EEMCS-CS-DACS

I'm 陳äŗ­ēæ° (Chen, Ting-Han) fromĀ å°ē£ Taiwan.
Feel free to call me by my first name, äŗ­ēæ° (Ting-Han)Ā šŸ”Š

I started as a PhD candidateĀ in theĀ Design and Analysis of Communication Systems (DACS)Ā group at theĀ Faculty of Electrical Engineering, Mathematics and Computer Science (EEMCS)Ā atĀ theĀ University of TwenteĀ in April 2022.Ā My research is part ofĀ INTERSCT, the biggest cybersecurity project in the Netherlands.

Before my position in the Netherlands, I obtained an Electrical Engineering Bachelorā€™s Degree and a Computer and Communication Engineering Master's Degree from National Cheng Kung University (NCKU) in Taiwan, with an exchange program at RWTH Aachen University in Germany. In addition, I worked at Taiwan Semiconductor Manufacturing Company (TSMC) as a DevOps engineer.

We have seen IoT devices everywhere; however, is it safe to use them? To sort this out, I focus on finding IoTĀ vulnerabilities, performing vulnerability disclosure, and notifying users in a scalable way. The goal is to develop scalable vulnerability disclosure notifications to enhance the security of IoT.Ā For more details about my work, please check the Research tab.

Expertise

  • Computer Science

    • Internet of Things
    • User
    • Relationships
    • Signal Strength
    • Vulnerability Disclosure
    • Correlation
    • Time Information
    • Wearable Device

Organisations

My PhD project is "Scalable IoT vulnerability testing and notification."

Keywords: Internet of Things, Cybersecurity, Network Scanning, Vulnerability Disclosure

Nowadays, various IoT devices have flooded the market but revealed security concerns. My goal is to discover security vulnerabilities, perform disclosures to vendors, and notify device owners. How to inform owners and vendors will be a challenge. There may be multi-party involvement and limited access to reach the people responsible. Eventually, the project aims to investigate and implement scalable methods to improve IoT security.

My recent work is locating the best practices of active network scanning over the last decade. Network scanning is not only the way for attackers to find a system weakness but also a way for researchers and operators to defend the network infrastructure. I characterize the existing scanning operations by distinguishing the methodologies and policies used in different regions and scenarios. Eventually, I conclude with a guideline to suggest Pros and Cons, Dos and Don'ts when you start a network scanning.

Publications

2024
2019
WiTrack: Human-to-Human Mobility Relationship Tracking in Indoor Environments Based on Spatio-Temporal Wireless Signal StrengthIn 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). Chen, T.-H., Sou, S.-I. & Lee, Y.https://doi.org/10.1109/dasc/picom/cbdcom/cyberscitech.2019.00146

Research profiles

Courses academic year 2023/2024

Courses in the current academic year are added at the moment they are finalised in the Osiris system. Therefore it is possible that the list is not yet complete for the whole academic year.

Address

University of Twente

Zilverling (building no. 11), room 5110
Hallenweg 19
7522 NH Enschede
Netherlands

Navigate to location

Organisations

Additional contact information

Status: 🟢
If I'm on leave, I update my status and time to return here

Scan the QR code or
Download vCard