Past Projects (2014-2022)
- Crypto
- End to End Secured Realtime Chat Room
- NTU Vote: Attack and Defense
- Secure I-Voting System
- The Study of Batch Verification for Vehicular Communications
- Privacy-preserving data mining
- I-voting System Implementation
- On Next Generation Hashing: Robustness of Neural Network Generated Hash Function
- Asynchronous Secure Group Messaging
- A Privacy-Preserving Campus Access Control System
- Mitigating the Effects of COVID-19 via an Anonymous Authentication System and Zero-Knowledge Proofs
- Password / authentication
- Website Security against Brute Force Attack
- I Want Your Password
- A password manager based on fingerprint authentication
- Who Are You? a word embedding unlock method which defense peeking attack
- Password Manager Enhancement: Better Security
- The Zhuyin Password Cracker
- 臺大帳戶密碼重設機制之安全性探討
- Survey for Different DRM Mechanisms in Games on Steam
- A Verifiable Anonymous Authentication System
- TIME INVARIANT FAKE USER DETECTION SYSTEM
- Anonymity and Privacy
- Cyber Hunting System
- Deep web and darknet survey
- Location Anonymity
- TorFS: Abusing Tor’s Onion Service to Store Data
- Who Are The Attackers? Multiple Rounds’ Power in Local Differential Privacy Protocol
- The Possibility of IP Leaking Concerned with Online Games
- Chatbot Security
- Privacy-Preserving Contact Tracing with Adaptive Undeniability
- Web
- Malicious Mining Program in Browser Survey
- Security Issues of Short URLs
- 台大校園網站安全檢測
- AdvertiXmentsert: The Extreme Ad Terminator
- Clickjacking
- Internationalized Domain Names (IDN) phishing
- Shortened URLs
- Investigation and Study on Browser Hijacking
- CSRF Attack
- Video Services Investigation Inspired by NTU COOL
- Security Analysis of NTU Access Control System
- Wireless
- Common WiFi vulnerability investigation
- NFC: Potential Threats and Attacks
- Survey and Experiments on Wi-Fi Vulnerabilities
- WarWalking NTU: A Survey of NTU WiFi
- Evil-Twin Attack
- Wi-Fi Chameleon: Captive Portal Evil Twin Attack
- Static and Dynamic GPS Spoofing Detection: A Machine Learning Approach
- A SECURITY RISKS ANALYSIS OF CONSUMER BLUETOOTH LOW ENERGY DEVICES
- A Brief Survey of Open Radio Access Network (O-RAN) Security
- RFID 物件辨識系統的資安風險調查
- DDoS and network
- Defending Against Browser-Based DDoS
- Flash Crowd Mimicking Attacks with Implementation and Analysis in Heterogeneous Network
- A Survey on DoS: Attack and Defence
- 現有IP Spoofing 及ARP Spoofing 偵測與防禦技術之實作與分析
- Detection of C&C Servers and Bots using Graph Centrality Measure and Clustering Algorithm
- Building a Pulsing DDoS Attack against Frequency-based Filtering
- IoT/CPS
- Mirai analysis and IoT Mitigation
- Juice Jacking Implementation using Embedded Device
- Intrusion Detection in CPS System Based on Machine Learning
- Surveys on Printer Hacks
- IFTTT Recipe Analysis+: An Automated Tool for Recipe Analysis
- mobile and apps
- WooTalk 安全性分析
- Android Malware Survey and Design
- A Practical Attack on EasyCard using Android Device
- 電子發票的安全性議題
- Sound Pay: A Better Choice for Mobile Payment
- Risk Analysis and Hack in Android Apps
- Hacking Android Apps!
- Bluetooth Contact Tracing Apps
- Android 11+ ADB
- ML
- Learning to Detect - From ML to Malware Family
- Learning to Defend – From ML to Security
- Whitebox Attack on Image Classification Models
- Defense against Machine Learning based CAPTCHAs Attack
- Graph Convolutional Network for Malware Detection
- Software and Systems
- Survey of Antivirus
- An Examination of Ways Against Ransomware
- When Ransomware Becomes Service
- Attacks on the Judge System
- Bash vulnerability - Shellshock
- Studying on VPN – NTU SSLVPN
- Potential Security and Privacy Issues in Novel Taiwanese National eID system
- Security Analysis on Video Communication Software
- Bypassing Seccomp filters in Linux
- Java Spring Security
- Sandboxes for Online Judge Systems
- A Survey on Aimbot
- Ransomware Analysis & Survey
- Don’t Trust Any Car
- Bitcoin
- Bitcoin Address Management
- 電子貨幣初探及相關資訊安全議題
- Side channel
- Intercept password by recording keyboard noise