yang, “Tracing the Origin of Single-Packet Attacks,” Information Security Conference, 2004
    26.  Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh, Shen-Hsuan Wang, “Source-end Defense System against DDoS Attacks,” International Workshop on Advanced Developments in Software and Systems Security, pp31-35, 2003
    27.  Shih-I Huang, Shiuhpyng Shieh, Shang-Yen Wu, “Adaptive Random Key distribution Schemes for Wireless Sensor Network,” International Workshop on Advanced Developments in Software and Systems Security, pp61-65, 2003.
    28.  Shiuhpyng Shieh, Fu-Yuan Lee, “Fast Packet Classification for Improving the Performance of Secure Network Services,” Information Security Conference, 2003.
    29.  Shiuhpyng Shieh, Yung-Zen Lai, Ya-Ting Chang and Fu-Yuan Lee, "Clustered Architecture for High-Speed IPsec Gateway," ICS'2002.
    30.  Chang-Han Jong, Shiuh-Pyng Shieh and Jia-Ning Luo, "Detecting Distributed DoS/Scanning by Anomaly Distribution of Packet Fields," ICS'2002.
    31.  Fu-Yuan Lee, Shiuhpyng Shieh and Lin-Yi Wu, "Address Sharing Enabled Mobile IP Utilizing NAPT," ICS'2002.
    32.  Fu-Shen Ho, Shiuhpyng Shieh, Y.L. Huang and K.L. Tsai, "A Service Probing and Channel Establishment Protocol Across Multiple Network Access Translation Realms,"  ICS'2002.
    33.  Shiuhpyng Shieh, Shih-I Huang and Fu-Shen Ho, "An ID-based Proxy Authentication Protocol Supporting Public Key Infrastructure," IWAP'2002
    34. Jia-Ning Luo, Shiuh-Pyng Shieh, "The Multi-layer RSIP Framework," The 9th IEEE International Conference on Networks, ICON'2001. Bangkok, Thailand, October 2001.
    35. Cheng-Fen Lu, Shiuh-Pyng Shieh, "Secure Key Evolving Protocols for Discrete Logarithm Schemes," RSA conference, Feb 2002.
    36. C.H. Chun, S.P. Shieh, “GSN-CERT and Computer Emergency Response,” Chinese-France Conference on Information Technology, March 2000
    37.  S.P. Shieh, Y.L. Huang, J.C. Wang, "Practical Key Distribution Schemes for Pay TV Channel Protection," IEEE International Computer Software and Applications Conference (COMPSAC'2000), Nov. 2000.
    38.  S.M. Cheng, W.H. Yang, S.P. Shieh, "A Flexible Authentication for Next Generation Mobile Communications," 6th Mobile Computing Workshop, pp. 67-73, March 2000.
    39.   W.H. Yang, K.W. Fan, S.P. Shieh, "A Scalable and Secure Multicast Protocol on M-bone Environments," Information Security Conference, May 2000.
    40. W.H. Yang, S.P. Shieh, "An Efficient Key Agreement Protocol for Secure Group Communications," Information Security Conference, May 2000.
    41. Y.L. Huang, S.P. Shieh, "A Fair Settlement Protocol for Online Transactions," Information Security Conference, May 2000.
    42. J.N. Luo, S.P. Shieh, "A Transparent and Efficient Mechanism for File System Protection," Information Security Conference, May 2000.
    43.  W.H. Yang, S.P. Shieh, "Enhancing Security and Flexibility of Password Authentication with ID-based Cryptosystems," Information Security Conference, May 1999.
    44.  C.T. Lin, S.P. Shieh, "A Secure Communication Protocol for Telecommunications Management Networks," Information Security Conference, May 1999.
    45.  C.T. Lin, S.P. Shieh, "An Efficient and Secure Credit Card-Based Billing Scheme for Telephone Services," Mobile Computing Workshop, March 1999, pp. 28-34.
    46. H.M. Sun, S.P. Shieh, "On Private-Key Cryptosystems Based on Product Codes," ACISP'98, Australia, July 1998.
    47. S.P. Shieh, C.T. Lin, Y.S. Juang, "Controlling Inference and information Flows in Secure Databases," 1998 Information Security Conference, May 1998.
    48. S.P. Shieh, C.T. Lin, S.Y. Wu, "A Software Authorization and Protection Model for Mobile Code Systems," 1998 International Symposium on Internet Technology, April 1998.
    49. S.P. Shieh, C.T. Lin, M.J. Peng, W.C. Yang, J.N. Yang, “A Secure Credit-Card Based Billing Schemes for Telephone Services,” International Conference on Mobile Computing, March 1998.
    50.  H.M. Sun, S.P. Shieh, “On-Line Secret Sharing Based on a One-Way Function,” 1998 Information Security Conference, May 1998.
    51.  H.M. Sun, S.P. Shieh, “A Secure Broadcasting Cryptosystem in Large Computer Networks,” 1998 Information Security Conference, May 1998.
    52. H.M. Sun, S.P. Shieh, “On Private-Key Cryptosystems Based on Product Codes,” Australia Information Security and Privacy Conference, July 1998.
    53. S.P. Shieh, C.T. Lin, Y.S. Juang, “Controlling Inference and information Flows in Secure Databases,” 1998 Information Security Conference, May 1998.
    54. S.P. Shieh, C.T. Lin, S.Y. Wu, “A Software Authorization and Protection Model for Mobile Code Systems," 1998 International Symposium on Internet Technology, April 1998.
    55.  I.J. Shue, S.P. Shieh, “Load-Balanced Playback Dispatch for Fault-Tolerant Multi-Server VOD Systems,” 1997 Workshop on Real-Time and Media Systems, July 30-31, 1997.
    56.  S.P. Shieh, J.N. Luo, “A Secure Mail System for Mobile Users in the Internet,” International Conference on Mobile Computing, March 1997.
    57.  F.S. Ho, S.P. Shieh, “An Efficient Authentication for Mobile Networks,” International Conference on Computer System Technologies for Industrial Applications, April 1997.
    58.  H.M. Sun, S.P. Shieh, “On the Information Rate of Perfect Secret Sharing Schemes with Access Structures of Rank Three,” Conference on Information Security, May 1997.
    59. C.F. Lu, S.P. Shieh, “An Anonymous Fair Credit Card Payment System,” Conference on Information Security, May 1997.
    60. M.J. Pong, S.P. Shieh, W.C. Yang, J.N. Yang, “Billing Schemes for Secure Telephony over Public Communication Networks,” Conference on Information Security, May 1997.
    61. H.M. Sun, S.P. Shieh, “Secret Sharing in Graph-Based Prohibited Structures," 1997 IEEE International Conference on Computer Communications (INFOCOM'97), Kobe, Japan, April 7-11, 1997.
    62. H.M. Sun, S.P. Shieh, “Crypto-analysis of Private-Key Schemes Based on Burst-Error-Correcting Codes," the Proceedings of ACM International Conference on Computer and Communications Security, March 14-16, 1996.
    63. S.P. Shieh, Y.L. Huang, F.S. Ho, “A Family of Secure Network Protocols," the Proceedings of Information Security Conference, May, 1996.
    64. H.M. Sun, S.P. Shieh, “A Perfect Scheme for Secret Sharing between Two Parties," Proceedings of Information Security Conference, May, 1995.
    65. S.P. Shieh, C.T. Lin, R.T. Hsueh, “Secure Communication in Global Systems for Mobile Telecommunications," Proceedings of Mobile Computing Workshop, April 1995.
    66. S.P. Shieh, C.T. Lin, “An Audit Scheme for Inference Control in Statistical Databases," Proceedings of International Conference on Intelligent Information Management Systems, June 1995.
    67. S.P. Shieh, et al, “The Design and Implementation of A MPOS Simulator," Proceedings of the Multiprocessor Systems Workshop, July 1995.
    68.  H.M. Sun, S.P. Shieh, “On Dynamic Threshold Schemes," 4rd Conference on Information Security, May 21, 1994.
    69. S.P. Shieh, H. M. Sun, “On Constructing Secret Sharing Schemes,"  1994 IEEE International Conference on Computer Communications, Networking for Global Communications (INFOCOM'94), Toronto, Canada, June 12-16, 1994.
    70.  I.J. Shyu, S.P. Shieh, “Architectural Support for 64-Bits Address Translation," Proceedings of 1994 International Computer Symposium, Dec., 1994, pp 322 - 327.
    71.  M.R. Chiang, S.P. Shieh, C.L. Liu, “Dynamic Load Balancing in Parallel Simulation Using Time Warp Mechanism," Proceedings of International Conference on Parallel and Distributed Systems, Dec., 1994, pp 222- 227.
    72.  H.M.. Sun, S.P. Shieh, “Optimal Information Dispersal for Reliable Communication in Computer Networks," Proceedings of International Conference on Parallel and Distributed Systems, Dec., 1994, pp 460 -464.
    73.  S.P. Shieh, “Covert Channel Bandwidth Estimation and Measurement," 3rd Conference on Information Security, May 12, 1993.
    74.  S.P. Shieh, “Intrusion Detection in Computer Networks," 3rd Conference on Information Security, May 12, 1993.
    75. S.P. Shieh, H.M. Sun, “A Secret Sharing Scheme for Hierarchical User Groups,"  the 8th International Joint Workshop on Computer Communication (JWCC-8), December 19-21, 1993.
    76. S.P. Shieh, V.D. Gligor, “A Pattern-Oriented Intrusion Detection Model and Its Applications," Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, (May 7-9, 1991), pp 327-342.
    77.  S.P. Shieh, V.D. Gligor, “Auditing the Use of Covert Storage Channels in Secure Systems," Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, (May 1990), pp 285-295. 




Comments