Sangjin Lee

Affiliations:
  • Korea University, School of Cybersecurity, Seoul, South Korea


According to our database1, Sangjin Lee authored at least 182 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Data remnants analysis of document files in Windows: Microsoft 365 as a case study.
Forensic Sci. Int. Digit. Investig., October, 2023

Forensic analysis of SQL server transaction log in unallocated area of file system.
Forensic Sci. Int. Digit. Investig., October, 2023

<i>Chracer</i>: Memory analysis of Chromium-based browsers.
Forensic Sci. Int. Digit. Investig., October, 2023

Data reconstruction and recovery of deduplicated files having non-resident attributes in NTFS volume.
Forensic Sci. Int. Digit. Investig., September, 2023

An improved IoT forensic model to identify interconnectivity between things.
Forensic Sci. Int. Digit. Investig., March, 2023

Discovering spoliation of evidence through identifying traces on deleted files in macOS.
Forensic Sci. Int. Digit. Investig., March, 2023

System API Vectorization for Malware Detection.
IEEE Access, 2023

2022
A Study on the Processing of Timestamps in the Creation of Multimedia Files on Mobile Devices.
J. Inf. Process. Syst., 2022

Characterizing client-side caches of audiovisual content sharing services: Findings and suggestions for forensics.
J. Inf. Secur. Appl., 2022

CATCH: Cloud Data Acquisition through Comprehensive and Hybrid Approaches.
Digit. Investig., 2022

DiagAnalyzer: User behavior analysis and visualization using Windows Diagnostics logs.
Digit. Investig., 2022

Vision: An empirical framework for examiners to accessing password-protected resources for on-the-scene digital investigations.
Digit. Investig., 2022

Forensic Recovery of File System Metadata for Digital Forensic Investigation.
IEEE Access, 2022

2021
User profiling via application usage pattern on digital devices for digital forensics.
Expert Syst. Appl., 2021

File fingerprinting of the ZIP format for identifying and tracking provenance.
Digit. Investig., 2021

NTFS Data Tracker: Tracking file data history based on $LogFile.
Digit. Investig., 2021

Forensic exploration on windows File History.
Digit. Investig., 2021

Forensic Recovery of SQL Server Database: Practical Approach.
IEEE Access, 2021

SoftMark: Software Watermarking via a Binary Function Relocation.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Automated analysis with Apriori algorithm: deriving guidance for working-level cybersecurity curricula.
Inroads, 2020

Study of identifying and managing the potential evidence for effective Android forensics.
Digit. Investig., 2020

5W1H-based Expression for the Effective Sharing of Information in Digital Forensic Investigations.
CoRR, 2020

Forensic Analysis of Residual Information in Adobe PDF Files.
CoRR, 2020

Forensic analysis of the Windows telemetry for diagnostics.
CoRR, 2020

2019
Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts.
Digit. Investig., 2019

High-Speed Searching Target Data Traces Based on Statistical Sampling for Digital Forensics.
IEEE Access, 2019

2018
Mobile forensic reference set (MFReS) and mobile forensic investigation for android devices.
J. Supercomput., 2018

Abnormal Behavior Detection to Identify Infected Systems Using the<i> APChain</i> Algorithm and Behavioral Profiling.
Secur. Commun. Networks, 2018

A method and tool to recover data deleted from a MongoDB.
Digit. Investig., 2018

Intelligent Virtual Assistant knows Your Life.
CoRR, 2018

2017
Study on the tracking revision history of MS Word files for forensic investigation.
Digit. Investig., 2017

Digital forensic approaches for Amazon Alexa ecosystem.
Digit. Investig., 2017

"Alexa, Can I Trust You?".
Computer, 2017

2016
An enhanced security framework for reliable Android operating system.
Secur. Commun. Networks, 2016

A study of user relationships in smartphone forensics.
Multim. Tools Appl., 2016

Towards Syntactic Approximate Matching - A Pre-Processing Experiment.
J. Digit. Forensics Secur. Law, 2016

Forensic investigation framework for the document store NoSQL DBMS: MongoDB as a case study.
Digit. Investig., 2016

Recovery method of deleted records and tables from ESE database.
Digit. Investig., 2016

2015
Methodology and implementation for tracking the file sharers using BitTorrent.
Multim. Tools Appl., 2015

Investigation Methodology of a Virtual Desktop Infrastructure for IoT.
J. Appl. Math., 2015

Analysis of the HIKVISION DVR File System.
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015

2014
An on-site digital investigation methodology for data leak case.
Secur. Commun. Networks, 2014

Test-driven forensic analysis of satellite automotive navigation systems.
J. Intell. Manuf., 2014

Practical Electromagnetic Disturbance Analysis on Commercial Contactless Smartcards.
Int. J. Distributed Sens. Networks, 2014

Data fragment forensics for embedded DVR systems.
Digit. Investig., 2014

Structure and application of IconCache.db files for digital forensics.
Digit. Investig., 2014

2013
Damaged backup data recovery method for Windows mobile.
J. Supercomput., 2013

A study of user data integrity during acquisition of Android devices.
Digit. Investig., 2013

A new triage model conforming to the needs of selective search and seizure of electronic evidence.
Digit. Investig., 2013

On-site investigation methodology for incident response in Windows environments.
Comput. Math. Appl., 2013

2012
The effective method of database server forensics on the enterprise environment.
Secur. Commun. Networks, 2012

A recovery method of deleted record for SQLite database.
Pers. Ubiquitous Comput., 2012

A study on multimedia file carving method.
Multim. Tools Appl., 2012

A research on the investigation method of digital forensics for a VMware Workstation's virtual machine.
Math. Comput. Model., 2012

On-the-spot digital investigation by means of LDFS: Live Data Forensic System.
Math. Comput. Model., 2012

Forensic analysis techniques for fragmented flash memory pages in smartphones.
Digit. Investig., 2012

Digital forensic investigation of cloud storage services.
Digit. Investig., 2012

A Study for Classification of Web Browser Log and Timeline Visualization.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Methodology for Digital Investigation of Illegal Sharing Using BitTorrent.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Methodology for Digital Forensic Investigation of iCloud.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Analysis Framework to Detect Artifacts of Portable Web Browser.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

2011
Advanced evidence collection and analysis of web browser activity.
Digit. Investig., 2011

Analysis of changes in file time attributes with file manipulation.
Digit. Investig., 2011

The Method of Database Server Detection and Investigation in the Enterprise Environment.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

2010
Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device.
Telecommun. Syst., 2010

Acceleration of Differential Power Analysis through the Parallel Use of GPU and CPU.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

A New Primitive For Stream Ciphers Applicable To Pervasive Environments.
Intell. Autom. Soft Comput., 2010

Secure USB bypassing tool.
Digit. Investig., 2010

A proposal for automating investigations in live forensics.
Comput. Stand. Interfaces, 2010

DES with any reduced masked rounds is not secure against side-channel attacks.
Comput. Math. Appl., 2010

2009
An efficient signed digit montgomery multiplication for RSA.
J. Syst. Archit., 2009

U-HMS: hybrid system for secure intelligent multimedia data services in Ubi-Home.
J. Intell. Manuf., 2009

Data concealment and detection in Microsoft Office 2007 files.
Digit. Investig., 2009

Forensic investigation of Microsoft PowerPoint files.
Digit. Investig., 2009

A Stepwise Methodology for Tracing Computer Usage.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Analysis of Time Information for Digital Investigation.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Research about extracting and analyzing accounting data of company to detect financial fraud.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

2008
Performance Enhancement of Differential Power Analysis Attacks With Signal Companding Methods.
IEEE Signal Process. Lett., 2008

Security analysis of the full-round DDO-64 block cipher.
J. Syst. Softw., 2008

Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions.
IACR Cryptol. ePrint Arch., 2008

Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths.
IACR Cryptol. ePrint Arch., 2008

Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension.
IACR Cryptol. ePrint Arch., 2008

Extraction of Residual Information in the Microsoft PowerPoint file from the Viewpoint of Digital Forensics considering PerCom Environment.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Recovery of Damaged Compressed Files for Digital Forensic Purposes.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Design and Implementation of a Tool for System Restore Point Analysis.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Methodologies for Detecting Covert Database.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Design and Implementation of a Tool to Detect Accounting Frauds.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Methodology for Forensic Analysis of Embedded Systems.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

USB PassOn: Secure USB Thumb Drive Forensic Toolkit.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

The design of framework for detecting an insider's leak of confidential information.
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008

2007
New FORK-256.
IACR Cryptol. ePrint Arch., 2007

Password Recovery Using an Evidence Collection Tool and Countermeasures.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Generalised Category Attack - Improving Histogram-Based Attack on JPEG LSB Embedding.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Windows Pagefile Collection and Analysis for a Live Forensics Context.
Proceedings of the Future Generation Communication and Networking, 2007

Discovering Methodology and Scenario to Detect Covert Database System.
Proceedings of the Future Generation Communication and Networking, 2007

A Field Guide to Hidden Accounting Information Detection.
Proceedings of the Future Generation Communication and Networking, 2007

Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Preimage Attack on the Parallel FFT-Hashing Function.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers.
J. Cryptol., 2006

DRBAC Model Using a WSNM for Services in <i>i</i>-Home.
IEICE Trans. Inf. Syst., 2006

Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators.
Proceedings of the Progressin Cryptology, 2006

A DRBAC Model Based on Context for Smart and Secure Services in Intelligent Ubiquitous Home.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

<i>ui</i>H-PMAC Model Suitable for Ubi-Home Gateway in Ubiquitous Intelligent Environment.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Attack on JPEG2000 Steganography Using LRCA.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

Category Attack for LSB Steganalysis of JPEG Images.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

User Centric Intelligent IPMPS in Ubi-Home.
Proceedings of the Computational Science and Its Applications, 2006

A Flexible DRM System Considering Ubiquitous Environment.
Proceedings of the Computational Science and Its Applications, 2006

Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis.
Proceedings of the Computational Science and Its Applications, 2006

A New Dedicated 256-Bit Hash Function: FORK-256.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

<i>C-i</i>UMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

HIGHT: A New Block Cipher Suitable for Low-Resource Device.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding.
Proceedings of the Advances in Cryptology, 2006

Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Construction of UOWHF: Two New Parallel Methods.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Linear Attack Using Multiple Linear Approximations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

On the Security of Encryption Modes of MD4, MD5 and HAVAL.
IACR Cryptol. ePrint Arch., 2005

Digital evidence collection process in integrity and memory information gathering.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

A Watermarking Method Using Quantization and Statistical Characteristics of Wavelet Transform.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b.
Proceedings of the Progress in Cryptology, 2005

Intelligent Multimedia Service System Based on Context Awareness in Smart Home.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

How to Construct Universal One-Way Hash Functions of Order <i>r</i>.
Proceedings of the Progress in Cryptology, 2005

Related-Key Differential Attacks on Cobra-H64 and Cobra-H128.
Proceedings of the Cryptography and Coding, 2005

New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Color Cube Analysis for Detection of LSB Steganography in RGB Color Images.
Proceedings of the Computational Science and Its Applications, 2005

Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE.
Proceedings of the Computational Science and Its Applications, 2005

Design and Implementation of the IMS-IPMP System in Convergence Home-Network Environment.
Proceedings of the Digital Libraries: Implementing Strategies and Sharing Experiences, 2005

Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Applying LR Cube Analysis to JSteg Detection.
Proceedings of the Communications and Multimedia Security, 2005

User-Oriented Multimedia Service Using Smart Sensor Agent Module in the Intelligent Home.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model.
IACR Cryptol. ePrint Arch., 2004

Steganographic Scheme Using a Block Cipher.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

On Security Notions of Steganographic Systems.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H.
Proceedings of the Progress in Cryptology, 2004

Related-Key Attacks on Reduced Rounds of SHACAL-2.
Proceedings of the Progress in Cryptology, 2004

Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA.
Proceedings of the Progress in Cryptology, 2004

On the Pseudorandomness of a Modification of KASUMI Type Permutations.
Proceedings of the Information Security and Cryptology, 2004

Padding Oracle Attacks on Multiple Modes of Operation.
Proceedings of the Information Security and Cryptology, 2004

On Security Notions for Steganalysis.
Proceedings of the Information Security and Cryptology, 2004

Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

Higher Order Universal One-Way Hash Functions.
Proceedings of the Advances in Cryptology, 2004

Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

Pseudorandomness of SPN-Type Transformations.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

The Related-Key Rectangle Attack - Application to SHACAL-1.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Differential and linear cryptanalysis for 2-round SPNs.
Inf. Process. Lett., 2003

Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property.
Proceedings of the Computer Network Security, 2003

A Secure Steganographic Scheme against Statistical Analyses.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

High Quality Perceptual Steganographic Techniques.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Designated Verification of Non-invertible Watermark.
Proceedings of the Information Security, 6th International Conference, 2003

Covert Channel Detection in the ICMP Payload Using Support Vector Machine.
Proceedings of the Computer and Information Sciences, 2003

Impossible Differential Cryptanalysis for Block Cipher Structures.
Proceedings of the Progress in Cryptology, 2003

Impossible Differential Attack on 30-Round SHACAL-2.
Proceedings of the Progress in Cryptology, 2003

New Block Cipher: ARIA.
Proceedings of the Information Security and Cryptology, 2003

Truncated Differential Attacks on 8-Round CRYPTON.
Proceedings of the Information Security and Cryptology, 2003

Differential Cryptanalysis of TEA and XTEA.
Proceedings of the Information Security and Cryptology, 2003

Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

New Parallel Domain Extenders for UOWHF.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

Key Recovery Attacks on the RMAC, TMAC, and IACBC.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Provable security for 13 round Skipjack-like structure.
Inf. Process. Lett., 2002

Impossible Differential Cryptanalysis of Zodiac.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Practical off-line authentication.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98.
Proceedings of the Selected Areas in Cryptography, 2002

An Improved Method of Multiplication on Certain Elliptic Curves.
Proceedings of the Public Key Cryptography, 2002

A Chosen Plaintext Linear Attack on Block Cipher CIKS-1.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

Saturation Attacks on Reduced Round Skipjack.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

Amplified Boomerang Attack against Reduced-Round SHACAL.
Proceedings of the Advances in Cryptology, 2002

A Practical Approach Defeating Blackmailing.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Off-Line Authentication Using Watermarks.
Proceedings of the Information Security and Cryptology, 2001

Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation.
Proceedings of the Information Security and Cryptology, 2001

Truncated Differential Cryptanalysis of Camellia.
Proceedings of the Information Security and Cryptology, 2001

Known-IV Attacks on Triple Modes of Operation of Block Ciphers.
Proceedings of the Advances in Cryptology, 2001

2000
New Block Cipher DONUT Using Pairwise Perfect Decorrelation.
Proceedings of the Progress in Cryptology, 2000

Difference Distribution Attack on DONUT and Improved DONUT.
Proceedings of the Information Security and Cryptology, 2000

Provable Security against Differential and Linear Cryptanalysis for the SPN Structure.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis.
Proceedings of the Advances in Cryptology, 2000

A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis.
Proceedings of the Information Security and Cryptology, 1999


  Loading...