Dr. Shiuhpyng Winston Shieh [Chinese][Homepage]
ACM Distinguished Scientist
Profile Publication and Patents Technique Transfer Books and Guidelines Others Professional Activities Reviews

Profile

Profile
Current Positions

IEEE Fellow & ACM Distinguished Scientist
IEEE Reliability Society Vice President for Technical Activities, 2014-
Director, NCTU DSNS Lab
Adviser, Investigation Bureau, Ministry of Justice
Contact

National Chiao Tung University, Hsinchu, Taiwan 300
Tel: +886 3 5731876  Fax: +886 3 5715407
E-mail:
URL: http://dsns.cs.nctu.edu.tw/ssp

For Prospective Student:

Please feel free to browse my website to get an idea what we are working on. Some of the webpages may be old, but they can still give an rough idea. Basically we now work mainly on two areas:

  1. Malware Analysis: This research work studies the malware behaviors on Windows and Android. The analysis is mainly conducted on the cloud with virtual machines.
  2. Network Security: This research work studies naming and authentication of Future Internet. Within Future Internet Architecture (FIT), DNSSEC (Domain Name Service Security Extension) and IoT (Internet of Things) will play the pivotal roles. In the research work, we will investigate the further extension of DNSSEC to support IoT naming, identification and authentication.


Directing Labs


Research Interests

  1. Wireless Security ( including Wi-Fi, Wi-Max, 3G/4G and Wireless Sensor Network )
  2. Network Security
  3. Distributed operation systems
  4. Cryptography

Course


Personal data

 
 

Shiuhpyng Shieh received the M.S. and Ph.D. degrees in electrical and computer engineering from the University of Maryland, College Park, respectively. He is currently a professor of the Department of Computer Science and Information Engineering, National Chiao-Tung University, and the Director of Taiwan Information Security Center at NCTU. He has served in the last few years as department chair of NCTU; Director, GSN-CERT/CC, RDEC, Executive Yuan, Taiwan; Advisor, National Information and Communication Security Task Force, Executive Yuan, Taiwan; President of Chinese Crypto and Information Security Association; Director of Computer and Network Center of NCTU. He also worked as a visiting professor at University of California at Berkeley, 2003-2004 and 2005-2006, respectively.

He participated in the design and implementation of the B2 Secure XENIX for IBM, Federal Sector Division, Gaithersburg, Maryland, USA. He was the designer of SNP (Secure Network Protocol), which was a very popular security software package. From 1994 to 1997, he was a consultant for Computer and Communications Laboratory, Industrial Technology Research Institute, Taiwan in the area of network security and distributed operating systems. Dr. Shieh designed and developed NetSphinx, a network security product, for Formosoft Inc., which is awarded 1999 network product of the year, Taiwan. He also designed and implemented the first IP phone in Taiwan, a joint work with Broadmedia Inc of USA.

Dr. Shieh is a Senior Member of IEEE, a steering committee member of ACM SIGSAC, and an editor of ACM Transactions on Information and System Security, IEEE Internet Computing, IEEE Transactions on Dependable and Secure Computing, Journal of Computer Security, and Journal of Information Science and Engineering. He is also the President of Chinese Cryptology and Information Security Association (CCISA), which is the largest academic association of its kind in Taiwan. He was on the organizing committees of numerous conferences, such as International Computer Symposium, and IEEE International conference on Parallel and Distributed Systems. Recently, he is the steering committee chair of ACM Symposium on Information, Computer and Communications Security, program chair of 2006 ACM ASIACCS, general chair of 1998 Network Security Technology Workshop, the program chair of 1999 Conference on Mobile Computing, the program chair of 2002 International Workshop on Asia Public Key Infrastructure, the program chair of 1997 Information Security Conference (INFOSEC'97) and the program committee member of 1996 and 2000 ACM Conference on Computer and Communications Security. Dr. Shieh has published over a hundred of academic articles, including papers, patents, and books. Recently he received ACM Service Award for his contribution to ACM; Outstanding Research Award, NationalChiaoTungUniversity, 2000; Distinguished Information Technology Award, 2000 bestowed by Executive Yuan for his academic achievement in computer security research.

His research interests include internetworking, distributed operating systems, and network security.

 

Education

  1. Ph.D., Electrical and Computer Engineering, University of Maryland, College Park, Maryland, USA
  2. M.S., Electrical and Computer Engineering, University of Maryland, College Park, Maryland, USA
  3. B.S., Electrical & Control Engineering, National Chiao Tung University, Hsinchu, Taiwan

Professional Background

  1. Distinguished Professor, Dept. of Computer Science & Information Eng., National Chiao Tung University, Taiwan.
  2. Director, NCTU-Cisco Internet Technology Laboratory.
  3. Director, Distributed System Network Security Lab., National Chiao Tung Univeristy.
  4. Chairman, Dept. of Computer Science & Information Eng., National Chiao Tung University, Taiwan.
  5. Associate Editor, ACM Transactions on Information and System Security.
  6. Adviser, National Information and Communication Security Taskforce, Executive Yuan (equivalent to State Department of USA), Taiwan.
  7. Director, Government Service Network-CERT/CC, RDEC, Executive Yuan, Taiwan.
  8. Director, Computer and Network Center, National Chiao Tung University, Taiwan.
  9. Vice Chairman of the Board, Chinese Cryptology and Information Security Association.
  10. Associate Professor, Dept. of Computer Science & Info. Eng., National Chiao Tung University, Taiwan8.
  11. Adviser, Taiwan Computer Emergency Response Team, Taiwan Network Information Center
  12. Consultant, Computer and Communications Lab., Industrial Technology and Research Institute, Taiwan.
  13. Research Consultant, IBM, Federal System Division, Gaithersburg, Maryland, USA.
  14. Instructor, Dept. of Electrical and Computer Eng., Univ. of Maryland, College Park, Maryland, USA.
  15. Teaching Assistant, Dept. of Electrical and Computer Eng., Univ. of Maryland, College Park, Maryland, USA.
  16. Instructor & 2nd Lieutenant, Dept. of Electrical and Computer Eng., Chinese Military Academy, Taiwan.

Publications/Patents

Journal Papers

  1. Vic Hsu, C.W. Wang, Shiuhpyng Shieh, “Reliability and Security of Large Scale Data Storage in Cloud Computing,” IEEE ATR, 2011.
  2. C.W. Wang, Shiuhpyng Shieh,” SWIFT: Decoupling System-Wide Information Flow Tracking for Malware Analysis” submitted to IEEE Transactions on Reliability.
  3. LY, Yeh, Y.L. Huang, S.P. Shieh, Anthony Joseph, “A Batch Authenticated and Key Agreement Framework for P2P-based Online Social Networks,” accepted for publication, IEEE Transactions on Vehicular Technology.
  4. Pokai Chen, Shiuhpyng Shieh, “Security for Future Internet Architecture - Motivation from DNSSEC,” IEEE ATR, 2011.
  5. Yu-Lung Huang, Chiya Shen, Shiuhpyng Shieh, "S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks," in revision, IEEE Transactions on Vehicular Technology.
  6. Chi-Wei Wang, Shiuhpyng Shieh, “The Evolution of Fine-Grain Malware Behavior Analysis -From Static to Dynamic,” IEEE Reliability Society ATR, 2010.
  7. "Proactive Distributed Digital Evidence Preservation with Tamper Resistance, Perfect Secrecy, and High Survivability," IEEE JSAC, submitted.
  8. Minghao Yang, Shiuhpyng Shieh, "Tracing Anonymous Mobile Attacker in Wireless Network," accepted for publication, Journal of Digital Content Technology and its Applications.
  9. Shih-I Huang, Shiuhpyng Shieh, "Secure Encrypted-Data Aggregation for Wireless Sensor Networks," ACM Journal of Wireless Networks,2009.
  10. Shih-I Huang, Shiuhpyng Shieh, "Secret Search Mechanism for Wireless Sensor Networks with Passive RFIDs," International Journal of Security and Networks, Volume 5, Number1 ,PP15 – 25, 2010.
  11. Fu-Yuan Lee, Shiuhpyng Shieh, "Edge-Based Record Route: A Novel Approach for Single Packet Traceback," in revision, Journal of Computer Security, 2006
  12. Jia-Ning Luo, Shiuhpyng Shieh, and Ji-Chiang Shen,“Secure Authentication Protocols Resistant to Guessing Attacks,” Journal of Information Science and Engineering, Vol.22 No. 5, September 2006, pp. 1125-1143.
  13. Fu-Yuan Lee, Shiuhpyng Shieh, "Packet Classification Using Diagonal-Based Tuple Space Search," Computer Networks. Volume 50, Issue 9 , 20 June 2006, Pages 1406-1423.
  14. Shiuhpyng Shieh, Dan Wallach, “Ad hoc and P2P Security,” IEEE Internet Computing, Nov/Dec 2005
  15. Shu-Min Cheng, Shiuhpyng Shieh, Weng-Her Yang, Fu-Yuan Lee, Jia-Ning Luo, “Designing Authentication Protocols for Third Generation Mobile Communications Systems,” Journal of Information Science and Engineering, Vol. 21 No. 2, March 2005, pp. 361-378
  16. Fu-Yuan Lee, Shiuhpyng Shieh, "Defending against Spoofed DDoS Attacks with Path Fingerprint," accepted Computers & Security 2005 pp.571- 586.
  17. Yu-Lun Huang, Shiuh-Pyng Shieh, Jian-Chyuan Wang,"Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems," IEEE Transactions on Multimedia. Vol. 6, Oct. 2004, pp. 760- 769.
  18. Shiuh-Pyng Shieh, Yea-Ching Tsai, Yu-Lun Huang,"Optimal Information Dispersal for Fault-Tolerant Communications overBurst Error Channel," IEEE Transactions on Reliability, Vol. 52, Issue 3, Sep. 2003, pp. 354-366.
  19. Fu-Yuan Lee, Shiuhpyng Shieh, "Packet Classification Using Diagonal-Based Tuple Space Search," accepted for publication, Computer Networks.
  20. Shiuhpyng Shieh, Weng-Her Yang, “Protecting Network Users in Mobile Code Systems,” Journal of Parallel and Distributed Computing, Vol. 64, Issue 2, February 2004, pp.191 –200.
  21. Fu-Yuan Lee, Shiuhpyng Shieh, “Scalable and lighterweight Key Distribution for Secure Group Communications,” ACM/PH International Journal of Network Management. Vol. 14, Issue 3,May 2004, pp. 167 - 176 <
  22. Fu-Yuan Lee, Shiuhpyng Shieh, “Accelerating Network Security Services with Fast Packet Classification,” Computer Communications, 2004, pp.1637-1646
  23. C.F. Lu, Shiuhpyng Shieh, “Re-keying Protocols in Symmetric Cryptosystems,” accepted for publication, Journal of Discrete Mathematical Sciences and Cryptography,volume 7, 2004 , p23~p27.
  24. C.F. Lu, Shiuhpyng Shieh, “Efficient Key Evolving Protocol for GQ Signature Scheme,” Journal of Information Science and Engineering. Vol. 20 No. 4, July 2004, pp.679-706.
  25. C.F. Lu, Shiuhpyng Shieh, “Secure Key-Evolving for Public Key Cryptosystems Based on the Discrete Logarithm Problem,” Journal of Information Science and Engineering, Vol. 20 No. 2, March 2004, pp. 391-400.
  26. Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh, Shen-Hsuan Wang, “Source-end Defense System against DDoS Attacks,” book chapter, Computer Security in the 21st Century, published by Springer, Feb. 2005, pp. 147-167.
  27. Shih-I Huang, Shiuhpyng Shieh, Shang-Yen Wu, “Adaptive Random Key distribution Schemes for Wireless Sensor Network,” book chapter, Computer Security in the 21st Century, published by Springer, Feb. 2005, pp.91-102.
  28. Wen-Her Yang, and Shiuh-Pyng Shieh, "Secure Key Agreement for Group Communications," ACM/PH International Journal of Network Management, Vol. 11, No 6, Nov-Dec 2001.
  29. Wen-Her Yang, Kai-Wei Fan and Shiuh-Pyng Shieh, "A secure multicast protocol for the internets multicast backbone," ACM/PH International Journal of Network Management vol. 11, Issue 2, page 129-136, Mar/April 2001.
  30. S.P. Shieh, Y.L. Huang, F.S. Ho, J.N. Luo, "Network Address Translators: Effects on Security Protocols and Applications in the TCP/IP Stack," IEEE Internet Computing, Nov./Dec. 2000.
  31. S.P. Shieh, C.T. Lin, W.B. Yang, H.M.Sun, "Digital Multisignature Schemes for Authenticating Delegates in Mobile Code Systems," IEEE Trans. on Vehicular Technology, August 2000, NSC-85-2622-E-009-006R.
  32. S.I. Huang, S.P. Shieh, S.Y. Wu, “Adaptive Random Key Distribution Schemes for Wireless Sensor Networks,” Security in 21 Century, 2004.
  33. Y.L. Huang, S.P. Shieh, F.S. Ho, "A Generic Electronic Payment Model Supporting Multiple Merchant Transactions," Vol 19, No. 5, Computers and Security, 2000, pp. 453-465.
  34. S.L. Chang, S.P. Shieh, C.H. Jong, "A Security Testing System for Vulnerability Detection," Vol. 12 No. 1, Journal of Computers, 2000, pp. 7-21.
  35. C.T. Lin, S.P. Shieh, "Chain Authentication in Mobile Communication Systems," Vol. 13, Journal of Telecommunication Systems, 2000.
  36. S.P. Shieh, C.T. Lin, W.H. Yang, "Information Protection in Dynamic Statistical Databases " Vo. 43, Encyclopedia of Computer Science and Technology, 2000, pp.97-112.
  37. I.J. Shue, S.P. Shieh, “Playback dispatch and Fault Recovery for a Clustered Video System with Multiple Servers," Journal of Multimedia Tools and Applications, Vol. 9, Issue 3, Nov. 1999, pp. 277-294.
  38. Hung-Min Sun and S. P. Shieh, "Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures," Journal of Information Science & Engineering, Vol. 15, No. 5, Sep.1999, pp. 679-690.
  39. F.S. Ho, S.P. Shieh, Y.L. Huang, “An Efficient Authentication Protocol for Mobile Networks," Journal of Information Science and Engineering, Vol.15 No.4, July 1999, pp.505-520.
  40. I.J. Shyu, S.P. Shieh, “A Distributed Fault-Tolerant Design for Multiple-Server VOD systems,” Journal of Multimedia Tools and Applications, March 1999, pp. 219-248.
  41. S.P. Shieh, C.T. Lin, “Auditing User Queries in Dynamic Statistical Databases," Journal of Information Science, Vol. 113, Jan. 1999, pp. 131-146, NSC 85-2213-E00 9-032.
  42. S.P. Shieh, “Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems,” Journal of Information Science and Engineering, Vol.15 No.1, January 1999, pp.91-106, NSC85-2622-E-009-006R.
  43. S.P. Shieh, C.T. Lin, S.Y. Wu, “Optimal Assignment of Mobile Agents for Software Authorization and Protection (COMCOM1223)," Computer Communications, Vol. 22, Jan. 1999, pp. 46-55.
  44. H.M. Sun, S.P. Shieh, "A note on breaking and repairing a secure broadcasting in large networks," Computer Communications, Vol. 22, 1999, pp. 193-194.
  45. C.T. Lin, S.P. Shieh, W.H. Yang, "Secure Authentication Protocols Resistant to Guessing Attacks," IICM, 1999.
  46. W.H. Yang, S.P. Shieh, "Password Authentication Schemes with Smart Cards," Computers and Security, Vol. 18, No. 8, 1999, pp. 727-734.
  47. Hung-Min Sun and S. P. Shieh, "Secret Sharing Schemes for Graph-Based Prohibited Structures," Computers and Mathematics with Applications, Vol. 36, No. 7, Oct. 1998, pp. 131-140.
  48. I.J. Shue, S.P. Shieh, “Balancing Workload and Recovery Load on Distributed Fault-Tolerant VOD Systems," IEEE Communications Letters,, Vol. 2, No. 10, Oct. 1998, pp. 288-290.
  49. S.P. Shieh, I.J. Shyu, C.Y. Shen, “Wide Address Translation and Protection for Single Address Space Operating Systems,” Proceedings of the National Science Council, Vol. 22, No. 5, September 1998, pp. 601-616, NSC 85-2221-E009-039.
  50. H.M. Sun, S.P. Shieh, “Secure Broadcasting in Large Networks," Computer Communications, March 1998, pp. 279-283.
  51. H.M. Sun, S.P. Shieh, “Optimal Information Dispersal for Increasing Reliability of a Distributed Service,” IEEE Transactions on Reliability, Dec. 1997, pp. 462-472, NSC 85-2213-E-009-032.
  52. S.P. Shieh, F.S. Ho, “A Comment on A Total Ordering Multicast Protocol,” IEEE Transactions on Parallel and Distributed Systems, October 1997.
  53. S.P. Shieh, V. D. Gligor, “On a Pattern-Oriented Model for Intrusion Detection," IEEE Transactions on Data and Knowledge Engineering, Vol. 9, No. 4, August 1997, pp. 661-667, NSC 85-2213-E-009-032.
  54. S.P. Shieh, W.H. Yang, H.M. Sun, “An Authentication Protocol with Trusted Third Party,” IEEE Communications Letters, Vol 1, No. 3, May 1997, pp. 87-89.
  55. S.P. Shieh, V.D Gligor, “Detecting Illicit Information Leakage in Operating Systems," Journal of Computer Security, April 1997, pp. 123-148, NSC 85-2213-E-009-032.
  56. H.M. Sun, S.P. Shieh, “Efficient Construct of On-Line Multiple Secret Sharing Schemes,” Journal of Computers, Dec. 1996, pp. 49-56.
  57. S.P. Shieh, W.H. Yang, “An Authentication and Key Distribution System for Open Network Systems," ACM Operating Systems Review, April 1996, pp 32-41, NSC 85-2213-E-009-032.
  58. H.M. Sun, S.P. Shieh, “An Efficient Construction of Perfect Secret Sharing Schemes for Graph-Based Structures," Computer & Mathematics with Applications, April 1996, pp. 129-135, NSC 84-2213-E-009-081.
  59. I.J. Shyu, S.P. Shieh, “Virtual Address Translation for Wide Address Architectures," ACM Operating Systems Review, Vol. 29, No. 2, October 1995, pp 37 - 46, NSC 84-2221-E-009-001.
  60. S.P. Shieh, “A Distributed Intrusion Detection Model," Journal of Computers, Vol 6, No 4, December, 1994, pp 24-34, TL 83-5206.
  61. H.M. Sun, S.P. Shieh, “A Construction of Dynamic Threshold Schemes," Electronic Letters, November 1994, pp 2023 - 2025, NSC 84-2213-E-009-081.
  62. H.M. Sun, S.P. Shieh, “On Dynamic Threshold Schemes," Information Processing Letters 52, 1994, pp 201-206, NSC 84-2213-E-009-081.
  63. S.P. Shieh, J.N. Cheng, “Specification,Validation and Verification of Time-Critical Systems," accepted for publication, Computer Communications, Vol. 21, No. 5, May 1998, pp. 460-469, NSC85-2213-E-009-032.
  64. H.M. Sun, S.P. Shieh, “Recursive Construction of Perfect Secret Sharing Schemes,” Computer & Mathematics with Applications, 1999, pp. 87-96.

Patents

  1. 王繼偉,謝續平,劉晏如,“分離式的全系統層次模擬器與資訊流動追蹤方法與其應用,” Taiwan patent pending
  2. CW Wang, SP Shieh, YR Liu, “Method for Decoupling System-Wide Information Flow Tracking for Malware Analysis and Its Applications,” US patent pending
  3. S.I. Huang, S.P. Shieh, “Method and System for Secure Data Aggregation in Wireless Sensor Networks, 用於在無線感應器網路中進行安全資料聚合的方法以及系統 “ROC patent no. I350086. 10, 2011.
  4. S.I. Huang, S.P. Shieh, C.W. Wang, “A Light-Weight Authentication and Secret Retrieval, 權重認證及秘密擷取” ROC patent pending no. 097139529, 2008
  5. S.I. Huang, S.P. Shieh, C.W. Wang, "A Light-Weight Authentication and Secret Retrieval," US patent pending, Aug. 12, 2008.
  6. S.I. Huang, S.P. Shieh, C.W. Wang, "A Light-Weight Authentication and Secret Retrieval," Taiwan patent pending, 2008.
  7. S.I. Huang, S.P. Shieh, "Method and System for Secure Data Aggregation in Wireless Sensor Networks," US patent pending, 2008.
  8. S.I. Huang, S.P. Shieh, "Method and System for Secure Data Aggregation in Wireless Sensor Networks," Taiwan patent pending, 2008.
  9. S.P. Shieh, "Multisignature Scheme with Message Recovery for Group Authorization in Mobile Networks," ROC patent no. 1248744, Feb. 2006.
  10. S.P. Shieh, "Clustered Architecture for High Speed IPsec Gateway," ROC patent no. 1227082, Jan. 2005.
  11. S.P. Shieh, Y.L. Huang, “Smart Card-Based Key Distribution Schemes in Conditional Access Systems,” ROC patent no. 203525, May 2004 – Oct. 2022.
  12. S.P. Shieh, “Synchronous Method and System for Processing a Packet," US patent pending no. 101742064, 2004.
  13. S.P. Shieh, "Clustered Architecture for High Speed IPsec Gateway," China patent pending no. 03148124.8, 2004.
  14. S.P. Shieh, et al, "Method and System for Synchronous Packet Processing," US patent pending, March. 2003.
  15. S.P. Shieh, et al, “Method and System for Synchronous Packet Processing," China patent pending, March. 2003.
  16. S.P. Shieh, et al, "Method and System for Access Control for Pay-TV channels," Taiwan patent pending, March. 2003.
  17. S.P. Shieh, et al, "Method and System for Multi-Signatures with Message Recovery," Taiwan patent pending, March. 2003.
  18. S.P. Shieh, et al, "同步封包處理系統," Taiwan patent pending, February. 2003.
  19. S.P. Shieh, et al, "Method and System for Smart Card-based Password Authentication," US patent pending, Nov. 1999.
  20. S.P. Shieh, et al, "Method and System for Online Transactions Involving Multiple Merchants," US patent pending, Nov. 1999.
  21. S.P. Shieh, et al, "Method and System for Enhancing Authentication Protocols against Guessing Attacks," US patent pending, Nov. 1999.
  22. S.P. Shieh, et al, " Authorization Method for Protecting Mobile Agents on the Internet," US patent pending, Nov. 1999.
  23. S.P. Shieh, et al, "Audit Scheme for Protecting Individuals in Dynamic Statistical Databases," US patent pending, Nov. 1999.
  24. S.P. Shieh, et al, “A Generic Secure Payment Method Supporting Multiple Merchants Transactions and Its Applications,” ROC patent no. 87148006, Dec.1999.
  25. S.P. Shieh, et al, “An Authentication System for Computer Networks," ROC patent no. 079094, 1996. The patent includes four systems: secure Telnet system, secure Rlogin system, secure Ftp system, and the network monitor system.
  26. S.P. Shieh, et al, “A Pattern-Oriented Intrusion-Detection System and Method," US patent no. 5278901, January 1994.

Conference Papers

  1. Chia-Ming Fan, Bing-Han Li, Shiuhpyng Shieh, “On The Security of Password-Based Pairing Protocol in Bluetooth” The 13th Asia-Pacific Network Operations and Management Symposium, (APNOMS 2011), 2011
  2. Yen-Ru Liu, C.W. Wang, J.W. Hsu, T.C. Tseng, S.P. Shieh, “Extracting Hidden Code from Packed Malware based on Virtual Machine Memory Comparison,” 21th Cryptology and Information Security Conference (CISC 2011), 2011.
  3. Bing-Han Li, Shiuhpyng Shieh, “RELEASE: Generating Exploits Using Loop-Aware Concolic Execution,” IEEE Conference on Secure Software Integration and Reliability Improvement, June 2011.
  4. Wei Shi-Sue, Shiuhpyng Shieh, Bing-Han Li, Michael Cheng Yi Cho and Chin-Wei Tien, "A Framework Using Fingerprinting for Signal Overlapping-Based Method in WLAN," the International Computer Symposium on Computer Networks and Web Technologies (ICS 2010), Tainan, Taiwan, Dec. 16-18, 2010.
  5. Chia-Wei Hsu, Shiuhpyng Shieh, "FREE: A Fine-grain Replaying Executions by Using Emulation", The 20th Cryptology and Information Security Conference (CISC 2010), Taiwan, 2010. (Best Student Paper Award)
  6. 王繼偉、王嘉偉、許家維、謝續平,"基於虛擬機器外部觀察與映像檔比對的惡意程式分析", The 20th Cryptology and Information Security Conference (CISC 2010), Taiwan, 2010.
  7. Yu-Lung Huang, Chih-Ya Shen, Shiuhpyng Shieh, Hung-jui Wang, Cheng-Chun Lin, "Provable Secure AKA Scheme with Reliable Key Delegation in UMTS," IEEE Conference on Secure Software Integration and Reliability Improvement, 2009.
  8. Yu-Lung Huang, Hsiaoying Lin, Doug Tygar, Shiuhpyng Shieh, "SWOON: A Testbed for Secure Wireless Overlay Networks," USENIX Workshop on Cyber Security Experimentation and Test (CSET 2008), 2008.
  9. Lian Lee, Shiuhpyng Shieh, "Protecting User Privacy with Dynamic Identity-Based Scheme for Low-cost Passive RFID Tags," Information Security Conference, May 2008.
  10. Che-Cheng Lin, Shiuhpyng Shieh, Jia-Chun Lin, "Lightweight, Distributed Key Agreement Protocol for Wireless Sensor Networks," IEEE conference on Secure System Integration and Reliability Improvement, 2008.
  11. Che-Cheng Lin, Shiuhpyng Shieh, Jia-Chun Lin, “A Pollution Attack Resistant Multicast Authentication Scheme Tolerant to Packet Loss,” IEEE Conference on Secure System Integration and Reliability Improvement, Yokohama, Japan, July 14-17, 2008 (co-sponsored by IEEE Reliability Society and IEEE System, Man, and Cybernetics Society, published by IEEE Press).
  12. Ming-Hao Yang, Shiuhpyng Shieh, "Tracing Mobile Attackers in Wireless Ad-hoc Network," IEEE International Workshop on Social and Legal Aspects under Emerging Computing Environments, held at Athens, Greece, June 8-13, 2008 (Best Paper Award, published by IEEE Press).
  13. Shiuhpyng Shieh, "Wireless Security - Attacks and Countermeasures," Japan-Taiwan Symposium, Oct. 2007.
  14. S.I. Huang, Shiuhpyng Shieh, "SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks, "  IEEE International Conference on Computational Intelligence and Security (IEEE CIS), Dec. 2007.
  15. Shiuhpyng Shieh, Cheng-Huang Jiang, Jen-Chien Liu,“Keystroke Statistical Learning Model for Web Authentication,” ACM Symposium on Information, Computer and Communications Security, 20-22 March, 2007.
  16. Tanya Roosta, Shiuhpyng Shieh, Shankar Sastry, “Taxonomy of Security Attacks in Sensor Networks and Countermeasures,” IEEE International Conference on System Integration and Reliability Improvements, Hanoi, Vietnam, 13-15 December 2006.
  17. Zhi-Kai Zhang, Tze-Yau William Huang, Shiuhpyng Shieh, “Controlling Various Platforms for Test Automation,” IEEE International Conference on System Integration and Reliability Improvements, Hanoi, Vietnam, 13-15 December 2006.
  18. Yang Tzu-I and S. P. Shieh and Warren Wolfe-Jen Lin and Li-Joe Lin, “A Path Authentication Scheme for Routing Disruption Attack Prevention in Ad Hoc Networks,” 2006 IEEE International Conference on Systems, Man, and Cybernetics, Oct. 2006.
  19. Shiuhpyng Shieh, “Defending against DDoS Attacks,” High Tech Forum – e-Security, Oct. 21-22, 2005.
  20. Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, “An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks,” ACM Symposium on Information, Computer and Communications Security, 2006.
  21. Ya-Jeng Lin, Shiuhpyng Shieh, “Lightweght, Pollution-Attack Resistant Multicast Authentication Scheme,” ACM Symposium on Information, Computer and Communications Security, 2006.
  22. Shih-I Huang, Shiuhpyng Shieh, “Secret Searching in Wireless Sensor Networks with RFIDs,” Information Security Conference, June 2005, pp. 237 – 244.
  23. Kang_Hsien Chou, Shiuhpyng Shieh, Ming-How Yang, and Fu-Yuan Lee, “Marking-Based Source Identification Scheme for Defending Against DDoS Attacks,” Information Security Conference, 2004
  24. Fu-Yuan Lee, Shiuhpyng Shieh and Ming-How Yang, “Tracing the Origin of Single-Packet Attacks,” Information Security Conference, 2004
  25. Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh, Shen-Hsuan Wang, “Source-end Defense System against DDoS Attacks,” International Workshop on Advanced Developments in Software and Systems Security, pp31-35, 2003
  26. Shih-I Huang, Shiuhpyng Shieh, Shang-Yen Wu, “Adaptive Random Key distribution Schemes for Wireless Sensor Network,” International Workshop on Advanced Developments in Software and Systems Security, pp61-65, 2003
  27. Shiuhpyng Shieh, Fu-Yuan Lee, “Fast Packet Classification for Improving the Performance of Secure Network Services,” Information Security Conference, 2003.
  28. Shiuhpyng Shieh, Yung-Zen Lai, Ya-Ting Chang and Fu-Yuan Lee, "Clustered Architecture for High-Speed IPsec Gateway," ICS'2002.
  29. Chang-Han Jong, Shiuh-Pyng Shieh and Jia-Ning Luo, "Detecting Distributed DoS/Scanning by Anomaly Distribution of Packet Fields," ICS'2002.
  30. Fu-Yuan Lee, Shiuhpyng Shieh and Lin-Yi Wu, "Address Sharing Enabled Mobile IP Utilizing NAPT," ICS'2002.
  31. Fu-Shen Ho, Shiuhpyng Shieh, Y.L. Huang and K.L. Tsai, "A Service Probing and Channel Establishment Protocol Across Multiple Network Address Translation Realms," ICS'2002.
  32. Shiuhpyng Shieh, Shih-I Huang and Fu-Shen Ho, "An ID-based Proxy Authentication Protocol Supporting Public Key Infrastructure," IWAP'2002
  33. Jia-Ning Luo, Shiuh-Pyng Shieh, "The Multi-layer RSIP Framework," The 9th IEEE International Conference on Networks, ICON'2001. Bangkok, Thailand, October 2001.
  34. Cheng-Fen Lu, Shiuh-Pyng Shieh, "Secure Key Evolving Protocols for Discrete Logarithm Schemes," RSA conference, Feb 2002.
  35. C.H. Chun, S.P. Shieh, “GSN-CERT and Computer Emergency Response,” Chinese-France Conference on Information Technology, March 2000
  36. S.P. Shieh, Y.L. Huang, J.C. Wang, "Practical Key Distribution Schemes for Pay TV Channel Protection," IEEE International Computer Software and Applications Conference (COMPSAC'2000), Nov. 2000.
  37. S.M. Cheng, W.H. Yang, S.P. Shieh, "A Flexible Authentication for Next Generation Mobile Communications," 6th Mobile Computing Workshop, pp. 67-73, March 2000.
  38. W.H. Yang, K.W. Fan, S.P. Shieh, "A Scalable and Secure Multicast Protocol on Mbone Environments," Informaiton Security Conference, May 2000.
  39. W.H. Yang, S.P. Shieh, "An Efficient Key Agreement Protocol for Secure Group Communications," Informaiton Security Conference, May 2000.
  40. Y.L. Huang, S.P. Shieh, "A Fair Settlement Protocol for Online Transactions of Electronic Contents," Information Security Conference, May 2000.
  41. J.N. Luo, S.P. Shieh, "A Transparent and Efficient Mechanism for File System Protection," Information Security Conference, May 2000.
  42. W.H. Yang, S.P. Shieh, "Enhancing Security and Flexibility of Password Authentication with ID-based Cryptosystems," Information Security Conferencre, May 1999.
  43. C.T. Lin, S.P. Shieh, "A Secure Communication Protocol for Telecommunications Management Networks," Information Security Conference, May 1999.
  44. C.T. Lin, S.P. Shieh, "An Efficient and Secure Credit Card-Based Billing Scheme for Telephone Services," Mobile Computing Workshop, March 1999, pp. 28-34.
  45. H.M. Sun, S.P. Shieh, "On Private-Key Cryptosystems Based on Product Codes," ACISP'98, Australia, July 1998.
  46. S.P. Shieh, C.T. Lin, Y.S. Juang, "Controlling Inference and information Flows in Secure Databases," 1998 Information Security Conference, May 1998.
  47. S.P. Shieh, C.T. Lin, S.Y. Wu, "A Software Authorization and Protection Model for Mobile Code Systems," 1998 International Symposium on Internet Technology, April 1998.
  48. Shiuh-Pyng Shieh, Chern-Tang Lin, Maujy Peng, Wen-Chi Yang, Jim-Ning Yang, "A Secure Credit Card-based Billing Scheme for Telephone Services," International Conference on Mobile Computing, 1998
  49. H.M. Sun, S.P. Shieh, “On-Line multiple Secret Sharing Based on a One-Way Function,” 1998 Information Security Conference, May 1998.
  50. H.M. Sun, S.P. Shieh, “A Secure Broadcasting Cryptosystem in Large Computer Networks,” 1998 Information Security Conference, May 1998.
  51. H.M. Sun, S.P. Shieh, “On Private-Key Cryptosystems Based on Product Codes,” Australia Information Security and Privacy Conference, July 1998.
  52. S.P. Shieh, C.T. Lin, Y.S. Juang, “Controlling Inference and information Flows in Secure Databases,” 1998 Information Security Conference, May 1998.
  53. I.J. Shue, S.P. Shieh, “Load-Balanced Playback Dispatch for Fault-Tolerant Multi-Server VOD Systems,” 1997 Workshop on Real-Time and Media Systems, July 30-31, 1997.
  54. S.P. Shieh, J.N. Luo, “A Secure Mail System for Mobile Users in the Internet,” International Conference on Mobile Computing, March 1997.
  55. F.S. Ho, S.P. Shieh, “An Efficient Authentication for Mobile Networks,” International Conference on Computer System Technologies for Industrial Applications, April 1997.
  56. H.M. Sun, S.P. Shieh, “On the Information Rate of Perfect Secret Sharing Schemes with Access Structures of Rank Three,” Conference on Information Security, May 1997.
  57. C.F. Lu, S.P. Shieh, “An Anonymous Fair Credit Card Payment System,” Conference on Information Security, May 1997.
  58. M.J. Pong, S.P. Shieh, W.C. Yang, J.N. Yang, “Billing Schemes for Secure Telephony over Public Communication Networks,” Conference on Information Security, May 1997.
  59. H.M. Sun, S.P. Shieh, “Secret Sharing in Graph-Based Prohibited Structures," 1997 IEEE International Conference on Computer Communications (INFOCOM'97), Kobe, Japan, April 7-11, 1997.
  60. H.M. Sun, S.P. Shieh, “Cryptoanalysis of Private-Key Schemes Based on Burst-Error-Correcting Codes," the Proceedings of ACM International Conference on Computer and Communications Security, March 14-16, 1996.
  61. S.P. Shieh, Y.L. Huang, F.S. Ho, “A Family of Secure Network Protocols," the Proceedings of Information Security Conference, May, 1996.
  62. H.M. Sun, S.P. Shieh, “A Perfect Scheme for Secret Sharing between Two Parties," Proceedings of Information Security Conference, May, 1995.
  63. S.P. Shieh, C.T. Lin, R.T. Hsueh, “Secure Communication in Global Systems for Mobile Telecommunications," Proceedings of Mobile Computing Workshop, April 1995.
  64. S.P. Shieh, C.T. Lin, “An Audit Scheme for Inference Control in Statistical Databases," Proceedings of International Conference on Intelligent Information Management Systems, June 1995.
  65. S.P. Shieh, et al, “The Design and Implementation of A MPOS Simulator," Proceedings of the Multiprocessor Systems Workshop, July 1995.
  66. H.M. Sun, S.P. Shieh, “On Dynamic Threshold Schemes," 4rd Conference on Information Security, May 21, 1994.
  67. S.P. Shieh, H. M. Sun, “On Constructing Secret Sharing Schemes," 1994 IEEE International Conference on Computer Communications, Networking for Global Communications (INFOCOM'94),Toronto, Canada, June 12-16, 1994.
  68. I.J. Shyu, S.P. Shieh, “Architectural Support for 64-Bits Address Translation," Proceedings of 1994 International Computer Symposium, Dec., 1994, pp 322 - 327.
  69. M.R. Chiang, S.P. Shieh, C.L. Liu, “Dynamic Load Balancing in Parallel Simulation Using Time Warp Mechanism," Proceedings of International Conference on Parallel and Distributed Systems, Dec., 1994, pp 222- 227.
  70. H.M.. Sun, S.P. Shieh, “Optimal Information Dispersal for Reliable Communication in Computer Networks," Proceedings of International Conference on Parallel and Distributed Systems, Dec., 1994, pp 460 -464.
  71. S.P. Shieh, “Covert Channel Bandwidth Estimation and Measurement," 3rd Conference on Information Security, May 12, 1993.
  72. S.P. Shieh, “Intrusion Detection in Computer Networks," 3rd Conference on Information Security, May 12, 1993.
  73. S.P. Shieh, H.M. Sun, “A Secret Sharing Scheme for Hierarchical User Groups," the 8th International Joint Workshop on Computer Communication (JWCC-8), December 19-21, 1993.
  74. S.P. Shieh, V.D. Gligor, “A Pattern-Oriented Intrusion Detection Model and Its Applications," Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, (May 7-9, 1991), pp 327-342.
  75. S.P. Shieh, V.D. Gligor, “Auditing the Use of Covert Storage Channels in Secure Systems," Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, (May 1990), pp 285-295.

Technique Transfer

Technique Transfer

  1. Secure Telnet, transferred to EverElite Corp. (Hinet network service provider),Formosoft Inc., Chung Shan Institute of Technology.
  2. Secure Rlogin, transferred to EverElite Corp.(Hinet network service provider), Formosoft Inc., Chung Shan Institute of Technology.
  3. Secure Ftp, transferred to EverElite Corp. (Hinet network service provider), Formosoft Inc., Chung Shan Institue of Technology.
  4. Secure Email, transferred to EverElite Corp. (Hinet network service provider), Formosoft Inc., Chung Shan Institute of Technology.
  5. Network Monitoring Tool, transferred to EverElite Corp. (Hinet network service provider), Formosoft Inc., Chung Shan Institute of Technology.
  6. Gigabit VPN Gateway, transferred to ITRI/CCL.
  7. Remote Security Scanner, 國防部.

Books and Guidelines

Books and Guidelines

  1. 謝續平、黃能富、黃仁俊,”無線網路安全”教材,教育部資通安全聯盟,2009.
  2. M. –H. Yang and S.-P. Shieh, A book chapter in “分散式癱瘓服務攻擊解決策略--追蹤匿名攻擊者,” 財團法人國家實驗研究院科技政策研究與資訊中心, 2006.
  3. D.T. Lee, S.P. Shieh, Doug Tygar, “Computer Security in 21 Century,” Springer, Feb. 2005.
  4. Shiuhpyng Shieh, et al, “Intrusion, Detection and Prevention, Illustrated,” published by NSC, Dec. 2004.
  5. Shiuhpyng Shieh, et al, “System and Network Security,” published by NSC, Jan. 2004.
  6. S.P. Shieh, et al, 編纂行政院研考會“健全政府機關電子公文交換作業安全專題研究,” published by RDEC, 1996.
  7. S.P. Shieh, "Internet Security," a book to be published by Pearson Education.
  8. S.P. Shieh, T.L. Hwang, Operating System Supports for Shared Memory Multiprocessor Systems, Book Chapter, World Scientific Publishing Co. Pte. Ltd., To appear.
  9. S.P. Shieh, el al., "Secure Electronic Documents exchange," RDEC, Executive Yuan, 1996.
  10. Gligor, V. D., and Shieh, S. P., et al, A Guide to Understanding Covert Channel Analysis of Trusted Systems, NCSC-TG-030, National Computer Security Center, USA, November 1993.
  11. S.P. Shieh, “An Information and Privilege Flow Model for Intrusion Detection in Computer Systems," Ph.D. Dissertation, University of Maryland, College Park, MD, June 1991.
  12. S.P. Shieh, “Intrusion Detection in Multilevel Secure Systems," IBM Independent Research and Development report, 1991.
  13. S.P. Shieh, J.S. He, “The Automation of Covert Channel Analysis," IBM Independent Research and Development report, 1990.
  14. S.P. Shieh, “A Survey of Supercomputers," Technical Report, University of Maryland, College Park, March, 1986.

Others

Others

  1. S.P. Shieh, "An Information and Privilege Flow Model for Intrusion Detection in Computer Systems," Ph.D. Dissertation, University of Maryland, College Park, MD, June 1991.
  2. S.P. Shieh, "A Survey of Supercomputers," Technical Report, University of Maryland, College Park, March, 1986.
  3. S.P. Shieh, J.S. He, "The Automation of Covert Channel Analysis," IBM Independent Research and Development report, 1990.
  4. S.P. Shieh, "Intrusion Detection in Multilevel Secure Systems," IBM Independent Research and Development report, 1991.

Professional Activities

Editor Board

Current:
  1. Editor-in-Chief, IEEE Reliability Society Newsletter, 2010-present
  2. Associate Editor, IEEE Transactions on Reliability, 2008 - present
  3. Associate Editor, IEEE Transactions on Dependable and Secure Computing, 2007 - present.
  4. Associate Editor, Journal of Computers, 2004 -present.
Former:
  1. Associate Editor, Journal of Computer Security, IOS Press, 2002 - 2010.
  2. Associate Editor, ACM Transactions on Information and System Security , 2004 - 2008.
  3. Editor, Journal of Information Science and Engineering, 2000 - 2006.
  4. Associate Editor, International Journal of Information and Computer Security , 2004 - 2006.
  5. Guest Editor, IEEE Internet Computing, "Security for P2P and Ad Hoc Networks", 2004 - 2005.
  6. Guest Editor, Electronics Magazine, special issue on Internetworking, May & June 2000.

Conference Organizing Committee

  1. IEEE Senior Member.
  2. IEEE Taipei Section Reliability Society chair.
  3. IEEE Reliability Society Technical Activities Committee Member.
  4. ACM SIGSAC Steering Committee member.
  5. Program Chair, IEEE Conference on Software Security and Reliability (SERE), Washington D.C., June 2012
  6. Publicity Chair, IEEE Conference on Secure Software Integration and Reliability Improvement, 2009.
  7. Steering Committee Chair, ACM Symposium on Information, Computer and Communications Security, Singapore, March 2006, 2007, 2008, 2009,2010, 2011, 2012.
  8. Program Committee Member, ACM Symposium on Information, Computer and Communications Security, Singapore, March 2007, 2008, 2009, 2010, 2011, 2012.
  9. Program Committee Member, IEEE Pacific Rim International Symposium on Dependable Computing, 2008.
  10. Program Committee Member, IEEE Workshop on Dependable and Secure Nanocomputing, 2007.
  11. Program Committee Member, ACM Conference on Computer and Communications Security (CCS), Washington DC, Oct. 1996, 2000, 2003,2007, 2008, 2009.
  12. Program Committee member, ACM SIGCOMM Workshop on Large Scale Attack Defense (LSAD), Kyoto, Japan September 2007.
  13. Program Committee Member, IEEE International Workshop on Trust, Security and Privacy in Ubiquitous Computing (TSPUC2007), Finland, 2007.
  14. Program Committee member, Performance and Dependability Symposium (PDS) track of the 2007 International Conference on Dependable Systems and Networks (DSN 2007), to be held in Edinburgh, UK, June 25-28, 2007.
  15. IEEE International Conference on System Integration and Reliability Improvements, SIRI 2006, Hanoi, Vietnam, 13-15 December 2006.
  16. Academia-Industry Track Chair, IEEE International Conference on System Integration and Reliability Improvements, SIRI 2006, Hanoi, Vietnam, 13-15 December 2006.
  17. Steering Committee member, Asiacrypt, 2003, 2004, 2005, 2006, 2007, 2008, 2009
  18. Program Chair and Founder, ACM Symposium on Information, Computer and Communications Security, March 2006.
  19. Program Chair, ACM Symposium on Information, Computer and Communications Security, March 2006
  20. Program Committee member, Conference on Security and Privacy for Emerging Areas in Communication Networks, Sept. 2005
  21. General Chair, Information Security Conference, June 2004, 2005, 2006.
  22. Program Committee Member,, IEEE International Workshop on Trust, Security and Privacy in Ubiquitous Computing(TSPUC2005), Taormina, Italy, June 13, 2005
  23. Program Committee Member, IEEE Conference on Dependable Systems and Networks, Yokohama, Japan, June 2005.
  24. Program Committee Member, Information Security Practice and Experience Conference (ISPEC), to be held on April 11-14, 2005 in Singapore
  25. Program Committee Member, IWAP’2004, Oct. 2004.
  26. Steering Committee member, ACM Symposium on Information, Computer and Communications Security, 2004.
  27. Steering Committee member, Asiacrypt, 2003, 2004.
  28. Program Chair, 2003 International Workshop on Advanced Development in Software and System Security, Dec. 2003
  29. Session Chair & Program Committee Member, ACM Conference on Computer and Communications Security, Washington DC, Oct. 2003.
  30. Program Chair, IWAP’2002, Oct 30 – Nov. 1, 2002.
  31. Program Chair, ICS’2002, Dec. 2002/11/4
  32. Program Committee Member, Network Security Workshop, San Francisco, Sept. 2002.
  33. Program Committee Member, ICIST, Singapore, Nov. 2002.
  34. Program Committee Member, 2001 ACM International Conference on Information Security, Sep. 2001
  35. Program Committee Member, ACM International Conference on Computer and Communications Security, Nov 1996, 2000, 2003. (Flagship conference of ACM in its area).
  36. Program Committee Member, National Computer Symposium, 1999.
  37. Advisory Committee Member, TANET'99, Oct. 1999.
  38. Program Chairman, 1999 Mobile Computing Conference, April 1999.
  39. Program Committee member, International Workshop on Cryptographic Techniques and E-Commerce, Hong Kong, 1999.
  40. General Chair, 1998 Workshop on Network Security Technology, May 1998.
  41. Advisory Committee Member, TANET’98.
  42. Program Chair, 1997 Information Security Conference, May 1997.
  43. Program Committee Member, 1996 International Computer Symposiums, Dec., 1996.
  44. Session Chair & Program Committee Member, 1996 ACM International Conference on Computer and Communication Security, March 1996 (Flagship conference of ACM in its area), “Protocol Analysis."
  45. Publication Chairman, 1996 International Conference on Computer Systems for Industrial Applications, April, 1996.
  46. Publication Chairman, 1995 International Conference on High Performance Computer Systems, July, 1995.
  47. Publication Chairman, 1994 IEEE International Conference on Parallel and Distributed Systems, Dec., 1994.
  48. Publication Chairman, 1994 International Computer Symposiums, Dec., 1994.
  49. Session Chairman, 1994 International Computer Symposiums, “Architecture (II)."
  50. Session Chairman, 1993 IS'COMM, “Protocol Verification and Testing."
  51. Session Chairman & Program Committee Member, 1993, 1994, 1995, 1996, 1997, 1998 Information Security Conference.
  52. Panelist, RAM’98, “Security and Billing”

Service Committee

  1. 國家資通安全會報技服中心惡意程式交流聯盟主席,2011- present
  2. NCC「通訊傳播事業研究發展活動適用投資抵減案」審查委員,2011- present
  3. TWNIC網安委員會委員,2008- present
  4. 交通大學產學運籌中心專利技術顧問,2011 - present
  5. 教育部電算中心諮詢委員, 2011 - present
  6. 教育部資安聯盟訪視委員2011 - present
  7. IEET工程教育學會評鑑委員,2007-present
  8. 國科會電信國家型計畫辦公室規劃委員, 2000
  9. 法務部專家資源資料庫諮詢顧問2005/10-20011/9
  10. 法務部調查局資通安全工作諮詢委員2009/1-2011/12
  11. 國科會電信國家型計畫辦公室規劃委員
  12. 國家資通安全會報技術服務中心諮詢委員,2002/1 ─ present
  13. 全民健保IC卡評選委員
  14. 工研院電通所顧問, 7/1994 - 7/1997
  15. 行政院青輔會獎勵投資評審委員,7/1997- present
  16. 行政院警政署刑事警察局顧問群成員, 1997- present
  17. 台灣網路資訊中心(TWNIC)電腦危機處理小組(TW-CERT)顧問, 9/1997 - 8/1998
  18. 中華民國資訊安全學會(Chinese Information Security Society) 第一、二屆理事, 5/1994-present.
  19. 交通部民航局飛航軟體評審委員,1993-1997
  20. 科學園區投資暨研發獎勵計劃評審,1992-present
  21. 經濟部中央標準局計劃審議委員, 9/1997- 8/1998
  22. 行政院研考會國民卡議約顧問, 1996-1997
  23. TWNIC理事,8/1998-7/1999

其他協助產業技術發展之具體績效

  1. 擔任國科會電信國家型計畫辦公室規劃委員,協助經濟部、交通部、教育部、國科會等部會規劃國家大型計畫。
  2. 擔任國家資通安全會報諮詢委員,協助建立我國資通安全體系。
  3. 積極參與協助產業技術發展, 擔任工研院電通所顧問多年,協助策略規劃及發展NII Security and HFC Network Security Infrastructures和相關關鍵技術。
  4. 協助國家太空實驗室規劃及發展衛星通訊安全及防護系統。
  5. 編訂行政院研考會“健全政府機關電子公文交換作業安全”手冊。
  6. 協助倫飛電腦公司發展多處理機電腦工作站系統軟體,提升系統效率。
  7. 承接國科會及科學園區全陽科技公司產學研究計劃發展多媒體伺服器。
  8. 規劃電信國家型科技計劃網路安全分項。
  9. 所發展之專利技術與系統SNP (Secure Network Protocols) 其中包含Secure Telnet, Secure Rlogin, Secure Ftp, Certified Secure Email, Network Monitoring Tool等網路安全系統, 已技術移轉艾群科技EverElite Corp. (Hinet service provider) 、中山科學研究院, Formosoft Inc.。
  10. 主持行政院研考會「電子化政府網路安全防護機制之建立」,2000。
  11. 1998年開發出網際網路電話軟硬體(非純軟體網路電話),並技術移轉亞旭、西陵、傳邦、致福、傑發等,對我國高科技產業技術提升,助益極大。

Reviews

Patents

  1. Taiwan patent reviewer.

Journals

  1. Information Processing Letters
  2. Computer Systems Science and Engineering
  3. IEEE Transactions on Computers
  4. IEEE Communications Letters
  5. ACM Wireless Networks
  6. ACM Mobile Networking and Applications
  7. Jounal of Intelligent Information Systems
  8. Journal of Information Science and Engineering
  9. Computer Communications
  10. IEEE Internet Computing
  11. IEEE Journal of Selective Areas in Communications
  12. IEEE Transactions on Knowledge and Data Engineering
  13. IEEE Transactions on Vehicular Technology

Conference

  1. 1996 ACM International Conference on Computer and Communication Security
  2. 1996, 1997 International Conference on Computer System Technologies for Industrial Applications
  3. 1992, 1993, 1994, 1995, 1996, 1997, International Computer Symposiums
  4. 1993, 1994 International Conference on Parallel and Distributed Systems
  5. 1993, 1994, 1995, 1996, 1997, 1998, 1999 Information Security Conference

Honors

  1. Distinguished Teaching Award, National Chiao Tung University, 2012.
  2. ACM Distinguished Member, Oct. 2010.
  3. 2011 National Science Council Elite Research Project, 2011 (國科會優良網路通訊國家型研究計畫獎)
  4. Editor-in-Chief, IEEE Reliability Society Newsletter, 2010-present
  5. 2009 IEEE Reliability Society Gold Award
  6. 2008 IEEE Reliability Society Bronze Award
  7. 2010 IEEE Taipei Section Outstanding Chapter Award
  8. 2010 IEEE Taipei Section Outstanding Membership Development Award
  9. IEEE Reliability Society Administration Committee Member, 2010
  10. 中科院學合案績優計畫獎, Nov. 2009
  11. Best Paper Award (with Jia-Wei Hsu), Cryptology and Information Security Conference, May 2010
  12. Associate Editor, IEEE Transactions on Reliability, 2008 – present.
  13. Associate Editor, IEEE Transactions on Dependable and Secure Computing, 2007 - present.
  14. IEEE Reliability Society Taipei/Tainan Chapter, 2007 – present.
  15. IEEE Reliability Society Technical Activities Committee member, 2007 – present.
  16. Best Paper Award, Minghao Yang, C.S. Chiu, Shiuhpyng Shieh, "Tracing Mobile Attackers in Wireless Ad-Hoc Network" IEEE SLAECE 2008 (Workshop of ICIW 2008).
  17. ACM Recognition of Service Award, In appreciation to contribution to ACM, 2006.
  18. Guest Editor, IEEE Transactions on Dependable a nd Secure Computing, 2006 .
  19. Associate Editor, IEEE Transactions on Dependable and Secure Computing, 2007 - present.
  20. 國科會「優等研究獎」,2005-2006。
  21. 2005龍騰論文獎優等獎。
  22. Associate Editor, ACM Transactions on Information and System Security, 2004/1- 2008.
  23. Steering Committee Member,ACM Special Interest Group on Security, Audit and Control (SIGSAC).
  24. Editor, Journal of Computer Security, IOS Press, 2002 - present.
  25. Editor, Journal of Information Science and Engineering, 2000 - present.
  26. Guest Editor, IEEE Internet Computing, 2004 - 2005.
  27. Editor, International Journal of Information and Computer Security (IJICS), 2004 - 2006.
  28. Guest Editor, Electronics Magazine, special issue on Internetworking, May & June 2000.
  29. IEEE Senior Member.
  30. 榮獲2000資訊月年度「傑出資訊人才獎」,行政院頒發,Dec. 2000。
  31. 榮獲國科會工程處「傑出研究獎」提名, April 2000。
  32. 榮獲「傑出研究獎」, 交通大學,May 2000。
  33. 獲得交通大學推薦參選1998年「教育部所屬機關優秀教育人員」。
  34. 研發成果獲得1999資訊月台北世貿資訊展「傑出資訊應用與產品槳」,Dec. 1999.
  35. 榮獲「傑出論文獎」,中華民國資訊安全學會,2000。
  36. 榮獲「全國傑出資訊論文指導教授獎」,經濟部、中華民國資訊學會、資策會共同舉辦, 1999。
  37. The Intrusion Detection Independent Research and Development (IRAD) project performed at IBM was evaluated by U.S. Government reviewers as exceptional (IRAD of the year, 1991.

Invited Talks

  1. “Cloud Computing Security,” keynote speech, Government and Education CIO summit, Nov. 2009.
  2. “Cloud Computing Security,” keynote speech, International Workshop on Cryptology and Information Security, Dec. 2009.
  3. “Tracing DDoS Attacks in the Internet,” keynote speech, 2005 Network Security Forum organized by NSC, San Jose, Oct. 2005.
  4. "Tracing network attacks," MicroSoft Research Asia Regional Workshop, Beijing, 2005.
  5. "Protecting network user against DDoS attacks,"Conference on e-Security: the prevention of cyber crimes and the security of information, San Francisco, Oct. 2005.
  6. Panel Moderator, ASIA PKI Forum, 2004.
  7. "Network Security Development in Taiwan," 2002 MEMS and Network Security Conference, organized by NSC, September 2002.
  8. "The Research and Developement of Internet Security Technology," 2002 Network Security Workshop, San Francisco.
  9. "Internet Security Key Problems and Technologies," TANET'97, Oct. 1997.
  10. "Internet Security Issues and Technologies," 1996 Communication Electronics Technology Conference, April 1996.

Accomplishments by Supervised Students

  1. 2011台灣駭客年會War game 第一名
  2. 2010 行政院國科會「大專學生研究創作獎」指導教授
  3. 2010 全國駭客年會Wargame 第一名
  4. 2010 全國資訊安全會議「最佳學生論文」
  5. 2008 資策會全國大專院校金盾獎第二名。
  6. 2008 資策會全國大專院校金盾獎潛力無窮獎
  7. 2006 微軟思源盃兩岸三校網際網路經濟創意大賽最佳總體創新獎(即 第一名)。
  8. 2005 龍騰論文獎博士論文優等獎。
  9. 2004 微軟學者獎。
  10. 2004 行政院國科會「大專學生研究創作獎」。
  11. 2004 教育部大專校院通訊科技專題製作競賽暨亞太地區名校邀請觀犘賽大專組優等
  12. 2004 教育部研發競賽第一名。
  13. 2004 思源研發競賽金竹獎,作品:「Wireless Sensor Network」。
  14. 2002 R&D Conest, 2nd prize, National Chiao Tung Univ.
  15. 2001 Student Invention Award, National Science Council.
  16. 2000「傑出學生論文獎」,中華民國資訊安全學會。
  17. 1999 Student Invention Award, National Science Council.
  18. 1999 R&D Contest, National Chiao Tung Univ.
  19. 1999 R&D Contest, Third prize, National Chiao Tung Univ.
  20. 1999 best student paper of the year, Ministry of Economics, Chinese Information Society, Institute for Information Industry.
  21. 1998 R&D Contest, Fourth prize, National Chiao Tung Univ.
  22. 1997 R&D Contest, Fourth prize, National Chiao Tung Univ.
  23. 1996 ROC patent.
  24. 1996 future star of the year, Taipei Computer Association.
  25. 1996 R&D Contest, Third prize, National Chiao Tung Univ.
  26. Fourth prize, 1996 ACM programming contest, Asia.
  27. First prize, 1996 programming contest, Ministry of Education.
  28. First prize, 1995 R&D Contest, National Chiao Tung Univ.
  29. Fourth prize, 1995 R&D Contest, Ministry of Education.