If you made any changes in Pure these will be visible here soon.

Research Output 1995 2019

  • 2194 Citations
  • 22 h-Index
  • 116 Conference contribution
  • 93 Article
  • 3 Paper
  • 1 Editorial
Filter
Article
2019

Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts

Jeong, D. & Lee, S., 2019 Jun 1, In : Digital Investigation. 29, p. 21-27 7 p.

Research output: Contribution to journalArticle

Firmware
Copying
Computer operating systems
Artifacts
artifact
2018
Servers
Intrusion detection
Experiments
Botnet
2017
27 Citations (Scopus)

Alexa, Can i Trust You?

Chung, H., Iorga, M., Voas, J. & Lee, S., 2017, Computer, 50, 9, p. 100-104 5 p.

Research output: Contribution to specialist publicationArticle

Ecosystems
Testing
2 Citations (Scopus)

A method and tool to recover data deleted from a MongoDB

Yoon, J. & Lee, S., 2017 Jan 1, (Accepted/In press) In : Digital Investigation.

Research output: Contribution to journalArticle

Information Storage and Retrieval
Research
Recovery
Servers
Engines
29 Citations (Scopus)

Digital forensic approaches for Amazon Alexa ecosystem

Chung, H., Park, J. & Lee, S., 2017 Aug 1, In : Digital Investigation. 22, p. S15-S25

Research output: Contribution to journalArticle

assistant
Ecosystems
Ecosystem
Equipment and Supplies
artifact
1 Citation (Scopus)

Mobile forensic reference set (MFReS) and mobile forensic investigation for android devices

Kim, D., Lee, Y. & Lee, S., 2017 Dec 1, (Accepted/In press) In : Journal of Supercomputing. p. 1-15 15 p.

Research output: Contribution to journalArticle

Crime
Mobile devices
User Behavior
Mobile Devices
Repository
2 Citations (Scopus)

Study on the tracking revision history of MS Word files for forensic investigation

Jeong, D. & Lee, S., 2017 Jan 1, (Accepted/In press) In : Digital Investigation.

Research output: Contribution to journalArticle

Metadata
Thymidine Monophosphate
History
history
Research Personnel
2016
2 Citations (Scopus)

An enhanced security framework for reliable Android operating system

Park, J. H., Kim, D., Park, J. S. & Lee, S., 2016 Apr 1, In : Security and Communication Networks. 9, 6, p. 528-534 7 p.

Research output: Contribution to journalArticle

Computer operating systems
Websites
Computer systems
Malware
1 Citation (Scopus)

A study of user relationships in smartphone forensics

Choi, J. & Lee, S., 2016 Jun 25, (Accepted/In press) In : Multimedia Tools and Applications. p. 1-13 13 p.

Research output: Contribution to journalArticle

Smartphones
Experiments
3 Citations (Scopus)

A study on efficient detection of network-based IP spoofing DDoS and malware-infected Systems

Seo, J. W. & Lee, S., 2016 Dec 1, In : SpringerPlus. 5, 1, 1878.

Research output: Contribution to journalArticle

Servers
Malware

A study on the integrity and authentication of weather observation data using Identity Based Encryption

Seo, J. W. & Lee, S., 2016 Dec 1, In : SpringerPlus. 5, 1, 1225.

Research output: Contribution to journalArticle

Authentication
Cryptography
National security
Warships
Terrorism
11 Citations (Scopus)

Forensic investigation framework for the document store NoSQL DBMS: MongoDB as a case study

Yoon, J., Jeong, D., Kang, C. H. & Lee, S., 2016 Jun 1, In : Digital Investigation. 17, p. 53-65 13 p.

Research output: Contribution to journalArticle

Crime
Mobile Applications
Information Storage and Retrieval
Internet
offense
5 Citations (Scopus)

Recovery method of deleted records and tables from ESE database

Kim, J., Park, A. & Lee, S., 2016 Aug 7, In : Digital Investigation. 18, p. S118-S124

Research output: Contribution to journalArticle

Databases
Engines
Recovery
data storage
Web Browser
2015
5 Citations (Scopus)

Investigation methodology of a virtual desktop infrastructure for IoT

Jeong, D., Park, J., Lee, S. & Kang, C., 2015, In : Journal of Applied Mathematics. 2015, 689870.

Research output: Contribution to journalArticle

Internet of Things
Cloud computing
Infrastructure
Methodology
Servers

Message from FSP 2015 workshop chairs: FSP 2015 workshop

Lee, S. & Seo, J., 2015 Apr 3, In : Unknown Journal. p. xvi 7079549.

Research output: Contribution to journalArticle

2014
4 Citations (Scopus)

Advanced protocol to prevent man-in-the-middle attack in SCADA system

Oh, S., Chung, H., Lee, S. & Lee, K. H., 2014 Jan 1, In : International Journal of Security and its Applications. 8, 2, p. 1-8 8 p.

Research output: Contribution to journalArticle

SCADA systems
Gas pipelines
Power transmission
Water treatment
Disasters

An on-site digital investigation methodology for data leak case

Lee, S., Lee, K., Park, J. H. & Lee, S., 2014 Jan 1, In : Security and Communication Networks. 7, 12, p. 2616-2626 11 p.

Research output: Contribution to journalArticle

Digital forensics
5 Citations (Scopus)

Data fragment forensics for embedded DVR systems

Park, J. & Lee, S., 2014 Jan 1, In : Digital Investigation. 11, 3, p. 187-200 14 p.

Research output: Contribution to journalArticle

Multimedia
video
Embedded systems
Digital forensics
fragmentation
1 Citation (Scopus)

Practical electromagnetic disturbance analysis on commercial contactless smartcards

Ji, J., Han, D. G., Jung, S., Lee, S. & Moon, J., 2014 Jan 1, In : International Journal of Distributed Sensor Networks. 2014, 142610.

Research output: Contribution to journalArticle

Smart cards
Access control
Cryptography
Control systems
Costs
3 Citations (Scopus)

Structure and application of IconCache.db files for digital forensics

Lee, C. Y. & Lee, S., 2014 Jan 1, In : Digital Investigation. 11, 2, p. 102-110 9 p.

Research output: Contribution to journalArticle

Artifacts
artifact
cyhalothrin
Digital forensics
time
4 Citations (Scopus)

Test-driven forensic analysis of satellite automotive navigation systems

Lim, K. S., Lee, C., Park, J. H. & Lee, S., 2014 Jan 1, In : Journal of Intelligent Manufacturing. 25, 2, p. 329-338 10 p.

Research output: Contribution to journalArticle

Navigation systems
Satellites
Navigation
Crime
Global positioning system
2013
9 Citations (Scopus)

A new triage model conforming to the needs of selective search and seizure of electronic evidence

Hong, I., Yu, H., Lee, S. & Lee, K. H., 2013 Sep 1, In : Digital Investigation. 10, 2, p. 175-192 18 p.

Research output: Contribution to journalArticle

seizure
Triage
Law enforcement
Law Enforcement
law enforcement
28 Citations (Scopus)

A study of user data integrity during acquisition of Android devices

Son, N., Lee, Y., Kim, D., James, J. I., Lee, S. & Lee, K. H., 2013 Aug 1, In : Digital Investigation. 10, SUPPL.

Research output: Contribution to journalArticle

integrity
Equipment and Supplies
Data acquisition
data acquisition
Recovery
1 Citation (Scopus)

Damaged backup data recovery method for Windows mobile

Bang, J., Lee, C., Lee, S. & Lee, K. H., 2013 Apr 22, In : Journal of Supercomputing. 66, 2, p. 875-887 13 p.

Research output: Contribution to journalArticle

Recovery
Windows operating system
Grid computing
Cloud computing
Metadata
4 Citations (Scopus)

Methodology and implementation for tracking the file sharers using BitTorrent

Park, S., Chung, H., Lee, C., Lee, S. & Lee, K. H., 2013 Dec 10, (Accepted/In press) In : Multimedia Tools and Applications. p. 1-16 16 p.

Research output: Contribution to journalArticle

Servers

On-site investigation methodology for incident response in Windows environments

Lee, K., Lee, C. & Lee, S., 2013 May 1, In : Computers and Mathematics with Applications. 65, 9, p. 1413-1420 8 p.

Research output: Contribution to journalArticle

Personal computers
Servers
Display devices
Attack
Path
2012
34 Citations (Scopus)

A recovery method of deleted record for SQLite database

Jeon, S., Bang, J., Byun, K. & Lee, S., 2012 Aug 1, In : Personal and Ubiquitous Computing. 16, 6, p. 707-715 9 p.

Research output: Contribution to journalArticle

Recovery
Smartphones
Application programs
Information management
Availability
5 Citations (Scopus)

A research on the investigation method of digital forensics for a VMware Workstation's virtual machine

Lim, S., Yoo, B., Park, J., Byun, K. & Lee, S., 2012 Jan 1, In : Mathematical and Computer Modelling. 55, 1-2, p. 151-160 10 p.

Research output: Contribution to journalArticle

Digital Forensics
Computer workstations
Virtual Machine
Recovery
Virtualization
13 Citations (Scopus)

A study on multimedia file carving method

Yoo, B., Park, J., Lim, S., Bang, J. & Lee, S., 2012 Nov 1, In : Multimedia Tools and Applications. 61, 1, p. 243-261 19 p.

Research output: Contribution to journalArticle

Recovery
Data compression
Digital forensics
7 Citations (Scopus)

Detection of zombie PCs based on email spam analysis

Jeong, H. C., Kim, H. K., Lee, S. & Kim, E., 2012 May 25, In : KSII Transactions on Internet and Information Systems. 6, 5, p. 1445-1446 2 p.

Research output: Contribution to journalArticle

Electronic mail
Spamming
Pollution
Computer crime
Botnet
120 Citations (Scopus)

Digital forensic investigation of cloud storage services

Chung, H., Park, J., Lee, S. & Kang, C., 2012 Nov 1, In : Digital Investigation. 9, 2, p. 81-95 15 p.

Research output: Contribution to journalArticle

Smartphones
Cloud computing
Digital devices
Internet
popularity
11 Citations (Scopus)

Forensic analysis techniques for fragmented flash memory pages in smartphones

Park, J., Chung, H. & Lee, S., 2012 Nov 1, In : Digital Investigation. 9, 2, p. 109-118 10 p.

Research output: Contribution to journalArticle

Flash memory
Smartphones
data acquisition
systems analysis
data analysis
8 Citations (Scopus)

On-the-spot digital investigation by means of LDFS: Live Data Forensic System

Lim, K. S., Savoldi, A., Lee, C. & Lee, S., 2012 Jan 1, In : Mathematical and Computer Modelling. 55, 1-2, p. 223-240 18 p.

Research output: Contribution to journalArticle

Web browsers
Crime
File System
Metadata
Instant
1 Citation (Scopus)

The effective method of database server forensics on the enterprise environment

Son, N., Lee, K., Jeon, S., Lee, S. & Lee, C., 2012 Oct 1, In : Security and Communication Networks. 5, 10, p. 1086-1093 8 p.

Research output: Contribution to journalArticle

Servers
Industry
Imaging techniques
2011
39 Citations (Scopus)

Advanced evidence collection and analysis of web browser activity

Oh, J., Lee, S. & Lee, S., 2011 Aug 1, In : Digital Investigation. 8, SUPPL.

Research output: Contribution to journalArticle

Web Browser
Web browsers
Internet
source of information
evidence
7 Citations (Scopus)

Analysis of changes in file time attributes with file manipulation

Bang, J., Yoo, B. & Lee, S., 2011 Apr 1, In : Digital Investigation. 7, 3-4, p. 135-144 10 p.

Research output: Contribution to journalArticle

Windows operating system
Data transfer
manipulation
data exchange
new technology
5 Citations (Scopus)

Low-power design of hardware one-time password generators for card-type OTPs

Lee, S. J., Lee, J. S., Lee, M. K., Lee, S., Choi, D. H. & Kim, D. K., 2011 Aug 1, In : ETRI Journal. 33, 4, p. 611-620 10 p.

Research output: Contribution to journalArticle

Cryptography
Computer hardware
Hardware
Electric power utilization
Data storage equipment
2010
4 Citations (Scopus)

Acceleration of differential power analysis through the parallel use of GPU and CPU

Lee, S. J., Seo, S. C., Han, D. G., Hong, S. & Lee, S., 2010 Sep 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E93-A, 9, p. 1688-1692 5 p.

Research output: Contribution to journalArticle

Differential Power Analysis
Program processors
Trace
Software
Extremes

A new primitive for stream ciphers applicable to pervasive environments

Choi, J., Moon, D. & Lee, S., 2010 Nov 1, In : Intelligent Automation and Soft Computing. 16, 3, p. 461-470 10 p.

Research output: Contribution to journalArticle

Stream Ciphers
Adders
Ubiquitous computing
Algebraic Attack
Electric power utilization
8 Citations (Scopus)

A proposal for automating investigations in live forensics

Lee, S., Savoldi, A., Lim, K. S., Park, J. H. & Lee, S., 2010 Oct 1, In : Computer Standards and Interfaces. 32, 5-6, p. 246-255 10 p.

Research output: Contribution to journalArticle

Crime
XML
offense
examination
resources
6 Citations (Scopus)

DES with any reduced masked rounds is not secure against side-channel attacks

Kim, J., Lee, Y. & Lee, S., 2010 Jul 1, In : Computers and Mathematics with Applications. 60, 2, p. 347-354 8 p.

Research output: Contribution to journalArticle

Side Channel Attacks
Encryption
Cryptography
Advanced Encryption Standard
Collision
4 Citations (Scopus)

Fraud detection for information reliability from the internet in forensic accounting

Kim, Y., Lee, S. & Lim, J. I., 2010 Jun 14, In : Journal of Internet Technology. 11, 3, p. 323-332 10 p.

Research output: Contribution to journalArticle

Internet
Industry
Finance
Taxation
5 Citations (Scopus)

Novel methodologies to detect covert databases

Lee, K. G., Choi, J. H., Lim, S. K., Lee, S. & Lee, S., 2010 Mar 1, In : International Journal of Innovative Computing, Information and Control. 6, 3, p. 1313-1324 12 p.

Research output: Contribution to journalArticle

Methodology
Servers
Server
Enterprise Resource Planning
Enterprise resource planning
4 Citations (Scopus)

Secure USB bypassing tool

Bang, J., Yoo, B. & Lee, S., 2010 Aug 1, In : Digital Investigation. 7, SUPPL.

Research output: Contribution to journalArticle

Data storage equipment
Controllers
Flash memory
Privacy
Confidentiality
5 Citations (Scopus)

Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device

Lee, C., Lee, S., Park, J. H., Hussain, S. & Song, J. H., 2010 Aug 1, In : Telecommunication Systems. 44, 3-4, p. 267-279 13 p.

Research output: Contribution to journalArticle

Ubiquitous computing
Computer hardware
Computer systems
2009
4 Citations (Scopus)

An efficient signed digit montgomery multiplication for RSA

Lim, D., Chang, N. S., Ji, S. Y., Kim, C. H., Lee, S. & Park, Y. H., 2009 Jul 1, In : Journal of Systems Architecture. 55, 7-9, p. 355-362 8 p.

Research output: Contribution to journalArticle

Adders
Cryptography
4 Citations (Scopus)

CFES: Comprehensive framework for forensic analysis of embedded systems

Lim, K. S., Choi, Y., Kim, J., Lee, C. & Lee, S., 2009 Dec 1, In : Journal of Internet Technology. 10, 5, p. 549-562 14 p.

Research output: Contribution to journalArticle

Embedded systems
Crime
Digital devices
Navigation systems
Mobile phones
25 Citations (Scopus)

Data concealment and detection in Microsoft Office 2007 files

Park, B., Park, J. & Lee, S., 2009 Mar 1, In : Digital Investigation. 5, 3-4, p. 104-114 11 p.

Research output: Contribution to journalArticle

Computer Security
XML
Research Personnel
Security of data
examiner
10 Citations (Scopus)

Forensic investigation of Microsoft PowerPoint files

Park, J. & Lee, S., 2009 Sep 1, In : Digital Investigation. 6, 1-2, p. 16-24 9 p.

Research output: Contribution to journalArticle

electronics
examiner
Research
evidence
2 Citations (Scopus)

Improved side-channel attack on des with the first four rounds masked

Kim, J., Hong, S., Han, D. G. & Lee, S., 2009 Oct 1, In : ETRI Journal. 31, 5, p. 625-627 3 p.

Research output: Contribution to journalArticle

Side channel attack