I'm é³äŗēæ° (Chen, Ting-Han) fromĀ å°ē£ Taiwan.
Feel free to call me by my first name, äŗēæ° (Ting-Han)Ā š
I started as a PhD candidateĀ in theĀ Design and Analysis of Communication Systems (DACS)Ā group at theĀ Faculty of Electrical Engineering, Mathematics and Computer Science (EEMCS)Ā atĀ theĀ University of TwenteĀ in April 2022.Ā My research is part ofĀ INTERSCT, the biggest cybersecurity project in the Netherlands.
Before my position in the Netherlands, I obtained an Electrical Engineering Bachelorās Degree and a Computer and Communication Engineering Master's Degree from National Cheng Kung University (NCKU) in Taiwan, with an exchange program at RWTH Aachen University in Germany. In addition, I worked at Taiwan Semiconductor Manufacturing Company (TSMC) as a DevOps engineer.
We have seen IoT devices everywhere; however, is it safe to use them? To sort this out, I focus on finding IoTĀ vulnerabilities, performing vulnerability disclosure, and notifying users in a scalable way. The goal is to develop scalable vulnerability disclosure notifications to enhance the security of IoT.Ā For more details about my work, please check the Research tab.
Expertise
Computer Science
- Internet-Of-Things
- Relationships
- Signal Strength
- User
- Vulnerability Disclosure
- Correlation
- Time Information
- Wearable Device
Organisations
My PhD project is "Scalable IoT vulnerability testing and notification."
Keywords: Internet of Things, Cybersecurity, Network Scanning, Vulnerability Disclosure
Nowadays, various IoT devices have flooded the market but revealed security concerns. My goal is to discover security vulnerabilities, perform disclosures to vendors, and notify device owners. How to inform owners and vendors will be a challenge. There may be multi-party involvement and limited access to reach the people responsible. Eventually, the project aims to investigate and implement scalable methods to improve IoT security.
My recent work is locating the best practices of active network scanning over the last decade. Network scanning is not only the way for attackers to find a system weakness but also a way for researchers and operators to defend the network infrastructure. I characterize the existing scanning operations by distinguishing the methodologies and policies used in different regions and scenarios. Eventually, I conclude with a guideline to suggest Pros and Cons, Dos and Don'ts when you start a network scanning.
Publications
2024
2019
Research profiles
Courses academic year 2023/2024
Courses in the current academic year are added at the moment they are finalised in the Osiris system. Therefore it is possible that the list is not yet complete for the whole academic year.
Address
University of Twente
Zilverling (building no. 11), room 5110
Hallenweg 19
7522 NH Enschede
Netherlands
University of Twente
Zilverling 5110
P.O. Box 217
7500 AE Enschede
Netherlands
Organisations
Additional contact information
Status: 🟢
If I'm on leave, I update my status and time to return here
Download vCard