Welcome...

T.H. Chen (Ting-Han)

PhD Candidate

About Me

I'm 陳亭翰 (Chen, Ting-Han) from 台灣 Taiwan.
Feel free to call me by my first name, 亭翰 (Ting-Han🔊

I started as a PhD candidate in the Design and Analysis of Communication Systems (DACS) group at the Faculty of Electrical Engineering, Mathematics and Computer Science (EEMCS) at the University of Twente in April 2022. My research is part of INTERSCT, the biggest cybersecurity project in the Netherlands.

Before my position in the Netherlands, I obtained an Electrical Engineering Bachelor’s Degree and a Computer and Communication Engineering Master's Degree from National Cheng Kung University (NCKU) in Taiwan, with an exchange program at RWTH Aachen University in Germany. In addition, I worked at Taiwan Semiconductor Manufacturing Company (TSMC) as a DevOps engineer.

We have seen IoT devices everywhere; however, is it safe to use them? To sort this out, I focus on finding IoT vulnerabilities, performing vulnerability disclosure, and notifying users in a scalable way. The goal is to develop scalable vulnerability disclosure notifications to enhance the security of IoT. For more details about my work, please check the Research tab.

Expertise

Engineering & Materials Science
Bluetooth
Internet
Internet Of Things
Network Security
Security Of Data
Smartphones
Testbeds
Wearable Technology

Research

My PhD project is "Scalable IoT vulnerability testing and notification."

Keywords: Internet of Things, Cybersecurity, Network Scanning, Vulnerability Disclosure

Nowadays, various IoT devices have flooded the market but revealed security concerns. My goal is to discover security vulnerabilities, perform disclosures to vendors, and notify device owners. How to inform owners and vendors will be a challenge. There may be multi-party involvement and limited access to reach the people responsible. Eventually, the project aims to investigate and implement scalable methods to improve IoT security.

My recent work is locating the best practices of active network scanning over the last decade. Network scanning is not only the way for attackers to find a system weakness but also a way for researchers and operators to defend the network infrastructure. I characterize the existing scanning operations by distinguishing the methodologies and policies used in different regions and scenarios. Eventually, I conclude with a guideline to suggest Pros and Cons, Dos and Don'ts when you start a network scanning.

Publications

Recent
Chen, T.-H., Sou, S.-I., & Lee, Y. (2019). WiTrack: Human-to-Human Mobility Relationship Tracking in Indoor Environments Based on Spatio-Temporal Wireless Signal Strength. In 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) https://doi.org/10.1109/dasc/picom/cbdcom/cyberscitech.2019.00146

UT Research Information System

Google Scholar Link

Contact Details

Visiting Address

University of Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling (building no. 11), room 5110
Hallenweg 19
7522NH  Enschede
The Netherlands

Navigate to location

Mailing Address

University of Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling  5110
P.O. Box 217
7500 AE Enschede
The Netherlands

Additional Contact Information

Status: 🟢

(If I'm on leave, I update my status and time to return here)

  • 2024.01.30 ~ 2024.03.15
    I'm back in Taiwan. May take more time to respond to messages.

Social Media