講座教授 謝續平
Shiuhpyng Winston Shieh
實驗室尚有碩士生名額,歡迎加入!
We still have M.S. student quota, welcome to join us!
Current positions:
- University Chair Professor, Department of Computer Science, NYCU
- Editor-in-Chief, IEEE Transactions on Reliability, 2022-
Honors:
- Outstanding Research Award, Ministry of Science and Technology, 2019 (科技部傑出研究獎, 2019)
- 2017 IEEE Reliability Society Engineer of The Year Award
- IEEE Fellow
- ACM Distinguished Scientist
- Distinguished Engineering Professor, Chinese Electrical Engineer Association
Contact
National Chiao Tung University, Hsinchu, Taiwan 300
Tel: +886 3 5731876 Fax: +886 3 5715407
E-mail: ssp(at)nycu.edu.tw
URL: http://dsns.cs.nycu.edu.tw/ssp
For Prospective Student:
Please feel free to browse my website to get an idea about what we are working on. Some of the webpages may be old, but they can still give an rough idea.
Basically we now work mainly on:
- Future Internet Security: This research work studies the security of Future Internet with cloud and a large-scale of IoT devices. Innovative evasive penetration testing techniques for systems and webpages are investigated.
Past Postions
- Associate Dean, Hacker College (亥客書院副院長)
- Vice President, IEEE Reliability Society, 2014 – 2016, 2018-2019
- Editor-in-Chief, IEEE Reliability, 2014-2016
- Advisor, Bamboofox club
- Advisor, National Security Council, Taiwan, 2011-2012
- President, Chinese Crypto & Information Security Association (similar to IACR in the US), 8/2003 - 8/2006
- Chair, Dept. of Computer Science & Information Eng, NCTU, 8/2001 - 7/2003
- Director, Computer and Network Center, NCTU,8/1998 - 7/2001
- Visting Professor, Dept. of EECS, UC Berkeley,1/2004- 9/2004, 8/2005 - 9/2006
- Director, GSN-CERT/CC, 1998 - 2001
- Director, NCTU-Cisco Internet Technology Lab, 10/2000 - 2011
- Professor, Dept. of Comp. Science, NCTU, 8/1998 – 1/2014
- Chair, Malware Forum, National Information and Communication Security Task Force, 2011 - 2012
- AdCom member, Reliability Society, 2010-2015
- Founding Chair, RS Taipei/Tainan Chapter, 2007-2013
- Member, RS Technical Activities, 2007-2009
- Advisory board member, National Information and Communication Security Task Force, 2002/1- 2012
- Advisor, National Security Bureau, 7/1996 – 2008
- Program Director, National Telecommunication Project Office, 2003
- Vice President, Chinese Crypto. & Info. Security Association, Taiwan, 2000 - 2003
- Board Director, Chinese Cryptology & Info. Security Association, Taiwan, 1994 - 2003
- IEEE Senior Member, 1999.
- Associate Professor, Dept. of Comp. Sci. & Info. Eng., NCTU, 8/1991 - 7/1998
- Consultant, ITRI/CCL, 7/1994-7/1997
- Consultant, IBM Federal Sector Division, Gaithersburg, MD, 1987 - 1991
- Instructor, Dept. of Electrical & Computer Engineering, University of Maryland, 1985
Education
- Ph. D., Electrical & Computer Engineering, University of Maryland, College Park (Advisor: Virgil Gligor,currently the director of CyLab, Carnegie Mellon University)
- M. S., Electrical & Computer Engineering, University of Maryland, College Park
- B.S., Electrical & Control Engineering, National Chiao Tung University
Directing Labs
- Network Security Lab
- Taiwan Information Security Center (TWISC@NCTU)
Research Interests
- Cybersecurity
- Intrusion Detection
- Penetration Test
- Malware Analysis using Deep Learning techniques
Course
- Network Security (2017 Fall)
- Network Security (2017 Spring)
- Network Security (2016 Fall)
- Network Security (2016 Spring)
- Network Security (2015 Fall)
- Network Security (2015 Spring)
- Computer Security Practice (2015 Fall)
- Network Security (2014 Fall)
- Introduction to Computer Networks (2014 Fall)
- Information Engineering Seminar(2013 Fall)
- Introduction to Computer Networks(2013 Fall)
- Network Security(2012 Fall)
- Computer Security(2012 Fall)
- Wireless and Mobile Network Security(2012 Spring)
- Computer Security(2012 Spring)
- Network Security(2011 Fall)
- Wireless and Mobile Network Security(2011 Spring)
- Network security(2010 Fall)
- Network security(2010 Spring)
- Network security(2009 Fall)
- Operation System(2009 Fall)
- Computer Security(2009)
- Wireless and Mobile Network Security (2009)
- Network Security(2008)
- Introduction to Network Security (2006)
Major Awards and Honors
- IEEE Reliability Society "Engineer of The Year" Award
- Outstanding Research Award, Ministry of Science and Technology, 2019 (科技部傑出研究獎, 2019)
- IEEE Fellow, 11/2013
- ACM Distinguished Scientist, 2010 (one of the 41 recipients in the world)
- Distinguished Engineering Professor, Chinese Institute of Electrical Engineers, 2014.
- Distinguished Teaching Award, National Chiao Tung University (NCTU), 2013
- Excellent Teaching Award, National Chiao Tung University (NCTU), 2012
- ACM SIGSAC Service Award, 2012
- Distinguished patent award, ITRI, 2012
- National Science Council Elite Research Project Award, 2011
- 2011 RS Chapter Award 1st place
- Best Paper Award, Cryptology and Information Security Conference, 2010
- 2010 Taipei Section Outstanding Chapter Award.
- 2010 RS Chapter Award 1st place
- 2010 Taipei Section Outstanding Membership Development Award.
- Outstanding Research Project Award, CSIST, 2009
- 2009 RS Chapter Award 1st place
- 2008 RS Chapter Award 3rd place
- ACM Service Award, 2006
- Excellent Research Award, National Science Council, 2005
- Distinguished Information Technology Award (the highest honor for computer scientists in Taiwan),bestowed by State Department, Taiwan, Dec. 2000 (presented by Taiwan Vice President).
- Outstanding Research Award, National Chiao Tung Univ., 2000.
- Best Paper Award, International Workshop on Social and Legal Aspects under Emerging Computing Environments, held at Athens, Greece, June 8-13, 2008 (published by IEEE Press).
- Outstanding Research Award, National Science Council, runner-up, 2000.
- Best paper award, Chinese Information Association/ACM Taipei Chapter, 1999.
- Best paper award, Chinese Cryptology & Information Security Association, 2000.
- Recipient of the 1999 National Distinguished Computer and Information Product of the Year, Taiwan.
- Recipient of IBM IRAD (Independent Research and Development) of the Year, Maryland, USA,1990.
- Best Honorary teacher, NCTU, runner-up (2 nd place), 1998.
- Program Chairs/General Chairs of numerous conferences.
- New Star Award, Taipei Computer Expo, 1996
- Gold Award, NCTU Research Contest, 1995.
- Gold Award, Programming Contest, Ministry of Education, 1996
- Invention Award, National Science Council, 2001
- Gold Award, NCTU Research Contest, 2004
- Gold Award, Research Contest, Ministry of Education, 2004
- Invention Award, National Science Council, 2004
Editorial Board
- Editor-in-Chief, IEEE Transactions on Reliability, 2022 – 2025.
- IEEE Reliability Society Fellow Committee Chair, 2019 - 2020
- Steering Committee Member, IEEE IoT Magazine, 2017–2020
- Guest editor, IEEE Access, 2019 - 2021
- Editor-in-Chief, IEEE Reliability, 2014 – 2016
- Editor-in-Chief, RS Newsletter, 2011/1-2013
- Associate Editor, Transactions on Reliability, 2008-2016
- Associate Editor, Transactions on Dependable and Secure Computing, 2007-2011
- Editor, ACM Transactions on Information and System Security, 2003- 2008
- Guest Editor, Internet Computing, “Security for P2P and Ad Hoc Networks,” 2004-2005.
- Guest Editor, TR Special Section on Trustworthy Computing, 2013
- Guest Editor, TR Special Section on Software, system and Information Reliability, 2013
- Guest Editor, TR Special Section on Software Security and Reliability, 2012
- Editor, Journal of Computer Security, IOS Press, 2002 - 2013.
- Editor, Journal of Information Science and Engineering, 2000 - 2006.
- Editor, Journal of Computer and Information Security, 2004 - 2006
- Guest Editor, IEEE Internet Computing, 2004
- Guest Editor, Electronics Magazine, special issue on Internetworking, May & June 2000.Conference Committees
- Founding Steering Committee Chair, ACM Symposium on Information, Computer and Communications Security (AsiaCCS), 2006-2013
- Program Chair, IEEE Conference on Software Security and Reliability (SERE), 2012, 2013
- Program Chair, IEEE Workshop on Information Assurance, 2012
- Student Program Chair, IEEE International Symposium on Software Reliability Engineering, 2012
- Founding Steering Committee Member, IEEE Conference on Communications and Network Security, 2012-
- Publicity Chair, IEEE Conference on Secure Software Integration and Reliability Improvement, 2009
- Program Chair, IEEE Workshop on Advanced Development in Software and Systems Security, 2003
- Publication Chair, IEEE Conference on Parallel and Distributed Systems, 1994.
- ACM SIGSAC Election Committee Member, 2012
- ACM SIGSAC Award Committee Member, 2011
- Steering Committee member, ACM Special Interests Group on Security, Audit and Control (SIGSAC), 2005-2008
- Founding Program Chair, ACM Symposium on Information, Computer and Communications Security, March 2006
- Steering Committee member, Asiacrypt, 2003-2008
- General Chair, Information Security Conference, June 2004, 2005.
- Program Chair, 2003 IEEE International Workshop on Advanced Development in Software and System Security, Dec. 2003
- Program Chair, IWAP’2002, Oct 30 – Nov. 1, 2002.
- Program Chairman, 1999 Mobile Computing Conference, April 1999.
- Program Chair, ICS’2002, Dec. 2002/11/4
- Advisory Committee Member, TANET (1998-2001)
- General Chair, Workshop on Network Security Technology, May 1998.
- Program Chair, Information Security Conference, May 1997.
- Publication Chair, International Conference on Computer Systems for Industrial Applications, April, 1996.
- Publication Chair, International Conference on High Performance Computer Systems, July, 1995.
- Publication Chair, IEEE International Conference on Parallel and Distributed Systems, Dec., 1994.
- Publication Chairman, International Computer Symposiums, Dec., 1994.
- Session Chairman, International Computer Symposiums, 1994
- Session Chairman, IS'COMM, 1993
- Panelist, RAM’98,
- PC member, CCS(Flagship conference of ACM; 1996, 2000, 2003, 2006-2009), AsiaCCS (2006-2013), IEEE/IFIP DSN2007, ISSRE2012; DSN(2005-2007); TSPUC(2005-2007); SUTC2006; SecComm2005; DCCS2005, ISPEC2005, IWAP2004, Asiacrypt2003, NSW2002, ICIST2002, ACMCIS2001, NCS1999, IWCTEC1999, ISC(1993-1997), ICS1996
Representative Publication List (Journal)
- Shiuhpyng Winston Shieh, “Emerging Trends in Trustworthy Computing,” IEEE Transactions on Reliability, Volume 71 , Issue 4, Dec. 2022.
- Shiuhpyng Shieh, et al, SEMI E187 Reference Practice, Oct 2022.
- Shiuhpyng Shieh, Shanhsin Lee, Mengru Tsai, “Strategy and Tactics against Ransomware,” IEEE Computer, May 2022, pp 85-92.
- Hsiu-Chuan Huang, Zhi-Kai Zhang, Chong-Kuan Chen, Wei-Da Hong, Jui-Chien Jao, and Shiuhpyng Shieh, “Adaptive Entry Point Discovery for Web Vulnerability Scanning,” Journal of Information Science and Engineering (JISE), Jan. 2022.
- Chen, C-Y., Quan, W., Cheng, N., Yu, S., Lee, J-H., Perez, G. M., Zhang, H. & Shieh, S-P., “Artificial Intelligence in Cybersecurity,” IEEE Access. 8, Sep 2020, p. 163329-163333
- 謝續平、李善新,“從國際推動趨勢談我國資安治理之挑戰與政策整備,” 國土及公共治理季刊,2020。
- Chung-Kuan Chen, Zhi-Kai Zhang, Shan-Hsin Lee, and Shiuhpyng Shieh, “The New Age of Penetration Test: IoT Era,” IEEE Computer, May 2018.
- Jeff Voas, et.al., “Educating Next Generation Computer Scientist,” IEEE Computer, January 2018. (Virtual Round Table Speaker Shiuhpyng Shieh)
- Zong-Xian Shen, Chia-Wei Hsu, Shiuhpyng Shieh, “Security Semantics Modeling with Progressive Distillation,” IEEE Transactions on Mobile Computing, 2017.
- Hsiu-Chuan Huang, Zhi-Kai Zhang, Shiuhpyng Shieh, “Web Application Security: Attacks, Countermeasure, and Pitfalls,” IEEE Computer, June 2017.
- Chia-Wei Hsu, Chia-Huei Chang, Chi-Wei Wang, Shiuhpyng Shieh, “DROIT+: Taint Tracking for Storage Access on Android,” Journal of Information Science and Engineering, Vol. 33 No. 5, September 2017.
- Chia-Chen Wu, Yu-Lun Huang, and Shiuhpyng Shieh, “Investigating Anonymous and Secure Fault-Tolerable Routing Protocols for Overlay Networks,” IEEE Reliability, August 2016.
- Michael Cheng Yi Cho, Zhi-Kai Zhang, Shiuhpyng Shieh, “Resolving Malware-Loading Problem by Leveraging Shellcode Detection Heuristics,” IEEE Reliability, November 2016.
- Chia-Wei Hsu, Shiuhpyng Shieh, “Adaptive Gestures for GUI Testing on Smartphones,” accepted for publication IEEE Software, 2015.
- Tzu-Hsin Ho, Shiuhpyng Shieh, Chien-Chao Tseng, “RAKA: Revocable Authenticated Key Agreement System for Mobile Social Networks,” accepted for publication, Journal of Information Science and Engineering, 2015.
- Chung-Kuan Chen, Shiuhpyng Shieh, “CTF: Alternative Training for Offensive Security,” IEEE Reliability, August 2015
- Zhi-Kai Zhang, Michael Cheng Yi Cho, Zong-Yu Wu, Shiuhpyng Shieh, “Identifying and Authenticating IoT Objects in a More Natural Way,” IEEE Computer, August 2015
- Chia-Wei Wang, Michael Cheng Yi Cho, Shiuhpyng Shieh, “Software Piracy in Clouds,” IEEE Computer, October 2015
- Chia-Wei Wang, Chi-Wei Wang, Shiuhpyng Shieh, "ProbeBuilder: Uncovering Opaque Kernel Data Structures for Automatic Probe Construction,” IEEE Transactions on Dependable and Secure Computing, March 2015.
↓
- Chi-Wei Wang, Chong-Kuan Chen,Chia-Wei Wang,Shiuhpyng Shieh, “MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern” Journal of Information Science and Engineering, Vol. 31 No. 2, pp. 455-473 (March 2015)
- Chia-Wei Wang, Shiuhpyng Shieh, “DROIT: Dynamic Alternation of Dual-Level Tainting for Malware Analysis,” Journal of Information Science and Engineering, Vol. 31 No. 1, pp. 111-129 (March 2015).
- Chia-Wei Wang, Chung-Kwan Chen, Shiuhpyng Shieh, “The Achilles Heel of Antivirus,” IEEE Reliability, Nov. 2014.
- Chi-Wei Wang, Chia-Wei Wang, Chu-An Hsieh, Shiuhpyng Shieh, “Cloudebug: An Online, Interactive, and Programmable Malware Testbed,” IEEE Computer, July 2014.
- Michael Cheng Yi Cho, Pokai Chen, and Shiuhpyng Shieh, “Dmail: A Globally Authenticated Email Service,” IEEE Computer, May 2014.
- Michael Cheng Yi Cho, Chia-Wei Hsu, Shiuhpyng Winston Shieh, Chi-Wei Wang, “Can Malware be Exterminated by Better Understanding its Roots?” accepted for publication, IEEE IT Professional,2013.
- Jia-Chun Lin, Shiuhyng Shieh, Chia-Wei Hsu, “Proactive Distributed Digital Evidence Preservation with Tamper Resistance, Perfect Secrecy and High Survivability,” accepted for publication, Journal of Information Science and Engineering, 2013.
- LY, Yeh, Y.L. Huang, S.P. Shieh, Anthony Joseph, “A Batch Authenticated and Key Agreement Framework for P2P-based Online Social Networks,” IEEE Transactions on Vehicular Technology, May 2012.
- Yu-Lung Huang, Chiya Shen, Shiuhpyng Shieh, "S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks," IEEE Transactions on Vehicular Technology, Volume 60, Issue 9, Nov. 2011, pp. 4509 – 4519.
- Vic Hsu, C.W. Wang, Shiuhpyng Shieh, “Reliability and Security of Large Scale Data Storage in Cloud Computing,” IEEE Reliability Society ATR, 2011.
- Pokai Chen, Shiuhpyng Shieh, “Security for Future Internet Architecture - Motivation from DNSSEC,” IEEE Reliability Society ATR, 2011.
- Minghao Yang, Shiuhpyng Shieh, “Tracing Anonymous Mobile Attackers in Wireless Network,” Journal of Digital Content Technology and its Applications, Volume 4, Number 4, pp. 161 ~ 173, July 2010.
↓
- Shih-I Huang, Shiuhpyng Shieh, “Secure Encrypted-Data Aggregation for Wireless Sensor Networks,” ACM Journal of Wireless Networks, Volume 16 Issue 4, pp. 915-927, May 2010.
↓
- Chi-Wei Wang, Shiuhpyng Shieh, “The Evolution of Fine-Grain Malware Behavior Analysis - From Static to Dynamic,” IEEE Reliability Society ATR, 2010.
- Shih-I Huang, Shiuhpyng Shieh, “Authentication and secret search mechanisms for RFID-aware wireless sensor networks,” International Journal of Security and Networks, Volume 5, Number1, pp. 15 – 25, 2010.
↓
- Jia-Ning Luo, Shiuhpyng Shieh, and Ji-Chiang Shen, “Secure Authentication Protocols Resistant to Guessing Attacks,” Journal of Information Science and Engineering, Vol.22 No. 5, September 2006, pp. 1125-1143.
↓
- Fu-Yuan Lee, Shiuhpyng Shieh, "Packet Classification Using Diagonal-Based Tuple Space Search," Computer Networks. Volume 50, Issue 9 , 20 June 2006, Pages 1406-1423
↓
- Shiuhpyng Shieh, Dan Wallach, “Ad hoc and P2P Security,” IEEE Internet Computing, Nov/Dec, 2005.
↓
- Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh, Shen-Hsuan Wang, “Source-end Defense System against DDoS Attacks,” book chapter, Computer Security in the 21st Century, published by Springer, Feb. 2005, pp. 147-167.
↓
- Shu-Min Cheng, Shiuhpyng Shieh, Weng-Her Yang, Fu-Yuan Lee, Jia-Ning Luo, “Designing Authentication Protocols for Third Generation Mobile Communications Systems,” Journal of Information Science and Engineering, Vol. 21 No. 2, March 2005, pp. 361-378.
- Fu-Yuan Lee, Shiuhpyng Shieh, “Defending against spoofed DDoS attacks with path fingerprint,” Computers & Security, 2005, pp. 571-586.
- Shih-I Huang, Shiuhpyng Shieh, Shang-Yen Wu, “Adaptive Random Key distribution Schemes for Wireless Sensor Network,” book chapter, Computer Security in the 21st Century, published by Springer, Feb. 2005, pp.91-102.
- Yu-Lun Huang, Shiuh-Pyng Shieh, Jian-Chyuan Wang, "Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems," IEEE Transactions on Multimedia. Vol. 6, Oct. 2004, pp. 760- 769.
↓
- Shiuh-Pyng Shieh, Yea-Ching Tsai, Yu-Lun Huang, "Optimal Information Dispersal for Fault-Tolerant Communications over Burst Error Channel," IEEE Transactions on Reliability, Vol. 52, Issue 3, Sep. 2003, pp. 354-366.
↓
- Shiuhpyng Shieh, Weng-Her Yang, “Protecting Network Users in Mobile Code Systems,” Journal of Parallel and Distributed Computing, Vol. 64, Issue 2, February 2004, pp.191 – 200.
↓
- Fu-Yuan Lee, Shiuhpyng Shieh, “Scalable and lighterweight Key Distribution for Secure Group Communications,” ACM/PH International Journal of Network Management, Vol. 14, Issue 3, May 2004, pp. 167 – 176.
↓
- Fu-Yuan Lee, Shiuhpyng Shieh, “Accelerating Network Security Services with Fast Packet Classification,” Computer Communications, 2004, pp.1637-1646.
↓
- Shu-Min Cheng, Shiuhpyng Shieh, Weng-Her Yang, Fu-Yuan Lee, Jia-Ning Luo, “Designing Authentication Protocols for Third Generation Mobile Communications Systems,” Journal of Information Science and Engineering, Vol. 21 No. 2, March 2005, pp. 361-378.
↓
- C.F. Lu, Shiuhpyng Shieh, “Re-keying Protocols in Symmetric Cryptosystems,” , Journal of Discrete Mathematical Sciences and Cryptography.volume 7, 2004 , p23~p27.
- C.F. Lu, Shiuhpyng Shieh, “Efficient Key Evolving Protocol for GQ Signature Scheme,” Journal of Information Science and Engineering. Vol. 20 No. 4, July 2004, pp.679-706.
↓
- C.F. Lu, Shiuhpyng Shieh, “Secure Key-Evolving for Public Key Cryptosystems Based on the Discrete Logarithm Problem,” Journal of Information Science and Engineering, Vol. 20 No. 2, March 2004, pp. 391-400.
- Shih-I Huang, Shiuhpyng Shieh, Shang-Yen Wu, “Adaptive Random Key distribution Schemes for Wireless Sensor Network,” book chapter, Computer Security in the 21st Century, published by Springer, Feb. 2005, pp.91-102.
↓
- Wen-Her Yang, and Shiuh-Pyng Shieh, "Secure Key Agreement for Group Communications," ACM/PH International Journal of Network Management, Vol. 11, No 6, Nov-Dec 2001.
↓
- Wen-Her Yang, Kai-Wei Fan and Shiuh-Pyng Shieh, "A secure multicast protocol for the internets multicast backbone," ACM/PH International Journal of Network Management vol. 11, Issue 2, page 129-136, Mar/April 2001.
↓
- S.P. Shieh, Y.L. Huang, F.S. Ho, J.N. Luo, "Network Address Translators: Effects on Security Protocols and Applications in the TCP/IP Stack," IEEE Internet Computing, Nov./Dec. 2000.
↓
- S.P. Shieh, C.T. Lin, W.B. Yang, H.M.Sun, "Digital Multisignature Schemes for Authenticating Delegates in Mobile Code Systems," IEEE Trans. on Vehicular Technology, August 2000, NSC-85-2622-E-009-006R.
↓
- Y.L. Huang, S.P. Shieh, F.S. Ho, "A Generic Electronic Payment Model Supporting Multiple Merchant Transactions," Vol 19, No. 5, Computers and Security, 2000, pp. 453-465.
↓
- S.L. Chang, S.P. Shieh, C.H. Jong, "A Security Testing System for Vulnerability Detection," Vol. 12 No. 1, Journal of Computers, 2000, pp. 7-21.
- C.T. Lin, S.P. Shieh, "Chain Authentication in Mobile Communication Systems," Vol. 13, Journal of Telecommunication Systems, 2000.
↓
- S.P. Shieh, C.T. Lin, W.H. Yang, "Information Protection in Dynamic Statistical Databases " Vo. 43, Encyclopedia of Computer Science and Technology, 2000, pp.97-112.
↓
- I.J. Shue, S.P. Shieh, “Playback dispatch and Fault Recovery for a Clustered Video System with Multiple Servers," Journal of Multimedia Tools and Applications, Vol. 9, Issue 3, Nov. 1999, pp. 277-294.
↓
- Hung-Min Sun and S. P. Shieh, "Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures," Journal of Information Science & Engineering, Vol. 15, No. 5, Sep.1999, pp. 679-690.
↓
- F.S. Ho, S.P. Shieh, Y.L. Huang, “An Efficient Authentication Protocol for Mobile Networks," Journal of Information Science and Engineering, Vol.15 No.4, July 1999, pp.505-520.
↓
- I.J. Shyu, S.P. Shieh, “A Distributed Fault-Tolerant Design for Multiple-Server VOD systems,” Journal of Multimedia Tools and Applications, March 1999, pp. 219-248.
↓
- S.P. Shieh, C.T. Lin, “Auditing User Queries in Dynamic Statistical Databases," Journal of Information Science, Vol. 113, Jan. 1999, pp. 131-146, NSC 85-2213-E00 9-032.
↓
- S.P. Shieh, “Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems,” Journal of Information Science and Engineering, Vol.15 No.1, January 1999, pp.91-106, NSC85-2622-E-009-006R.
↓
- S.P. Shieh, C.T. Lin, S.Y. Wu, “Optimal Assignment of Mobile Agents for Software Authorization and Protection (COMCOM1223)," Computer Communications, Vol. 22, Jan. 1999, pp. 46-55.
↓
- H.M. Sun, S.P. Shieh, "A note on breaking and repairing a secure broadcasting in large networks," Computer Communications, Vol. 22, 1999, pp. 193-194.
↓
- C.T. Lin, S.P. Shieh, W.H. Yang, "Secure Authentication Protocols Resistant to Guessing Attacks," IICM, 1999.
↓
- W.H. Yang, S.P. Shieh, "Password Authentication Schemes with Smart Cards," Computers and Security, Vol. 18, No. 8, 1999, pp. 727-734.
↓
- Hung-Min Sun and S. P. Shieh, "Secret Sharing Schemes for Graph-Based Prohibited Structures," Computers and Mathematics with Applications, Vol. 36, No. 7, Oct. 1998, pp. 131-140.
↓
- I.J. Shue, S.P. Shieh, “Balancing Workload and Recovery Load on Distributed Fault-Tolerant VOD Systems," IEEE Communications Letters,, Vol. 2, No. 10, Oct. 1998, pp. 288-290.
↓
- S.P. Shieh, I.J. Shyu, C.Y. Shen, “Wide Address Translation and Protection for Single Address Space Operating Systems,” Proceedings of the National Science Council, Vol. 22, No. 5, September 1998, pp. 601-616, NSC 85-2221-E009-039.
↓
- H.M. Sun, S.P. Shieh, “Secure Broadcasting in Large Networks," Computer Communications, March 1998, pp. 279-283.
↓
- H.M. Sun, S.P. Shieh, “Optimal Information Dispersal for Increasing Reliability of a Distributed Service,” IEEE Transactions on Reliability, Dec. 1997, pp. 462-472, NSC 85-2213-E-009-032.
↓
- S.P. Shieh, F.S. Ho, “A Comment on A Total Ordering Multicast Protocol,” IEEE Transactions on Parallel and Distributed Systems, October 1997.
↓
- S.P. Shieh, V. D. Gligor, “On a Pattern-Oriented Model for Intrusion Detection," IEEE Transactions on Data and Knowledge Engineering, Vol. 9, No. 4, August 1997, pp. 661-667, NSC 85-2213-E-009-032.
↓
- S.P. Shieh, W.H. Yang, H.M. Sun, “An Authentication Protocol with Trusted Third Party,” IEEE Communications Letters, Vol 1, No. 3, May 1997, pp. 87-89.
↓
- S.P. Shieh, V.D Gligor, “Detecting Illicit Information Leakage in Operating Systems," Journal of Computer Security, April 1997, pp. 123-148, NSC 85-2213-E-009-032.
- H.M. Sun, S.P. Shieh, “Efficient Construct of On-Line Multiple Secret Sharing Schemes,” Journal of Computers, Dec. 1996, pp. 49-56.
- S.P. Shieh, W.H. Yang, “An Authentication and Key Distribution System for Open Network Systems," ACM Operating Systems Review, April 1996, pp 32-41, NSC 85-2213-E-009-032.
↓
- H.M. Sun, S.P. Shieh, “An Efficient Construction of Perfect Secret Sharing Schemes for Graph-Based Access Structures," Computer & Mathematics with Applications, April 1996, pp. 129-135, NSC 84-2213-E-009-081.
↓
- I.J. Shyu, S.P. Shieh, “Virtual Address Translation for Wide Address Architectures," ACM Operating Systems Review, Vol. 29, No. 2, October 1995, pp 37 - 46, NSC 84-2221-E-009-001.
↓
- S.P. Shieh, “A Distributed Intrusion Detection Model," Journal of Computers, Vol 6, No 4, December, 1994, pp 24-34, TL 83-5206.
- H.M. Sun, S.P. Shieh, “A Construction of Dynamic Threshold Schemes," Electronic Letters, November 1994, pp 2023 - 2025, NSC 84-2213-E-009-081.
↓
- H.M. Sun, S.P. Shieh, “On Dynamic Threshold Schemes," Information Processing Letters 52, 1994, pp 201-206, NSC 84-2213-E-009-081.
↓
- S.P. Shieh, J.N. Cheng, “Specification, Validation and Verification of Time-Critical Systems," , Computer Communications, Vol. 21, No. 5, May 1998, pp. 460-469, NSC85-2213-E-009-032.
↓
- H.M. Sun, S.P. Shieh, “Recursive Construction of Perfect Secret Sharing Schemes,” Computer & Mathematics with Applications, 1999, pp. 87-96.
↓
Books:
- 謝續平、黃能富、黃仁俊,”無線網路安全”教材,教育部資通安全聯盟,2009.
- M. –H. Yang and S.-P. Shieh, A book chapter in “分散式癱瘓服務攻擊解決策略--追蹤匿名攻擊者,” 財團法人國家實驗研究院科技政策研究與資訊中心, 2006.
- D.T. Lee, S.P. Shieh, Doug Tygar, “Computer Security in 21 Century,” Springer, Feb. 2005.
- Shiuhpyng Shieh, et al, “Intrusion, Detection and Prevention, Illustrated,” published by NSC, Dec. 2004.
- Shiuhpyng Shieh, et al, “System and Network Security,” published by NSC, Jan. 2004.
- Gligor, V. D., and Shieh, S. P., et al, A Guide to Understanding Covert Channel Analysis of Trusted Systems, NCSC-TG-030, National Computer Security Center, USA, November 1993
- S.P. Shieh, et al, “Security Infrastructure for Government Document Exchange,” published by RDEC, 1996.
- S.P. Shieh, “An Information and Privilege Flow Model for Intrusion Detection in Computer Systems," Ph.D. Dissertation, University of Maryland, College Park, MD, June 1991.
- S.P. Shieh, “A Survey of Supercomputers," Technical Report, University of Maryland, College Park, March, 1986.
- S.P. Shieh, J.S. He, “The Automation of Covert Channel Analysis," IBM Independent Research and Development report, 1990.
- S.P. Shieh, “Intrusion Detection in Multilevel Secure Systems," IBM Independent Research and Development report, 1991.
Patents:
- 謝續平(陽明交大資訊工程;指導教授), 王嘉偉, 黃秀娟, 王偋, 周國森, 潘建全, “上下文相關之資料結構逆向工程系統及其方法”, No. I661355 (申請日期2018/08/03、公告日 2019/06/01、公開號202008152、公開日2020/02/16) (中華民國專利)
- Zong-Xian Shen, Shiuh-Pyng Shieh, “Computer-Implemented Method for Distilling A Malware Program in A System,” US patent 9870471, January 16, 2018
- Shiuhpyng Shieh, Chia-Wei Wang, Chi-Wei Wang, Chia-Wei Hsu, “AUTOMATIC PROBE CONSTRUCTION SYSTEM AND METHOD THEREOF,” US patent pending, Dec. 28, 2017.
- Shiuhpyng Shieh, Chia-Wei Wang, Chi-Wei Wang, Chia-Wei Hsu, ”自動化探針建構系統及其方法,”ROC/Taiwan patent I551984, 2016/10/1 ~ 2035/9/22
- C.W. Wang, S.P. Shieh, Y.R. Liu, “Decoupled Method For Tracking Information Flow and Computer System Thereof,” US patent, Appl. no. 13/459,258, granted, Feb. 2016.
- Zong-Xian Shen, SP Shieh, ”產生純化惡意程式的方法、偵測惡意程式之方法及其系統,”ROC/Taiwan patent I515598, 2016/1/1 ~ 2033/8/22
- Zong-Xian Shen, SP Shieh, “computer-implemented method for distilling a malware program in a system”, US patent pending, US 2015/0058984 A1, 2015
- Z.S. Shen, S.P. Shieh, “Security Relevant Semantics Modeling Method and System for Mobile Malware Detection,” ROC patent, Appl. no. 102130367, Aug. 23, 2013.
- Chi-Wei Wang, C.H. Chang, S.P. Shieh, Chia-Wei Wang, C.W. Hsu, “Method for Detecting Privacy-Theft Android Applications with Decoupling Information Flow Tracking“, ROC patent, Appl. no. 101135433, Sep. 2012.
- C.W. Hsu, B.H. Lee, S.P. Shieh, ”Method and System for VM-Aware Malware Detection,” ROC patent, Appl. no. 101116554, May. 2012.
- C.W. Wang, S.P. Shieh, Y.R. Liu, “Method for Decoupling System-Wide Information Flow Tracking for Malware Analysis and Its Applications,” ROC patent, Appl. no. 101101270, Jan. 2012.
- C.W. Wang, S.P. Shieh, “MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern,” ROC and US patents pending
- S.I. Huang, S.P. Shieh, C.W. Wang, “A Light-Weight Authentication and Secret Retrieval Scheme and Its Applications,” US patent pending no. US 2010/0042842 A1, Aug. 12, 2008.
- S.I. Huang, S.P. Shieh, C.W. Wang, “A Light-Weight Authentication and Secret Retrieval Scheme and Its Applications,” ROC patent pending no. 097139529, 2008.
- S.I. Huang, S.P. Shieh, “Method and System for Secure Data Aggregation in Wireless Sensor Networks,” US patent no. 8027474, 2011.9.27
- S.I. Huang, S.P. Shieh, “Method and System for Secure Data Aggregation in Wireless Sensor Networks,” ROC patent no. I350086. 10, 2011
- S.I. Huang, S.P. Shieh, “Method and System for Secure Data Aggregation in Wireless Sensor Networks,” China patent number ZL200710301500.9, 2011
- S.P. Shieh, "Multisignature Scheme with Message Recovery for Group Authorization in Mobile Networks," ROC patent no. 1248744, Feb. 2006.
- S.P. Shieh, "Clustered Architecture for High Speed IPsec Gateway," ROC patent no. 1227082, Jan. 2005.
- S.P. Shieh, Y.L. Huang, “Smart Card-Based Key Distribution Schemes in Conditional Access Systems,” ROC patent no. 203525, May 2004 – Oct. 2022.
- S.P. Shieh, “Synchronous Method and System for Processing a Packet," US patent pending no. 101742064, 2004.
- S.P. Shieh, "Clustered Architecture for High Speed IPsec Gateway," China patent pending no. 03148124.8, 2004.
- S.P. Shieh, et al, “A Generic Secure Payment Method Supporting Multiple Merchants Transactions and Its Applications,” ROC patent no. 87148006, Dec.1999.
- S.P. Shieh, et al, “An Authentication System for Computer Networks," ROC patent no. 079094, 1996. The patent includes four systems: secure Telnet system, secure Rlogin system, secure Ftp system, and the network monitor system.
- S.P. Shieh, et al, “A Pattern-Oriented Intrusion-Detection System and Method," US patent no. 5278901, January 1994.
Conference Papers:
- Shan-Hsin Lee, Wei-Gang Sun, Chen Lien, Shiuhpyng Shieh, “Spearphishing Email Anatomy Based on MITRE ATT&CK,” CISC 2021, Aug. 2021.
- Shan-Hsin Lee, Shen-Chieh Lan, Hsiu-Chuan Huang, Chia-Wei Hsu, Yung-Shiu Chen, Shiuhpyng Shieh, “EC-Model: An Evolvable Malware Classification Model,” IEEE Conference on Dependable and Secure Computing, January 2021
- Shan-Hsin Lee, Shiuhpyng Shieh, et al, “Open Source Encryption Library Downsizing and Cross-Platform Deployment,” The 30th Cryptology and Information Security Conference (CISC), Sep. 2020.
- Chun-Han Lin, Shan-Hsin Lee, Hsiu-Chuan Huang, Chi-Wei Wang, Chia-Wei Hsu and Shiuhpyng Shieh, “DT-Track: Using DNS-Timing Side Channel for Mobile User Tracking,” IEEE Conference on Dependable and Secure Computing, November 2019.
- Shiuhpyng Shieh, “The Game of Spear and Shield in Enterprise Networks,” Keynote Speech, IEEE Conference on Dependable and Secure Computing, November 2019.
- Shiuhpyng Shieh, “IoT penetration tests for Security Assurance,” Invited Talk, IEEE IoT World Forum, Ireland, April 2019.
- Chung-Kuan Chen, Shang-Kuei Chen and Shiuhpyng Shieh, “Mitigating Over-Permissible Transfer for Control Flow Integrity,” IEEE Conference on Dependable and Secure Computing (DSC), 2018
- Chia-Wei Hsu, Sheng-Ru Wei and Shiuhpyng Shieh, “Finder: Automatic ICC Data Reconstruction for Long-Term Runtime Semantics,” IEEE Conference on Dependable and Secure Computing (DSC), 2018.
- Chung-Kuan Chen, E-Lin Ho and Shiuhpyng Shieh, “DeepMemIntrospect: Recognizing Data Structures in Memory with Neural Networks,” IEEE Conference on Dependable and Secure Computing (DSC), 2018
- Chung-Kuan Chen, Shiuhpyng Shieh, “Building Automatic and Intelligent Cyber Attack-Defense Platform,” 17th European Conference on Cyber Warfare and Security, Oslo, Norway, 2018.
- Chiawei Wang, Shiuhpyng Shieh, “VMCloak: Toward a Stealthy in-VM Agent Execution,” IEEE Conference on Dependable and Secure Computing (DSC), 2017.
- Chong-Kuan Chen, Shen-Chieh Lan, Shiuhpyng Shieh, “Shellcode Detector for Malicious Document Hunting,” IEEE Conference on Dependable and Secure Computing (DSC), 2017.
- Yen-Ting Chiang, Ting-Yi Chang, Chia-Wei Hsu, Shiuhpyng Shieh, “Cyber Threat Evaluation of Mobile Networks,” Cryptology and Information Security Conference (CISC 2017), Taiwan, May 2017.
- Liang-Mei Huang, Chien-Ho Chao, Chia-Wei Hsu, Shiuhpyng Shieh, Ping-Hsin Liu, “Security Analysis of Android Apps and Tool Evaluation,” 26th Cryptology and Information Security Conference (CISC 2016), Taiwan, May 2016.
- Shiuhpyng Shieh, “ProbeBuilder: Automatically Constructing Behavior Profilers for Malware Analysis,” Network Security Workshop, Dubai, 2016.
- Chu-An Shieh, Chia-Wei Hsu, Chien-Ho Chao, Shiuhpyng Shieh, “Modeling Android Apps Behaviors Using Graphics,” 25th Cryptology and Information Security Conference (CISC 2015), Taiwan, May 2015.
- Zhi-Kai Zhang, Michael Cheng Yi Cho, Shiuhpyng Shieh, “Emerging Security Threats and Countermeasures in IoT,” ACM Symposium on Information, Computer and Communications Security, March 2015.
- 謝居安, 許家維, 趙健賀, 謝續平, “Android 應用程式行為特徵圖的建構與方法,” The 25th Cryptology and Information Security Conference (CISC), 2015
- Shiuhpyng Shieh, “Building APT Shield with Polymorphic Defense,” NCTU-TUS Data Science and Optimization Joint Symposium, 2015.
- Chi-Kai Chang, Michael Cho, Chia-Wei Hsu, Chia-Wei Wang, C.K., Chen, Shiuhpyng Shieh, “IoT: Ongoing Challenges and Research Opportunities,” IEEE IoTS Workshop, Matsue, Japan, Nov 2014.
- 王繼偉, 王嘉偉, 謝居安, 謝續平, “可編程之互動式進階惡意程式雲端調試平台,” The 24th Cryptology and Information Security Conference (CISC), May, 2014
- Yen-Ju Liu, Chong-Kuan Chen, Micheal Cheng Yi Cho, and Shiuhpyng Shieh, “Fast Discovery of VM-Sensitive Divergence Points with Basic Block Comparison,” IEEE International Conference on Software Security and Reliability (IEEE SERE 2014), San Francisco, USA, June 2014.
- Andy Shen, Chia-Wei, Shiuhpyng Shieh, “Real-Time Record and Replay on Android for Malware Analysis,” Crypto and Information Security Conference, 2013.
- Yin-Change Song, Michael Cho, C.W. Wang, Chia-Wei Hsu, Shiuhpyng Winston Shieh, “Light-Weight CSRF Protection by Labeling User-Created Contents,” IEEE International Conference on Software Security and Reliability (IEEE SERE 2013) , Washington, D.C., USA, 2013.
- Chia-Wei Hsu, Fan-SyunShih, Chi-WeiWang, Shiuhpyng Winston Shieh, “Divergence Detector: A Fine-grained Approach to Detecting VM-Awareness Malware,” the Seventh IEEE International Conference on Software Security and Reliability (IEEE SERE 2013) , Washington, D.C., USA, 2013.
- Chung-Kwan Chen, Wei-Chi Chen, Vic Hsu, Shiuhyng Shieh, “Mutant Malware Discovery and Behavior Analysis for Cyber Crime Investigation,” Crypto and Information Security Conference, 2012.
- Yun-Min Cheng, Bing-Han Li and Shiuhpyng Shieh, “Accelerating Taint-based Concolic Testing by Pruning Pointer Overtaint,” IEEE Conference on Software Security and Reliability (SERE), Washington DC, June 2012.
- Chia-Ming Fan, Bing-Han Li, Shiuhpyng Shieh, “On The Security of Password-Based Pairing Protocol in Bluetooth” The 13th Asia-Pacific Network Operations and Management Symposium, (APNOMS 2011), 2011
- Yen-Ru Liu, C.W. Wang, J.W. Hsu, T.C. Tseng, S.P. Shieh, “Extracting Hidden Code from Packed Malware based on Virtual Machine Memory Comparison,” 21th Cryptology and Information Security Conference (CISC 2011), 2011.
- Bing-Han Li, Shiuhpyng Shieh, “RELEASE: Generating Exploits Using Loop-Aware Concolic Execution,” IEEE Conference on Secure Software Integration and Reliability Improvement, June 2011.
- Wei Shi-Sue, Shiuhpyng Shieh, Bing-Han Li, Michael Cheng Yi Cho and Chin-Wei Tien, "A Framework Using Fingerprinting for Signal Overlapping-Based Method in WLAN," the International Computer Symposium on Computer Networks and Web Technologies (ICS 2010), Dec. 16-18, 2010..
- Chia-Wei Hsu, Shiuhpyng Shieh, "FREE: A Fine-grain Replaying Executions by Using Emulation", The 20th Cryptology and Information Security Conference (CISC), 2010. (Best Student Paper Award)
- 王繼偉, 王嘉偉, 許家維, 謝續平, "基於虛擬機器外部觀察與映像檔比對的惡意程式分析", The 20th Cryptology and Information Security Conference (CISC) , 2010.
- Yu-Lung Huang, Chih-Ya Shen, Shiuhpyng Shieh, Hung-jui Wang, Cheng-Chun Lin, “Provable Secure AKA Scheme with Reliable Key Delegation in UMTS,” IEEE Conference on Secure Software Integration and Reliability Improvement, 2009.
- Yu-Lung, Hsiaoying Lin, Doug Tygar, Shiuhpyng Shieh, “SWOON: A Testbed for Secure Wireless Overlay Networks,” USENIX Workshop on Cyber Security Experimentation and Test (CSET 2008), 2008.
- Lian Lee, Shiuhpyng Shieh, “Protecting User Privacy with Dynamic Identity-Based Scheme for Low-cost Passive RFID Tags,” Information Security Conference, May 2008.
- Warren W. Lin, Shiuhpyng Shieh, Jia-Chun Lin, “Lightweight, Distributed Key Agreement Protocol for Wireless Sensor Networks,” IEEE Conference on Secure System Integration and Reliability Improvement, Yokohama, Japan, July 14-17, 2008 (co-sponsored by IEEE Reliability Society and IEEE System, Man, and Cybernetics Society, published by IEEE Press).
- Che-Cheng Lin, Shiuhpyng Shieh, Jia-Chun Lin, “A Pollution Attack Resistant Multicast Authentication Scheme Tolerant to Packet Loss,” IEEE Conference on Secure System Integration and Reliability Improvement, Yokohama, Japan, July 14-17, 2008 (co-sponsored by IEEE Reliability Society and IEEE System, Man, and Cybernetics Society, published by IEEE Press).
- Ming-Hao Yang, Shiuhpyng Shieh, "Tracing Mobile Attackers in Wireless Ad-hoc Network," IEEE International Workshop on Social and Legal Aspects under Emerging Computing Environments, held at Athens, Greece, June 8-13, 2008 (Best Paper Award, published by IEEE Press).
- S.I. Huang, Shiuhpyng Shieh, “SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks,” IEEE International Conference on Computational Intelligence and Security (IEEE CIS), Dec. 2007.
- C.H. Jiang, Shiuhpyng Shieh, Rachel Liu, “Keystroke Statistical Learning Model for Web Authentication,” ACM Symposium on Information, Computer and Communications Security, Singapore, 2007.
- Tanya Roosta, Shiuhpyng Shieh, Shankar Sastry, “Taxonomy of Security Attacks in Sensor Networks and Countermeasures,” IEEE International Conference on System Integration and Reliability Improvements, Hanoi, Vietnam, 13-15 December 2006.
- Zhi-Kai Zhang, Tze-Yau William Huang, Shiuhpyng Shieh, “Controlling Various Platforms for Test Automation,” IEEE International Conference on System Integration and Reliability Improvements, Hanoi, Vietnam, 13-15 December 2006.
- Yang Tzu-I and S. P. Shieh and WarrenWolfe-Jen Lin and Li-Joe Lin, “A Path Authentication Scheme for Routing Disruption Attack Prevention in Ad Hoc Networks,” 2006 IEEE International Conference on Systems, Man, and Cybernetics, Oct. 2006.
- Shiuhpyng Shieh, “Defending against DDoS Attacks,” High Tech Forum – e-Security, Oct. 21-22, 2005.
- Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, “An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks,” ACM Symposium on Information, Computer and Communications Security, 2006.
- Ya-Jeng Lin, Shiuhpyng Shieh, “Lightweght, Pollution-Attack Resistant Multicast Authentication Scheme,” ACM Symposium on Information, Computer and Communications Security, 2006.
- Shih-I Huang, Shiuhpyng Shieh, “Secret Searching in Wireless Sensor Networks with RFIDs,” Information Security Conference, June 2005, pp. 237 – 244.
- Kang_Hsien Chou, Shiuhpyng Shieh, Ming-How Yang, and Fu-Yuan Lee, “Marking-Based Source Identification Scheme for Defending Against DDoS Attacks,” Information Security Conference, 2004
- Fu-Yuan Lee, Shiuhpyng Shieh and Ming-How Yang, “Tracing the Origin of Single-Packet Attacks,” Information Security Conference, 2004
- Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh, Shen-Hsuan Wang, “Source-end Defense System against DDoS Attacks,” International Workshop on Advanced Developments in Software and Systems Security, pp31-35, 2003
- Shih-I Huang, Shiuhpyng Shieh, Shang-Yen Wu, “Adaptive Random Key distribution Schemes for Wireless Sensor Network,” International Workshop on Advanced Developments in Software and Systems Security, pp61-65, 2003.
- Shiuhpyng Shieh, Fu-Yuan Lee, “Fast Packet Classification for Improving the Performance of Secure Network Services,” Information Security Conference, 2003.
- Shiuhpyng Shieh, Yung-Zen Lai, Ya-Ting Chang and Fu-Yuan Lee, "Clustered Architecture for High-Speed IPsec Gateway," ICS'2002.
- Chang-Han Jong, Shiuh-Pyng Shieh and Jia-Ning Luo, "Detecting Distributed DoS/Scanning by Anomaly Distribution of Packet Fields," ICS'2002.
- Fu-Yuan Lee, Shiuhpyng Shieh and Lin-Yi Wu, "Address Sharing Enabled Mobile IP Utilizing NAPT," ICS'2002.
- Fu-Shen Ho, Shiuhpyng Shieh, Y.L. Huang and K.L. Tsai, "A Service Probing and Channel Establishment Protocol Across Multiple Network Access Translation Realms," ICS'2002.
- Shiuhpyng Shieh, Shih-I Huang and Fu-Shen Ho, "An ID-based Proxy Authentication Protocol Supporting Public Key Infrastructure," IWAP'2002
- Jia-Ning Luo, Shiuh-Pyng Shieh, "The Multi-layer RSIP Framework," The 9th IEEE International Conference on Networks, ICON'2001. Bangkok, Thailand, October 2001.
- Cheng-Fen Lu, Shiuh-Pyng Shieh, "Secure Key Evolving Protocols for Discrete Logarithm Schemes," RSA conference, Feb 2002.
- C.H. Chun, S.P. Shieh, “GSN-CERT and Computer Emergency Response,” Chinese-France Conference on Information Technology, March 2000
- S.P. Shieh, Y.L. Huang, J.C. Wang, "Practical Key Distribution Schemes for Pay TV Channel Protection," IEEE International Computer Software and Applications Conference (COMPSAC'2000), Nov. 2000.
- S.M. Cheng, W.H. Yang, S.P. Shieh, "A Flexible Authentication for Next Generation Mobile Communications," 6th Mobile Computing Workshop, pp. 67-73, March 2000.
- W.H. Yang, K.W. Fan, S.P. Shieh, "A Scalable and Secure Multicast Protocol on M-bone Environments," Information Security Conference, May 2000.
- W.H. Yang, S.P. Shieh, "An Efficient Key Agreement Protocol for Secure Group Communications," Information Security Conference, May 2000.
- Y.L. Huang, S.P. Shieh, "A Fair Settlement Protocol for Online Transactions," Information Security Conference, May 2000.
- J.N. Luo, S.P. Shieh, "A Transparent and Efficient Mechanism for File System Protection," Information Security Conference, May 2000.
- W.H. Yang, S.P. Shieh, "Enhancing Security and Flexibility of Password Authentication with ID-based Cryptosystems," Information Security Conference, May 1999.
- C.T. Lin, S.P. Shieh, "A Secure Communication Protocol for Telecommunications Management Networks," Information Security Conference, May 1999.
- C.T. Lin, S.P. Shieh, "An Efficient and Secure Credit Card-Based Billing Scheme for Telephone Services," Mobile Computing Workshop, March 1999, pp. 28-34.
- H.M. Sun, S.P. Shieh, "On Private-Key Cryptosystems Based on Product Codes," ACISP'98, Australia, July 1998.
- S.P. Shieh, C.T. Lin, Y.S. Juang, "Controlling Inference and information Flows in Secure Databases," 1998 Information Security Conference, May 1998.
- S.P. Shieh, C.T. Lin, S.Y. Wu, "A Software Authorization and Protection Model for Mobile Code Systems," 1998 International Symposium on Internet Technology, April 1998.
- S.P. Shieh, C.T. Lin, M.J. Peng, W.C. Yang, J.N. Yang, “A Secure Credit-Card Based Billing Schemes for Telephone Services,” International Conference on Mobile Computing, March 1998.
- H.M. Sun, S.P. Shieh, “On-Line Secret Sharing Based on a One-Way Function,” 1998 Information Security Conference, May 1998.
- H.M. Sun, S.P. Shieh, “A Secure Broadcasting Cryptosystem in Large Computer Networks,” 1998 Information Security Conference, May 1998.
- H.M. Sun, S.P. Shieh, “On Private-Key Cryptosystems Based on Product Codes,” Australia Information Security and Privacy Conference, July 1998.
- S.P. Shieh, C.T. Lin, Y.S. Juang, “Controlling Inference and information Flows in Secure Databases,” 1998 Information Security Conference, May 1998.
- S.P. Shieh, C.T. Lin, S.Y. Wu, “A Software Authorization and Protection Model for Mobile Code Systems," 1998 International Symposium on Internet Technology, April 1998.
- I.J. Shue, S.P. Shieh, “Load-Balanced Playback Dispatch for Fault-Tolerant Multi-Server VOD Systems,” 1997 Workshop on Real-Time and Media Systems, July 30-31, 1997.
- S.P. Shieh, J.N. Luo, “A Secure Mail System for Mobile Users in the Internet,” International Conference on Mobile Computing, March 1997.
- F.S. Ho, S.P. Shieh, “An Efficient Authentication for Mobile Networks,” International Conference on Computer System Technologies for Industrial Applications, April 1997.
- H.M. Sun, S.P. Shieh, “On the Information Rate of Perfect Secret Sharing Schemes with Access Structures of Rank Three,” Conference on Information Security, May 1997.
- C.F. Lu, S.P. Shieh, “An Anonymous Fair Credit Card Payment System,” Conference on Information Security, May 1997.
- M.J. Pong, S.P. Shieh, W.C. Yang, J.N. Yang, “Billing Schemes for Secure Telephony over Public Communication Networks,” Conference on Information Security, May 1997.
- H.M. Sun, S.P. Shieh, “Secret Sharing in Graph-Based Prohibited Structures," 1997 IEEE International Conference on Computer Communications (INFOCOM'97), Kobe, Japan, April 7-11, 1997.
- H.M. Sun, S.P. Shieh, “Crypto-analysis of Private-Key Schemes Based on Burst-Error-Correcting Codes," the Proceedings of ACM International Conference on Computer and Communications Security, March 14-16, 1996.
- S.P. Shieh, Y.L. Huang, F.S. Ho, “A Family of Secure Network Protocols," the Proceedings of Information Security Conference, May, 1996.
- H.M. Sun, S.P. Shieh, “A Perfect Scheme for Secret Sharing between Two Parties," Proceedings of Information Security Conference, May, 1995.
- S.P. Shieh, C.T. Lin, R.T. Hsueh, “Secure Communication in Global Systems for Mobile Telecommunications," Proceedings of Mobile Computing Workshop, April 1995.
- S.P. Shieh, C.T. Lin, “An Audit Scheme for Inference Control in Statistical Databases," Proceedings of International Conference on Intelligent Information Management Systems, June 1995.
- S.P. Shieh, et al, “The Design and Implementation of A MPOS Simulator," Proceedings of the Multiprocessor Systems Workshop, July 1995.
- H.M. Sun, S.P. Shieh, “On Dynamic Threshold Schemes," 4rd Conference on Information Security, May 21, 1994.
- S.P. Shieh, H. M. Sun, “On Constructing Secret Sharing Schemes," 1994 IEEE International Conference on Computer Communications, Networking for Global Communications (INFOCOM'94), Toronto, Canada, June 12-16, 1994.
- I.J. Shyu, S.P. Shieh, “Architectural Support for 64-Bits Address Translation," Proceedings of 1994 International Computer Symposium, Dec., 1994, pp 322 - 327.
- M.R. Chiang, S.P. Shieh, C.L. Liu, “Dynamic Load Balancing in Parallel Simulation Using Time Warp Mechanism," Proceedings of International Conference on Parallel and Distributed Systems, Dec., 1994, pp 222- 227.
- H.M.. Sun, S.P. Shieh, “Optimal Information Dispersal for Reliable Communication in Computer Networks," Proceedings of International Conference on Parallel and Distributed Systems, Dec., 1994, pp 460 -464.
- S.P. Shieh, “Covert Channel Bandwidth Estimation and Measurement," 3rd Conference on Information Security, May 12, 1993.
- S.P. Shieh, “Intrusion Detection in Computer Networks," 3rd Conference on Information Security, May 12, 1993.
- S.P. Shieh, H.M. Sun, “A Secret Sharing Scheme for Hierarchical User Groups," the 8th International Joint Workshop on Computer Communication (JWCC-8), December 19-21, 1993.
- S.P. Shieh, V.D. Gligor, “A Pattern-Oriented Intrusion Detection Model and Its Applications," Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, (May 7-9, 1991), pp 327-342.
- S.P. Shieh, V.D. Gligor, “Auditing the Use of Covert Storage Channels in Secure Systems," Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, (May 1990), pp 285-295.