教師個人簡歷
現職
國立中央大學
資訊電機學院資訊工程學系
教授
專長
系統及網路安全
行動裝置安全
IoT 安全
Web Security
System and Network Security
Smartphone Security
IoT Security
Web Security
專長簡述
系統安全、電腦及網路安全、作業系統、行動裝置與無線裝置安全、車輛安全
最高學歷
美國Stony Brook University
computer Science
博士
科技部學門領域
- E - 工程及應用科學
- E08 - 資訊工程/智慧計算
- E0818 - 資訊安全
- E0896 - 系統安全保證及反駭客控制應用開發
- E13 - 晶片系統國家型計畫
- E1304 - 自由軟體暨嵌入式系統
- E40 - 資訊工程(資訊)
- E4006 - 資訊安全
- E4096 - 系統安全保證及反駭客控制應用開發
- E4098 - 資訊安全實務應用專案
- E92 - 電信國家型計畫
- E93 - 網路通訊國家型計畫
- E9302 - 通訊軟體及平台(網通國家型)
- E98 - 專案計畫
- E9833 - 深耕工業基礎技術專案計畫- 非主動規劃型
- H - 人文及社會科學
- H11 - 教育學
- H11A9 - 課程與教學
政府GRB研究專長領域
教育部學門領域
在職專班
-
108學年度資工系碩士在職專班
1080701~1090731
-
107學年度資工系碩士在職專班
1070701~1080731
-
106學年度第二學期資訊工程學系碩士在職專班
1060701~1070731
高教深耕計畫
-
中大講座「資訊工程講座」- 張可昭教授
1080101~1081231
-
「高等深耕教育-教學創新與推動」-資工系:程式設計與智慧科技
1080101~1081231
-
中大講座「資訊工程講座」- 張可昭教授
1070101~1071231
-
「高教深耕計畫-教學創新與推動」-資工系:智慧科技與資訊安全
1070101~1071231
其他補助
-
提升校園行動應用服務研發及內容設計人才培育計畫
1050518~1061231
國科會計畫統計
-
遠距辦公下重要檔案的存取防護,防毒和帳號保護
1140801~1150731
-
無檔案惡意程式與勒索軟體的解決方法
1130801~1140731
[勒索軟體,無檔案惡意程式,動態程式庫注入,掃毒軟體,病毒特徵碼 , ransomware,fileless malware,DLL injection,antivirus,virus signature] -
無檔案惡意程式與勒索軟體的解決方法
1120801~1130731
[勒索軟體,無檔案惡意程式,動態程式庫注入,掃毒軟體,病毒特徵碼 , ransomware,fileless malware,DLL injection,antivirus,virus signature] -
無檔案惡意程式與勒索軟體的解決方法
1110801~1120731
[勒索軟體,無檔案惡意程式,動態程式庫注入,掃毒軟體,病毒特徵碼 , ransomware,fileless malware,DLL injection,antivirus,virus signature] -
Android上新型資安攻擊的防禦方法
1100801~1110731
[工作綁架,安卓框架,安卓偵錯程式,智慧型手機,惡意應用程式 , task hijacking,Android framework,Android adb,smartphone,malicious app] -
Android上新型資安攻擊的防禦方法
1090801~1100731
[工作綁架,安卓框架,安卓偵錯程式,智慧型手機,惡意應用程式 , task hijacking,Android framework,Android adb,smartphone,malicious app] -
Android上新型資安攻擊的防禦方法
1080801~1090731
[工作綁架,安卓框架,安卓偵錯程式,智慧型手機,惡意應用程式 , task hijacking,Android framework,Android adb,smartphone,malicious app] -
公共熱點的惡意Rogue AP偵測
1070801~1080731
-
運用SDN與NFV佈建虛擬網路功能技術研究(I)
1070101~1071231
[軟體定義網路,網路功能虛擬化,服務功能鏈,網路服務標頭,路由控制,頻寬管理 , Software-Defined networking,Network Functions Virtualization,Service Function Chaining, Network Service Header,Routing Control,Bandwidth Management] -
公共熱點的惡意Rogue AP偵測
1060801~1070731
-
公共熱點的惡意Rogue AP偵測
1050801~1060731
-
Android跨元件Intent的動態防禦機制
1040801~1050731
[smartphone, component hijacking attack, Android OS, Intent ]
產學合作計畫統計
-
資訊安全手法設計與驗證技術
1130607~1140331
[車用 , ATRC] -
基地台TCP Proxy 研究
1130201~1130630
[TCP,Proxy,5G通訊 , TCP,Proxy,5G Communication] -
TCP中間盒反射放大流量技術(1/1)
1130101~1131231
[中間盒,分散式阻斷攻擊,反射攻擊,放大攻擊,TCP,網路安全 , Middlebox,DDoS,Reflect attack,Amplify attack,TCP,Network Security] -
基於封包流量異常通報自動鑑別分析技術研究
1120101~1121130
[鏡像封包檢測,網路封包,機器學習 , Mirror packet examination,ML] -
能源物聯網裝置資訊安全導入建置與攻擊測試應用研究
1100401~1101130
[物聯網,網路安全,閘道器,白名單 , IoT,Network Security,Gateway,Whitelisting] -
能源物聯網的資訊安全與應用研究
1090401~1091130
[自動收集與申報系統,物聯網,網路安全,集中器 , IoT,Network Security,Data Concentrator] -
資工系技術服務計畫-校內
1080101~1081231
-
Rouge AP偵測技術研究
1080101~1081215
-
閘道型重要網路服務快速移轉硬體裝置
1070301~1071231
-
基於虛擬化之應用程式白名單技術
1070101~1071231
-
教育部補助辦理第19屆海峽兩岸資訊技術(CSIT2017)研討會
1061101~1061231
-
4G端點防護支關鍵檔案隔離技術
1060501~1061215
-
分散式阻斷服務攻擊
1060401~1061231
-
基於虛擬化之應用程式白名單技術
1060101~1061231
-
基於自動更新機制之新式攻擊
1051001~1051231
-
家用基站系統非預期行為監控與阻絕技術
1050401~1051215
-
AMI滲透測試技術研究與攻擊工具開發
1050315~1051130
-
網路設備密碼模組安全性分析
1050201~1051130
-
基於虛擬化之應用程式白名單技術
1050101~1051231
-
Cyber Security Start-up 調查分析
1041101~1041231
-
A Live Migration-based 之網路測試驗證
1041101~1041231
-
AMI滲透測試技術研究及軟體平台建置
1040415~1041130
-
通訊異常及權限濫用行為之自動化分析研究
1040401~1050229
期刊著作
-
USBIPS Framework: Protecting Hosts from Malicious USB Peripherals
Computer Standards and Interfaces, 95, 2025-06-25
[ USB peripheral,USB firewall,Human interface device,Protocol masquerading,Behavior-based detection ] -
Enhancing Linux System Security: A Kernel-Based Approach to Fileless Malware Detection and Mitigation
Electronics (Switzerland), 13, 17, 2024-09-01
[ antivirus,dynamic analysis,fileless malware,memory analysis ] -
MPSD: A Robust Defense Mechanism against Malicious PowerShell Scripts in Windows Systems
Electronics (Switzerland), 13, 18, 2024-09-01
[ Antimalware Scan Interface,malware detection,PowerShell commands,VirusTotal,Windows security ] -
A Vehicle Forensics framework with Post-Quantum Cryptography and Blockchain
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS, 2024, 2024-01-01
[ blockchain,data security,post-quantum cryptography,privacy,vehicle forensics ] -
Defending IoT Devices against Bluetooth Worms with Bluetooth OBEX Proxy
Information (Switzerland), 14, 10, 2023-10-01
[ Bluetooth technology,BlueZ’s OBEX service daemon,Internet of Things (IoT),IoT device security,IoT malware ] -
MinerGuard: A Solution to Detect Browser-Based Cryptocurrency Mining through Machine Learning
Applied Sciences (Switzerland), 12, 19, 2022-10-01
[ bitcoin,browser-based cryptocurrency mining,cryptojacking,JavaScript miner,machine learning,monero ] -
WPFD: Active User-Side Detection of Evil Twins
Applied Sciences (Switzerland), 12, 16, 2022-08-01 -
IoTD: An approach to identify E-mails sent by IoT devices
Computer Communications, 179, 62-72, 2021-11-01
[ Internet of Things,SMTP,Spam,TLS ] -
SMS Observer: A dynamic mechanism to analyze the behavior of SMS-based malware
Journal of Parallel and Distributed Computing, 156, 25-37, 2021-10-01
[ Emulation,Information security,Network security,System analysis and design,Unified messaging ] -
DPC:A Dynamic Permission Control Mechanism for Android Third-Party Libraries
IEEE Transactions on Dependable and Secure Computing, 18, 4, 1751-1761, 2021-07-01 -
Ddos flood and destination service changing sensor
Sensors, 21, 6, 1-17, 2021-03-02
[ DDoS attack,Live migration,Loadable kernel module,Network security,TCP three-way handshake ] -
Simple and Ingenious Mobile Botnet Covert Network Based on Adjustable Unit (SIMBAIDU)
Mathematical Problems in Engineering, 2021, 2021-01-01 -
A passive user-side solution for evil twin access point detection at public hotspots
International Journal of Communication Systems, 33, 14, 2020-09-25
[ evil twin , rogue access point , Wi-Fi , wireless security ] -
A cloud-based real-time mechanism to protect end hosts against malware
Applied Sciences (Switzerland), 9, 18, 2019-09-01
[ Antivirus , Cloud system , Malware , Real time detection ] -
A solution to detect the existence of a malicious rogue AP
Computer Communications, 142-143, 62-68, 2019-06-15
[ Evil twin , Network security , Rogue access point , Wi-fi , Wireless security ] -
Itus: Behavior-based spamming group detection on Facebook
Journal of Computers (Taiwan), 29, 4, 69-81, 2018-08-01
[ Advertisement,Behavior-based approach,Classifer,Facebook Spamming Groups,Social network,SVM ] -
A Cloud-based Protection approach against JavaScript-based attacks to browsers
Computers and Electrical Engineering, 68, 241-251, 2018-05-01
[ Cloud-based Protection , Malicious JavaScript , VirusTotal , Web security ] -
Handover: A mechanism to improve the reliability and availability of network services for clients behind a network address translator
Computers and Electrical Engineering, 67, 159-169, 2018-04-01
[ DDoS , Live migration , NAT , Three-way handshake , Virtual machine ] -
A client-side detection mechanism for evil twins
Computers and Electrical Engineering, 59, 76-85, 2017-04-01
[ Evil twin , Rogue AP , Wi-Fi , Wireless ] -
Detecting Web-Based Botnets Using Bot Communication Traffic Features
Security and Communication Networks, 2017, 2017-01-01 -
VRS: a values-based reputation system for web services
Security and Communication Networks, 9, 18, 6335-6350, 2016-12-01
[ recommendation system , reputation system , Sybil attack , web service ] -
TRAP: A Three-way handshake server for TCP connection establishment
Applied Sciences (Switzerland), 6, 11, 2016-11-16
[ DDoS , Netfilter , SYN flood attack , TCP , TCP options , Three-way handshake ] -
Data concealments with high privacy in new technology file system
Journal of Supercomputing, 72, 1, 120-140, 2016-01-01
[ Anti-forensics , File rootkit , File storage system , NTFS ] -
Defeat scanning worms in cyber warfare
Security and Communication Networks, 8, 5, 715-726, 2015-03-25
[ Computer crime , Network security , System security , Worm ] -
Web security in a windows system as PrivacyDefender in private browsing mode
Multimedia Tools and Applications, 74, 5, 1667-1688, 2015-01-01
[ Anti-forensics , Malicious , Private browsing , Web security ] -
Bypass cell-phone-verification through a smartphone-based botnet
Journal of Information Science and Engineering, 31, 3, 1097-1111, 2015-01-01
[ Cell-phone security , Cell-phone-verification , Smartphone-based botnet ] -
Detect fast-flux domains through response time differences
IEEE Journal on Selected Areas in Communications, 32, 10, 1947-1956, 2014-10-01 -
Image reversibility in data embedding on the basis of blocking-predictions
Peer-to-Peer Networking and Applications, 7, 4, 723-736, 2014-01-01
[ Blocking-predictions , Histogram-based , Image quality , Predictions , Reversibility ] -
Visible watermarking with reversibility of multimedia images for ownership declarations
Journal of Supercomputing, 70, 1, 247-268, 2014-01-01
[ Histogram , Ownership , Reversibility , Visible , Watermarking ] -
Reversible data hiding using side-match predictions on steganographic images
Multimedia Tools and Applications, 67, 3, 571-591, 2013-12-01
[ Histogram , Information hiding , Prediction , Reversible data hiding , Side match ] -
ARMORY: An automatic security testing tool for buffer overflow defect detection
Computers and Electrical Engineering, 39, 7, 2233-2242, 2013-10-01 -
Reversibility of image with balanced fidelity and capacity upon pixels differencing expansion
Journal of Supercomputing, 66, 2, 812-828, 2013-03-15
[ Difference expansion , Histogram , Predictor , Reversible data hiding ] -
Message from the TC workshop chairs: The first international workshop on trustworthy computing
, 2013-01-01 -
Antivirus software shield against antivirus terminators
IEEE Transactions on Information Forensics and Security, 7, 5, 1439-1447, 2012-09-20
[ Antivirus software , API hooking , malware ] -
Application of neural networks for detecting erroneous tax reports from construction companies
Automation in Construction, 20, 7, 935-939, 2011-11-01
[ Construction company , Neural networks , Pattern classification , Tax report ] -
BrowserGuard: A behavior-based solution to drive-by-download attacks
IEEE Journal on Selected Areas in Communications, 29, 7, 1461-1468, 2011-08-01
[ drive-by-download attack , heap spray , intrusion detection , malware , system security , Web browser ] -
A reinforcement-learning approach to color quantization
Journal of Applied Science and Engineering, 14, 2, 141-150, 2011-06-01
[ Classifier systems , Color quantization , Color reduction , Machine learning , Neuro-Fuzzy systems , Pattern recognition , Reinforcement learning ] -
A robust kernel-based solution to control-hijacking buffer overflow attacks
Journal of Information Science and Engineering, 27, 3, 869-890, 2011-05-01
[ AURORA,Buffer overflow attack,Control hijacking boa,Retum-into-libc attack,Stack smashing attack ] -
HSP: A solution against heap sprays
Journal of Systems and Software, 83, 11, 2227-2236, 2010-11-01
[ ASLR , Buffer overflow attack , Heap spray , System call ] -
A neural tree and its application to spam e-mail detection
Expert Systems with Applications, 37, 12, 7976-7985, 2010-01-01
[ Decision tree , Incremental learning , Neural networks , Neural tree , Pattern classification , Spam detection ] -
A signal-representation-based parser to extract text-based information from the web
Journal of Advanced Computational Intelligence and Intelligent Informatics, 14, 5, 531-539, 2010-01-01 -
Sago: A network resource management system for real-time content distribution
Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS, 2002-January, 557-562, 2002-01-01
[ Delay , Fault tolerance , Fault tolerant systems , Internet , IP networks , Multicast algorithms , Network topology , Real time systems , Resource management , Scheduling algorithm ]
研討會著作
-
Identifying IoT Devices with SMTP
2021-01-01
-
A Kernel Module Based Mechanism to Establish a TCP/IP Connection When Destination Service Changing
2020-09-28
-
Keep rogue IoT away: IoT detector based on diversified tls negotiation
548-555, 2019-08-01
[ Botnet , HTTPS , IoT , Security , TLS negotiation ] -
Preventing Activity Hijacking Attacks in Android APP
170-173, 2019-05-01
[ Activity Hijacking , Android forensics , Android Malware , Instant message , View System ] -
Fake GPS Defender: A Server-side Solution to Detect Fake GPS
2018-07-22
[ Fake GPS,Server Side Solution ] -
The bilateral communication-based dynamic extensible honeypot
263-268, 2016-01-21
[ bait , bilateral communication , honeynet , honeypot , shellcode , zero-day attack ] -
Hawkeye: Finding spamming accounts
2014-01-01
[ Botnet , Compromised account , E-mail , Spam ] -
A QTE-based solution to keylogger attacks
62-67, 2012-12-01
[ Authentication , Computer security , Keylogger , Privacy ] -
Dual-watermarking by QR-code applications in image processing
638-643, 2012-11-28
[ Data hiding , Histogram , QR cord , Reversible , Watermarking ] -
TransSQL: A translation and validation-based solution for SQL-injection attacks
248-251, 2011-12-01
[ LDAP , SQL injection , Web security ] -
The perceptions of cooperative learning in computer-assisted language learning environmnets
6969-6972, 2011-11-16
[ Computer-Assisted Language Learning(CALL) , cooperative learning , English learning ] -
Reversible watermarking scheme with visibility using randomize distance
204-207, 2011-11-09
[ Copyright protection , Lossless data hiding , Reversible data hiding , Steganography , Watermarking ] -
Improving histogram-based reversible data hiding by tictactoemidlet predictions
667-670, 2010-12-01
[ Copyright protection , Lossless data hiding , Reversible data hiding , Steganography , Watermarking ] -
Scalable network-based buffer overflow attack detection
163-171, 2006-12-01
[ Buffer overflow attacks , CTCP , Generalized attack signatures , Network-based intrusion detection , Payload bypassing , Return-into-libc attacks ] -
CTCP: A transparent centralized TCP/IP architecture for network security
335-344, 2004-12-01
-
A path information caching and aggregation approach to traffic source identification
332-339, 2003-07-23
-
RAD: A compile-time solution to buffer overflow attacks
409-417, 2001-01-01
專書
-
Smart Innovation, Systems and Technologies
371-380, 2025-01-01
[ Attack,Defense,ETW,VirusTotal,Windows registry ] -
Lecture Notes in Networks and Systems
490-499, 2024-01-01
[ Browser Extension Development,Consent Management,Deceptive Click Attacks,General Data Protection Regulation (GDPR),Optical Character Recognition (OCR) Technology ] -
Smart Innovation, Systems and Technologies
153-158, 2023-01-01
[ Access point,Evil twin,Wi-Fi,Wireless security ] -
Advances in Intelligent Systems and Computing
35-38, 2020-01-01
[ Anonymity network,Botnet,Man-in-the-middle attack,Tor ] -
Applied Mechanics and Materials
916-922, 2014-01-01
[ Account theft,Phishing,Phishing email,URL ] -
Applied Mechanics and Materials
923-927, 2014-01-01
[ Computer crime,Network security,System security,Worm ] -
Applied Mechanics and Materials
3385-3389, 2013-02-20
[ Authentication,Computer security,Keylogger,Privacy ] -
Applied Mechanics and Materials
3454-3458, 2013-02-20
[ Android,Botnet,SMS ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
244-255, 2010-06-25
[ Active objects,Actors,Garbage collection,Program transformation ]
校內獲獎
- 114 研究傑出獎
- 113 研究傑出獎
- 112 研究傑出獎
- 112 優良論文貢獻獎
- 111 研究傑出獎
- 110 研究傑出獎
- 109 研究傑出獎
- 108 研究傑出獎
- 105 研究傑出獎
期刊編輯
-
114 ~ 115
Journal of Information Science and Engineering
ISSN 1016-2364
《資訊科學與工程學報》由中央研究院資訊科學研究所每兩個月出版一次。本期刊旨在提供一個開放的平台,發表資訊科學與工程領域的高品質研究論文,促進研究思維、經驗和成果的交流。因此,本期刊誠摯邀請您投稿與該領域主題相關的技術論文。 -
113 ~ 114
Journal of Information Science and Engineering
ISSN 1016-2364
副編輯 -
112 ~ 113
Journal of Information Science and Engineering
ISSN 1016-2364
副編輯 -
111 ~ 111
Journal of Information Science and Engineering
ISSN 1016-2364
Associated Editor -
111 ~ 111
Journal of Information Science and Engineering
ISSN 1016-2364
Associated Editor -
110 ~ 111
資訊、科技與社會學報
ISSN 1682-8054
Associated Editor -
110 ~ 110
Journal of Information Science and Engineering
ISSN 1016-2364
Associated Editor -
109 ~ 110
資訊、科技與社會學報
ISSN 1682-8054
Associated Editor -
109 ~ 109
Journal of Information Science and Engineering
ISSN 1016-2364
Associated Editor -
108 ~ 109
資訊、科技與社會學報
ISSN 1682-8054
Associated Editor -
108 ~ 108
Journal of Information Science and Engineering
ISSN 1016-2364
Associated Editor -
108 ~ 108
資訊、科技與社會學報
ISSN 1682-8054
Associated Editor -
108 ~ 108
資訊、科技與社會學報
ISSN 1682-8054
Associated Editor -
107 ~ 107
資訊、科技與社會學報
ISSN 1682-8054
Associated Editor -
107 ~ 107
Journal of Information Science and Engineering
ISSN 1016-2364
Associated Editor
- SYSTEM AND METHOD OF FILELESS MALWARE DETECTION AND NON-TRANSITORY COMPUTER READABLE MEDIUM [美國]
- 偵測無檔案惡意軟體的系統及方法 [中華民國]
- 虛擬機器即時轉移方法 [中國]
- 連線方法及連線系統 [中華民國]
- 虛擬機器即時轉移方法 METHOD FOR LIVE MIGRATING VIRTUAL MACHINE [美國]
- 虛擬機器即時轉移方法 [中華民國]
國立中央大學