校講座教授 謝續平

Shiuhpyng Winston Shieh

實驗室尚有碩士生名額,歡迎加入!
We still have master degree quota, welcome to join us!

Current positions:

Honors:

Biography

Contact

National Chiao Tung University, Hsinchu, Taiwan 300
Tel: +886 3 5731876 Fax: +886 3 5715407
E-mail: ssp(at)cs.nctu.edu.tw
URL: http://dsns.cs.nctu.edu.tw/ssp

For Prospective Student:

Please feel free to browse my website to get an idea about what we are working on. Some of the webpages may be old, but they can still give an rough idea.
Basically we now work mainly on two areas:

  1. Malware Analysis​ Using Deep Learning: This research work studies the malware behaviors on Windows and Android​ using deep learning AI techniques​.The analysis is mainly conducted on the cloud with virtual machines.
  2. Future Internet​ Security: This research work studies ​the security of ​Future Internet​ with cloud and a large-scale of IoT device​s. ​ Innovative evasive penetration testing techniques ​for systems and webpages are investigated.

Past Postions


Education


Directing Labs

  1. Network Security Lab
  2. Taiwan Information Security Center (TWISC@NCTU)

Research Interests

  1. Cybersecurity
  2. Intrusion Detection
  3. Penetration Test
  4. Malware Analysis using Deep Learning techniques

Course

Major Awards and Honors

Editorial Board

Representative Publication List (Journal)

  1. Chung-Kuan Chen, Zhi-Kai Zhang, Shan-Hsin Lee, and Shiuhpyng Shieh, “The New Age of Penetration Test: IoT Era,” IEEE Computer, May 2018.
  2. Jeff Voas, et.al., “Educating Next Generation Computer Scientist,” IEEE Computer, January 2018. (Virtual Round Table Speaker Shiuhpyng Shieh)
  3. Zong-Xian Shen, Chia-Wei Hsu, Shiuhpyng Shieh, “Security Semantics Modeling with Progressive Distillation,” IEEE Transactions on Mobile Computing, 2017.
  4. Hsiu-Chuan Huang, Zhi-Kai Zhang, Shiuhpyng Shieh, “Web Application Security: Attacks, Countermeasure, and Pitfalls,” IEEE Computer, June 2017.
  5. Chia-Wei Hsu, Chia-Huei Chang, Chi-Wei Wang, Shiuhpyng Shieh, “DROIT+: Taint Tracking for Storage Access on Android,” Journal of Information Science and Engineering, Vol. 33 No. 5, September 2017.
  6. Chia-Chen Wu, Yu-Lun Huang, and Shiuhpyng Shieh, “Investigating Anonymous and Secure Fault-Tolerable Routing Protocols for Overlay Networks,” IEEE Reliability, August 2016.
  7. Michael Cheng Yi Cho, Zhi-Kai Zhang, Shiuhpyng Shieh, “Resolving Malware-Loading Problem by Leveraging Shellcode Detection Heuristics,” IEEE Reliability, November 2016.
  8. Chia-Wei Hsu, Shiuhpyng Shieh, “Adaptive Gestures for GUI Testing on Smartphones,” accepted for publication IEEE Software, 2015.
  9. Tzu-Hsin Ho, Shiuhpyng Shieh, Chien-Chao Tseng, “RAKA: Revocable Authenticated Key Agreement System for Mobile Social Networks,” accepted for publication, Journal of Information Science and Engineering, 2015.
  10. Chung-Kuan Chen, Shiuhpyng Shieh, “CTF: Alternative Training for Offensive Security,” IEEE Reliability, August 2015
  11. Zhi-Kai Zhang, Michael Cheng Yi Cho, Zong-Yu Wu, Shiuhpyng Shieh, “Identifying and Authenticating IoT Objects in a More Natural Way,” IEEE Computer, August 2015
  12. Chia-Wei Wang, Michael Cheng Yi Cho, Shiuhpyng Shieh, “Software Piracy in Clouds,” IEEE Computer, October 2015
  13. Chia-Wei Wang, Chi-Wei Wang, Shiuhpyng Shieh, "ProbeBuilder: Uncovering Opaque Kernel Data Structures for Automatic Probe Construction,” IEEE Transactions on Dependable and Secure Computing, March 2015.
  14. Chi-Wei Wang, Chong-Kuan Chen,Chia-Wei Wang,Shiuhpyng Shieh, “MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern” Journal of Information Science and Engineering, Vol. 31 No. 2, pp. 455-473 (March 2015)
  15. Chia-Wei Wang, Shiuhpyng Shieh, “DROIT: Dynamic Alternation of Dual-Level Tainting for Malware Analysis,” Journal of Information Science and Engineering, Vol. 31 No. 1, pp. 111-129 (March 2015).
  16. Chia-Wei Wang, Chung-Kwan Chen, Shiuhpyng Shieh, “The Achilles Heel of Antivirus,” IEEE Reliability, Nov. 2014.
  17. Chi-Wei Wang, Chia-Wei Wang, Chu-An Hsieh, Shiuhpyng Shieh, “Cloudebug: An Online, Interactive, and Programmable Malware Testbed,” IEEE Computer, July 2014.
  18. Michael Cheng Yi Cho, Pokai Chen, and Shiuhpyng Shieh, “Dmail: A Globally Authenticated Email Service,” IEEE Computer, May 2014.
  19. Michael Cheng Yi Cho, Chia-Wei Hsu, Shiuhpyng Winston Shieh, Chi-Wei Wang, “Can Malware be Exterminated by Better Understanding its Roots?” accepted for publication, IEEE IT Professional,2013.
  20. Jia-Chun Lin, Shiuhyng Shieh, Chia-Wei Hsu, “Proactive Distributed Digital Evidence Preservation with Tamper Resistance, Perfect Secrecy and High Survivability,” accepted for publication, Journal of Information Science and Engineering, 2013.
  21. LY, Yeh, Y.L. Huang, S.P. Shieh, Anthony Joseph, “A Batch Authenticated and Key Agreement Framework for P2P-based Online Social Networks,” IEEE Transactions on Vehicular Technology, May 2012.
  22. Yu-Lung Huang, Chiya Shen, Shiuhpyng Shieh, "S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks," IEEE Transactions on Vehicular Technology, Volume 60, Issue 9, Nov. 2011, pp. 4509 – 4519.
  23. Vic Hsu, C.W. Wang, Shiuhpyng Shieh, “Reliability and Security of Large Scale Data Storage in Cloud Computing,” IEEE Reliability Society ATR, 2011.
  24. Pokai Chen, Shiuhpyng Shieh, “Security for Future Internet Architecture - Motivation from DNSSEC,” IEEE Reliability Society ATR, 2011.
  25. Minghao Yang, Shiuhpyng Shieh, “Tracing Anonymous Mobile Attackers in Wireless Network,” Journal of Digital Content Technology and its Applications, Volume 4, Number 4, pp. 161 ~ 173, July 2010.
  26. Shih-I Huang, Shiuhpyng Shieh, “Secure Encrypted-Data Aggregation for Wireless Sensor Networks,” ACM Journal of Wireless Networks, Volume 16 Issue 4, pp. 915-927, May 2010.
  27. Chi-Wei Wang, Shiuhpyng Shieh, “The Evolution of Fine-Grain Malware Behavior Analysis - From Static to Dynamic,” IEEE Reliability Society ATR, 2010.
  28. Shih-I Huang, Shiuhpyng Shieh, “Authentication and secret search mechanisms for RFID-aware wireless sensor networks,” International Journal of Security and Networks, Volume 5, Number1, pp. 15 – 25, 2010.
  29. Jia-Ning Luo, Shiuhpyng Shieh, and Ji-Chiang Shen, “Secure Authentication Protocols Resistant to Guessing Attacks,” Journal of Information Science and Engineering, Vol.22 No. 5, September 2006, pp. 1125-1143.
  30. Fu-Yuan Lee, Shiuhpyng Shieh, "Packet Classification Using Diagonal-Based Tuple Space Search," Computer Networks. Volume 50, Issue 9 , 20 June 2006, Pages 1406-1423
  31. Shiuhpyng Shieh, Dan Wallach, “Ad hoc and P2P Security,” IEEE Internet Computing, Nov/Dec, 2005.
  32. Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh, Shen-Hsuan Wang, “Source-end Defense System against DDoS Attacks,” book chapter, Computer Security in the 21st Century, published by Springer, Feb. 2005, pp. 147-167.
  33. Shu-Min Cheng, Shiuhpyng Shieh, Weng-Her Yang, Fu-Yuan Lee, Jia-Ning Luo, “Designing Authentication Protocols for Third Generation Mobile Communications Systems,” Journal of Information Science and Engineering, Vol. 21 No. 2, March 2005, pp. 361-378.
  34. Fu-Yuan Lee, Shiuhpyng Shieh, “Defending against spoofed DDoS attacks with path fingerprint,” Computers & Security, 2005, pp. 571-586.
  35. Shih-I Huang, Shiuhpyng Shieh, Shang-Yen Wu, “Adaptive Random Key distribution Schemes for Wireless Sensor Network,” book chapter, Computer Security in the 21st Century, published by Springer, Feb. 2005, pp.91-102.
  36. Yu-Lun Huang, Shiuh-Pyng Shieh, Jian-Chyuan Wang, "Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems," IEEE Transactions on Multimedia. Vol. 6, Oct. 2004, pp. 760- 769.
  37. Shiuh-Pyng Shieh, Yea-Ching Tsai, Yu-Lun Huang, "Optimal Information Dispersal for Fault-Tolerant Communications over Burst Error Channel," IEEE Transactions on Reliability, Vol. 52, Issue 3, Sep. 2003, pp. 354-366.
  38. Shiuhpyng Shieh, Weng-Her Yang, “Protecting Network Users in Mobile Code Systems,” Journal of Parallel and Distributed Computing, Vol. 64, Issue 2, February 2004, pp.191 – 200.
  39. Fu-Yuan Lee, Shiuhpyng Shieh, “Scalable and lighterweight Key Distribution for Secure Group Communications,” ACM/PH International Journal of Network Management, Vol. 14, Issue 3, May 2004, pp. 167 – 176.
  40. Fu-Yuan Lee, Shiuhpyng Shieh, “Accelerating Network Security Services with Fast Packet Classification,” Computer Communications, 2004, pp.1637-1646.
  41. Shu-Min Cheng, Shiuhpyng Shieh, Weng-Her Yang, Fu-Yuan Lee, Jia-Ning Luo, “Designing Authentication Protocols for Third Generation Mobile Communications Systems,” Journal of Information Science and Engineering, Vol. 21 No. 2, March 2005, pp. 361-378.
  42. C.F. Lu, Shiuhpyng Shieh, “Re-keying Protocols in Symmetric Cryptosystems,” , Journal of Discrete Mathematical Sciences and Cryptography.volume 7, 2004 , p23~p27.
  43. C.F. Lu, Shiuhpyng Shieh, “Efficient Key Evolving Protocol for GQ Signature Scheme,” Journal of Information Science and Engineering. Vol. 20 No. 4, July 2004, pp.679-706.
  44. C.F. Lu, Shiuhpyng Shieh, “Secure Key-Evolving for Public Key Cryptosystems Based on the Discrete Logarithm Problem,” Journal of Information Science and Engineering, Vol. 20 No. 2, March 2004, pp. 391-400.
  45. Shih-I Huang, Shiuhpyng Shieh, Shang-Yen Wu, “Adaptive Random Key distribution Schemes for Wireless Sensor Network,” book chapter, Computer Security in the 21st Century, published by Springer, Feb. 2005, pp.91-102.
  46. Wen-Her Yang, and Shiuh-Pyng Shieh, "Secure Key Agreement for Group Communications," ACM/PH International Journal of Network Management, Vol. 11, No 6, Nov-Dec 2001.
  47. Wen-Her Yang, Kai-Wei Fan and Shiuh-Pyng Shieh, "A secure multicast protocol for the internets multicast backbone," ACM/PH International Journal of Network Management vol. 11, Issue 2, page 129-136, Mar/April 2001.
  48. S.P. Shieh, Y.L. Huang, F.S. Ho, J.N. Luo, "Network Address Translators: Effects on Security Protocols and Applications in the TCP/IP Stack," IEEE Internet Computing, Nov./Dec. 2000.
  49. S.P. Shieh, C.T. Lin, W.B. Yang, H.M.Sun, "Digital Multisignature Schemes for Authenticating Delegates in Mobile Code Systems," IEEE Trans. on Vehicular Technology, August 2000, NSC-85-2622-E-009-006R.
  50. Y.L. Huang, S.P. Shieh, F.S. Ho, "A Generic Electronic Payment Model Supporting Multiple Merchant Transactions," Vol 19, No. 5, Computers and Security, 2000, pp. 453-465.
  51. S.L. Chang, S.P. Shieh, C.H. Jong, "A Security Testing System for Vulnerability Detection," Vol. 12 No. 1, Journal of Computers, 2000, pp. 7-21.
  52. C.T. Lin, S.P. Shieh, "Chain Authentication in Mobile Communication Systems," Vol. 13, Journal of Telecommunication Systems, 2000.
  53. S.P. Shieh, C.T. Lin, W.H. Yang, "Information Protection in Dynamic Statistical Databases " Vo. 43, Encyclopedia of Computer Science and Technology, 2000, pp.97-112.
  54. I.J. Shue, S.P. Shieh, “Playback dispatch and Fault Recovery for a Clustered Video System with Multiple Servers," Journal of Multimedia Tools and Applications, Vol. 9, Issue 3, Nov. 1999, pp. 277-294.
  55. Hung-Min Sun and S. P. Shieh, "Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures," Journal of Information Science & Engineering, Vol. 15, No. 5, Sep.1999, pp. 679-690.
  56. F.S. Ho, S.P. Shieh, Y.L. Huang, “An Efficient Authentication Protocol for Mobile Networks," Journal of Information Science and Engineering, Vol.15 No.4, July 1999, pp.505-520.
  57. I.J. Shyu, S.P. Shieh, “A Distributed Fault-Tolerant Design for Multiple-Server VOD systems,” Journal of Multimedia Tools and Applications, March 1999, pp. 219-248.
  58. S.P. Shieh, C.T. Lin, “Auditing User Queries in Dynamic Statistical Databases," Journal of Information Science, Vol. 113, Jan. 1999, pp. 131-146, NSC 85-2213-E00 9-032.
  59. S.P. Shieh, “Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems,” Journal of Information Science and Engineering, Vol.15 No.1, January 1999, pp.91-106, NSC85-2622-E-009-006R.
  60. S.P. Shieh, C.T. Lin, S.Y. Wu, “Optimal Assignment of Mobile Agents for Software Authorization and Protection (COMCOM1223)," Computer Communications, Vol. 22, Jan. 1999, pp. 46-55.
  61. H.M. Sun, S.P. Shieh, "A note on breaking and repairing a secure broadcasting in large networks," Computer Communications, Vol. 22, 1999, pp. 193-194.
  62. C.T. Lin, S.P. Shieh, W.H. Yang, "Secure Authentication Protocols Resistant to Guessing Attacks," IICM, 1999.
  63. W.H. Yang, S.P. Shieh, "Password Authentication Schemes with Smart Cards," Computers and Security, Vol. 18, No. 8, 1999, pp. 727-734.
  64. Hung-Min Sun and S. P. Shieh, "Secret Sharing Schemes for Graph-Based Prohibited Structures," Computers and Mathematics with Applications, Vol. 36, No. 7, Oct. 1998, pp. 131-140.
  65. I.J. Shue, S.P. Shieh, “Balancing Workload and Recovery Load on Distributed Fault-Tolerant VOD Systems," IEEE Communications Letters,, Vol. 2, No. 10, Oct. 1998, pp. 288-290.
  66. S.P. Shieh, I.J. Shyu, C.Y. Shen, “Wide Address Translation and Protection for Single Address Space Operating Systems,” Proceedings of the National Science Council, Vol. 22, No. 5, September 1998, pp. 601-616, NSC 85-2221-E009-039.
  67. H.M. Sun, S.P. Shieh, “Secure Broadcasting in Large Networks," Computer Communications, March 1998, pp. 279-283.
  68. H.M. Sun, S.P. Shieh, “Optimal Information Dispersal for Increasing Reliability of a Distributed Service,” IEEE Transactions on Reliability, Dec. 1997, pp. 462-472, NSC 85-2213-E-009-032.
  69. S.P. Shieh, F.S. Ho, “A Comment on A Total Ordering Multicast Protocol,” IEEE Transactions on Parallel and Distributed Systems, October 1997.
  70. S.P. Shieh, V. D. Gligor, “On a Pattern-Oriented Model for Intrusion Detection," IEEE Transactions on Data and Knowledge Engineering, Vol. 9, No. 4, August 1997, pp. 661-667, NSC 85-2213-E-009-032.
  71. S.P. Shieh, W.H. Yang, H.M. Sun, “An Authentication Protocol with Trusted Third Party,” IEEE Communications Letters, Vol 1, No. 3, May 1997, pp. 87-89.
  72. S.P. Shieh, V.D Gligor, “Detecting Illicit Information Leakage in Operating Systems," Journal of Computer Security, April 1997, pp. 123-148, NSC 85-2213-E-009-032.
  73. H.M. Sun, S.P. Shieh, “Efficient Construct of On-Line Multiple Secret Sharing Schemes,” Journal of Computers, Dec. 1996, pp. 49-56.
  74. S.P. Shieh, W.H. Yang, “An Authentication and Key Distribution System for Open Network Systems," ACM Operating Systems Review, April 1996, pp 32-41, NSC 85-2213-E-009-032.
  75. H.M. Sun, S.P. Shieh, “An Efficient Construction of Perfect Secret Sharing Schemes for Graph-Based Access Structures," Computer & Mathematics with Applications, April 1996, pp. 129-135, NSC 84-2213-E-009-081.
  76. I.J. Shyu, S.P. Shieh, “Virtual Address Translation for Wide Address Architectures," ACM Operating Systems Review, Vol. 29, No. 2, October 1995, pp 37 - 46, NSC 84-2221-E-009-001.
  77. S.P. Shieh, “A Distributed Intrusion Detection Model," Journal of Computers, Vol 6, No 4, December, 1994, pp 24-34, TL 83-5206.
  78. H.M. Sun, S.P. Shieh, “A Construction of Dynamic Threshold Schemes," Electronic Letters, November 1994, pp 2023 - 2025, NSC 84-2213-E-009-081.
  79. H.M. Sun, S.P. Shieh, “On Dynamic Threshold Schemes," Information Processing Letters 52, 1994, pp 201-206, NSC 84-2213-E-009-081.
  80. S.P. Shieh, J.N. Cheng, “Specification, Validation and Verification of Time-Critical Systems," , Computer Communications, Vol. 21, No. 5, May 1998, pp. 460-469, NSC85-2213-E-009-032.
  81. H.M. Sun, S.P. Shieh, “Recursive Construction of Perfect Secret Sharing Schemes,” Computer & Mathematics with Applications, 1999, pp. 87-96.

Books:

  1. 謝續平、黃能富、黃仁俊,”無線網路安全”教材,教育部資通安全聯盟,2009.
  2. M. –H. Yang and S.-P. Shieh, A book chapter in “分散式癱瘓服務攻擊解決策略--追蹤匿名攻擊者,” 財團法人國家實驗研究院科技政策研究與資訊中心, 2006.
  3. D.T. Lee, S.P. Shieh, Doug Tygar, “Computer Security in 21 Century,” Springer, Feb. 2005.
  4. Shiuhpyng Shieh, et al, “Intrusion, Detection and Prevention, Illustrated,” published by NSC, Dec. 2004.
  5. Shiuhpyng Shieh, et al, “System and Network Security,” published by NSC, Jan. 2004.
  6. Gligor, V. D., and Shieh, S. P., et al, A Guide to Understanding Covert Channel Analysis of Trusted Systems, NCSC-TG-030, National Computer Security Center, USA, November 1993
  7. S.P. Shieh, et al, “Security Infrastructure for Government Document Exchange,” published by RDEC, 1996.
  8. S.P. Shieh, “An Information and Privilege Flow Model for Intrusion Detection in Computer Systems," Ph.D. Dissertation, University of Maryland, College Park, MD, June 1991.
  9. S.P. Shieh, “A Survey of Supercomputers," Technical Report, University of Maryland, College Park, March, 1986.
  10. S.P. Shieh, J.S. He, “The Automation of Covert Channel Analysis," IBM Independent Research and Development report, 1990.
  11. S.P. Shieh, “Intrusion Detection in Multilevel Secure Systems," IBM Independent Research and Development report, 1991.

Patents:

  1. Shiuhpyng Shieh, Chia-Wei Wang, Chi-Wei Wang, Chia-Wei Hsu, “AUTOMATIC PROBE CONSTRUCTION SYSTEM AND METHOD THEREOF,” US patent pending, Dec. 28, 2017.
  2. Shiuhpyng Shieh, Chia-Wei Wang, Chi-Wei Wang, Chia-Wei Hsu, ”自動化探針建構系統及其方法,”ROC/Taiwan patent I551984, 2016/10/1 ~ 2035/9/22
  3. C.W. Wang, S.P. Shieh, Y.R. Liu, “Decoupled Method For Tracking Information Flow and Computer System Thereof,” US patent, Appl. no. 13/459,258, granted, Feb. 2016.
  4. Zong-Xian Shen, SP Shieh, ”產生純化惡意程式的方法、偵測惡意程式之方法及其系統,”ROC/Taiwan patent I515598, 2016/1/1 ~ 2033/8/22
  5. Zong-Xian Shen, SP Shieh, “computer-implemented method for distilling a malware program in a system”, US patent pending, US 2015/0058984 A1, 2015
  6. Z.S. Shen, S.P. Shieh, “Security Relevant Semantics Modeling Method and System for Mobile Malware Detection,” ROC patent, Appl. no. 102130367, Aug. 23, 2013.
  7. Chi-Wei Wang, C.H. Chang, S.P. Shieh, Chia-Wei Wang, C.W. Hsu, “Method for Detecting Privacy-Theft Android Applications with Decoupling Information Flow Tracking“, ROC patent, Appl. no. 101135433, Sep. 2012.
  8. C.W. Hsu, B.H. Lee, S.P. Shieh, ”Method and System for VM-Aware Malware Detection,” ROC patent, Appl. no. 101116554, May. 2012.
  9. C.W. Wang, S.P. Shieh, Y.R. Liu, “Method for Decoupling System-Wide Information Flow Tracking for Malware Analysis and Its Applications,” ROC patent, Appl. no. 101101270, Jan. 2012.
  10. C.W. Wang, S.P. Shieh, “MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern,” ROC and US patents pending
  11. S.I. Huang, S.P. Shieh, C.W. Wang, “A Light-Weight Authentication and Secret Retrieval Scheme and Its Applications,” US patent pending no. US 2010/0042842 A1, Aug. 12, 2008.
  12. S.I. Huang, S.P. Shieh, C.W. Wang, “A Light-Weight Authentication and Secret Retrieval Scheme and Its Applications,” ROC patent pending no. 097139529, 2008.
  13. S.I. Huang, S.P. Shieh, “Method and System for Secure Data Aggregation in Wireless Sensor Networks,” US patent no. 8027474, 2011.9.27
  14. S.I. Huang, S.P. Shieh, “Method and System for Secure Data Aggregation in Wireless Sensor Networks,” ROC patent no. I350086. 10, 2011
  15. S.I. Huang, S.P. Shieh, “Method and System for Secure Data Aggregation in Wireless Sensor Networks,” China patent number ZL200710301500.9, 2011
  16. S.P. Shieh, "Multisignature Scheme with Message Recovery for Group Authorization in Mobile Networks," ROC patent no. 1248744, Feb. 2006.
  17. S.P. Shieh, "Clustered Architecture for High Speed IPsec Gateway," ROC patent no. 1227082, Jan. 2005.
  18. S.P. Shieh, Y.L. Huang, “Smart Card-Based Key Distribution Schemes in Conditional Access Systems,” ROC patent no. 203525, May 2004 – Oct. 2022.
  19. S.P. Shieh, “Synchronous Method and System for Processing a Packet," US patent pending no. 101742064, 2004.
  20. S.P. Shieh, "Clustered Architecture for High Speed IPsec Gateway," China patent pending no. 03148124.8, 2004.
  21. S.P. Shieh, et al, “A Generic Secure Payment Method Supporting Multiple Merchants Transactions and Its Applications,” ROC patent no. 87148006, Dec.1999.
  22. S.P. Shieh, et al, “An Authentication System for Computer Networks," ROC patent no. 079094, 1996. The patent includes four systems: secure Telnet system, secure Rlogin system, secure Ftp system, and the network monitor system.
  23. S.P. Shieh, et al, “A Pattern-Oriented Intrusion-Detection System and Method," US patent no. 5278901, January 1994.

Conference Papers:

  1. Chiawei Wang, Shiuhpyng Shieh, “VMCloak: Toward a Stealthy in-VM Agent Execution,” IEEE Conference on Dependable and Secure Computing (DSC), 2017.
  2. Chong-Kuan Chen, Shen-Chieh Lan, Shiuhpyng Shieh, “Shellcode Detector for Malicious Document Hunting,” IEEE Conference on Dependable and Secure Computing (DSC), 2017.
  3. Yen-Ting Chiang, Ting-Yi Chang, Chia-Wei Hsu, Shiuhpyng Shieh, “Cyber Threat Evaluation of Mobile Networks,” Cryptology and Information Security Conference (CISC 2017), Taiwan, May 2017.
  4. Liang-Mei Huang, Chien-Ho Chao, Chia-Wei Hsu, Shiuhpyng Shieh, Ping-Hsin Liu, “Security Analysis of Android Apps and Tool Evaluation,” 26th Cryptology and Information Security Conference (CISC 2016), Taiwan, May 2016.
  5. Shiuhpyng Shieh, “ProbeBuilder: Automatically Constructing Behavior Profilers for Malware Analysis,” Network Security Workshop, Dubai, 2016.
  6. Chu-An Shieh, Chia-Wei Hsu, Chien-Ho Chao, Shiuhpyng Shieh, “Modeling Android Apps Behaviors Using Graphics,” 25th Cryptology and Information Security Conference (CISC 2015), Taiwan, May 2015.
  7. Zhi-Kai Zhang, Michael Cheng Yi Cho, Shiuhpyng Shieh, “Emerging Security Threats and Countermeasures in IoT,” ACM Symposium on Information, Computer and Communications Security, March 2015.
  8. 謝居安, 許家維, 趙健賀, 謝續平, “Android 應用程式行為特徵圖的建構與方法,” The 25th Cryptology and Information Security Conference (CISC), 2015
  9. Shiuhpyng Shieh, “Building APT Shield with Polymorphic Defense,” NCTU-TUS Data Science and Optimization Joint Symposium, 2015.
  10. Chi-Kai Chang, Michael Cho, Chia-Wei Hsu, Chia-Wei Wang, C.K., Chen, Shiuhpyng Shieh, “IoT: Ongoing Challenges and Research Opportunities,” IEEE IoTS Workshop, Matsue, Japan, Nov 2014.
  11. 王繼偉, 王嘉偉, 謝居安, 謝續平, “可編程之互動式進階惡意程式雲端調試平台,” The 24th Cryptology and Information Security Conference (CISC), May, 2014
  12. Yen-Ju Liu, Chong-Kuan Chen, Micheal Cheng Yi Cho, and Shiuhpyng Shieh, “Fast Discovery of VM-Sensitive Divergence Points with Basic Block Comparison,” IEEE International Conference on Software Security and Reliability (IEEE SERE 2014), San Francisco, USA, June 2014.
  13. Andy Shen, Chia-Wei, Shiuhpyng Shieh, “Real-Time Record and Replay on Android for Malware Analysis,” Crypto and Information Security Conference, 2013.
  14. Yin-Change Song, Michael Cho, C.W. Wang, Chia-Wei Hsu, Shiuhpyng Winston Shieh, “Light-Weight CSRF Protection by Labeling User-Created Contents,” IEEE International Conference on Software Security and Reliability (IEEE SERE 2013) , Washington, D.C., USA, 2013.
  15. Chia-Wei Hsu, Fan-SyunShih, Chi-WeiWang, Shiuhpyng Winston Shieh, “Divergence Detector: A Fine-grained Approach to Detecting VM-Awareness Malware,” the Seventh IEEE International Conference on Software Security and Reliability (IEEE SERE 2013) , Washington, D.C., USA, 2013.
  16. Chung-Kwan Chen, Wei-Chi Chen, Vic Hsu, Shiuhyng Shieh, “Mutant Malware Discovery and Behavior Analysis for Cyber Crime Investigation,” Crypto and Information Security Conference, 2012.
  17. Yun-Min Cheng, Bing-Han Li and Shiuhpyng Shieh, “Accelerating Taint-based Concolic Testing by Pruning Pointer Overtaint,” IEEE Conference on Software Security and Reliability (SERE), Washington DC, June 2012.
  18. Chia-Ming Fan, Bing-Han Li, Shiuhpyng Shieh, “On The Security of Password-Based Pairing Protocol in Bluetooth” The 13th Asia-Pacific Network Operations and Management Symposium, (APNOMS 2011), 2011
  19. Yen-Ru Liu, C.W. Wang, J.W. Hsu, T.C. Tseng, S.P. Shieh, “Extracting Hidden Code from Packed Malware based on Virtual Machine Memory Comparison,” 21th Cryptology and Information Security Conference (CISC 2011), 2011.
  20. Bing-Han Li, Shiuhpyng Shieh, “RELEASE: Generating Exploits Using Loop-Aware Concolic Execution,” IEEE Conference on Secure Software Integration and Reliability Improvement, June 2011.
  21. Wei Shi-Sue, Shiuhpyng Shieh, Bing-Han Li, Michael Cheng Yi Cho and Chin-Wei Tien, "A Framework Using Fingerprinting for Signal Overlapping-Based Method in WLAN," the International Computer Symposium on Computer Networks and Web Technologies (ICS 2010), Dec. 16-18, 2010..
  22. Chia-Wei Hsu, Shiuhpyng Shieh, "FREE: A Fine-grain Replaying Executions by Using Emulation", The 20th Cryptology and Information Security Conference (CISC), 2010. (Best Student Paper Award)
  23. 王繼偉, 王嘉偉, 許家維, 謝續平, "基於虛擬機器外部觀察與映像檔比對的惡意程式分析", The 20th Cryptology and Information Security Conference (CISC) , 2010.
  24. Yu-Lung Huang, Chih-Ya Shen, Shiuhpyng Shieh, Hung-jui Wang, Cheng-Chun Lin, “Provable Secure AKA Scheme with Reliable Key Delegation in UMTS,” IEEE Conference on Secure Software Integration and Reliability Improvement, 2009.
  25. Yu-Lung, Hsiaoying Lin, Doug Tygar, Shiuhpyng Shieh, “SWOON: A Testbed for Secure Wireless Overlay Networks,” USENIX Workshop on Cyber Security Experimentation and Test (CSET 2008), 2008.
  26. Lian Lee, Shiuhpyng Shieh, “Protecting User Privacy with Dynamic Identity-Based Scheme for Low-cost Passive RFID Tags,” Information Security Conference, May 2008.
  27. Warren W. Lin, Shiuhpyng Shieh, Jia-Chun Lin, “Lightweight, Distributed Key Agreement Protocol for Wireless Sensor Networks,” IEEE Conference on Secure System Integration and Reliability Improvement, Yokohama, Japan, July 14-17, 2008 (co-sponsored by IEEE Reliability Society and IEEE System, Man, and Cybernetics Society, published by IEEE Press).
  28. Che-Cheng Lin, Shiuhpyng Shieh, Jia-Chun Lin, “A Pollution Attack Resistant Multicast Authentication Scheme Tolerant to Packet Loss,” IEEE Conference on Secure System Integration and Reliability Improvement, Yokohama, Japan, July 14-17, 2008 (co-sponsored by IEEE Reliability Society and IEEE System, Man, and Cybernetics Society, published by IEEE Press).
  29. Ming-Hao Yang, Shiuhpyng Shieh, "Tracing Mobile Attackers in Wireless Ad-hoc Network," IEEE International Workshop on Social and Legal Aspects under Emerging Computing Environments, held at Athens, Greece, June 8-13, 2008 (Best Paper Award, published by IEEE Press).
  30. S.I. Huang, Shiuhpyng Shieh, “SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks,” IEEE International Conference on Computational Intelligence and Security (IEEE CIS), Dec. 2007.
  31. C.H. Jiang, Shiuhpyng Shieh, Rachel Liu, “Keystroke Statistical Learning Model for Web Authentication,” ACM Symposium on Information, Computer and Communications Security, Singapore, 2007.
  32. Tanya Roosta, Shiuhpyng Shieh, Shankar Sastry, “Taxonomy of Security Attacks in Sensor Networks and Countermeasures,” IEEE International Conference on System Integration and Reliability Improvements, Hanoi, Vietnam, 13-15 December 2006.
  33. Zhi-Kai Zhang, Tze-Yau William Huang, Shiuhpyng Shieh, “Controlling Various Platforms for Test Automation,” IEEE International Conference on System Integration and Reliability Improvements, Hanoi, Vietnam, 13-15 December 2006.
  34. Yang Tzu-I and S. P. Shieh and WarrenWolfe-Jen Lin and Li-Joe Lin, “A Path Authentication Scheme for Routing Disruption Attack Prevention in Ad Hoc Networks,” 2006 IEEE International Conference on Systems, Man, and Cybernetics, Oct. 2006.
  35. Shiuhpyng Shieh, “Defending against DDoS Attacks,” High Tech Forum – e-Security, Oct. 21-22, 2005.
  36. Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, “An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks,” ACM Symposium on Information, Computer and Communications Security, 2006.
  37. Ya-Jeng Lin, Shiuhpyng Shieh, “Lightweght, Pollution-Attack Resistant Multicast Authentication Scheme,” ACM Symposium on Information, Computer and Communications Security, 2006.
  38. Shih-I Huang, Shiuhpyng Shieh, “Secret Searching in Wireless Sensor Networks with RFIDs,” Information Security Conference, June 2005, pp. 237 – 244.
  39. Kang_Hsien Chou, Shiuhpyng Shieh, Ming-How Yang, and Fu-Yuan Lee, “Marking-Based Source Identification Scheme for Defending Against DDoS Attacks,” Information Security Conference, 2004
  40. Fu-Yuan Lee, Shiuhpyng Shieh and Ming-How Yang, “Tracing the Origin of Single-Packet Attacks,” Information Security Conference, 2004
  41. Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh, Shen-Hsuan Wang, “Source-end Defense System against DDoS Attacks,” International Workshop on Advanced Developments in Software and Systems Security, pp31-35, 2003
  42. Shih-I Huang, Shiuhpyng Shieh, Shang-Yen Wu, “Adaptive Random Key distribution Schemes for Wireless Sensor Network,” International Workshop on Advanced Developments in Software and Systems Security, pp61-65, 2003.
  43. Shiuhpyng Shieh, Fu-Yuan Lee, “Fast Packet Classification for Improving the Performance of Secure Network Services,” Information Security Conference, 2003.
  44. Shiuhpyng Shieh, Yung-Zen Lai, Ya-Ting Chang and Fu-Yuan Lee, "Clustered Architecture for High-Speed IPsec Gateway," ICS'2002.
  45. Chang-Han Jong, Shiuh-Pyng Shieh and Jia-Ning Luo, "Detecting Distributed DoS/Scanning by Anomaly Distribution of Packet Fields," ICS'2002.
  46. Fu-Yuan Lee, Shiuhpyng Shieh and Lin-Yi Wu, "Address Sharing Enabled Mobile IP Utilizing NAPT," ICS'2002.
  47. Fu-Shen Ho, Shiuhpyng Shieh, Y.L. Huang and K.L. Tsai, "A Service Probing and Channel Establishment Protocol Across Multiple Network Access Translation Realms," ICS'2002.
  48. Shiuhpyng Shieh, Shih-I Huang and Fu-Shen Ho, "An ID-based Proxy Authentication Protocol Supporting Public Key Infrastructure," IWAP'2002
  49. Jia-Ning Luo, Shiuh-Pyng Shieh, "The Multi-layer RSIP Framework," The 9th IEEE International Conference on Networks, ICON'2001. Bangkok, Thailand, October 2001.
  50. Cheng-Fen Lu, Shiuh-Pyng Shieh, "Secure Key Evolving Protocols for Discrete Logarithm Schemes," RSA conference, Feb 2002.
  51. C.H. Chun, S.P. Shieh, “GSN-CERT and Computer Emergency Response,” Chinese-France Conference on Information Technology, March 2000
  52. S.P. Shieh, Y.L. Huang, J.C. Wang, "Practical Key Distribution Schemes for Pay TV Channel Protection," IEEE International Computer Software and Applications Conference (COMPSAC'2000), Nov. 2000.
  53. S.M. Cheng, W.H. Yang, S.P. Shieh, "A Flexible Authentication for Next Generation Mobile Communications," 6th Mobile Computing Workshop, pp. 67-73, March 2000.
  54. W.H. Yang, K.W. Fan, S.P. Shieh, "A Scalable and Secure Multicast Protocol on M-bone Environments," Information Security Conference, May 2000.
  55. W.H. Yang, S.P. Shieh, "An Efficient Key Agreement Protocol for Secure Group Communications," Information Security Conference, May 2000.
  56. Y.L. Huang, S.P. Shieh, "A Fair Settlement Protocol for Online Transactions," Information Security Conference, May 2000.
  57. J.N. Luo, S.P. Shieh, "A Transparent and Efficient Mechanism for File System Protection," Information Security Conference, May 2000.
  58. W.H. Yang, S.P. Shieh, "Enhancing Security and Flexibility of Password Authentication with ID-based Cryptosystems," Information Security Conference, May 1999.
  59. C.T. Lin, S.P. Shieh, "A Secure Communication Protocol for Telecommunications Management Networks," Information Security Conference, May 1999.
  60. C.T. Lin, S.P. Shieh, "An Efficient and Secure Credit Card-Based Billing Scheme for Telephone Services," Mobile Computing Workshop, March 1999, pp. 28-34.
  61. H.M. Sun, S.P. Shieh, "On Private-Key Cryptosystems Based on Product Codes," ACISP'98, Australia, July 1998.
  62. S.P. Shieh, C.T. Lin, Y.S. Juang, "Controlling Inference and information Flows in Secure Databases," 1998 Information Security Conference, May 1998.
  63. S.P. Shieh, C.T. Lin, S.Y. Wu, "A Software Authorization and Protection Model for Mobile Code Systems," 1998 International Symposium on Internet Technology, April 1998.
  64. S.P. Shieh, C.T. Lin, M.J. Peng, W.C. Yang, J.N. Yang, “A Secure Credit-Card Based Billing Schemes for Telephone Services,” International Conference on Mobile Computing, March 1998.
  65. H.M. Sun, S.P. Shieh, “On-Line Secret Sharing Based on a One-Way Function,” 1998 Information Security Conference, May 1998.
  66. H.M. Sun, S.P. Shieh, “A Secure Broadcasting Cryptosystem in Large Computer Networks,” 1998 Information Security Conference, May 1998.
  67. H.M. Sun, S.P. Shieh, “On Private-Key Cryptosystems Based on Product Codes,” Australia Information Security and Privacy Conference, July 1998.
  68. S.P. Shieh, C.T. Lin, Y.S. Juang, “Controlling Inference and information Flows in Secure Databases,” 1998 Information Security Conference, May 1998.
  69. S.P. Shieh, C.T. Lin, S.Y. Wu, “A Software Authorization and Protection Model for Mobile Code Systems," 1998 International Symposium on Internet Technology, April 1998.
  70. I.J. Shue, S.P. Shieh, “Load-Balanced Playback Dispatch for Fault-Tolerant Multi-Server VOD Systems,” 1997 Workshop on Real-Time and Media Systems, July 30-31, 1997.
  71. S.P. Shieh, J.N. Luo, “A Secure Mail System for Mobile Users in the Internet,” International Conference on Mobile Computing, March 1997.
  72. F.S. Ho, S.P. Shieh, “An Efficient Authentication for Mobile Networks,” International Conference on Computer System Technologies for Industrial Applications, April 1997.
  73. H.M. Sun, S.P. Shieh, “On the Information Rate of Perfect Secret Sharing Schemes with Access Structures of Rank Three,” Conference on Information Security, May 1997.
  74. C.F. Lu, S.P. Shieh, “An Anonymous Fair Credit Card Payment System,” Conference on Information Security, May 1997.
  75. M.J. Pong, S.P. Shieh, W.C. Yang, J.N. Yang, “Billing Schemes for Secure Telephony over Public Communication Networks,” Conference on Information Security, May 1997.
  76. H.M. Sun, S.P. Shieh, “Secret Sharing in Graph-Based Prohibited Structures," 1997 IEEE International Conference on Computer Communications (INFOCOM'97), Kobe, Japan, April 7-11, 1997.
  77. H.M. Sun, S.P. Shieh, “Crypto-analysis of Private-Key Schemes Based on Burst-Error-Correcting Codes," the Proceedings of ACM International Conference on Computer and Communications Security, March 14-16, 1996.
  78. S.P. Shieh, Y.L. Huang, F.S. Ho, “A Family of Secure Network Protocols," the Proceedings of Information Security Conference, May, 1996.
  79. H.M. Sun, S.P. Shieh, “A Perfect Scheme for Secret Sharing between Two Parties," Proceedings of Information Security Conference, May, 1995.
  80. S.P. Shieh, C.T. Lin, R.T. Hsueh, “Secure Communication in Global Systems for Mobile Telecommunications," Proceedings of Mobile Computing Workshop, April 1995.
  81. S.P. Shieh, C.T. Lin, “An Audit Scheme for Inference Control in Statistical Databases," Proceedings of International Conference on Intelligent Information Management Systems, June 1995.
  82. S.P. Shieh, et al, “The Design and Implementation of A MPOS Simulator," Proceedings of the Multiprocessor Systems Workshop, July 1995.
  83. H.M. Sun, S.P. Shieh, “On Dynamic Threshold Schemes," 4rd Conference on Information Security, May 21, 1994.
  84. S.P. Shieh, H. M. Sun, “On Constructing Secret Sharing Schemes," 1994 IEEE International Conference on Computer Communications, Networking for Global Communications (INFOCOM'94), Toronto, Canada, June 12-16, 1994.
  85. I.J. Shyu, S.P. Shieh, “Architectural Support for 64-Bits Address Translation," Proceedings of 1994 International Computer Symposium, Dec., 1994, pp 322 - 327.
  86. M.R. Chiang, S.P. Shieh, C.L. Liu, “Dynamic Load Balancing in Parallel Simulation Using Time Warp Mechanism," Proceedings of International Conference on Parallel and Distributed Systems, Dec., 1994, pp 222- 227.
  87. H.M.. Sun, S.P. Shieh, “Optimal Information Dispersal for Reliable Communication in Computer Networks," Proceedings of International Conference on Parallel and Distributed Systems, Dec., 1994, pp 460 -464.
  88. S.P. Shieh, “Covert Channel Bandwidth Estimation and Measurement," 3rd Conference on Information Security, May 12, 1993.
  89. S.P. Shieh, “Intrusion Detection in Computer Networks," 3rd Conference on Information Security, May 12, 1993.
  90. S.P. Shieh, H.M. Sun, “A Secret Sharing Scheme for Hierarchical User Groups," the 8th International Joint Workshop on Computer Communication (JWCC-8), December 19-21, 1993.
  91. S.P. Shieh, V.D. Gligor, “A Pattern-Oriented Intrusion Detection Model and Its Applications," Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, (May 7-9, 1991), pp 327-342.
  92. S.P. Shieh, V.D. Gligor, “Auditing the Use of Covert Storage Channels in Secure Systems," Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, (May 1990), pp 285-295.
新竹市大學路1001號 國立交通大學 工程三館 622 室
Addr. Dept. of C.S. & Info. Eng. Nat'l Chiao Tung Univ. Hsinchu 30010 Taiwan, R.O.C.
Tel 03-571-2121 Ext. 54750
FAX 03-572-4176


© 2015 crs@DSNS LAB