Name Lee, Chang Hoon.
Position professor
Tel +82-2-970-6712
Fax 02-970-9734
E-mail chlee@seoultech.ac.kr
Biography
Ph.D(Korea Univ.)
Research Areas
Information Security, Cryptography, Digital Forensics, IoT Security, FinTech Security
Teaching
Algorithm, Data Structure, Discrete Mathematics, Basic Engineering Design, Programming
/Advanced Information Security, Advanced Algorithm, Topics in Algorithm, Cryptography and Information Security (Theory and Practice)
Selected Publications
[Changhoon Lee - Google Scholar Citations]
http://scholar.google.com/citations?user=w_e5-hQAAAAJ&hl=ko

[Lab - Homepage]
https://cis.seoultech.ac.kr/subList/20000002766
Journal Papers
- Scalable Lightweight Blockchain-based Authentication Mechanism for Secure VoIP Communication, HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2022
- Homomorphic Encryption Based Privacy-Preservation for IoMT, Applied Sciences, vol.11 No.18, 2021
- Detection of Adversarial Attacks in AI-Based Intrusion Detection Systems Using Explainable AI, HCIS, vol.11, 2021
- Memory Layout Extraction and Verification Method for Reliable Physical Memory Acquisition, Electronics, vol.10 No.12, 2021
- Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks, KSII Transactions on Internet and Information Systems, vol.15 No.6 pp.2148~2167, 2021
- Cyber Threat Intelligence Framework for Incident Response in Energy Cloud Platform, Electronics, 2021
- HANMRE-An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches, Applied Soft Computing, vol.97 No.part A, 2020
- Smart seed selection-based effective black box fuzzing for IIoT protocol, Journal of Supercomputing, vol.76 No.12 pp.10140~10154, 2020
- 포렌식 분석을 위한 LockMyPix의 미디어 파일 복호화 방안 연구, Journal of Digital Forensics, vol.14 No.3 pp.269~278, 2020
- Packet Preprocessing in CNN-Based Network Intrusion Detection System, ELECTRONICS, vol.9 No.7, 2020
- Analysis of mobile browser privacy mode from memory forensic, Journal of Digital Contents Society, vol.21 No.4 pp.781~791, 2020
- 디지털포렌식 관점에서의 안드로이드 선탑재 애플리케이션의 위치정보 수집 및 활용 방안, Journal of Digital Forensiks, vol.14 No.1 pp.59~74, 2020
- MODBUS security scheme considering industrial control system layers, Journal of Digital Contents Society, vol.21 No.3 pp.637~645, 2020
- BLOCIS: Blockchain-Based Cyber Threat Intelligence Sharing Framework for Sybil-Resistance, Electronics, vol.9 No.3, 2020
- Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor, IEEE Transactions on Industrial Informatics, vol.15 No.9, 2019
- Access Control Mechanism for Industrial Control System Based Smart Contract, Journal of The Korea Institute of Information Security & Cryptology, vol.29 No.3 pp.579~588, 2019
- An Empirical Study on Tacit Knowledge Sharing Based on Social Network Analysis, JOURNAL OF INTERNET TECHNOLOGY, vol.20 No.2 pp.483~489, 2019
- Artifacts Analysis of Users Behavior in Korea Random Chat Application, 디지털포렌식연구, vol.12 No.3 pp.1~8, 2018
- A Reliability Comparison Method for OSINT Validity Analysis, IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, vol.14 No.12 pp.5428~5435, 2018
- Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets, SYMMETRY-BASEL, vol.10 No.8, 2018
- SDN based Discrimination Mechanism for Control Command of Industrial Control System, SDN based Discrimination Mechanism for Control Command of Industrial Control System, vol.19 No.6 pp.1185~1195, 2018
- Method of hijacking a user account using a password manager vulnerability, 디지털포렌식연구, vol.12 No.1 pp.9~18, 2018
- 디지털 포렌식 측면에서의 안드로이드 기기에 대한 데이터 수집 연구, OSIA Standards & Technology Review, vol.31 No.2 pp.12~17, 2018
- Color sensors and their applications based on real-time color image segmentation for cyber physical systems, eurasip journal on image and video processing, 2018
- Instagram Users Behavior Analysis in a Digital Forensic Perspective, Journal of The Korea Institute of Information Security & Cryptology, vol.28 No.2 pp.407~416, 2018
- 부채널 공격 대응을 위한 Rekeying 기법에 관한 연구, A Study on Rekeying and Sponged-based Scheme against Side Channel Attacks, vol.19 No.3 pp.579~586, 2018
- Study on Remote Data Acquisition Methods Using OAuth Protocol of Android Operating System, Journal of The Korea Institute of Information Security & Cryptology, vol.28 No.1 pp.111~122, 2018
- CoWebDraw: a real-time collaborative graphical editing system supporting multi-clients based on HTML5, Multimedia Tools and Applications, vol.77 No.4 pp.5067~5082, 2018
- Spatial and temporal pyramid-based real-time gesture recognition, Journal of Real-Time Image Processing, vol.13 pp.599~611, 2017
- Analysis on Non-Volatile System Log of Android Based Smartphone, 디지털포렌식연구, vol.11 No.2 pp.19~42, 2017
- A Study on Application Method of Crypto-module for Industrial Control System, Journal of Digital Contents Society, vol.18 No.5 pp.1001~1008, 2017
- A privacy preserving authentication scheme for roaming in ubiquitous networks, Cluster Computing-The Journal of Networks, Software Tools and Applications, vol.20 pp.1223~1236, 2017
- SSL/TLS 공격에 대한 신규 대응 방안, 한국전자거래학회지, vol.22 No.2 pp.169~185, 2017
- Cryptanalysis of the XO-64 Suitable for Wireless Systems, Wireless Personal Communications, vol.93 pp.589~600, 2017
- An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things, Wireless Personal Communications, vol.93 pp.571~587, 2017
- Block Chain Application Technology to Improve Reliability of Real Estate Market, 한국전자거래학회지, vol.22 No.1 pp.51~64, 2017
- The protocol design and New approach for SCADA security enhancement during sensors broadcasting system, Multimedia Tools and Applications, vol.75 No.22 pp.14641~14668, 2016
- Abnormal event detection in crowded scenes based on deep learning, Multimedia Tools and Applications, vol.75 No.22 pp.14617~14639, 2016
- Guest Editorial: Automated Big Data Analysis for Social Multimedia Network Environments, Multimedia Tools and Applications, vol.75 No.20 pp.12663~12667, 2016
- Performance analysis for contention adaptation of M2M devices with directional antennas, The Journal of Supercomputing, vol.72 No.9 pp.3387~3408, 2016
- Security analysis of SDDO-based block cipher for wireless sensor network, The Journal of Supercomputing, vol.72 No.9 pp.3619~3628, 2016
- Capability-based semantic matching for dynamic resource allocation in tactical edge environment, The Journal of Supercomputing, vol.72 No.9 pp.3646~3662, 2016
- Improving the Efficiency of the EWF-file Imaging Time from a Cryptographic Perspective, 정보보호학회논문지, vol.26 No.4 pp.911~919, 2016
- A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols, Sensors, vol.16 No.6 , 2016
- Guest Editorial: Data Mining and Machine Learning Technologies for Multimedia Information Retrieval and Recommendation, Multimedia Tools and Applications, vol.75 No.9 pp.4845~4849, 2016
- Editorial: A special section on "Emerging Platform Technologies", The Journal of Supercomputing, vol.72 pp.1~4, 2016
- Distinguishing attack on CPB-based cipher COSB-128, International Journal of Security and Its Applications, vol.10 No.1 pp.355~360, 2016
- Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis, Peer-to-Peer Networking and Applications, vol.8 pp.716~732, 2015
- Safety Analysis of Various Padding Techniques on Padding Oracle Attack, 정보보호학회논문지, vol.25 No.2 pp.271~278, 2015
- Differential Fault Analysis on Symmetric SPN Block Cipher with Bitslice Involution S-box, 정보처리학회논문지. 컴퓨터 및 통신시스템, vol.4 No.3 pp.105~108, 2015
- Related-Key Differential Attacks on COSB-128, International Journal of Distributed Sensor Networks, 2015
- Padding Oracle Attack on Block Cipher with CBC|CBC-Double Mode of Operation using the BOZ-PAD, 한국전자거래학회지, vol.20 No.1 pp.89~97, 2015
- Analysis of Padding Oracle Attack Possibility about Application Environment; SRTP, MIKEY, CMS, IPSec, TLS, IPTV, 정보처리학회논문지. 컴퓨터 및 통신시스템, vol.4 No.2 pp.73~80, 2015
- Differential Fault Attack on SSB Cipher, 한국항행학회논문지, vol.19 No.1 pp.48~52, 2015
- Methodology and implementation for tracking the file sharers using BitTorrent, Multimedia Tools and Applications, vol.74 No.1 pp.271~286, 2015
- Biclique cryptanalysis of PRESENT-80 and PRESENT-128, The Journal of Supercomputing, vol.70 No.1 pp.95~103, 2014
- An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks, The Journal of Supercomputing, vol.70 No.1 pp.224~235, 2014
- Special issue on convergence of real-time 3D imaging and optical communications, Journal of Real-Time Image Processing, vol.9 pp.519~521, 2014
- The study of stage financing model of IT project investment, Scientific World Journal, 2014
- Knowledge management technologies for semantic multimedia services, Multimedia Tools and Applications, vol.71 No.1 pp.195~198, 2014
- Test-driven forensic analysis of satellite automotive navigation systems, JOURNAL OF INTELLIGENT MANUFACTURING, vol.25 pp.329~338, 2014
- Special section on human-centric computing, Information Sciences, vol.257 pp.229~230, 2014
- Study on advanced analysis method based on timeline chart for Digital Forensic Investigation, 한국항행학회논문지, vol.18 No.1 pp.50~55, 2014
- special issue on Recent advanced in ubiquitous infrastructure technology, Telecommunication Systems, vol.55 pp.1~3, 2014
- Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing, International Journal of Distributed Sensor Networks, 2014
- Posted price model based on GRS and its optimization for improving grid resource sharing efficiency, TELECOMMUNICATION SYSTEMS, vol.55 pp.71~79, 2014
- Methodology and implementation for tracking the file sharers using BitTorrent, Multimedia Tools and Applications, 2013
- Damaged backup data recovery method for Windows mobile, Journal of Supercomputing, vol.66 pp.875~887, 2013
- Differential Fault Analysis onSymmetry Structured SPN Block Cipher, 한국항행학회논문지, vol.17 No.5 pp.568~573, 2013
- A Special Section on Wireless Sensor Networks Technologies and Applications for Smart Spaces, Sensor Letters, vol.11 pp.1672~1674, 2013
- Related-Key Amplified Boomerang Attacks on KT-64 and MD-64 Suitable for Wireless Sensor Networks, sensor letters, vol.11 pp.1765~1770, 2013
- A framework for unified digital evidence management in security convergence, ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, vol.13 pp.379~398, 2013
- Ring and Clustering Routing Strategy Based on Data Filed in Sensor Network, sensor letters, vol.11 pp.1828~1835, 2013
- Security Analysis on Block Cipher XSB, 정보처리학회논문지. 컴퓨터 및 통신시스템, vol.2 No.7 pp.311~316, 2013
- Links organization for channel assignment in multi-radio wireless mesh networks, Multimedia Tools and Applications, vol.65 pp.239~258, 2013
- Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks, EURASIP Journal on Wireless Communications and Networking, 2013
- Angle and ranging based localization method for ad hoc network, sournal of Supercomputing, vol.64 pp.507~521, 2013
- mCrypton and LED against biclique cryptanalysis, Peer-to-Peer Networking and Applications, 2013
- On-site investigation methodology for incident response in Windows environments, Computers & Mathematics with Applications, vol.65 No.9 pp.1413~1420, 2013
- Efficient three-party key exchange protocols with round efficiency, Telecommunication Systems, vol.52 No.2 pp.1367~1376, 2013
- Digital Forensics Framework for Cloud Computing, 한국항행학회논문지, vol.17 No.1 pp.63~68, 2013
- XFS file system and file recovery tools, International Journal of Smart Home, vol.7 No.1 pp.193~198, 2013
- A study on tachograph based security network, International Journal of Smart Home, vol.7 No.1 pp.231~238, 2013
- Security analysis of scalable block cipher PP-1 applicable to distributed sensor networks, International Journal of Distributed Sensor Networks, vol.2013 No.0 pp.0~0, 2013
- Applying Forensic Approach to Live Investigation Using XeBag, Lecture Notes in Electrical Engineering, vol.203 pp.389~397, 2012
- A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks, JOURNAL OF SUPERCOMPUTING, vol.62 No.1 pp.4~23, 2012
- The effective method of database server forensics on the enterprise environment, SECURITY AND COMMUNICATION NETWORKS, vol.5 pp.1086~1093, 2012
- Differential Fault Analysis on Lightweight Block Cipher LBlock, 한국항행학회논문지, vol.16 No.5 pp.871~878, 2012
- Analysis Framework to Detect Artifacts of Portable Web Browser, Lecture Notes in Electrical Engineering, vol.180 pp.207~214, 2012
- Methodology for Digital Investigation of Illegal Sharing Using BitTorrent, Lecture Notes in Electrical Engineering, vol.180 pp.187~195, 2012
- Methodology for Digital Forensic Investigation of iCloud, Lecture Notes in Electrical Engineering, vol.180 pp.198~206, 2012
- A New Design and Implementation of Digital Evidence Container for Triage and Effective Investigation, 전자공학회논문지 - CI, vol.49 No.4 pp.31~41, 2012
- Differential Fault Analysis on Block Cipher LED-64, Lecture Notes in Electrical Engineering, vol.164 , 2012
- Recent advances and future directions in multimedia and mobile computing, Multimedia Tools and Applications, vol.57 pp.237~242, 2012
- A Key Management Scheme for Security and Energy Efficiency in Sensor Networks, JOURNAL OF INTERNET TECHNOLOGY, vol.13 No.2 pp.223~231, 2012
- Security Analysis of Block Cipher KT-64, 정보처리학회논문지C, vol.19 No.1 pp.55~62, 2012
- On-the-spot digital investigation by means of LDFS: Live Data Forensic System, MATHEMATICAL AND COMPUTER MODELLING, vol.55 No.43102 pp.223~240, 2012
- Task-based behavior detection of illegal codes, MATHEMATICAL AND COMPUTER MODELLING, vol.55 No.43102 pp.80~86, 2012
- 블록 암호SCOS-3의 연관키 차분 공격에 대한 안전성 분석, 한국항행학회논문지, vol.13 No.6 pp.977~983, 2009
- CFES: Comprehensive Framework for Forensic Analysis of Embedded Systems, Journal of Internet Technology, vol.11 No.1 pp.549~562, 2009
- 축소된 SMS4 블록 암호에 대한 향상된 안전성 분석, 정보보호학회논문지, vol.19 No.3 pp.3~10, 2009
- 유비쿼터스 환경에 적합한 블록암호 mCrypton에 대한 안전성 분석, 멀티미디어학회논문지, vol.12 No.5 pp.644~652, 2009
- AES의 연관키 랙탱글 공격에 대한 안전성 분석, 정보보호학회논문지, vol.19 No.2 pp.39~48, 2009
- Security analysis of the SCO-family using key schedules, Information Sciences, vol.179 No.24 pp.4232~4242, 2009
- Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments, Journal of Universal Computer Science, vol.15 No.5 pp.1007~1022, 2009
Conference Papers
-
- 변현수, 서승희, 이창훈, A study of the identification of wiping tool usage traces by NTFS event log pattern analysis, 2021 한국정보보호학회 동계학술대회(CISC-W) 논문집, 온라인, 2021
- 공성현, 이창훈, High-speed password cracking technique using probability-based password pattern extraction, 2021 한국정보보호학회 동계학술대회(CISC-w) 논문집, 온라인, 2021
- 최민영, 석병진, 조민정, 이창훈, A Study on Performance benchmarking ofKorea Encryption Algorithm on VxWorks based IndustrialControl System, CISC-W'21 Vol.31, No.2, 온라인 발표, 2021
- 차해성, 서승희, 이창훈, A New Password Recovery Algorithm of hwpx Document by Reverse-Engineering of Hancom Office, ICT플랫폼학회 추계학술대회 발표논문집, 동국대학교 충무로 영상센터, 2021
- 최민영, 조민정, 이창훈, Performance Comprarison of Encryption Algorithm in Vxworks, 2021 국가암호공모전(논문) 발표집, 온라인 발표, 2021
- 공성현, 이창훈, A Study on Cyber-attack Modeling and Simulation Methods for Industrial Control System Environment, 2021년도 춘계학술대회 발표논문집, 강릉 경포 라카이샌드파인 리조트, 2021
- 문상민, 서승희, 이창훈, Digital Forensic Analysis for Smart-home Platform Hejhome, CISC-S'21 Vol.31, No.1, 온라인 컨퍼런스(한국과학기술회관 12F 아나이스홀), 2021
- 차해성, 공성현, 이창훈, Bittorrent File Sharing Framework with Automatic Malicious Behavior Analysis of Cuckoo Sandbox, CISC-S'21 Vol.31, No.1, 온라인 컨퍼런스(한국과학기술회관 12F 아나이스홀), 2021
- 박진성, 서승희, 석병진, 이창훈, 디지털포렌식 관점에서의 암호키 재사용 취약점을 이용한 앱 데이터 복호화 연구, CISC-W-20, 온라인컨퍼런스, 2020
- 김인영, 조민정, 이창훈, 콘솔 게임기 아티팩트 분석 : 불법 콘텐츠 재생을 위한 익스플로잇 현황을 중심으로, CISC-W-20, 온라인컨퍼런스, 2020
- 박진성, 공성현, 이창훈, 음란물 유포 경로 추적을 위한 Tumblr 애플리케이션 메모리 포렌식 분석, CISC-S-20, 온라인 컨퍼런스, 2020
- 조서연, 서승희, 조민정, 이창훈, SCADA 시스템에 대한 랜섬웨어 최신 동향 분석, CISC-S-20, 온라인컨퍼런스, 2020
- Erzhena Tcydenova, 조민정, 석병진, 이창훈, Application of Neural Differential Distinguisher on SIMON-32/64, CISC-S-20, 온라인 컨퍼런스, 2020
- Seonghyeon Gong and Changhoon Lee, Efficient Data Noise-Reduction for Cyber Threat Intelligence System, Advances in Computer Science and Ubiquitous Computing, University of Macau, 2019
- 배재건, 공성현, 이창훈, A Study on Intel SGX-based Management Scheme to Prevent Certificate Leakage Accident, CISC-W'19, 중앙대학교 흑석동, 2019
- 조서연, 석병진, 이창훈, Security requirements for Industrial Communication Protocol on Smart Factory, The 2019 Korea institute of Information Security and Cryptology Choongchung Chapter (KIISC CC 2019), 한남대학교, 2019
- 박진성,이창훈, Secure OAuth Framework using Blockchain based on Cloud Service, 2019 정보보호학회 하계학술 대회, 동명대학교, 2019
- 공성현, 이창훈, Cyber Threat Intelligence based Cyber Kill Chain Model, 한국정보보학회 하계학술대회 논문집 Vol.29 No.1, 부산 동명대학교, 2019
- 배재건,공성현,석병진,이창훈, Analysis of DLL Hijacking Vulnerability in System Executable Files for Administerator Pribileges of Windows, 2019년 춘계학술발표대회 논문집 제 26권 제 1호, 숭실대학교, 2019
- 조서현,공성현,석병진,이창훈, DDoS Security Considerations When proposing a protocol for CoAP, 2019년 춘계학술발표대회 논문집 제 26권 제 1호, 숭실대학교, 2019
- 남기훈, A study on user account hijacking using Android application vulnerability, 2017 디지털포렌식 동계 학술대회, 상명대학교, 2017
- 서승희, Forensic analysis of Instagram Application on Android, 2017 디지털 포렌식 기술 하계 워크숍, 서울과학기술대학교, 2017
- 공성현, 조민정, 조재익, 이창훈, A Study on Dataset Construction Technique for Intrusion Detection based on Pattern Recognition, 2017년 춘계학술발표대회 논문집 제24권 제1호(2017.4), 제주대학교 아라캠퍼스, 2017
- Tran Song Dat Phuc, Byoungjin Seok, Changhoon Lee, Rekeying Approach against Side Channel Attacks, 2017년도 춘계학술발표대회 논문집 제24권 제1호(2017.4), 제주대학교 아라캠퍼스, 2017
- 공성현, 강형철, 이창훈, An Analysis of Letest Authentication Encryption, 2016년도 한국정보보호학회 하계학술대회 논문집, 부경대학교, 2016
- 오서영, 임권창, 문도현, 이창훈, Padding Oracle Attacks on CBC|CBC|CBC Mode Encryption with BOZ-PAD and ANSI X.923, 2016년도 한국정보보호학회 하계학술대회 논문집, 부경대학교, 2016
- Tran Song Dat Phuc, Changhoon Lee, Distinguishing Attack on XO-64, IEEE Proceedings-2016 International Conference on Platform Technology and Service (PlatCon), 제주 롯데시티 호텔, 2016
- 정원서, 이재형, 이창훈, Security Vulnerability and Cracking Case of Wireless routers, 2016년도 한국통신학회 동계종합학술발표회, 하이원리조트, 2016
- HyungChul Kang, Myungseo Park, Dukjae Moon, Changhoon Lee, Jongsung Kim, Kimoon Kim, Juhyuk Kim, Seo, New Efficient Padding Methods Secure against Padding Oracle Attacks, The 18th Annual International Conference on Information Security and Cryptography, 중앙대학교, 2015
- 최종훈, 신지혜, 김대호, 이창훈, A Study of Cryptograph Algorithm Education for the Lower Grades in Elemen, 2015년도 한국정보처리학회 추계학술발표대회 논문집, 제주한라대학교, 2015
- 정원서, 이재형, 이창훈, Analysis of Security Vulnerability for Smart Car, 2015년도 한국정보처리학회 추계학술발표대회 논문집, 제주한라대학교, 2015
- 임권창, 정태을, 이창훈, The security issue and example experiment of smart healthcare, 2015년도 한국정보처리학회 추계학술발표대회 논문집, 제주한라대학교, 2015
- 양승재, 문도현, 이창훈, Analysis of Smart Home Technology for IoT, 2015년도 한국정보처리학회 추계학술발표대회 논문집, 제주한라대학교, 2015
- 공성현, 오서영, 이창훈, Analysis of password hashing algorithms, 2015년도 한국정보처리학회 추계학술발표대회 논문집, 제주한라대학, 2015
- Chen Si-hua, Changhoon Lee, He wei, The application of stage financing to IT project investment, Proceedings iof the 2013 International Conference on Platform Technology and Service, Ramada Plaza jeju Hotel, 2014
- Chen Si-hua, Changhoon Lee, He Wei, Study on Qualitative Simulation of Non-cooperative Behaviors of Knowledge Workers, Proceedings iof the 2013 International Conference on Platform Technology and Service, Ramada Plaza jeju Hotel, 2014
- Seongjin wang ghoon Lee, A Study on Privacy in Big Data Environment, Proceedings iof the 2013 International Conference on Platform Technology and Service, Ramada Plaza jeju Hotel, 2014
- Trna Song Dat Phuc, Changhoon Lee, Distinguishing attack on CPB-based cipher COSB-128, Proceedings iof the 2013 International Conference on Platform Technology and Service, Ramada Plaza jeju Hotel, 2014
- Jinkeon Kang, Kitae Jeong, Changhoon Lee, Seokhie Hong, Distinguishing Attack on SDDO-Based Block Cipher BMD-128, Ubiquitous Information Technologies and Applications, Berlin Heidelberg, 2013
- 이창훈, 황성진,김종성, 박명서, A Study on Privacy in a Big Data Environment, 2013년도 한국정보보호학회 동계학술대회 CISC-W'13, 아주대학교 종합관, 2013
- 이근기, 이창훈, 이상진, 신규 파일 시스템에 대한 디지털 포렌식 분석 필요성 연구, 제 38회 한국정보처리학회 추계학술대회 논문집, 제주대학교 아라캠퍼스, 2012
- Yuseop Lee, Jongsung Kim, Seokhie Hong, Changhoon Lee, Improved Differential Fault Analysis on Block Cipher SEED-128, Proceedings of the 15th International Conference on Network-Based Information Systems (NBiS 2012), La Trobe University, City campus, Melbourne, Australia, 2012
- 강진건 이창훈, 경량 암호의 하드웨어 구현 최적화 기법에 관한 연구, 2012 한국정보기술융합학회 동계학술대회 논문집, 제주 샤인빌리조트, 2012
- 정기태, 이창훈, 최신 블록 암호 운영 모드에 관한 연구, 2012 한국정보기술융합학회 동계학술대회 프로시딩, 제주 샤인빌리조트, 2012
- 강진건, 이창훈, 경량 블록 암호 개발 동향, 제 37회 한국정보처리학회 춘계학술대회 논문집, 순천대학교 70주년 기념관, 2012
- Jinkeon Kang, Kitae Jeong, Sang-Soo Yeo, Changhoon Lee, Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments, Proceeding of IEEE 26th International Conference on Advanced Information Networking and Applications, Fukuoka-shi, Japan, 2012
- 강진건, 정기태, 이창훈, 블록암호 AES 에 대한 차분 오류 공격 동향, 2012년 한국정보기술융합학회 동계학술대회, 경기 곤지암리조트, 2012
- 이근기, 이창훈, 이상진, 삭제된 이메일 항목 복원 기술에 대한 연구, 2012 한국정보기술융합학회 동계학술대회 논문집, 경기도 곤지암리조트, 2012
Books
Cryptographic Mathematics, 2009
Projects
- 에너지 클라우드 고신뢰 암호모듈 개발 및 포렌식 기술 연구, 한국연구재단, 2019.06.~2021.12.
- 디지털포렌식 관점에서의 플래싱 도구 활용 방안 연구, 대검찰청, 2019.05.~2019.11.
- 스마트공장 네트워크 인프라용 보안 칩 및 실시간 제어프로토콜 보안 기술 개발, 정보통신기획평가원(구'정보통신기술진흥센터), 2019.04.~2021.12.
- 메모리 포렌식 관점에서의 모바일 브라우저 사생활 보호 모드 분석, 산학협력단, 2019.03.~2020.02.
- 지능형 위협에 대한 딥러닝 기반 공격 예측 및 선제 대응 기술 연구, 산학협력단, 2018.02.~2021.01.
- 인스타그램 분석을 통한 사용자 행위 분석에 관한 연구, 산학협력단, 2017.07.~2018.02.
- 부채널 공격 대응을 위한 Rekeying 기법에 관한 연구, 산학협력단, 2017.06.~2018.02.
- 네트워크 패킷 분석을 통한 프로토콜 패턴 분석 연구, 고려대학교산학협력단, 2017.05.~2017.12.
- 최신 모바일 기기에 대한 암호해독 및 포렌식 분석, 정보통신기획평가원(구'정보통신기술진흥센터), 2017.04.~2020.12.
- 17년 고용계약형 SW석사과정 지원사업, 과학기술정보통신부, 2017.03.01.~2017.12.31.
- '17년 고용계약형 SW석사과정 지원사업, 정보통신기술진흥센터, 2017.03.~2017.12.
- 국가 차원의 침해사고 대응을 위한 사이버 위협 인텔리전스 분석(CTI) 및 정보 공유 기술 개발, 정보통신기획평가원(구'정보통신기술진흥센터), 2017.03.~2019.12.
- 원전 비안전등급 제어기기(DCS) 사이버침해 예방 및 탐지 기술 개발, 한국에너지기술평가원, 2016.12.~2020.12.
- 부채널 공격에 안전한 신규 암호 프리미티브 개발, 정보통신기술진흥센터, 2016.09.~2016.12.
- 암호데이터 중복처리 서비스를 위한 암호 운영 모드 적합성 연구, 한국전자통신연구원, 2016.07.~2016.11.
- 사물인터넷(IoT) 환경의 공개키 알고리즘 및 해시함수 적용방안 연구, 한국인터넷진흥원, 2016.04.~2016.10.
- 사물인터넷(IoT) 환경에 적합한 경량 인증 암호화 기술 개발, 한국연구재단, 2015.07.~2018.06.
- 최신 암호기술 국제공모(PHC, CAESAR) 동향 및 신규 설계논리 분석 연구, ETRI부설국가보안기술연구소, 2015.06.~2016.01.
- 사물인터넷(IoT) 환경에서의 암호·인증기술 이용기준 마련 및 최적 구현 방법 연구, 한국인터넷진흥원, 2015.05.~2015.12.
- NIST-PAD를 사용하는 CBC|CBC 이중 모드에 대한 패딩 오라클 공격, 산학협력단, 2014.12.~2015.11.
- 비트 슬라이스 대합 S-박스에 의한 대칭 SPN 블록 암호에 대한 차분 오류 공격, 산학협력단, 2014.07.~2015.06.
- 블록 암호 SSB에 대한 차분 오류 공격, 산학협력단, 2014.04.~2015.03.
- 국산 블록암호기술의 안전한 패딩 설계방법 연구 및 암호 기술 중장기 로드맵 개발 연구, 한국인터넷진흥원, 2014.04.~2014.11.
- '14년 고용계약형 SW석사과정 지원사업, 정보통신산업진흥원, 2014.03.~2015.02.
- 타임 라인 분석 기법을 이용한 디지털 증거 분석 방법, 산학협력단, 2013.03.~2014.02.
- 대칭구조 SPN 블록 암호 알고리즘에 대한 차분 오류 공격, 산학협력단, 2013.03.~2014.02.
- 클라우드 환경을 고려한 디지털 포렌식 프레임워크, 산학협력단, 2012.09.~2013.02.
- 블록 암호 Lblock에 대한 차분 오류 공격, 산학협력단, 2012.09.~2013.02.
- 퍼블릭클라우드환경에서 가상화 보안 모델링 연구, 한국정보화진흥원, 2012.06.~2012.12.
- IT멘토링 팀 프로젝트 지원과제(스마트 모바일 기기를 이용한 원격 회사 업무 & 계획 플래너 개발), 정보통신산업진흥원, 2012.05.~2012.12.
- 안전한 암호 알고리즘 및 키 선택을 위한 암호기술 안전성 분석, 한국인터넷진흥원, 2012.04.~2012.10.
- 경량 블록 암호 알고리즘에 대한 안전성 분석, 국정원, 2012.03.~2012.11.
- 차세대 디지털 증거 관리 기술 연구, 한국연구재단, 2011.05.~2013.04.
수상
- 2018년도 연구분야 우수교원, 2018년도 연구분야 우수교원 표창, 서울과학기술대학교 산학협력단, 2020
- 메모리 포렌식 관점에서의 One-Byte Modification 공격 대응 방안 연구, 2020 한국디지털포렌식학회 동계학술대회 우수논문상, 한국디지털포렌식학회, 2020
- Graph Convolutional Network based Cyber Threat Intelligence Modeling for Cyber Kill-Chain Response, 2020 사이버안보 논문 공모전 장려상, KOREA INSTITUTE OF INFORMATION SECURITY & CRYPTOLOGY, 2020
- Digital Forensic Analysis Using Vulnerability of Bluetooth-based Smart Doorlocks, Tech Contest 2nd, KOREA INSTITUTE OF INFORMATION SECURITY & CRYPTOLOGY, 2019
- DDoS Security Considerations When proposing a protocol for CoAP, a silver prize, KOREA INSTITUTE OF INFORMATION SECURITY & CRYPTOLOGY., 2019
- 블록체인 기반의 부동산 스마트 컨트랙트 시스템, 국가암호공모전 특별상, KIISC, KCF, 2018
- 디지털 포렌식 관점에서 랜덤 챗 어플리케이션 사용자 행위 분석 연구, 2018 디지털 포렌식 동계 학술대회 우수논문상, korean national police agency, 2018
- 안드로이드 환경에서의 인스타그램에 대한 포렌식 분석, 2017년 한국디지털포렌식학회 디지털포렌식기술 하계워크숍 우수논문상, Korea Digital Forensic Society, 2017
- Rekeying Approach against Side Channel Attacks, 한국정보처리학회 춘계학술대회 우수논문상, 한국정보처리학회, 2017
- Distinguishing Attack on XO-64, Best Paper, ICT플랫폼학회-PlatCon 2016 국제학술대회, 2016
- 패딩 오라클 공격에 안전한 신규 패딩 방, 우수상 (논문분야), 국가보안기술연구소, 2015
- Security Analysis on Block Cipher with CBCCBCCBC-Triple Modes of Operation Using the BOZ-PAD, 2015 International Conference on Platform Technology and Service-Best Paper, ICT플랫폼학회, 2015
- Related-key Attack on COSB-128, 논문 특별상, 한국정보보학회, 2014
- Applying Forensic Approach to Live Investigation using XeBag, CSA 2012 Best Paper Award, FTRA - Future Technology Research Association International, 2012
- 공로상, 한국정보처리학회, 2010
- 공로상, 한국정보처리학회, 2009
- Best Paper Award (우수논문상), CSA 2008 국제학술회의, 2008
Miscellaneous
IEEE Society
IEEE Computer Society
IEEE Communications Society
International Association for Cryptologic Research (IACR).
Research Group BM7
Korea Institute of Information Security & Cryptology (KIISC),
Korea Information Processing Society (KIPS)
Korea Digital Forensic Society (KDFS),
ICT Platform Society
Korean Society For Internet Information (KSII)
Korea Multimedia Society (KMMS)
The Korea Insitute of Commuications and Information Sciences (KICS)
The Institute of Electronics and Information Engineers (IEIE)
Korean Institute of Information Technology (KIIT)
The Korean Navigation Institute (KONI)
Institution of Creative Research Professionals (ICRP), Senior Vice-President & Director