Introduction
Department
Academic Affairs
Admission
HOME > Department > Department of Computer Science and Engineering > Faculty
Introduction Faculty Curriculum
Department of Computer Science and Engineering
Name
Lee, Chang Hoon.
MAJOR
Information Security, Cryptography, Digital Forensic, Cyber Security, Blockchain
TEL
02-970-6712
E-mail
chlee@seoultech.ac.kr
Biography
Ph.D(Korea Univ.)
Research Areas
Information Security, Cryptography, Digital Forensics, IoT Security, FinTech Security
Teaching
Algorithm, Data Structure, Discrete Mathematics, Basic Engineering Design, Programming
/Advanced Information Security, Advanced Algorithm, Topics in Algorithm, Cryptography and Information Security (Theory and Practice)
Selected Publications
[Changhoon Lee - Google Scholar Citations]
http://scholar.google.com/citations?user=w_e5-hQAAAAJ&hl=ko

[Lab - Homepage]
https://cis.seoultech.ac.kr/subList/20000002766
Journal Papers
Changhoon Lee, “Biclique cryptanalysis of PRESENT-80 and PRESENT-128”, The Journal of Supercomputing, Springer US, 28 January 2014, DOI 10.1007/s11227-014-1103-3.

Hang Tu, Neeraj Kumar, Debiao He, Jongsung Kim, Changhoon Lee, “An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks”, The Journal of Supercomputing, Springer.

Sooyoung Park, Hyunji Chung, Changhoon Lee, Sangjin Lee, Kyungho Lee, “Methodology and implementation for tracking the file sharers using BitTorrent”, Multimedia Tools and Applications, 10 December 2013, Springer US.

Mingbiao Li, Naixue Xiong, Bo Yang, Zhonghua Li, Jong Hyuk Park, Changhoon Lee, “Posted Price Model Based on GRS and Its Optimization for Improving Grid Resource Sharing Efficiency”, Telecommunication Systems, 03 August 2013, Springer US.

Kitae Jeong, HyungChul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jong In Lim “Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis”, Peer-to-Peer Networking and Applications, 11 May 2013, Springer US.

Kyung-Soo Lim, Changhoon Lee, Jong Hyuk Park, Sang-Jin Lee, “Test-driven forensic analysis of satellite automotive navigation systems”Journal of Intelligent Manufacturing, 05 June 2012, Springer : DOI : 10.1007/s10845-012-0653-6

Yuhua Liu, Wenwen Dai, Yanzhen Qu, Cui Xu, Naixue Xiong, Changhoon Lee, and Zheng Wan, “Ring and Clustering Routing strategy based on Data Filed in Sensor Network”, Volume 11, Number 9 (September 2013) pp. 1828-1835, Sensor Letter, American Scientific Publishers.

Jinkeon Kang, Kitae Jeong, Seokhie Hong, Changhoon Lee, “Related-Key Amplified Boomerang Attacks on KT-64 and MD-64 Suitable for Wireless Sensor Networks”, Volume 11, Number 9 (September 2013) pp. 1765-1770, Sensor Letter, American Scientific Publishers.

Yuseop Lee, Kitae Jeong, Changhoon Lee, Jaechul Sung and Seokhie Hong, “Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing”, Volume 2014 , Article ID 389476, 10 pages, 2014, Hindawi.

Jewan Bang, Changhoon Lee, Sangjin Lee, Kyungho Lee, “Damaged backup data recovery method for Windows mobile”, The Journal of Supercomputing, November 2013, Volume 66, Issue 2, pp 875-887, Springer.

Yuseop Lee, Kitae Jeong, Jaechul Sung, Changhoon Lee, Seokhie Hong, and Ku-Young Chang, “Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks”, International Journal of Distributed Sensor Networks, Volume 2013 (2013), Article ID 169638, 9 pages. (http://dx.doi.org/10.1155/2013/169638)

Kitae Jeong, Changhoon Lee and Jongin Lim, “Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks”, EURASIP Journal on Wireless Communications and Networking 2013, 2013:151, Published: 3 June 2013. (doi:10.1186/1687-1499-2013-151)

Kyung-Soo Lim, Changhoon Lee, “A Framework for Unified Digital Evidence Management in Security Convergence”, Electronic Commerce Research, September 2013, Volume 13, Issue 3, pp 379-398, Springer US.

Keungi Lee, Changhoon Lee, Sangjin Lee, “On-site investigation methodology for incident response in Windows environments”, Computers & Mathematics with Applications, Volume 65, Issue 9, May 2013, Pages 1413–1420, Elsevier.
◾ A Study on the Improvement of Domestic Policies and Guidelines for Secure AI Services, Journal of The Korea Institute of Information Security and Cryptology, 2023이창훈
◾ Conditional Cube Attack on Lightweight Sycon-AEAD-64, IEEE Internet of Things Journal, 2023이창훈
◾ A Study on the Decryption of Bianlian Ransomware through Reverse Engineering, Journal of Digital Forensics, 2023이창훈
◾ A Study on the Digital Forensics Artifacts Collection and Analysis of Browser Extension-Based Crypto Wall, Journal of The Korea Institute of Information Security and Cryptology, 2023이창훈
◾ A Study on Creating WBC-AES Dummy LUT as a Countermeasure against DCA, Journal of The Korea Institute of Information Security and Cryptology, 2023이창훈
◾ Related-key Neural Distinguisher on Block Ciphers SPECK-32/64, HIGHT and GOST, Journal of Platform Technology, vol.11 No.1 pp.72~84, 2023이창훈
◾ Digital forensic investigation framework for the metaverse, The Journal of Supercomputing, 2023이창훈
◾ Related-Key Amplified Boomerang Attack on Full-Round MM-128, Human-centric Computing and Information Sciences, vol.13, 2023이창훈
◾ Forensic Analysis of Element Instant Messenger Artifacts, Journal of The Korea Institute of Information Security and Cryptology (JKIISC), vol.32 No.6 pp.1113~1120, 2022이창훈
◾ A Cube Attack on a Reduced-Round Sycon, ELECTRONICS, vol.11 No.21, 2022이창훈
◾ A Study on the remote acuisition of HejHome Air Cloud artifacts, Journal of Internet Computing and Services(JICS), vol.23 No.5 pp.69~78, 2022이창훈
◾ CoVAC: A P2P smart contract-based intelligent smart city architecture for vaccine manufacturing, COMPUTERS & INDUSTRIAL ENGINEERING, vol.166 pp.107967~, 2022이창훈
◾ Scalable Lightweight Blockchain-Based Authentication Mechanism for Secure VoIP Communication, HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, vol.12, 2022이창훈
◾ Detection of Adversarial Attacks in AI-Based Intrusion Detection Systems Using Explainable AI, HCIS, vol.11, 2021이창훈
◾ Homomorphic Encryption Based Privacy-Preservation for IoMT, Applied Sciences, vol.11 No.18, 2021이창훈
◾ Memory Layout Extraction and Verification Method for Reliable Physical Memory Acquisition, Electronics, vol.10 No.12, 2021이창훈
◾ Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks, KSII Transactions on Internet and Information Systems, vol.15 No.6 pp.2148~2167, 2021이창훈
◾ Cyber Threat Intelligence Framework for Incident Response in Energy Cloud Platform, Electronics, 2021이창훈
◾ Smart seed selection-based effective black box fuzzing for IIoT protocol, Journal of Supercomputing, vol.76 No.12 pp.10140~10154, 2020이창훈
◾ HANMRE-An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches, Applied Soft Computing, vol.97 No.part A, 2020이창훈
◾ 포렌식 분석을 위한 LockMyPix의 미디어 파일 복호화 방안 연구, Journal of Digital Forensics, vol.14 No.3 pp.269~278, 2020이창훈
◾ Packet Preprocessing in CNN-Based Network Intrusion Detection System, ELECTRONICS, vol.9 No.7, 2020이창훈
◾ Analysis of mobile browser privacy mode from memory forensic, Journal of Digital Contents Society, vol.21 No.4 pp.781~791, 2020이창훈
◾ BLOCIS: Blockchain-Based Cyber Threat Intelligence Sharing Framework for Sybil-Resistance, Electronics, vol.9 No.3, 2020이창훈
◾ MODBUS security scheme considering industrial control system layers, Journal of Digital Contents Society, vol.21 No.3 pp.637~645, 2020이창훈
◾ 디지털포렌식 관점에서의 안드로이드 선탑재 애플리케이션의 위치정보 수집 및 활용 방안, Journal of Digital Forensiks, vol.14 No.1 pp.59~74, 2020이창훈
◾ Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor, IEEE Transactions on Industrial Informatics, vol.15 No.9, 2019이창훈
◾ Access Control Mechanism for Industrial Control System Based Smart Contract, Journal of The Korea Institute of Information Security & Cryptology, vol.29 No.3 pp.579~588, 2019이창훈
◾ An Empirical Study on Tacit Knowledge Sharing Based on Social Network Analysis, JOURNAL OF INTERNET TECHNOLOGY, vol.20 No.2 pp.483~489, 2019이창훈
◾ Artifacts Analysis of Users Behavior in Korea Random Chat Application, 디지털포렌식연구, vol.12 No.3 pp.1~8, 2018이창훈
◾ A Reliability Comparison Method for OSINT Validity Analysis, IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, vol.14 No.12 pp.5428~5435, 2018이창훈
◾ Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets, SYMMETRY-BASEL, vol.10 No.8, 2018이창훈
◾ 디지털 포렌식 측면에서의 안드로이드 기기에 대한 데이터 수집 연구, OSIA Standards & Technology Review, vol.31 No.2 pp.12~17, 2018이창훈
◾ Method of hijacking a user account using a password manager vulnerability, 디지털포렌식연구, vol.12 No.1 pp.9~18, 2018이창훈
◾ SDN based Discrimination Mechanism for Control Command of Industrial Control System, SDN based Discrimination Mechanism for Control Command of Industrial Control System, vol.19 No.6 pp.1185~1195, 2018이창훈
◾ Color sensors and their applications based on real-time color image segmentation for cyber physical systems, eurasip journal on image and video processing, 2018이창훈
◾ Instagram Users Behavior Analysis in a Digital Forensic Perspective, Journal of The Korea Institute of Information Security & Cryptology, vol.28 No.2 pp.407~416, 2018이창훈
◾ 부채널 공격 대응을 위한 Rekeying 기법에 관한 연구, A Study on Rekeying and Sponged-based Scheme against Side Channel Attacks, vol.19 No.3 pp.579~586, 2018이창훈
◾ Study on Remote Data Acquisition Methods Using OAuth Protocol of Android Operating System, Journal of The Korea Institute of Information Security & Cryptology, vol.28 No.1 pp.111~122, 2018이창훈
◾ CoWebDraw: a real-time collaborative graphical editing system supporting multi-clients based on HTML5, Multimedia Tools and Applications, vol.77 No.4 pp.5067~5082, 2018이창훈
◾ Analysis on Non-Volatile System Log of Android Based Smartphone, 디지털포렌식연구, vol.11 No.2 pp.19~42, 2017이창훈
◾ Spatial and temporal pyramid-based real-time gesture recognition, Journal of Real-Time Image Processing, vol.13 pp.599~611, 2017이창훈
◾ A Study on Application Method of Crypto-module for Industrial Control System, Journal of Digital Contents Society, vol.18 No.5 pp.1001~1008, 2017이창훈
◾ A privacy preserving authentication scheme for roaming in ubiquitous networks, Cluster Computing-The Journal of Networks, Software Tools and Applications, vol.20 pp.1223~1236, 2017이창훈
◾ SSL/TLS 공격에 대한 신규 대응 방안, 한국전자거래학회지, vol.22 No.2 pp.169~185, 2017이창훈
◾ An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things, Wireless Personal Communications, vol.93 pp.571~587, 2017이창훈
◾ Cryptanalysis of the XO-64 Suitable for Wireless Systems, Wireless Personal Communications, vol.93 pp.589~600, 2017이창훈
◾ Block Chain Application Technology to Improve Reliability of Real Estate Market, 한국전자거래학회지, vol.22 No.1 pp.51~64, 2017이창훈
◾ Abnormal event detection in crowded scenes based on deep learning, Multimedia Tools and Applications, vol.75 No.22 pp.14617~14639, 2016이창훈
◾ The protocol design and New approach for SCADA security enhancement during sensors broadcasting system, Multimedia Tools and Applications, vol.75 No.22 pp.14641~14668, 2016이창훈
◾ Guest Editorial: Automated Big Data Analysis for Social Multimedia Network Environments, Multimedia Tools and Applications, vol.75 No.20 pp.12663~12667, 2016이창훈
◾ Performance analysis for contention adaptation of M2M devices with directional antennas, The Journal of Supercomputing, vol.72 No.9 pp.3387~3408, 2016이창훈
◾ Security analysis of SDDO-based block cipher for wireless sensor network, The Journal of Supercomputing, vol.72 No.9 pp.3619~3628, 2016이창훈
◾ Capability-based semantic matching for dynamic resource allocation in tactical edge environment, The Journal of Supercomputing, vol.72 No.9 pp.3646~3662, 2016이창훈
◾ Improving the Efficiency of the EWF-file Imaging Time from a Cryptographic Perspective, 정보보호학회논문지, vol.26 No.4 pp.911~919, 2016이창훈
◾ A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols, Sensors, vol.16 No.6 , 2016이창훈
◾ Guest Editorial: Data Mining and Machine Learning Technologies for Multimedia Information Retrieval and Recommendation, Multimedia Tools and Applications, vol.75 No.9 pp.4845~4849, 2016이창훈
◾ Editorial: A special section on "Emerging Platform Technologies", The Journal of Supercomputing, vol.72 pp.1~4, 2016이창훈
◾ Distinguishing attack on CPB-based cipher COSB-128, International Journal of Security and Its Applications, vol.10 No.1 pp.355~360, 2016이창훈
◾ Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis, Peer-to-Peer Networking and Applications, vol.8 pp.716~732, 2015이창훈
◾ Safety Analysis of Various Padding Techniques on Padding Oracle Attack, 정보보호학회논문지, vol.25 No.2 pp.271~278, 2015이창훈
◾ Related-Key Differential Attacks on COSB-128, International Journal of Distributed Sensor Networks, 2015이창훈
◾ Differential Fault Analysis on Symmetric SPN Block Cipher with Bitslice Involution S-box, 정보처리학회논문지. 컴퓨터 및 통신시스템, vol.4 No.3 pp.105~108, 2015이창훈
◾ Padding Oracle Attack on Block Cipher with CBC|CBC-Double Mode of Operation using the BOZ-PAD, 한국전자거래학회지, vol.20 No.1 pp.89~97, 2015이창훈
◾ Analysis of Padding Oracle Attack Possibility about Application Environment; SRTP, MIKEY, CMS, IPSec, TLS, IPTV, 정보처리학회논문지. 컴퓨터 및 통신시스템, vol.4 No.2 pp.73~80, 2015이창훈
◾ Differential Fault Attack on SSB Cipher, 한국항행학회논문지, vol.19 No.1 pp.48~52, 2015이창훈
◾ Methodology and implementation for tracking the file sharers using BitTorrent, Multimedia Tools and Applications, vol.74 No.1 pp.271~286, 2015이창훈
◾ Biclique cryptanalysis of PRESENT-80 and PRESENT-128, The Journal of Supercomputing, vol.70 No.1 pp.95~103, 2014이창훈
◾ An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks, The Journal of Supercomputing, vol.70 No.1 pp.224~235, 2014이창훈
◾ Special issue on convergence of real-time 3D imaging and optical communications, Journal of Real-Time Image Processing, vol.9 pp.519~521, 2014이창훈
◾ The study of stage financing model of IT project investment, Scientific World Journal, 2014이창훈
◾ Knowledge management technologies for semantic multimedia services, Multimedia Tools and Applications, vol.71 No.1 pp.195~198, 2014이창훈
◾ Test-driven forensic analysis of satellite automotive navigation systems, JOURNAL OF INTELLIGENT MANUFACTURING, vol.25 pp.329~338, 2014이창훈
◾ Special section on human-centric computing, Information Sciences, vol.257 pp.229~230, 2014이창훈
◾ Study on advanced analysis method based on timeline chart for Digital Forensic Investigation, 한국항행학회논문지, vol.18 No.1 pp.50~55, 2014이창훈
◾ Posted price model based on GRS and its optimization for improving grid resource sharing efficiency, TELECOMMUNICATION SYSTEMS, vol.55 pp.71~79, 2014이창훈
◾ special issue on Recent advanced in ubiquitous infrastructure technology, Telecommunication Systems, vol.55 pp.1~3, 2014이창훈
◾ Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing, International Journal of Distributed Sensor Networks, 2014이창훈
◾ Methodology and implementation for tracking the file sharers using BitTorrent, Multimedia Tools and Applications, 2013이창훈
◾ Damaged backup data recovery method for Windows mobile, Journal of Supercomputing, vol.66 pp.875~887, 2013이창훈
◾ Differential Fault Analysis onSymmetry Structured SPN Block Cipher, 한국항행학회논문지, vol.17 No.5 pp.568~573, 2013이창훈
◾ Related-Key Amplified Boomerang Attacks on KT-64 and MD-64 Suitable for Wireless Sensor Networks, sensor letters, vol.11 pp.1765~1770, 2013이창훈
◾ Ring and Clustering Routing Strategy Based on Data Filed in Sensor Network, sensor letters, vol.11 pp.1828~1835, 2013이창훈
◾ A Special Section on Wireless Sensor Networks Technologies and Applications for Smart Spaces, Sensor Letters, vol.11 pp.1672~1674, 2013이창훈
◾ A framework for unified digital evidence management in security convergence, ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, vol.13 pp.379~398, 2013이창훈
◾ Links organization for channel assignment in multi-radio wireless mesh networks, Multimedia Tools and Applications, vol.65 pp.239~258, 2013이창훈
◾ Security Analysis on Block Cipher XSB, 정보처리학회논문지. 컴퓨터 및 통신시스템, vol.2 No.7 pp.311~316, 2013이창훈
◾ Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks, EURASIP Journal on Wireless Communications and Networking, 2013이창훈
◾ mCrypton and LED against biclique cryptanalysis, Peer-to-Peer Networking and Applications, 2013이창훈
◾ Angle and ranging based localization method for ad hoc network, sournal of Supercomputing, vol.64 pp.507~521, 2013이창훈
◾ On-site investigation methodology for incident response in Windows environments, Computers & Mathematics with Applications, vol.65 No.9 pp.1413~1420, 2013이창훈
◾ Digital Forensics Framework for Cloud Computing, 한국항행학회논문지, vol.17 No.1 pp.63~68, 2013이창훈
◾ Efficient three-party key exchange protocols with round efficiency, Telecommunication Systems, vol.52 No.2 pp.1367~1376, 2013이창훈
◾ A study on tachograph based security network, International Journal of Smart Home, vol.7 No.1 pp.231~238, 2013이창훈
◾ Security analysis of scalable block cipher PP-1 applicable to distributed sensor networks, International Journal of Distributed Sensor Networks, vol.2013 No.0 pp.0~0, 2013이창훈
◾ XFS file system and file recovery tools, International Journal of Smart Home, vol.7 No.1 pp.193~198, 2013이창훈
◾ Applying Forensic Approach to Live Investigation Using XeBag, Lecture Notes in Electrical Engineering, vol.203 pp.389~397, 2012이창훈
◾ A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks, JOURNAL OF SUPERCOMPUTING, vol.62 No.1 pp.4~23, 2012이창훈
◾ Differential Fault Analysis on Lightweight Block Cipher LBlock, 한국항행학회논문지, vol.16 No.5 pp.871~878, 2012이창훈
◾ The effective method of database server forensics on the enterprise environment, SECURITY AND COMMUNICATION NETWORKS, vol.5 pp.1086~1093, 2012이창훈
◾ Analysis Framework to Detect Artifacts of Portable Web Browser, Lecture Notes in Electrical Engineering, vol.180 pp.207~214, 2012이창훈
◾ Methodology for Digital Investigation of Illegal Sharing Using BitTorrent, Lecture Notes in Electrical Engineering, vol.180 pp.187~195, 2012이창훈
◾ Methodology for Digital Forensic Investigation of iCloud, Lecture Notes in Electrical Engineering, vol.180 pp.198~206, 2012이창훈
◾ A New Design and Implementation of Digital Evidence Container for Triage and Effective Investigation, 전자공학회논문지 - CI, vol.49 No.4 pp.31~41, 2012이창훈
◾ Differential Fault Analysis on Block Cipher LED-64, Lecture Notes in Electrical Engineering, vol.164 , 2012이창훈
◾ Recent advances and future directions in multimedia and mobile computing, Multimedia Tools and Applications, vol.57 pp.237~242, 2012이창훈
◾ A Key Management Scheme for Security and Energy Efficiency in Sensor Networks, JOURNAL OF INTERNET TECHNOLOGY, vol.13 No.2 pp.223~231, 2012이창훈
◾ Security Analysis of Block Cipher KT-64, 정보처리학회논문지C, vol.19 No.1 pp.55~62, 2012이창훈
◾ On-the-spot digital investigation by means of LDFS: Live Data Forensic System, MATHEMATICAL AND COMPUTER MODELLING, vol.55 No.43102 pp.223~240, 2012이창훈
◾ Task-based behavior detection of illegal codes, MATHEMATICAL AND COMPUTER MODELLING, vol.55 No.43102 pp.80~86, 2012이창훈
◾ 블록 암호SCOS-3의 연관키 차분 공격에 대한 안전성 분석, 한국항행학회논문지, vol.13 No.6 pp.977~983, 2009이창훈
◾ CFES: Comprehensive Framework for Forensic Analysis of Embedded Systems, Journal of Internet Technology, vol.11 No.1 pp.549~562, 2009이창훈
◾ 축소된 SMS4 블록 암호에 대한 향상된 안전성 분석, 정보보호학회논문지, vol.19 No.3 pp.3~10, 2009이창훈
◾ 유비쿼터스 환경에 적합한 블록암호 mCrypton에 대한 안전성 분석, 멀티미디어학회논문지, vol.12 No.5 pp.644~652, 2009이창훈
◾ AES의 연관키 랙탱글 공격에 대한 안전성 분석, 정보보호학회논문지, vol.19 No.2 pp.39~48, 2009이창훈
◾ Security analysis of the SCO-family using key schedules, Information Sciences, vol.179 No.24 pp.4232~4242, 2009이창훈
◾ Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments, Journal of Universal Computer Science, vol.15 No.5 pp.1007~1022, 2009이창훈
Conference Papers
Jinkeon Kang, KitaeJeong, Changhoon Lee, Seokhie Hong, “Distinguishing attack on SDDO-based block cipher BMD-128”, Ubiquitous Information Technologies and Applications, Lecture Notes in Electrical Engineering Volume 280, 2014, pp 595-602.

Jaeung Namgung, Il young Hong, Jungheum Park, Changhoon Lee, Sangjin Lee, “A research for partition restoration techniques”, Future Information Technology (FutureTech 2013), Lecture Notes in Electrical Engineering Volume 276, 2014, pp 315-322, 10.1007/978-3-642-40861-8_45, Print ISBN978-3-642-40860-1

Kyung-Soo Lim, Changhoon Lee, “Applying Forensic Approach to Live Investigation using XeBag”, Computer Science and its Applications, Lecture Notes in Electrical Engineering, Volume 203, 2012, pp 389-397

Jeehee Lee, Hyunji Chung, Changhoon Lee, Sangjin Lee, “Methodology for Digital Forensic Investigation of iCloud”, Information Technology Convergence, Secure and Trust Computing, and Data Management, Lecture Notes in Electrical Engineering, Volume 180, 2012, pp 197-206

Jong-Hyun Choi, Keun-gi Lee, Jungheum Park, Changhoon Lee, Sangjin Lee, “Analysis Framework to Detect Artifacts of Portable Web Browser”, Information Technology Convergence, Secure and Trust Computing, and Data Management, Lecture Notes in Electrical Engineering, Volume 180, 2012, pp 207-214, Springer Verlag. ISSN 1876-1100

Sooyoung Park, Hyunji Chung, Changhoon Lee, Sangjin Lee, “Methodology for Digital Investigation of Illegal Sharing Using BitTorrent”, Information Technology Convergence, Secure and Trust Computing, and Data Management, Lecture Notes in Electrical Engineering, Volume 180, 2012, pp 187-195.

Kitae Jeong, Changhoon Lee, “Differential Fault Analysis on Block Cipher LED-64”, Future Information Technology, Application, and Service, Lecture Notes in Electrical Engineering, Volume 164, 2012, pp 747-755.

Yuseop Lee, Jongsung Kim, Seokhie Hong, Changhoon Lee, “Improved Differential Fault Analysis on Block Cipher SEED-128 ” Publication Year: 2012 , Page(s): 675 - 680 , 2012 15th International Conference on Network-Based Information Systems (NBiS), September 26-September 28, 2012.

Jinkeon Kang, Kitae Jeong, Sang-Soo Yeo, Changhoon Lee “Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments”, Publication Year: 2012 , Page(s): 726 - 731, IEEE 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2012 , Fukuoka, Japan, March 26-29, 2012. IEEE 2012, ISBN 978-1-4673-0714-7
◾ 김지연, 김역, 이창훈, Analysis of Competitive Factors in Information Security Products for Individual Users, Conference on Information Security and Cryptography-Winter 2023, 이화여자대학교, 2023이창훈
◾ 김하민, 조민정, 이창훈, 포스터세션으로 해당없음, Conference on Information Security and Cryptography-Winter 2023, 이화여자대학교, 2023이창훈
◾ Seunghee Seo, Yeog Kim, Changhoon Lee, Countering anti-forensics: Recovery Encrypted evidences on GPU and ASIC, 해당없음, 싱가포르 마리나베이센즈, 2023이창훈
◾ 변현수, 공성현, 석병진, 이창훈, Analysis of effectiveness of Jaccard index as a malware classifier, 해당없음, SETEC 컨벤션센터 세미나실, 2023이창훈
◾ 배지원, Erzhena Tcydenova, 석병진, 이창훈, A Study on the Performance Improvement of GIFT-COFB in ARMv8 Processor, 해당없음, 제주 오션스위츠 호텔, 2023이창훈
◾ 조예송, 조민정, 석병진, 이창훈, 딥페이크 미디어 생성 및 탐지 기술 분석, 2023년 한국정보보호학회 하계학술대회, 강원대학교, 2023이창훈
◾ 김지연, 석병진, 공성현, 이창훈, 안전한 AI 서비스를 위한 국내 데이터 프라이버시 보호 가이드라인 분석, 정보보호학회논문지, 강원대학교, 2023이창훈
◾ 차해성, 공성현, 이창훈, Malware classification through learning semantic information from Control Flow Graph, 한국정보보호학회 하계학술대회 논문집 Vol.33 No.1, 강원대학교, 2023이창훈
◾ 5, 디지털 포렌식 관점에서 hwp5.0 암호화 프로세스 분석 및 복호화 방안, (사)한국디지털포렌식학회 2023년 하계학술대회 자료집, 성균관대학교, 2023이창훈
◾ 차해성, 서승희, 이창훈, Bianlian 랜섬웨어 복호화 방안 연구, (사)한국디지털포렌식학회 2023년 학학술대회 자료집, 성균관대학교, 2023이창훈
◾ 윤희서, 조민정, 이창훈, Study on DGA Detection Methods based on DGA technique and Machine Learning Algorithm, ICT플랫폼학회 하계학술발표대회논문집, 동국대 충무로 영상센터 7층, 2022이창훈
◾ 변현수, 이창훈, Malware Classification Method based on TLSH Similarity, 2022 (사)ICT플랫폼학회 추계학술대회, 동국대 충무로영상센터 7층, 2022이창훈
◾ 김주은, 서승희, 석병진, 변현수, 이창훈, A Study on Digital Forensic Artifacts against Cryptocurrency Wallet Metamask, 한국정보보호학회 동계학술대회 논문집 Vol.32, No. 2, 국민대학교 미래관, 2022이창훈
◾ Erzhena Tcydenova, Byoungin Seok, Minjeong Cho, Changhoon Lee, Decentralized Access Control for Internet of Things Using Decentralized Identifiers and Multi-signature Smart Contracts, 2022 International Conference on Platform Technology and Service (PlatCon) Conference Proceedings, Jeju, 2022이창훈
◾ 서승희, 김주은, 이창훈, Security Analysis of Bridging in Matrix secure messaging protocol, 2022 한국디지털콘텐츠학회 하계종합학술대회 및 대학생논문경진대회 발표 논문집, 제주 오션스위츠 호텔, 2022이창훈
◾ 변현수, 이창훈, 안드로이드 환경에서 네이버 앱의 포렌식 아티팩트 분석 도구, 2022 한국디지털콘텐츠학회 하계종합학술대회 및 대학생논문경진대회 발표 논문집, 제주 오션스위츠 호텔, 2022이창훈
◾ 석병진, 이창훈, Offchain-based Industrial Control System Architecture, 2022 (사)ICT플랫폼학회 하계학술대회, 강릉세인트존스 호텔 바브다홀 (강원도 강릉소재), 2022이창훈
◾ 차해성, 조예송, 조민정, 이창훈, Another View of Ransomware Detection on API call and Machine Learning, 한국정보보호학회 하계학술대회 논문집 Vol.32, No. 1, 부산 벡스코 컨벤션홀 1층, 2022이창훈
◾ 조재민, 변현수, 윤희서, 서승희, 이창훈, Forensic analysis of Element instant messenger, 한국정보보호학회 하계학술대회 논문집 Vol.32, No. 1, 부산 벡스코 컨벤션홀 1층, 2022이창훈
◾ 차해성, 서승희, 이창훈, Analysis of Ransomware Detection Model using Automated Dynamic Analysis System, 2022년도 한국인터넷정보학회 춘계학술발표대회 논문집 제23권1호, 목포 호텔 현대 바 이 라한, 2022이창훈
◾ 변현수, 서승희, 김역, 이창훈, Sansung Internet Browser Analysis from a Digital Forensic Perspective, 2022년도 한국인터넷정보학회 춘계학술발표대회 논문집 제23권1호, 목포 호텔 현대 바 이 라한, 2022이창훈
◾ 변현수, 서승희, 이창훈, A study of the identification of wiping tool usage traces by NTFS event log pattern analysis, 2021 한국정보보호학회 동계학술대회(CISC-W) 논문집, 온라인, 2021이창훈
◾ 공성현, 이창훈, High-speed password cracking technique using probability-based password pattern extraction, 2021 한국정보보호학회 동계학술대회(CISC-w) 논문집, 온라인, 2021이창훈
◾ 최민영, 석병진, 조민정, 이창훈, A Study on Performance benchmarking ofKorea Encryption Algorithm on VxWorks based IndustrialControl System, CISC-W'21 Vol.31, No.2, 온라인 발표, 2021이창훈
◾ 차해성, 서승희, 이창훈, A New Password Recovery Algorithm of hwpx Document by Reverse-Engineering of Hancom Office, ICT플랫폼학회 추계학술대회 발표논문집, 동국대학교 충무로 영상센터, 2021이창훈
◾ 최민영, 조민정, 이창훈, Performance Comprarison of Encryption Algorithm in Vxworks, 2021 국가암호공모전(논문) 발표집, 온라인 발표, 2021이창훈
◾ 공성현, 이창훈, A Study on Cyber-attack Modeling and Simulation Methods for Industrial Control System Environment, 2021년도 춘계학술대회 발표논문집, 강릉 경포 라카이샌드파인 리조트, 2021이창훈
◾ 차해성, 공성현, 이창훈, Bittorrent File Sharing Framework with Automatic Malicious Behavior Analysis of Cuckoo Sandbox, CISC-S'21 Vol.31, No.1, 온라인 컨퍼런스(한국과학기술회관 12F 아나이스홀), 2021이창훈
◾ 문상민, 서승희, 이창훈, Digital Forensic Analysis for Smart-home Platform Hejhome, CISC-S'21 Vol.31, No.1, 온라인 컨퍼런스(한국과학기술회관 12F 아나이스홀), 2021이창훈
◾ 김인영, 조민정, 이창훈, 콘솔 게임기 아티팩트 분석 : 불법 콘텐츠 재생을 위한 익스플로잇 현황을 중심으로, CISC-W-20, 온라인컨퍼런스, 2020이창훈
◾ 박진성, 서승희, 석병진, 이창훈, 디지털포렌식 관점에서의 암호키 재사용 취약점을 이용한 앱 데이터 복호화 연구, CISC-W-20, 온라인컨퍼런스, 2020이창훈
◾ Erzhena Tcydenova, 조민정, 석병진, 이창훈, Application of Neural Differential Distinguisher on SIMON-32/64, CISC-S-20, 온라인 컨퍼런스, 2020이창훈
◾ 조서연, 서승희, 조민정, 이창훈, SCADA 시스템에 대한 랜섬웨어 최신 동향 분석, CISC-S-20, 온라인컨퍼런스, 2020이창훈
◾ 박진성, 공성현, 이창훈, 음란물 유포 경로 추적을 위한 Tumblr 애플리케이션 메모리 포렌식 분석, CISC-S-20, 온라인 컨퍼런스, 2020이창훈
◾ Seonghyeon Gong and Changhoon Lee, Efficient Data Noise-Reduction for Cyber Threat Intelligence System, Advances in Computer Science and Ubiquitous Computing, University of Macau, 2019이창훈
◾ 배재건, 공성현, 이창훈, A Study on Intel SGX-based Management Scheme to Prevent Certificate Leakage Accident, CISC-W'19, 중앙대학교 흑석동, 2019이창훈
◾ 조서연, 석병진, 이창훈, Security requirements for Industrial Communication Protocol on Smart Factory, The 2019 Korea institute of Information Security and Cryptology Choongchung Chapter (KIISC CC 2019), 한남대학교, 2019이창훈
◾ 박진성,이창훈, Secure OAuth Framework using Blockchain based on Cloud Service, 2019 정보보호학회 하계학술 대회, 동명대학교, 2019이창훈
◾ 공성현, 이창훈, Cyber Threat Intelligence based Cyber Kill Chain Model, 한국정보보학회 하계학술대회 논문집 Vol.29 No.1, 부산 동명대학교, 2019이창훈
◾ 배재건,공성현,석병진,이창훈, Analysis of DLL Hijacking Vulnerability in System Executable Files for Administerator Pribileges of Windows, 2019년 춘계학술발표대회 논문집 제 26권 제 1호, 숭실대학교, 2019이창훈
◾ 조서현,공성현,석병진,이창훈, DDoS Security Considerations When proposing a protocol for CoAP, 2019년 춘계학술발표대회 논문집 제 26권 제 1호, 숭실대학교, 2019이창훈
◾ 남기훈, A study on user account hijacking using Android application vulnerability, 2017 디지털포렌식 동계 학술대회, 상명대학교, 2017이창훈
◾ 서승희, Forensic analysis of Instagram Application on Android, 2017 디지털 포렌식 기술 하계 워크숍, 서울과학기술대학교, 2017이창훈
◾ Tran Song Dat Phuc, Byoungjin Seok, Changhoon Lee, Rekeying Approach against Side Channel Attacks, 2017년도 춘계학술발표대회 논문집 제24권 제1호(2017.4), 제주대학교 아라캠퍼스, 2017이창훈
◾ 공성현, 조민정, 조재익, 이창훈, A Study on Dataset Construction Technique for Intrusion Detection based on Pattern Recognition, 2017년 춘계학술발표대회 논문집 제24권 제1호(2017.4), 제주대학교 아라캠퍼스, 2017이창훈
◾ 공성현, 강형철, 이창훈, An Analysis of Letest Authentication Encryption, 2016년도 한국정보보호학회 하계학술대회 논문집, 부경대학교, 2016이창훈
◾ 오서영, 임권창, 문도현, 이창훈, Padding Oracle Attacks on CBC|CBC|CBC Mode Encryption with BOZ-PAD and ANSI X.923, 2016년도 한국정보보호학회 하계학술대회 논문집, 부경대학교, 2016이창훈
◾ Tran Song Dat Phuc, Changhoon Lee, Distinguishing Attack on XO-64, IEEE Proceedings-2016 International Conference on Platform Technology and Service (PlatCon), 제주 롯데시티 호텔, 2016이창훈
◾ 정원서, 이재형, 이창훈, Security Vulnerability and Cracking Case of Wireless routers, 2016년도 한국통신학회 동계종합학술발표회, 하이원리조트, 2016이창훈
◾ HyungChul Kang, Myungseo Park, Dukjae Moon, Changhoon Lee, Jongsung Kim, Kimoon Kim, Juhyuk Kim, Seo, New Efficient Padding Methods Secure against Padding Oracle Attacks, The 18th Annual International Conference on Information Security and Cryptography, 중앙대학교, 2015이창훈
◾ 정원서, 이재형, 이창훈, Analysis of Security Vulnerability for Smart Car, 2015년도 한국정보처리학회 추계학술발표대회 논문집, 제주한라대학교, 2015이창훈
◾ 최종훈, 신지혜, 김대호, 이창훈, A Study of Cryptograph Algorithm Education for the Lower Grades in Elemen, 2015년도 한국정보처리학회 추계학술발표대회 논문집, 제주한라대학교, 2015이창훈
◾ 임권창, 정태을, 이창훈, The security issue and example experiment of smart healthcare, 2015년도 한국정보처리학회 추계학술발표대회 논문집, 제주한라대학교, 2015이창훈
◾ 공성현, 오서영, 이창훈, Analysis of password hashing algorithms, 2015년도 한국정보처리학회 추계학술발표대회 논문집, 제주한라대학, 2015이창훈
◾ 양승재, 문도현, 이창훈, Analysis of Smart Home Technology for IoT, 2015년도 한국정보처리학회 추계학술발표대회 논문집, 제주한라대학교, 2015이창훈
◾ Trna Song Dat Phuc, Changhoon Lee, Distinguishing attack on CPB-based cipher COSB-128, Proceedings iof the 2013 International Conference on Platform Technology and Service, Ramada Plaza jeju Hotel, 2014이창훈
◾ Seongjin wang ghoon Lee, A Study on Privacy in Big Data Environment, Proceedings iof the 2013 International Conference on Platform Technology and Service, Ramada Plaza jeju Hotel, 2014이창훈
◾ Chen Si-hua, Changhoon Lee, He Wei, Study on Qualitative Simulation of Non-cooperative Behaviors of Knowledge Workers, Proceedings iof the 2013 International Conference on Platform Technology and Service, Ramada Plaza jeju Hotel, 2014이창훈
◾ Chen Si-hua, Changhoon Lee, He wei, The application of stage financing to IT project investment, Proceedings iof the 2013 International Conference on Platform Technology and Service, Ramada Plaza jeju Hotel, 2014이창훈
◾ Jinkeon Kang, Kitae Jeong, Changhoon Lee, Seokhie Hong, Distinguishing Attack on SDDO-Based Block Cipher BMD-128, Ubiquitous Information Technologies and Applications, Berlin Heidelberg, 2013이창훈
◾ 이창훈, 황성진,김종성, 박명서, A Study on Privacy in a Big Data Environment, 2013년도 한국정보보호학회 동계학술대회 CISC-W'13, 아주대학교 종합관, 2013이창훈
◾ 이근기, 이창훈, 이상진, 신규 파일 시스템에 대한 디지털 포렌식 분석 필요성 연구, 제 38회 한국정보처리학회 추계학술대회 논문집, 제주대학교 아라캠퍼스, 2012이창훈
◾ Yuseop Lee, Jongsung Kim, Seokhie Hong, Changhoon Lee, Improved Differential Fault Analysis on Block Cipher SEED-128, Proceedings of the 15th International Conference on Network-Based Information Systems (NBiS 2012), La Trobe University, City campus, Melbourne, Australia, 2012이창훈
◾ 강진건 이창훈, 경량 암호의 하드웨어 구현 최적화 기법에 관한 연구, 2012 한국정보기술융합학회 동계학술대회 논문집, 제주 샤인빌리조트, 2012이창훈
◾ 정기태, 이창훈, 최신 블록 암호 운영 모드에 관한 연구, 2012 한국정보기술융합학회 동계학술대회 프로시딩, 제주 샤인빌리조트, 2012이창훈
◾ 강진건, 이창훈, 경량 블록 암호 개발 동향, 제 37회 한국정보처리학회 춘계학술대회 논문집, 순천대학교 70주년 기념관, 2012이창훈
◾ Jinkeon Kang, Kitae Jeong, Sang-Soo Yeo, Changhoon Lee, Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments, Proceeding of IEEE 26th International Conference on Advanced Information Networking and Applications, Fukuoka-shi, Japan, 2012이창훈
◾ 강진건, 정기태, 이창훈, 블록암호 AES 에 대한 차분 오류 공격 동향, 2012년 한국정보기술융합학회 동계학술대회, 경기 곤지암리조트, 2012이창훈
◾ 이근기, 이창훈, 이상진, 삭제된 이메일 항목 복원 기술에 대한 연구, 2012 한국정보기술융합학회 동계학술대회 논문집, 경기도 곤지암리조트, 2012이창훈
Books
Cryptographic Mathematics, 2009
Projects
Many projects
◾ 에너지 클라우드 고신뢰 암호모듈 개발 및 포렌식 기술 연구, 한국연구재단, 2019.06.~2022.12.이창훈
◾ 디지털포렌식 관점에서의 플래싱 도구 활용 방안 연구, 대검찰청, 2019.05.~2019.11.이창훈
◾ 스마트공장 네트워크 인프라용 보안 칩 및 실시간 제어프로토콜 보안 기술 개발, 정보통신기획평가원(구'정보통신기술진흥센터), 2019.04.~2022.12.이창훈
◾ 메모리 포렌식 관점에서의 모바일 브라우저 사생활 보호 모드 분석, 산학협력단, 2019.03.~2020.02.이창훈
◾ 지능형 위협에 대한 딥러닝 기반 공격 예측 및 선제 대응 기술 연구, 산학협력단, 2018.02.~2021.01.이창훈
◾ 인스타그램 분석을 통한 사용자 행위 분석에 관한 연구, 산학협력단, 2017.07.~2018.02.이창훈
◾ 부채널 공격 대응을 위한 Rekeying 기법에 관한 연구, 산학협력단, 2017.06.~2018.02.이창훈
◾ 네트워크 패킷 분석을 통한 프로토콜 패턴 분석 연구, 고려대학교산학협력단, 2017.05.~2017.12.이창훈
◾ 최신 모바일 기기에 대한 암호해독 및 포렌식 분석, 정보통신기획평가원(구'정보통신기술진흥센터), 2017.04.~2020.12.이창훈
◾ 17년 고용계약형 SW석사과정 지원사업, 과학기술정보통신부, 2017.03.01.~2017.12.31.이창훈
◾ 국가 차원의 침해사고 대응을 위한 사이버 위협 인텔리전스 분석(CTI) 및 정보 공유 기술 개발, 정보통신기획평가원(구'정보통신기술진흥센터), 2017.03.~2019.12.이창훈
◾ '17년 고용계약형 SW석사과정 지원사업, 정보통신기술진흥센터, 2017.03.~2017.12.이창훈
◾ 원전 비안전등급 제어기기(DCS) 사이버침해 예방 및 탐지 기술 개발, 한국에너지기술평가원, 2016.12.~2020.12.이창훈
◾ 부채널 공격에 안전한 신규 암호 프리미티브 개발, 정보통신기술진흥센터, 2016.09.~2016.12.이창훈
◾ 암호데이터 중복처리 서비스를 위한 암호 운영 모드 적합성 연구, 한국전자통신연구원, 2016.07.~2016.11.이창훈
◾ 사물인터넷(IoT) 환경의 공개키 알고리즘 및 해시함수 적용방안 연구, 한국인터넷진흥원, 2016.04.~2016.10.이창훈
◾ 사물인터넷(IoT) 환경에 적합한 경량 인증 암호화 기술 개발, 한국연구재단, 2015.07.~2018.06.이창훈
◾ 최신 암호기술 국제공모(PHC, CAESAR) 동향 및 신규 설계논리 분석 연구, ETRI부설국가보안기술연구소, 2015.06.~2016.01.이창훈
◾ 사물인터넷(IoT) 환경에서의 암호·인증기술 이용기준 마련 및 최적 구현 방법 연구, 한국인터넷진흥원, 2015.05.~2015.12.이창훈
◾ NIST-PAD를 사용하는 CBC|CBC 이중 모드에 대한 패딩 오라클 공격, 산학협력단, 2014.12.~2015.11.이창훈
◾ 비트 슬라이스 대합 S-박스에 의한 대칭 SPN 블록 암호에 대한 차분 오류 공격, 산학협력단, 2014.07.~2015.06.이창훈
◾ 블록 암호 SSB에 대한 차분 오류 공격, 산학협력단, 2014.04.~2015.03.이창훈
◾ 국산 블록암호기술의 안전한 패딩 설계방법 연구 및 암호 기술 중장기 로드맵 개발 연구, 한국인터넷진흥원, 2014.04.~2014.11.이창훈
◾ '14년 고용계약형 SW석사과정 지원사업, 정보통신산업진흥원, 2014.03.~2015.02.이창훈
◾ 대칭구조 SPN 블록 암호 알고리즘에 대한 차분 오류 공격, 산학협력단, 2013.03.~2014.02.이창훈
◾ 타임 라인 분석 기법을 이용한 디지털 증거 분석 방법, 산학협력단, 2013.03.~2014.02.이창훈
◾ 클라우드 환경을 고려한 디지털 포렌식 프레임워크, 산학협력단, 2012.09.~2013.02.이창훈
◾ 블록 암호 Lblock에 대한 차분 오류 공격, 산학협력단, 2012.09.~2013.02.이창훈
◾ 퍼블릭클라우드환경에서 가상화 보안 모델링 연구, 한국정보화진흥원, 2012.06.~2012.12.이창훈
◾ IT멘토링 팀 프로젝트 지원과제(스마트 모바일 기기를 이용한 원격 회사 업무 & 계획 플래너 개발), 정보통신산업진흥원, 2012.05.~2012.12.이창훈
◾ 안전한 암호 알고리즘 및 키 선택을 위한 암호기술 안전성 분석, 한국인터넷진흥원, 2012.04.~2012.10.이창훈
◾ 경량 블록 암호 알고리즘에 대한 안전성 분석, 국정원, 2012.03.~2012.11.이창훈
◾ 차세대 디지털 증거 관리 기술 연구, 한국연구재단, 2011.05.~2013.04.이창훈
Awarded
◾ 클라우드 컴퓨팅 서비스 보안사고 포렌식 분석 -네이버 클라우드를 중심으로-, 우수 논문상, Korean Digital Forensics Society, 2023이창훈
◾ 디지털포렌식 관점에서의 브라우저 기반 암호화폐 지갑의 데이터 수집 및 분석연구, 한국저작권보호원장상, Korea Copyright Protection Agency, 2023이창훈
◾ 해당없음, 사이버치안대상시상식 행정안정부 장관상, Ministry of Public Administration and Security, 2023이창훈
◾ 해당없음, 2023 암호분석경진대회 특별상, 신호기술연구소, 2023이창훈
◾ 해당없음, 2023 국가암호공모전 특별상, Korea Cryptography Forum, 2023이창훈
◾ 악성코드 분류기로서 자카드 인덱스의 실효성 분석, 2023 ICT플랫폼학회 하계학술대회 우수논문상, ICT Platform Society, 2023이창훈
◾ ARMv8 프로세서 상에서 GIFT-COFB의 성능 향상 방안 연구, 2023 한국디지털콘텐츠학회 하계종합학술대회 우수논문상, Digital Contents Society, 2023이창훈
◾ 디지털 포렌식 관점에서 hwp5.0 파일 복호화 방안 연구, 2023 한국디지털포렌식학회 하계학술대회 우수논문상, Korean Digital Forensics Society, 2023이창훈
◾ Bianlian 랜섬웨어 복호화 방안 연구, 2023 한국 디지털포렌식학회 하계학술대회 한국저작권보호위원장상, Korea Copyright Protection Agency, 2023이창훈
◾ 해당없음, 제 29회 정보통신망 정보보호컨퍼런스 과학기술정보통신부장관 표창장, Ministry of Science and ICT, 2023이창훈
◾ Control Flow Graph의 구조적 의미 학습을 통한 악성코드 분류, 2022 AI+Security 우수논문/아이디어 공모전 논문부문 최우수상(과기정통부 장관상), Ministry of Science and ICT, 2022이창훈
◾ Korean Password Guessing Using Probabilistic Context-Free Grammars, Digital Forensic Challenge 2022 (Tech-Contest) 2nd place, Korea Institute Of Information Security And Cryptology, 2022이창훈
◾ A Study on Digital Forensic Artifacts against Cryptocurrency Wallet Metamask, 정보보호학회장상, KOREA INSTITUTE OF INFORMATION SECURITY & CRYPTOLOG, 2022이창훈
◾ Dummy LUT Operations for countermeasure against DCA, 최우수 논문상, 과학기술정보통신부, 2022이창훈
◾ 국가암호공모전 특별상, National Security Research Institute, 2022이창훈
◾ 암호분석경진대회 특별상, Millitary Crypto Research Center, 2022이창훈
◾ Graph-based Cyber Threat Intelligence Analysis and Attack Stage Prediction Technique, 2022 사이버안보 논문공모전 최우수상, Korea Institute Of Information Security And Cryptology, 2022이창훈
◾ Offchain-based Industrial Control System Architecture, 2022 ICT플랫폼학회 우수논문상, ICT Platform Society, 2022이창훈
◾ SecurityAnalysis of Bridging inMatrix securemessaging protocol, 2022 한국디지털콘텐츠학회 하계학술 최우수논문상, Digital Contents Society, 2022이창훈
◾ 안드로이드 환경에서 네이버 앱의 포렌식 아티팩트 분석 도구, 2022 한국디지털콘텐츠학회 하계학술 대학생부문 금상, Digital Contents Society, 2022이창훈
◾ Forensic analysis of Element instant messenger, 2022 한국정보보호학회 하계학술대회 한국인터넷진흥원장상, Korea Internet & Security Agency, 2022이창훈
◾ A study on cloud artifact collection of HejHome Air using OpenAPI, 2022 한국인터넷정보학회 춘계학술대회 우수논문상, Korea Internet & Security Agency, 2022이창훈
◾ 메모리 포렌식 관점에서의 One-Byte Modification 공격 대응 방안 연구, 2020 한국디지털포렌식학회 동계학술대회 우수논문상, 한국디지털포렌식학회, 2020이창훈
◾ 2018년도 연구분야 우수교원, 2018년도 연구분야 우수교원 표창, 서울과학기술대학교 산학협력단, 2020이창훈
◾ Graph Convolutional Network based Cyber Threat Intelligence Modeling for Cyber Kill-Chain Response, 2020 사이버안보 논문 공모전 장려상, KOREA INSTITUTE OF INFORMATION SECURITY & CRYPTOLOGY, 2020이창훈
◾ Digital Forensic Analysis Using Vulnerability of Bluetooth-based Smart Doorlocks, Tech Contest 2nd, KOREA INSTITUTE OF INFORMATION SECURITY & CRYPTOLOGY, 2019이창훈
◾ DDoS Security Considerations When proposing a protocol for CoAP, a silver prize, KOREA INSTITUTE OF INFORMATION SECURITY & CRYPTOLOGY., 2019이창훈
◾ 블록체인 기반의 부동산 스마트 컨트랙트 시스템, 국가암호공모전 특별상, KIISC, KCF, 2018이창훈
◾ 디지털 포렌식 관점에서 랜덤 챗 어플리케이션 사용자 행위 분석 연구, 2018 디지털 포렌식 동계 학술대회 우수논문상, korean national police agency, 2018이창훈
◾ 안드로이드 환경에서의 인스타그램에 대한 포렌식 분석, 2017년 한국디지털포렌식학회 디지털포렌식기술 하계워크숍 우수논문상, Korea Digital Forensic Society, 2017이창훈
◾ Rekeying Approach against Side Channel Attacks, 한국정보처리학회 춘계학술대회 우수논문상, 한국정보처리학회, 2017이창훈
◾ Distinguishing Attack on XO-64, Best Paper, ICT플랫폼학회-PlatCon 2016 국제학술대회, 2016이창훈
◾ 패딩 오라클 공격에 안전한 신규 패딩 방, 우수상 (논문분야), 국가보안기술연구소, 2015이창훈
◾ Security Analysis on Block Cipher with CBCCBCCBC-Triple Modes of Operation Using the BOZ-PAD, 2015 International Conference on Platform Technology and Service-Best Paper, ICT플랫폼학회, 2015이창훈
◾ Related-key Attack on COSB-128, 논문 특별상, 한국정보보학회, 2014이창훈
◾ Applying Forensic Approach to Live Investigation using XeBag, CSA 2012 Best Paper Award, FTRA - Future Technology Research Association International, 2012이창훈
◾ 공로상, 한국정보처리학회, 2010이창훈
◾ 공로상, 한국정보처리학회, 2009이창훈
◾ Best Paper Award (우수논문상), CSA 2008 국제학술회의, 2008이창훈
Miscellaneous
IEEE Society
IEEE Computer Society
IEEE Communications Society
International Association for Cryptologic Research (IACR).
Research Group BM7
Korea Institute of Information Security & Cryptology (KIISC),
Korea Information Processing Society (KIPS)
Korea Digital Forensic Society (KDFS),
ICT Platform Society
Korean Society For Internet Information (KSII)
Korea Multimedia Society (KMMS)
The Korea Insitute of Commuications and Information Sciences (KICS)
The Institute of Electronics and Information Engineers (IEIE)
Korean Institute of Information Technology (KIIT)
The Korean Navigation Institute (KONI)
Institution of Creative Research Professionals (ICRP), Senior Vice-President & Director
232 Gongneung-ro, Nowon-gu, Seoul, 01811, korea Tel :+82-2-970-6793 Fax : +82-2-970-6800
Copyright © Seoul National University of Science&Technology. All rights Reserved.