I started as a PhD candidate in the Design and Analysis of Communication Systems (DACS) group at the Faculty of Electrical Engineering, Mathematics and Computer Science (EEMCS) at the University of Twente in April 2022. My research is part of INTERSCT, the biggest cybersecurity project in the Netherlands.
Before my position in the Netherlands, I obtained an Electrical Engineering Bachelor’s Degree and a Computer and Communication Engineering Master's Degree from National Cheng Kung University (NCKU) in Taiwan, with an exchange program at RWTH Aachen University in Germany. In addition, I worked at Taiwan Semiconductor Manufacturing Company (TSMC) as a DevOps engineer.
We have seen IoT devices everywhere; however, is it safe to use them? To sort this out, I focus on finding IoT vulnerabilities, performing vulnerability disclosure, and notifying users in a scalable way. The goal is to develop scalable vulnerability disclosure notifications to enhance the security of IoT. For more details about my work, please check the Research tab.
My PhD project is "Scalable IoT vulnerability testing and notification."
Keywords: Internet of Things, Cybersecurity, Network Scanning, Vulnerability Disclosure
Nowadays, various IoT devices have flooded the market but revealed security concerns. My goal is to discover security vulnerabilities, perform disclosures to vendors, and notify device owners. How to inform owners and vendors will be a challenge. There may be multi-party involvement and limited access to reach the people responsible. Eventually, the project aims to investigate and implement scalable methods to improve IoT security.
My recent work is locating the best practices of active network scanning over the last decade. Network scanning is not only the way for attackers to find a system weakness but also a way for researchers and operators to defend the network infrastructure. I characterize the existing scanning operations by distinguishing the methodologies and policies used in different regions and scenarios. Eventually, I conclude with a guideline to suggest Pros and Cons, Dos and Don'ts when you start a network scanning.
UT Research Information System
Google Scholar Link
Additional Contact Information
Status: ✅ Available
If I'm on leave, I update my status and time to return here