終身講座教授 謝續平
Shiuhpyng Winston Shieh
實驗室尚有碩士生名額,歡迎加入!
We still have M.S. student quota, welcome to join us!
Current positions:
- University Lifetime Chair Professor, Department of Computer Science, NYCU
- Editor-in-Chief, IEEE Transactions on Reliability, 2022-
Honors:
- Outstanding Research Award, Ministry of Science and Technology, 2019 (科技部傑出研究獎, 2019)
- 2017 IEEE Reliability Society Engineer of The Year Award
- IEEE Fellow
- ACM Distinguished Scientist
- Distinguished Engineering Professor, Chinese Electrical Engineer Association
- 榮獲2022 IEEE Computer期刊傑出專欄論文獎 Outstanding Column Award, IEEE Computer, 2022
Contact
National Chiao Tung University, Hsinchu, Taiwan 300
Tel: +886 3 5731876 Fax: +886 3 5715407
E-mail: ssp@nycu.edu.tw
URL: http://dsns.cs.nycu.edu.tw/ssp
For Prospective Student:
Please feel free to browse my website to get an idea about what we are working on. Some of the webpages may be old, but they can still give an rough idea.
Basically we now work mainly on:
- Future Internet Security: This research work studies the security of Future Internet with cloud and a large-scale of IoT devices. Innovative evasive penetration testing techniques for systems and webpages are investigated.
Past Postions
- Associate Dean, Hacker College (亥客書院副院長)
- Vice President, IEEE Reliability Society, 2014 – 2016, 2018-2019
- Editor-in-Chief, IEEE Reliability, 2014-2016
- Advisor, Bamboofox club
- Advisor, National Security Council, Taiwan, 2011-2012
- President, Chinese Crypto & Information Security Association (similar to IACR in the US), 8/2003 - 8/2006
- Chair, Dept. of Computer Science & Information Eng, NCTU, 8/2001 - 7/2003
- Director, Computer and Network Center, NCTU,8/1998 - 7/2001
- Visting Professor, Dept. of EECS, UC Berkeley,1/2004- 9/2004, 8/2005 - 9/2006
- Director, GSN-CERT/CC, 1998 - 2001
- Director, NCTU-Cisco Internet Technology Lab, 10/2000 - 2011
- Professor, Dept. of Comp. Science, NCTU, 8/1998 – 1/2014
- Chair, Malware Forum, National Information and Communication Security Task Force, 2011 - 2012
- AdCom member, Reliability Society, 2010-2015
- Founding Chair, RS Taipei/Tainan Chapter, 2007-2013
- Member, RS Technical Activities, 2007-2009
- Advisory board member, National Information and Communication Security Task Force, 2002/1- 2012
- Advisor, National Security Bureau, 7/1996 – 2008
- Program Director, National Telecommunication Project Office, 2003
- Vice President, Chinese Crypto. & Info. Security Association, Taiwan, 2000 - 2003
- Board Director, Chinese Cryptology & Info. Security Association, Taiwan, 1994 - 2003
- IEEE Senior Member, 1999.
- Associate Professor, Dept. of Comp. Sci. & Info. Eng., NCTU, 8/1991 - 7/1998
- Consultant, ITRI/CCL, 7/1994-7/1997
- Consultant, IBM Federal Sector Division, Gaithersburg, MD, 1987 - 1991
- Instructor, Dept. of Electrical & Computer Engineering, University of Maryland, 1985
Education
- Ph. D., Electrical & Computer Engineering, University of Maryland, College Park (Advisor: Virgil Gligor,currently the director of CyLab, Carnegie Mellon University)
- M. S., Electrical & Computer Engineering, University of Maryland, College Park
- B.S., Electrical & Control Engineering, National Chiao Tung University
Directing Labs
- Network Security Lab
- Taiwan Information Security Center (TWISC@NCTU)
Research Interests
- Cybersecurity
- Intrusion Detection
- Penetration Test
- Malware Analysis using Deep Learning techniques
Course
- Network Security (2017 Fall)
- Network Security (2017 Spring)
- Network Security (2016 Fall)
- Network Security (2016 Spring)
- Network Security (2015 Fall)
- Network Security (2015 Spring)
- Computer Security Practice (2015 Fall)
- Network Security (2014 Fall)
- Introduction to Computer Networks (2014 Fall)
- Information Engineering Seminar(2013 Fall)
- Introduction to Computer Networks(2013 Fall)
- Network Security(2012 Fall)
- Computer Security(2012 Fall)
- Wireless and Mobile Network Security(2012 Spring)
- Computer Security(2012 Spring)
- Network Security(2011 Fall)
- Wireless and Mobile Network Security(2011 Spring)
- Network security(2010 Fall)
- Network security(2010 Spring)
- Network security(2009 Fall)
- Operation System(2009 Fall)
- Computer Security(2009)
- Wireless and Mobile Network Security (2009)
- Network Security(2008)
- Introduction to Network Security (2006)
Major Awards and Honors
- IEEE Reliability Society "Engineer of The Year" Award
- Outstanding Research Award, Ministry of Science and Technology, 2019 (科技部傑出研究獎, 2019)
- IEEE Fellow, 11/2013
- ACM Distinguished Scientist, 2010 (one of the 41 recipients in the world)
- Distinguished Engineering Professor, Chinese Institute of Electrical Engineers, 2014.
- Distinguished Teaching Award, National Chiao Tung University (NCTU), 2013
- Excellent Teaching Award, National Chiao Tung University (NCTU), 2012
- ACM SIGSAC Service Award, 2012
- Distinguished patent award, ITRI, 2012
- National Science Council Elite Research Project Award, 2011
- 2011 RS Chapter Award 1st place
- Best Paper Award, Cryptology and Information Security Conference, 2010
- 2010 Taipei Section Outstanding Chapter Award.
- 2010 RS Chapter Award 1st place
- 2010 Taipei Section Outstanding Membership Development Award.
- Outstanding Research Project Award, CSIST, 2009
- 2009 RS Chapter Award 1st place
- 2008 RS Chapter Award 3rd place
- ACM Service Award, 2006
- Excellent Research Award, National Science Council, 2005
- Distinguished Information Technology Award (the highest honor for computer scientists in Taiwan),bestowed by State Department, Taiwan, Dec. 2000 (presented by Taiwan Vice President).
- Outstanding Research Award, National Chiao Tung Univ., 2000.
- Best Paper Award, International Workshop on Social and Legal Aspects under Emerging Computing Environments, held at Athens, Greece, June 8-13, 2008 (published by IEEE Press).
- Outstanding Research Award, National Science Council, runner-up, 2000.
- Best paper award, Chinese Information Association/ACM Taipei Chapter, 1999.
- Best paper award, Chinese Cryptology & Information Security Association, 2000.
- Recipient of the 1999 National Distinguished Computer and Information Product of the Year, Taiwan.
- Recipient of IBM IRAD (Independent Research and Development) of the Year, Maryland, USA,1990.
- Best Honorary teacher, NCTU, runner-up (2 nd place), 1998.
- Program Chairs/General Chairs of numerous conferences.
- New Star Award, Taipei Computer Expo, 1996
- Gold Award, NCTU Research Contest, 1995.
- Gold Award, Programming Contest, Ministry of Education, 1996
- Invention Award, National Science Council, 2001
- Gold Award, NCTU Research Contest, 2004
- Gold Award, Research Contest, Ministry of Education, 2004
- Invention Award, National Science Council, 2004
Editorial Board
- Editor-in-Chief, IEEE Transactions on Reliability, 2022 – 2025.
- IEEE Reliability Society Fellow Committee Chair, 2019 - 2020
- Steering Committee Member, IEEE IoT Magazine, 2017–2020
- Guest editor, IEEE Access, 2019 - 2021
- Editor-in-Chief, IEEE Reliability, 2014 – 2016
- Editor-in-Chief, RS Newsletter, 2011/1-2013
- Associate Editor, Transactions on Reliability, 2008-2016
- Associate Editor, Transactions on Dependable and Secure Computing, 2007-2011
- Editor, ACM Transactions on Information and System Security, 2003- 2008
- Guest Editor, Internet Computing, “Security for P2P and Ad Hoc Networks,” 2004-2005.
- Guest Editor, TR Special Section on Trustworthy Computing, 2013
- Guest Editor, TR Special Section on Software, system and Information Reliability, 2013
- Guest Editor, TR Special Section on Software Security and Reliability, 2012
- Editor, Journal of Computer Security, IOS Press, 2002 - 2013.
- Editor, Journal of Information Science and Engineering, 2000 - 2006.
- Editor, Journal of Computer and Information Security, 2004 - 2006
- Guest Editor, IEEE Internet Computing, 2004
- Guest Editor, Electronics Magazine, special issue on Internetworking, May & June 2000.Conference Committees
- Founding Steering Committee Chair, ACM Symposium on Information, Computer and Communications Security (AsiaCCS), 2006-2013
- Program Chair, IEEE Conference on Software Security and Reliability (SERE), 2012, 2013
- Program Chair, IEEE Workshop on Information Assurance, 2012
- Student Program Chair, IEEE International Symposium on Software Reliability Engineering, 2012
- Founding Steering Committee Member, IEEE Conference on Communications and Network Security, 2012-
- Publicity Chair, IEEE Conference on Secure Software Integration and Reliability Improvement, 2009
- Program Chair, IEEE Workshop on Advanced Development in Software and Systems Security, 2003
- Publication Chair, IEEE Conference on Parallel and Distributed Systems, 1994.
- ACM SIGSAC Election Committee Member, 2012
- ACM SIGSAC Award Committee Member, 2011
- Steering Committee member, ACM Special Interests Group on Security, Audit and Control (SIGSAC), 2005-2008
- Founding Program Chair, ACM Symposium on Information, Computer and Communications Security, March 2006
- Steering Committee member, Asiacrypt, 2003-2008
- General Chair, Information Security Conference, June 2004, 2005.
- Program Chair, 2003 IEEE International Workshop on Advanced Development in Software and System Security, Dec. 2003
- Program Chair, IWAP’2002, Oct 30 – Nov. 1, 2002.
- Program Chairman, 1999 Mobile Computing Conference, April 1999.
- Program Chair, ICS’2002, Dec. 2002/11/4
- Advisory Committee Member, TANET (1998-2001)
- General Chair, Workshop on Network Security Technology, May 1998.
- Program Chair, Information Security Conference, May 1997.
- Publication Chair, International Conference on Computer Systems for Industrial Applications, April, 1996.
- Publication Chair, International Conference on High Performance Computer Systems, July, 1995.
- Publication Chair, IEEE International Conference on Parallel and Distributed Systems, Dec., 1994.
- Publication Chairman, International Computer Symposiums, Dec., 1994.
- Session Chairman, International Computer Symposiums, 1994
- Session Chairman, IS'COMM, 1993
- Panelist, RAM’98,
- PC member, CCS(Flagship conference of ACM; 1996, 2000, 2003, 2006-2009), AsiaCCS (2006-2013), IEEE/IFIP DSN2007, ISSRE2012; DSN(2005-2007); TSPUC(2005-2007); SUTC2006; SecComm2005; DCCS2005, ISPEC2005, IWAP2004, Asiacrypt2003, NSW2002, ICIST2002, ACMCIS2001, NCS1999, IWCTEC1999, ISC(1993-1997), ICS1996
Representative Publication List (Journal)
- Shiuhpyng Winston Shieh, Shanhsin Lee, Mengru Tsai, Ping-Ching Chen, and Yu-Tung Lin, “Generative Threat Variants for Detection Tools Assessment,” to appear in Research Focus, IEEE Reliability Magazine, September 2024.
- Shanhsin Lee, Shiuhpyng Winston Shieh, and Mengru Tsai, “Enterprise-Centric Intelligence: A Prioritization Scheme for Cyberthreat Intelligence and Common Vulnerabilities and Exposures,” IEEE Computer, Volume: 57, Issue: 7, July 2024.
- Shanhsin Lee, Mengru Tsai, and Shiuhpyng Winston Shieh, “The Game of Spear and Shield in Next Era of Cybersecurity,” IEEE Transactions on Reliability, U.S.A., vol. 73, no. 1, pp. 85-92, March 2024.
- Mengru Tsai, Shanhsin Lee, and Shiuhpyng Winston Shieh, “Strategy for Implementing of Zero Trust Architecture,” in IEEE Transactions on Reliability, U.S.A., vol. 73, no. 1, pp. 93-100, March 2024.
- Shiuhpyng Shieh, Jeff Voas, Phil Laplante, Jason Rupe, Christian Hansen, Yu-Sung Wu, Yi-Ting Chen, Chi-Yu Li, Kai-Chiang Wu, “Reliability Engineering in a Time of Rapidly Converging Technologies, IEEE Transactions on Reliability, Volume 73, Issue 1, pp. 73-82, March 2024.
- James Tu, Winston Shieh, Terrence Liu, Leo Wang, “Cybersecurity Reference Architecture for Semiconductor Fab Environments,” Semi standard guidelines, Oct. 2023.
- Shiuhpyng Winston Shieh, “Editorial Cybersecurity in Modern Life,” IEEE Transactions on Reliability, Volume 72, Issue 4, pp. 1294 ,December 2023.
- Shiuhpyng Winston Shieh, “Editorial Degradation and Maintenance in Reliability,” IEEE Transactions on Reliability, Volume 72, Issue 3, pp. 862, September 2023.
- Shiuhpyng Winston Shieh, “Editorial Security, Reliability, and Resilience in Internet of Things,” IEEE Transactions on Reliability, Volume 72, Issue 2, pp. 430, June 2023.
- Shiuhpyng Winston Shieh, “Editorial Information Processing in Engineering System Reliability Assessment and Management,” IEEE Transactions on Reliability, Volume 72, Issue 1, pp. 2, March 2023.
- Shiuhpyng Winston Shieh, “Editorial Emerging Trends in Trustworthy Computing,” IEEE Transactions on Reliability, Volume 71, Issue 4, pp. 1399-1400, Dec. 2022.
- Leon Chang, Ares Cho, Shiuhpyng Winston Shieh, Terence Liu, Vannia Lin, Louis Liu, Minghui Chung, Shanhsin Lee, SEMI E187 (Specification for Cybersecurity of Fab Equipment) Reference Practice, SEMI standard guidelines, Oct 2022.
- Shiuhpyng Shieh, Shanhsin Lee, Mengru Tsai, “Strategy and Tactics against Ransomware,” IEEE Computer, May 2022, pp 85-92. (Outstanding Column Award; the most-downloaded column paper in IEEE Xplore in 2022 with more than 1,000 downloads)
- Hsiu-Chuan Huang, Zhi-Kai Zhang, Chong-Kuan Chen, Wei-Da Hong, Jui-Chien Jao, and Shiuhpyng Shieh, “Adaptive Entry Point Discovery for Web Vulnerability Scanning,” Journal of Information Science and Engineering (JISE), Volume 38, Issue 1, pp. 185-205, Jan. 2022.
- Chen, C-Y., Quan, W., Cheng, N., Yu, S., Lee, J-H., Perez, G. M., Zhang, H. & Shieh, S-P., “Artificial Intelligence in Cybersecurity,” IEEE Access. 8, Sep 2020, p. 163329-163333
- 謝續平、李善新,“從國際推動趨勢談我國資安治理之挑戰與政策整備,” 國土及公共治理季刊,2020。
- Chung-Kuan Chen, Zhi-Kai Zhang, Shan-Hsin Lee, and Shiuhpyng Shieh, “Penetration Test in The IoT Age,” IEEE Computer, Volume 51, Issue 4, pp. 82-85, April 2018.
- Jeff Voas, et.al., “Educating Next Generation Computer Scientist,” IEEE Computer, Volume 51, Issue 1, pp. 80-88, January 2018. (Virtual Round Table Speaker Shiuhpyng Shieh)
- Zong-Xian Shen, Chia-Wei Hsu, Shiuhpyng Shieh, “Security Semantics Modeling with Progressive Distillation,” IEEE Transactions on Mobile Computing, Volume 16, Issue 11, pp. 3196-3208, Nov 2017.
- Hsiu-Chuan Huang, Zhi-Kai Zhang, Shiuhpyng Shieh, “Web Application Security: Threats, Countermeasure, and Pitfalls,” IEEE Computer, Volume 50, Issue 6, pp. 81-85, June 2017.
- Chia-Wei Hsu, Chia-Huei Chang, Chi-Wei Wang, Shiuhpyng Shieh, “DROIT+: Taint Tracking for Storage Access on Android,” Journal of Information Science and Engineering, Vol. 33 No. 5, pp. 1237-1254, September 2017.
- Chia-Chen Wu, Yu-Lun Huang, and Shiuhpyng Shieh, “Investigating Anonymous and Secure Fault-Tolerable Routing Protocols for Overlay Networks,” IEEE Reliability, August 2016.
- Chi-Wei Wang, Chia-Wei Wang, Shiuhpyng Shieh, "ProbeBuilder: Uncovering Opaque Kernel Data Structures for Automatic Probe Construction,” IEEE Transactions on Dependable and Secure Computing, Volume: 13, Issue: 5, pp. 568-581, Sept.-Oct., 2016.
- Tzu-Hsin Ho, Shiuhpyng Shieh, Chien-Chao Tseng, “RAKA: Revocable Authenticated Key Agreement System for Mobile Social Networks,” accepted for publication, Journal of Information Science and Engineering, 2015.
- Chia-Chen Wu, Yu-Lun Huang, and Shiuhpyng Shieh, “Investigating Anonymous and Secure Fault-Tolerable Routing Protocols for Overlay Networks,” IEEE Reliability, August 2016.
- Michael Cheng Yi Cho, Zhi-Kai Zhang, Shiuhpyng Shieh, “Resolving Malware-Loading Problem by Leveraging Shellcode Detection Heuristics,” IEEE Reliability, November 2016.
- Chung-Kuan Chen, Shiuhpyng Shieh, “CTF: Alternative Training for Offensive Security,” IEEE Reliability, August 2015.
- Chia-Wei Wang, Michael Cheng Yi Cho, Chi-Wei Wang, Shiuhpyng Shieh, “Combating Software Piracy in Public Clouds,” IEEE Computer, No. 10, vol. 48, pp: 88-91, October 2015.
- Zhi-Kai Zhang, Michael Cheng Yi Cho, Zong-Yu Wu, Shiuhpyng Shieh, “Identifying and Authenticating IoT Objects in a More Natural Way,” IEEE Computer, vol. 48, No. 08, pp: 81-83, August 2015.
- Chi-Wei Wang, Chong-Kuan Chen, Chia-Wei Wang, Shiuhpyng Shieh, “MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern” Journal of Information Science and Engineering, Vol. 31 No. 2, pp. 455-473, pp. 568 - 581 (March 2015).
- Chi-Wei Wang, Shiuhpyng Shieh, “DROIT: Dynamic Alternation of Dual-Level Tainting for Malware Analysis,” Journal of Information Science and Engineering, Vol. 31 No. 1, pp. 111-129 (March 2015).
- Chia-Wei Wang, Chung-Kwan Chen, Shiuhpyng Shieh, “The Achilles Heel of Antivirus,” IEEE Reliability, Nov. 2014.
- Chi-Wei Wang, Chia-Wei Wang, Chu-An Hsieh, Shiuhpyng Shieh, “Cloudebug: A Programmable Online Malware Testbed,” IEEE Computer, Jul 2014, volume: 47, issue:7, pages: 90 – 92.
- Michael Cheng Yi Cho, Chia-Wei Hsu, Shiuhpyng Winston Shieh, Chi-Wei Wang and Jeff Voas, “Can Malware be Exterminated by Better Understanding its Roots?” IEEE IT Professional,Volume 16, Issue 6, Nov. 2014, PP. 47-53.
- Michael Cheng Yi Cho, Pokai Chen, and Shiuhpyng Shieh, “Dmail: A Globally Authenticated Email Service,” IEEE Computer, Volume 47, Issue 5, May. 2014, PP. 88-91.
- Jia-Chun Lin, Shiuhyng Shieh, Chia-Wei Hsu, “Proactive Distributed Digital Evidence Preservation with Tamper Resistance, Perfect Secrecy and High Survivability,” Journal of Information Science and Engineering, Volume 30, 2014, 1847-1864.
- Lo-Yao Yeh, Yun-Lun Huang, Shiuhpyng Shieh, Anthony Joseph, “A Batch Authenticated and Key Agreement Framework for P2P-based Online Social Networks,” IEEE Transactions on Vehicular Technology, Volume 61, Issue4, May 2012, PP.1907-1924.
- Yu-Lun Huang, Chiya Shen, Shiuhpyng Shieh, "S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks," IEEE Transactions on Vehicular Technology, Volume 60, Issue 9, Nov. 2011, PP. 4509 – 4519.
- Chia-Wei Hsu, Chi-Wei Wang, Shiuhpyng Shieh, “Reliability and Security of Large Scale Data Storage in Cloud Computing,” IEEE ATR, 2011.
- Pokai Chen, Shiuhpyng Shieh, “Security for Future Internet Architecture - Motivation from DNSSEC,” IEEE ATR, 2011.
- Minghao Yang, Shiuhpyng Shieh, “Tracing Anonymous Mobile Attackers in Wireless Network,” Journal of Digital Content Technology and its Applications, Volume 4, Number 4, pp. 161 ~ 173, July 2010.
- Shih-I Huang, Shiuhpyng Shieh, “Secure Encrypted-Data Aggregation for Wireless Sensor Networks,” ACM Journal of Wireless Networks, Volume 16 Issue 4, pp. 915-927, May 2010.
- Chi-Wei Wang, Shiuhpyng Shieh, “The Evolution of Fine-Grain Malware Behavior Analysis - From Static to Dynamic,” IEEE ATR, 2010.
- Shih-I Huang, Shiuhpyng Shieh, “Authentication and secret search mechanisms for RFID-aware wireless sensor networks,” International Journal of Security and Networks, Volume 5, Number1, pp. 15 – 25, 2010.
- Jia-Ning Luo, Shiuhpyng Shieh, and Ji-Chiang Shen, “Secure Authentication Protocols Resistant to Guessing Attacks,” Journal of Information Science and Engineering, Vol. 22, No. 5, Sept. 2006, pp. 1125-1143.
- Fu-Yuan Lee, Shiuhpyng Shieh, "Packet Classification Using Diagonal-Based Tuple Space Search," Computer Networks. Volume 50, Issue 9 , 20 June 2006, Pages 1406-1423.
- Shiuhpyng Shieh, Dan Wallach, “Ad hoc and P2P Security,” IEEE Internet Computing, Nov/Dec 2005.
- Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh, Shen-Hsuan Wang, “Source-end Defense System against DDoS Attacks,” book chapter, Computer Security in the 21st Century, published by Springer, Feb. 2005, pp. 147-167.
- Shu-Min Cheng, Shiuhpyng Shieh, Weng-Her Yang, Fu-Yuan Lee, Jia-Ning Luo, “Designing Authentication Protocols for Third Generation Mobile Communications Systems,” Journal of Information Science and Engineering, Vol. 21 No. 2, pp. 361-378 (March 2005)
- Fu-Yuan Lee, Shiuhpyng Shieh, “Defending against spoofed DDoS attacks with path fingerprint,” Computers & Security, 2005, pp. 571-586.
- Shih-I Huang, Shiuhpyng Shieh, Shang-Yen Wu, “Adaptive Random Key Distribution Schemes for Wireless Sensor Network,” book chapter, Computer Security in the 21st Century, published by Springer, Feb. 2005, pp.91-102.
- Yu-Lun Huang, Shiuhpyng Shieh, Jian-Chyuan Wang, "Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems," IEEE Transactions on Multimedia, Vol. 6, Oct. 2004, pp. 760- 769.
- Shiuhpyng Shieh, Weng-Her Yang, “Protecting Network Users in Mobile Code Systems,” Journal of Parallel and Distributed Computing, Vol. 64, Issue 2, February 2004, pp.191 – 200.
- Fu-Yuan Lee, Shiuhpyng Shieh, “Scalable and lighterweight Key Distribution for Secure Group Communications,” ACM/PH International Journal of Network Management. Vol. 14, Issue 3, May 2004, pp. 167 - 176.
- Fu-Yuan Lee, Shiuhpyng Shieh, “Accelerating Network Security Services with Fast Packet Classification,” Computer Communications, 2004, pp.1637-1646.
- C.F. Lu, Shiuhpyng Shieh, “Re-keying Protocols in Symmetric Cryptosystems,” Journal of Discrete Mathematical Sciences and Cryptography, volume 7, 2004 , p23~p27.
- C.F. Lu, Shiuhpyng Shieh, “Efficient Key Evolving Protocol for GQ Signature Scheme,” Journal of Information Science and Engineering. Vol. 20 No. 4, July 2004, pp.679-706.
- C.F. Lu, Shiuhpyng Shieh, “Secure Key-Evolving for Public Key Cryptosystems Based on the Discrete Logarithm Problem,” Journal of Information Science and Engineering, Vol. 20 No. 2, March 2004, pp. 391-400.
- Shiuh-Pyng Shieh, Yea-Ching Tsai, Yu-Lun Huang, "Optimal Information Dispersal for Fault-Tolerant Communications over Burst Error Channel," IEEE Transactions on Reliability, Vol. 52, Issue 3, Sep. 2003, pp. 354-366.
- Wen-Her Yang, and Shiuh-Pyng Shieh, "Secure Key Agreement for Group Communications," ACM/PH International Journal of Network Management, Vol. 11, No 6, Nov-Dec 2001.
- Wen-Her Yang, Kai-Wei Fan and Shiuh-Pyng Shieh, "A secure multicast protocol for the internets multicast backbone," ACM/PH International Journal of Network Management vol. 11, Issue 2, page 129-136, Mar/April 2001.
- S.P. Shieh, Y.L. Huang, F.S. Ho, J.N. Luo, "Network Address Translators: Effects on Security Protocols and Applications in the TCP/IP Stack," IEEE Internet Computing, Nov./Dec. 2000.
- S.P. Shieh, C.T. Lin, W.B. Yang, H.M.Sun, "Digital Multisignature Schemes for Authenticating Delegates in Mobile Code Systems," IEEE Trans. on Vehicular Technology, August 2000, pp. 1464-1473, NSC-85-2622-E-009-006R.
- S.I. Huang, S.P. Shieh, S.Y. Wu, “Adaptive Random Key Distribution Schemes for Wireless Sensor Networks,” Computer Security in 21 Century, Feb. 2005.
- Y.L. Huang, S.P. Shieh, F.S. Ho, "A Generic Electronic Payment Model Supporting Multiple Merchant Transactions," Vol 19, No. 5, Computers and Security, 2000, pp. 453-465.
- S.L. Chang, S.P. Shieh, C.H. Jong, "A Security Testing System for Vulnerability Detection," Vol. 12 No. 1, Journal of Computers, 2000, pp. 7-21.
- C.T. Lin, S.P. Shieh, "Chain Authentication in Mobile Communication Systems," Vol. 13, Journal of Telecommunication Systems, 2000.
- S.P. Shieh, C.T. Lin, W.H. Yang, "Information Protection in Dynamic Statistical Databases " Vo. 43, Encyclopedia of Computer Science and Technology, 2000, pp.97-112.
- I.J. Shue, S.P. Shieh, “Playback dispatch and Fault Recovery for a Clustered Video System with Multiple Servers," Journal of Multimedia Tools and Applications, Vol. 9, Issue 3, Nov. 1999, pp. 277-294.
- Hung-Min Sun and S. P. Shieh, "Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures," Journal of Information Science & Engineering, Vol. 15, No. 5, Sep.1999, pp. 679-690.
- F.S. Ho, S.P. Shieh, Y.L. Huang, “An Efficient Authentication Protocol for Mobile Networks," Journal of Information Science and Engineering, Vol.15 No.4, July 1999, pp.505-520.
- I.J. Shyu, S.P. Shieh, “A Distributed Fault-Tolerant Design for Multiple-Server VOD systems,” Journal of Multimedia Tools and Applications, March 1999, pp. 219-248.
- S.P. Shieh, C.T. Lin, “Auditing User Queries in Dynamic Statistical Databases," Journal of Information Science, Vol. 113, Jan. 1999, pp. 131-146, NSC 85-2213-E00 9-032.
- S.P. Shieh, “Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems,” Journal of Information Science and Engineering, Vol.15 No.1, January 1999, pp.91-106, NSC85-2622-E-009-006R.
- S.P. Shieh, C.T. Lin, S.Y. Wu, “Optimal Assignment of Mobile Agents for Software Authorization and Protection (COMCOM1223)," Computer Communications, Vol. 22, Jan. 1999, pp. 46-55.
- H.M. Sun, S.P. Shieh, "A note on breaking and repairing a secure broadcasting in large networks," Computer Communications, Vol. 22, 1999, pp. 193-194.
- C.T. Lin, S.P. Shieh, W.H. Yang, "Secure Authentication Protocols Resistant to Guessing Attacks," IICM, 1999.
- W.H. Yang, S.P. Shieh, "Password Authentication Schemes with Smart Cards," Computers and Security, Vol. 18, No. 8, 1999, pp. 727-734.
- Hung-Min Sun and S. P. Shieh, "Secret Sharing Schemes for Graph-Based Prohibited Structures," Computers and Mathematics with Applications, Vol. 36, No. 7, Oct. 1998, pp. 131-140.
- I.J. Shue, S.P. Shieh, “Balancing Workload and Recovery Load on Distributed Fault-Tolerant VOD Systems," IEEE Communications Letters, Vol. 2, No. 10, Oct. 1998, pp. 288-290.
- S.P. Shieh, I.J. Shyu, C.Y. Shen, “Wide Address Translation and Protection for Single Address Space Operating Systems,” Proceedings of the National Science Council, Vol. 22, No. 5, September 1998, pp. 601-616, NSC 85-2221-E009-039.
- H.M. Sun, S.P. Shieh, “Secure Broadcasting in Large Networks," Computer Communications, March 1998, pp. 279-283.
- H.M. Sun, S.P. Shieh, “Optimal Information Dispersal for Increasing Reliability of a Distributed Service,” IEEE Transactions on Reliability, Dec. 1997, pp. 462-472, NSC 85-2213-E-009-032.
- S.P. Shieh, J.N. Cheng, “Specification, Validation and Verification of Time-Critical Systems," Computer Communications, Vol. 21, No. 5, May 1998, pp. 460-469, NSC85-2213-E-009-032.
- H.M. Sun, S.P. Shieh, “Recursive Construction of Perfect Secret Sharing Schemes,” Computer & Mathematics with Applications, 1998, pp. 1-19.
- S.P. Shieh, F.S. Ho, “A Comment on A Total Ordering Multicast Protocol,” IEEE Transactions on Parallel and Distributed Systems, October 1997.
- S.P. Shieh, V. D. Gligor, “On a Pattern-Oriented Model for Intrusion Detection," IEEE Transactions on Data and Knowledge Engineering, Vol. 9, No. 4, August 1997, pp. 661-667, NSC 85-2213-E-009-032.
- S.P. Shieh, W.H. Yang, H.M. Sun, “An Authentication Protocol with Trusted Third Party,” IEEE Communications Letters, Vol 1, No. 3, May 1997, pp. 87-89.
- S.P. Shieh, V.D Gligor, “Detecting Illicit Information Leakage in Operating Systems," Journal of Computer Security, April 1997, pp. 123-148, NSC 85-2213-E-009-032.
- H.M. Sun, S.P. Shieh, “Efficient Construct of On-Line Multiple Secret Sharing Schemes,” Journal of Computers, Dec. 1996, pp. 49-56.
- S.P. Shieh, W.H. Yang, “An Authentication and Key Distribution System for Open Network Systems," ACM Operating Systems Review, April 1996, pp 32-41, NSC 85-2213-E-009-032.
- H.M. Sun, S.P. Shieh, “An Efficient Construction of Perfect Secret Sharing Schemes for Graph-Based Access Structures," Computer & Mathematics with Applications, April 1996, pp. 129-135, NSC 84-2213-E-009-081.
- I.J. Shyu, S.P. Shieh, “Virtual Address Translation for Wide Address Architectures," ACM Operating Systems Review, Vol. 29, No. 2, October 1995, pp 37 - 46, NSC 84-2221-E-009-001.
- S.P. Shieh, “A Distributed Intrusion Detection Model," Journal of Computers, Vol 6, No 4, December, 1994, pp 24-34, TL 83-5206.
- H.M. Sun, S.P. Shieh, “A Construction of Dynamic Threshold Schemes," Electronic Letters, November 1994, pp 2023 - 2025, NSC 84-2213-E-009-081.
- H.M. Sun, S.P. Shieh, “On Dynamic Threshold Schemes," Information Processing Letters 52, 1994, pp 201-206, NSC 84-2213-E-009-081.
↓
Books:
- 謝續平、黃能富、黃仁俊,”無線網路安全”教材,教育部資通安全聯盟,2009.
- M. –H. Yang and S.-P. Shieh, A book chapter in “分散式癱瘓服務攻擊解決策略--追蹤匿名攻擊者,” 財團法人國家實驗研究院科技政策研究與資訊中心, 2006.
- D.T. Lee, S.P. Shieh, Doug Tygar, “Computer Security in 21 Century,” Springer, Feb. 2005.
- Shiuhpyng Shieh, et al, “Intrusion, Detection and Prevention, Illustrated,” published by NSC, Dec. 2004.
- Shiuhpyng Shieh, et al, “System and Network Security,” published by NSC, Jan. 2004.
- Gligor, V. D., and Shieh, S. P., et al, A Guide to Understanding Covert Channel Analysis of Trusted Systems, NCSC-TG-030, National Computer Security Center, USA, November 1993
- S.P. Shieh, et al, “Security Infrastructure for Government Document Exchange,” published by RDEC, 1996.
- S.P. Shieh, “An Information and Privilege Flow Model for Intrusion Detection in Computer Systems," Ph.D. Dissertation, University of Maryland, College Park, MD, June 1991.
- S.P. Shieh, “A Survey of Supercomputers," Technical Report, University of Maryland, College Park, March, 1986.
- S.P. Shieh, J.S. He, “The Automation of Covert Channel Analysis," IBM Independent Research and Development report, 1990.
- S.P. Shieh, “Intrusion Detection in Multilevel Secure Systems," IBM Independent Research and Development report, 1991.
Patents:
- 謝續平, 王嘉偉, 黃秀娟, 王偋, 周國森, 潘建全, “上下文相關之資料結構逆向工程系統及其方法”,公開號202008152、公開日2020/02/16, 中華民國專利
- Zong-Xian Shen, Shiuh-Pyng Shieh, “Computer-Implemented Method for Distilling A Malware Program in A System,” US patent 9870471, January 16, 2018
- Shiuhpyng Shieh, Chia-Wei Wang, Chi-Wei Wang, Chia-Wei Hsu, “AUTOMATIC PROBE CONSTRUCTION SYSTEM AND METHOD THEREOF,” US patent pending, Dec. 28, 2017.
- Shiuhpyng Shieh, Chia-Wei Wang, Chi-Wei Wang, Chia-Wei Hsu, ”自動化探針建構系統及其方法,”ROC/Taiwan patent I551984, 2016/10/1 ~ 2035/9/22
- C.W. Wang, S.P. Shieh, Y.R. Liu, “Decoupled Method For Tracking Information Flow and Computer System Thereof,” US patent, Appl. no. 13/459,258, granted, Feb. 2016.
- Zong-Xian Shen, SP Shieh, ”產生純化惡意程式的方法、偵測惡意程式之方法及其系統,”ROC/Taiwan patent I515598, 2016/1/1 ~ 2033/8/22
- Zong-Xian Shen, SP Shieh, “computer-implemented method for distilling a malware program in a system”, US patent pending, US 2015/0058984 A1, 2015
- Z.S. Shen, S.P. Shieh, “Security Relevant Semantics Modeling Method and System for Mobile Malware Detection,” ROC patent, Appl. no. 102130367, Aug. 23, 2013.
- Chi-Wei Wang, C.H. Chang, S.P. Shieh, Chia-Wei Wang, C.W. Hsu, “Method for Detecting Privacy-Theft Android Applications with Decoupling Information Flow Tracking“, ROC patent, Appl. no. 101135433, Sep. 2012.
- C.W. Hsu, B.H. Lee, S.P. Shieh, ”Method and System for VM-Aware Malware Detection,” ROC patent, Appl. no. 101116554, May. 2012.
- C.W. Wang, S.P. Shieh, Y.R. Liu, “Method for Decoupling System-Wide Information Flow Tracking for Malware Analysis and Its Applications,” ROC patent, Appl. no. 101101270, Jan. 2012.
- C.W. Wang, S.P. Shieh, “MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern,” ROC and US patents pending
- S.I. Huang, S.P. Shieh, C.W. Wang, “A Light-Weight Authentication and Secret Retrieval Scheme and Its Applications,” US patent pending no. US 2010/0042842 A1, Aug. 12, 2008.
- S.I. Huang, S.P. Shieh, C.W. Wang, “A Light-Weight Authentication and Secret Retrieval Scheme and Its Applications,” ROC patent pending no. 097139529, 2008.
- S.I. Huang, S.P. Shieh, “Method and System for Secure Data Aggregation in Wireless Sensor Networks,” US patent no. 8027474, 2011.9.27
- S.I. Huang, S.P. Shieh, “Method and System for Secure Data Aggregation in Wireless Sensor Networks,” ROC patent no. I350086. 10, 2011
- S.I. Huang, S.P. Shieh, “Method and System for Secure Data Aggregation in Wireless Sensor Networks,” China patent number ZL200710301500.9, 2011
- S.P. Shieh, "Multisignature Scheme with Message Recovery for Group Authorization in Mobile Networks," ROC patent no. 1248744, Feb. 2006.
- S.P. Shieh, "Clustered Architecture for High Speed IPsec Gateway," ROC patent no. 1227082, Jan. 2005.
- S.P. Shieh, Y.L. Huang, “Smart Card-Based Key Distribution Schemes in Conditional Access Systems,” ROC patent no. 203525, May 2004 – Oct. 2022.
- S.P. Shieh, “Synchronous Method and System for Processing a Packet," US patent pending no. 101742064, 2004.
- S.P. Shieh, "Clustered Architecture for High Speed IPsec Gateway," China patent pending no. 03148124.8, 2004.
- S.P. Shieh, et al, “A Generic Secure Payment Method Supporting Multiple Merchants Transactions and Its Applications,” ROC patent no. 87148006, Dec.1999.
- S.P. Shieh, et al, “An Authentication System for Computer Networks," ROC patent no. 079094, 1996. The patent includes four systems: secure Telnet system, secure Rlogin system, secure Ftp system, and the network monitor system.
- S.P. Shieh, et al, “A Pattern-Oriented Intrusion-Detection System and Method," US patent no. 5278901, January 1994.
Conference Papers:
- Shanhsin Lee, Shiuhpyng Winston Shieh, “CoDex: Cross-Tactic Correlation System for Data Exfiltration Detection,”IEEE Conference on Dependable and Secure Computing (DSC), Nov. 2023.
- Shanhsin Lee, Li-Ren Zhang, Pei-Hsuan Hung, Shiuhpyng Winston Shieh, “Network Flow-based Threat Detection Against Encrypted Tunnel,” CISC 2023, Jun. 2023.
- Shan-Hsin Lee, Wei-Gang Sun, Chen Lien, Shiuhpyng Shieh,“Spearphishing Email Anatomy Based on MITRE ATT&CK,” CISC 2021, Aug. 2021.
- Shan-Hsin Lee, Shen-Chieh Lan, Hsiu-Chuan Huang, Chia-Wei Hsu, Yung-Shiu Chen, Shiuhpyng Shieh, “EC-Model: An Evolvable Malware Classification Model,” IEEE Conference on Dependable and Secure Computing, January 2021.
- Shan-Hsin Lee, Shiuhpyng Shieh, et al, “Open Source Encryption Library Downsizing and Cross-Platform Deployment,” The 30th Cryptology and Information Security Conference (CISC), Sep. 2020.
- Chun-Han Lin, Shan-Hsin Lee, Hsiu-Chuan Huang, Chi-Wei Wang, Chia-Wei Hsu and Shiuhpyng Shieh, “DT-Track: Using DNS-Timing Side Channel for Mobile User Tracking,” IEEE Conference on Dependable and Secure Computing, November 2019.
- Shiuhpyng Shieh, “The Game of Spear and Shield in Enterprise Networks,” Keynote Speech, IEEE Conference on Dependable and Secure Computing, November 2019.
- Shiuhpyng Shieh, “IoT penetration tests for Security Assurance,” Invited Talk, IEEE IoT World Forum, Ireland, April 2019.
- Chung-Kuan Chen, Shang-Kuei Chen and Shiuhpyng Shieh, “Mitigating Over-Permissible Transfer for Control Flow Integrity,” IEEE Conference on Dependable and Secure Computing (DSC), 2018.
- Chia-Wei Hsu, Sheng-Ru Wei and Shiuhpyng Shieh, “Finder: Automatic ICC Data Reconstruction for Long-Term Runtime Semantics,” IEEE Conference on Dependable and Secure Computing (DSC), 2018.
- Chung-Kuan Chen, E-Lin Ho and Shiuhpyng Shieh, “DeepMemIntrospect: Recognizing Data Structures in Memory with Neural Networks,” IEEE Conference on Dependable and Secure Computing (DSC), 2018.
- Chung-Kuan Chen, Shiuhpyng Shieh, “Building Automatic and Intelligent Cyber Attack-Defense Platform,” 17th European Conference on Cyber Warfare and Security, Oslo, Norway, 2018.
- Chiawei Wang, Shiuhpyng Shieh, “VMCloak: Toward a Stealthy in-VM Agent Execution,” IEEE Conference on Dependable and Secure Computing (DSC), 2017.
- Chong-Kuan Chen, Shen-Chieh Lan, Shiuhpyng Shieh, “Shellcode Detector for Malicious Document Hunting,” IEEE Conference on Dependable and Secure Computing (DSC), 2017.
- Yen-Ting Chiang, Ting-Yi Chang, Chia-Wei Hsu, Shiuhpyng Shieh, “Cyber Threat Evaluation of Mobile Networks,” Cryptology and Information Security Conference (CISC 2017), Taiwan, May 2017.
- Liang-Mei Huang, Chien-Ho Chao, Chia-Wei Hsu, Shiuhpyng Shieh, Ping-Hsin Liu, “Security Analysis of Android Apps and Tool Evaluation,” 26th Cryptology and Information Security Conference (CISC 2016), Taiwan, May 2016.
- Shiuhpyng Shieh, “ProbeBuilder: Automatically Constructing Behavior Profilers for Malware Analysis,” Network Security Workshop, Dubai, 2016.
- Chu-An Shieh, Chia-Wei Hsu, Chien-Ho Chao, Shiuhpyng Shieh, “Modeling Android Apps Behaviors Using Graphics,” 25th Cryptology and Information Security Conference (CISC 2015), Taiwan, May 2015.
- Zhi-Kai Zhang, Michael Cheng Yi Cho, Shiuhpyng Shieh, “Emerging Security Threats and Countermeasures in IoT,” ACM Symposium on Information, Computer and Communications Security, March 2015.
- Shiuhpyng Shieh, “Building APT Shield with Polymorphic Defense,” NCTU-TUS Data Science and Optimization Joint Symposium, 2015.
- Chi-Kai Chang, Michael Cho, Chia-Wei Hsu, Chia-Wei Wang, Chong-Kuan Chen, Shiuhpyng Shieh, “IoT Security: Ongoing Challenges and Research Opportunities,” IEEE 7th International Conference on Service-Oriented Computing and Applications (SOCA 2014), Matsue, Japan, Nov 2014.
- Chi-Wei Wang, Chia-Wei Wang, Chu-An Shieh, Shiuhpyng Shieh, “Advanced Programmable, Interactive Malware Cloud Debug Platform,” 24th Cryptology and Information Security Conference (CISC 2014), Taiwan, May 2014.
- Yen-Ju Liu, Chong-Kuan Chen, Micheal Cheng Yi Cho, and Shiuhpyng Shieh, “Fast Discovery of VM-Sensitive Divergence Points with Basic Block Comparison,” IEEE International Conference on Software Security and Reliability (IEEE SERE 2014), San Francisco, USA, June 2014.
- Zong-Xian Shen, Chia-Wei, Shiuhpyng Shieh, “Real-Time Record and Replay on Android for Malware Analysis,” 23th Crypto and Information Security Conference (CISC 2013), Taiwan, May 2013.
- Yin-Chang Song, Michael Cho, C.W. Wang, Chia-Wei Hsu, Shiuhpyng Winston Shieh, “Light-Weight CSRF Protection by Labeling User-Created Contents,” IEEE International Conference on Software Security and Reliability (IEEE SERE 2013), Washington, D.C., USA, 2013.
- Chia-Wei Hsu, Fan-Syun Shih, Chi-Wei Wang, Shiuhpyng Winston Shieh, “Divergence Detector: A Fine-grained Approach to Detecting VM-Awareness Malware,” the Seventh IEEE International Conference on Software Security and Reliability (IEEE SERE 2013), Washington, D.C., USA, 2013.
- Chung-Kwan Chen, Wei-Chi Chen, Chia-Wei Hsu, Shiuhpyng Shieh, “Mutant Malware Discovery and Behavior Analysis for Cyber Crime Investigation,” 22th Crypto and Information Security Conference (CISC 2012), Taiwan, May 2012.
- Yun-Min Cheng, Bing-Han Li and Shiuhpyng Shieh, “Accelerating Taint-based Concolic Testing by Pruning Pointer Overtaint,” IEEE Conference on Software Security and Reliability (SERE), Washington DC, June 2012.
- Chia-Ming Fan, Bing-Han Li, Shiuhpyng Shieh, “On The Security of Password-Based Pairing Protocol in Bluetooth,” the 13th Asia-Pacific Network Operations and Management Symposium, (APNOMS 2011), 2011.
- Yen-Ru Liu, Chi-Wei Wang, Chia-Wei Hsu, Tzu-Chien Tseng, Shiuhpyng Shieh, “Extracting Hidden Code from Packed Malware based on Virtual Machine Memory Comparison,” 21th Cryptology and Information Security Conference (CISC 2011), Taiwan, May 2011.
- Bing-Han Li, Shiuhpyng Shieh, “RELEASE: Generating Exploits Using Loop-Aware Concolic Execution,” IEEE Conference on Secure Software Integration and Reliability Improvement, June 2011.
- Wei Shi-Sue, Shiuhpyng Shieh, Bing-Han Li, Michael Cheng Yi Cho and Chin-Wei Tien, "A Framework Using Fingerprinting for Signal Overlapping-Based Method in WLAN," the International Computer Symposium on Computer Networks and Web Technologies (ICS 2010), Dec. 16-18, 2010.
- Chia-Wei Wang, Chi-Wei Wang, Chia-Wei Hsu, " Malware Behavior Analysis Based on Virtual Machine Introspection and Snapshot Comparison", 20th Cryptology and Information Security Conference (CISC 2010), May 2010.
- Chia-Wei Hsu, Shiuhpyng Shieh, "FREE: Fine-grain Replaying Execution by Using Emulation", 20th Cryptology and Information Security Conference (CISC 2010), May 2010. (Best Student Paper Award)
- Yu-Lun Huang, Chih-Ya Shen, Shiuhpyng Shieh, Hung-jui Wang, Cheng-Chun Lin, “Provable Secure AKA Scheme with Reliable Key Delegation in UMTS,” IEEE Conference on Secure Software Integration and Reliability Improvement, 2009
- Yu-Lun Huang, Hsiaoying Lin, Doug Tygar, Shiuhpyng Shieh, “SWOON: A Testbed for Secure Wireless Overlay Networks,” USENIX Workshop on Cyber Security Experimentation and Test (CSET 2008), 2008
- Lian Lee, Shiuhpyng Shieh, “Protecting User Privacy with Dynamic Identity-Based Scheme for Low-cost Passive RFID Tags,” Information Security Conference, May 2008.
- Warren W. Lin, Shiuhpyng Shieh, Jia-Chun Lin, “Lightweight, Distributed Key Agreement Protocol for Wireless Sensor Networks,” IEEE Conference on Secure System Integration and Reliability Improvement, Yokohama, Japan, July 14-17, 2008 (co-sponsored by IEEE Reliability Society and IEEE System, Man, and Cybernetics Society, published by IEEE Press).
- Che-Cheng Lin, Shiuhpyng Shieh, Jia-Chun Lin, “A Pollution Attack Resistant Multicast Authentication Scheme Tolerant to Packet Loss,” IEEE Conference on Secure System Integration and Reliability Improvement, Yokohama, Japan, July 14-17, 2008 (co-sponsored by IEEE Reliability Society and IEEE System, Man, and Cybernetics Society, published by IEEE Press).
- Ming-Hao Yang, Shiuhpyng Shieh, "Tracing Mobile Attackers in Wireless Ad-hoc Network," IEEE International Workshop on Social and Legal Aspects under Emerging Computing Environments, held at Athens, Greece, June 8-13, 2008 (Best Paper Award, published by IEEE Press).
- S.I. Huang, Shiuhpyng Shieh, “SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks,” IEEE International Conference on Computational Intelligence and Security (IEEE CIS), Dec. 2007.
- C.H. Jiang, Shiuhpyng Shieh, Rachel Liu, “Keystroke Statistical Learning Model for Web Authentication,” ACM Symposium on Information, Computer and Communications Security, Singapore, 2007.
- Tanya Roosta, Shiuhpyng Shieh, Shankar Sastry, “Taxonomy of Security Attacks in Sensor Networks and Countermeasures,” IEEE International Conference on System Integration and Reliability Improvements, Hanoi, Vietnam, 13-15 December 2006.
- Zhi-Kai Zhang, Tze-Yau William Huang, Shiuhpyng Shieh, “Controlling Various Platforms for Test Automation,” IEEE International Conference on System Integration and Reliability Improvements, Hanoi, Vietnam, 13-15 December 2006.
- Li-Joe Lin, S. P. Shieh, Tzu-I Yang, and Warren W. Lin and, “A Path Authentication Scheme for Routing Disruption Attack Prevention in Ad Hoc Networks,” 2006 IEEE International Conference on Systems, Man, and Cybernetics, Oct. 2006.
- Shiuhpyng Shieh, “Defending against DDoS Attacks,” High Tech Forum – e-Security, Oct. 21-22, 2005.
- Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, “An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks,” ACM Symposium on Information, Computer and Communications Security, 2006.
- Ya-Jeng Lin, Shiuhpyng Shieh, “Lightweght, Pollution-Attack Resistant Multicast Authentication Scheme,” ACM Symposium on Information, Computer and Communications Security, 2006.
- Shih-I Huang, Shiuhpyng Shieh, “Secret Searching in Wireless Sensor Networks with RFIDs,” Information Security Conference, June 2005, pp. 237 – 244.
- Kang_Hsien Chou, Shiuhpyng Shieh, Ming-How Yang, and Fu-Yuan Lee, “Marking-Based Source Identification Scheme for Defending Against DDoS Attacks,” Information Security Conference, 2004.
- Fu-Yuan Lee, Shiuhpyng Shieh and Ming-How Yang, “Tracing the Origin of Single-Packet Attacks,” Information Security Conference, 2004.
- Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh, Shen-Hsuan Wang, “Source-end Defense System against DDoS Attacks,” International Workshop on Advanced Developments in Software and Systems Security, pp31-35, 2003.
- Shih-I Huang, Shiuhpyng Shieh, Shang-Yen Wu, “Adaptive Random Key distribution Schemes for Wireless Sensor Network,” International Workshop on Advanced Developments in Software and Systems Security, pp61-65, 2003.
- Shiuhpyng Shieh, Fu-Yuan Lee, “Fast Packet Classification for Improving the Performance of Secure Network Services,” Information Security Conference, 2003.
- Shiuhpyng Shieh, Yung-Zen Lai, Ya-Ting Chang and Fu-Yuan Lee, "Clustered Architecture for High-Speed IPsec Gateway," ICS'2002.
- Chang-Han Jong, Shiuh-Pyng Shieh and Jia-Ning Luo, "Detecting Distributed DoS/Scanning by Anomaly Distribution of Packet Fields," ICS'2002.
- Fu-Yuan Lee, Shiuhpyng Shieh and Lin-Yi Wu, "Address Sharing Enabled Mobile IP Utilizing NAPT," ICS'2002.
- Fu-Shen Ho, Shiuhpyng Shieh, Y.L. Huang and K.L. Tsai, "A Service Probing and Channel Establishment Protocol Across Multiple Network Access Translation Realms," ICS'2002.
- Shiuhpyng Shieh, Shih-I Huang and Fu-Shen Ho, "An ID-based Proxy Authentication Protocol Supporting Public Key Infrastructure," IWAP'2002
- Cheng-Fen Lu, Shiuh-Pyng Shieh, "Secure Key Evolving Protocols for Discrete Logarithm Schemes," RSA conference, Feb 2002.
- Jia-Ning Luo, Shiuh-Pyng Shieh, "The Multi-layer RSIP Framework," The 9th IEEE International Conference on Networks, ICON'2001. Bangkok, Thailand, October 2001.
- C.H. Chun, S.P. Shieh, “GSN-CERT and Computer Emergency Response,” Chinese-France Conference on Information Technology, March 2000
- S.P. Shieh, Y.L. Huang, J.C. Wang, "Practical Key Distribution Schemes for Pay TV Channel Protection," IEEE International Computer Software and Applications Conference (COMPSAC'2000), Nov. 2000.
- S.M. Cheng, W.H. Yang, S.P. Shieh, "A Flexible Authentication for Next Generation Mobile Communications," 6th Mobile Computing Workshop, pp. 67-73, March 2000.
- W.H. Yang, K.W. Fan, S.P. Shieh, "A Scalable and Secure Multicast Protocol on M-bone Environments," Information Security Conference, May 2000.
- W.H. Yang, S.P. Shieh, "An Efficient Key Agreement Protocol for Secure Group Communications," Information Security Conference, May 2000.
- Y.L. Huang, S.P. Shieh, "A Fair Settlement Protocol for Online Transactions," Information Security Conference, May 2000.
- J.N. Luo, S.P. Shieh, "A Transparent and Efficient Mechanism for File System Protection," Information Security Conference, May 2000.
- W.H. Yang, S.P. Shieh, "Enhancing Security and Flexibility of Password Authentication with ID-based Cryptosystems," Information Security Conference, May 1999.
- C.T. Lin, S.P. Shieh, "A Secure Communication Protocol for Telecommunications Management Networks," Information Security Conference, May 1999.
- C.T. Lin, S.P. Shieh, "An Efficient and Secure Credit Card-Based Billing Scheme for Telephone Services," Mobile Computing Workshop, March 1999, pp. 28-34.
- H.M. Sun, S.P. Shieh, "On Private-Key Cryptosystems Based on Product Codes," ACISP'98, Australia, July 1998.
- S.P. Shieh, C.T. Lin, Y.S. Juang, "Controlling Inference and information Flows in Secure Databases," 1998 Information Security Conference, May 1998.
- S.P. Shieh, C.T. Lin, S.Y. Wu, "A Software Authorization and Protection Model for Mobile Code Systems," 1998 International Symposium on Internet Technology, April 1998.
- S.P. Shieh, C.T. Lin, M.J. Peng, W.C. Yang, J.N. Yang, “A Secure Credit-Card Based Billing Schemes for Telephone Services,” International Conference on Mobile Computing, March 1998.
- H.M. Sun, S.P. Shieh, “On-Line Secret Sharing Based on a One-Way Function,” 1998 Information Security Conference, May 1998.
- H.M. Sun, S.P. Shieh, “A Secure Broadcasting Cryptosystem in Large Computer Networks,” 1998 Information Security Conference, May 1998.
- H.M. Sun, S.P. Shieh, “On Private-Key Cryptosystems Based on Product Codes,” Australia Information Security and Privacy Conference, July 1998.
- S.P. Shieh, C.T. Lin, S.Y. Wu, “A Software Authorization and Protection Model for Mobile Code Systems," 1998 International Symposium on Internet Technology, April 1998.
- I.J. Shue, S.P. Shieh, “Load-Balanced Playback Dispatch for Fault-Tolerant Multi-Server VOD Systems,” 1997 Workshop on Real-Time and Media Systems, July 30-31, 1997.
- S.P. Shieh, J.N. Luo, “A Secure Mail System for Mobile Users in the Internet,” International Conference on Mobile Computing, March 1997.
- F.S. Ho, S.P. Shieh, “An Efficient Authentication for Mobile Networks,” International Conference on Computer System Technologies for Industrial Applications, April 1997.
- H.M. Sun, S.P. Shieh, “On the Information Rate of Perfect Secret Sharing Schemes with Access Structures of Rank Three,” Conference on Information Security, May 1997.
- C.F. Lu, S.P. Shieh, “An Anonymous Fair Credit Card Payment System,” Conference on Information Security, May 1997.
- M.J. Pong, S.P. Shieh, W.C. Yang, J.N. Yang, “Billing Schemes for Secure Telephony over Public Communication Networks,” Conference on Information Security, May 1997.
- H.M. Sun, S.P. Shieh, “Secret Sharing in Graph-Based Prohibited Structures," 1997 IEEE International Conference on Computer Communications (INFOCOM'97), Kobe, Japan, April 7-11, 1997.
- H.M. Sun, S.P. Shieh, “Crypto-analysis of Private-Key Schemes Based on Burst-Error-Correcting Codes," the Proceedings of ACM International Conference on Computer and Communications Security, March 14-16, 1996.
- S.P. Shieh, Y.L. Huang, F.S. Ho, “A Family of Secure Network Protocols," the Proceedings of Information Security Conference, May, 1996.
- H.M. Sun, S.P. Shieh, “A Perfect Scheme for Secret Sharing between Two Parties," Proceedings of Information Security Conference, May, 1995.
- S.P. Shieh, C.T. Lin, R.T. Hsueh, “Secure Communication in Global Systems for Mobile Telecommunications," Proceedings of Mobile Computing Workshop, April 1995.
- S.P. Shieh, C.T. Lin, “An Audit Scheme for Inference Control in Statistical Databases," Proceedings of International Conference on Intelligent Information Management Systems, June 1995.
- S.P. Shieh, et al, “The Design and Implementation of A MPOS Simulator," Proceedings of the Multiprocessor Systems Workshop, July 1995.
- H.M. Sun, S.P. Shieh, “On Dynamic Threshold Schemes," 4rd Conference on Information Security, May 21, 1994.
- S.P. Shieh, H. M. Sun, “On Constructing Secret Sharing Schemes," 1994 IEEE International Conference on Computer Communications, Networking for Global Communications (INFOCOM'94), Toronto, Canada, June 12-16, 1994.
- I.J. Shyu, S.P. Shieh, “Architectural Support for 64-Bits Address Translation," Proceedings of 1994 International Computer Symposium, Dec., 1994, pp 322 - 327.
- M.R. Chiang, S.P. Shieh, C.L. Liu, “Dynamic Load Balancing in Parallel Simulation Using Time Warp Mechanism," Proceedings of International Conference on Parallel and Distributed Systems, Dec., 1994, pp 222- 227.
- H.M.. Sun, S.P. Shieh, “Optimal Information Dispersal for Reliable Communication in Computer Networks," Proceedings of International Conference on Parallel and Distributed Systems, Dec., 1994, pp 460 -464.
- S.P. Shieh, “Covert Channel Bandwidth Estimation and Measurement," 3rd Conference on Information Security, May 12, 1993.
- S.P. Shieh, “Intrusion Detection in Computer Networks," 3rd Conference on Information Security, May 12, 1993.
- S.P. Shieh, H.M. Sun, “A Secret Sharing Scheme for Hierarchical User Groups," the 8th International Joint Workshop on Computer Communication (JWCC-8), December 19-21, 1993.
- S.P. Shieh, V.D. Gligor, “A Pattern-Oriented Intrusion Detection Model and Its Applications," Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, (May 7-9, 1991), pp 327-342.
- S.P. Shieh, V.D. Gligor, “Auditing the Use of Covert Storage Channels in Secure Systems," Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, (May 1990), pp 285-295.