論文著述

A.期刊論文

1.      Hsia-Hsiang Chen, Chien-Hua Lee and Shih-Kun Huang, “A Unified Ant Agent Framework for Solving DoS and QoS Problems,” Journal of Information Science and Engineering, 32(6): 1397-1434 . Nov. 2016.

2.      Hsia-Hsiang Chen, Shih-Kun Huang, “LDDoS Attack Detection by Using Ant Colony Optimization Algorithms,” Journal of Information Science and Engineering, 32(4):995-1020 · July 2016.

3.      Shih-Kun Huang, Han-Lin Lu, “Exploit Generation from Software Failures,” IEEE Reliability Digest, pp. 40-44, Nov. 2014.

4.      Shih-Kun Huang, Min-Hsiang Huang, Po-Yen Huang, Han-Lin Lu, and Chung-Wei Lai, “Software Crash Analysis for Automatic Exploit Generation on Binary Programs,” IEEE Transactions on Reliability, 63(1), Mar. 2014, 270-289.

5.      Lin, H.Y., Wu, T.S. and Huang, S.K., “An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce,” Journal of Information Science and Engineering, Vol. 28, No. 4, 2012, pp. 771-785.

6.      Lin, H.Y., Wu, T.S. and Huang, S.K., “Certificate-Based Secure Three-Party Signcryption Scheme with Low Costs ,” Journal of Information Science and Engineering, Vol. 28, No. 4, 2012, pp. 739-753..

7.      Lin, H.Y., Hsu, C.L. and Huang, S.K., “Improved Convertible Authenticated Encryption Scheme with Provable Security,” Information Processing Letters, Vol. 111, No. 13, 2011, pp. 661-666.

8.      Lin, H.Y., Wu, T.S., Huang, S.K. and Yeh, Y.S., “Efficient Proxy Signcryption Scheme with Provable CCA and CMA Security,” Computers and Mathematics with Applications, Vol. 60, No. 7, 2010, pp. 1850-1858.

9.      Chang-Hsien Tsai, Shih-Kun Huang, “Detection and Diagnosis of Control Interception.” Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings. Lecture Notes in Computer Science 4861 Springer 2008, pp. 412-426

10.  Yao-Wen Huang, Chung-Hung Tsai, Tsung-Po Lin, Shih-Kun Huang, Der-Tsai Lee, Sy-Yen Kuo. “A Testing Framework for Web Application Security Assessment.” Journal of Computer Networks, 48(5):739-761, Jun. 2005, Elsevier (SCI, NSC 92-2422-H-001-004)

11.  Deng-Jyi Chen, Chung-Chien Hwang, Shih-Kun Huang, and David T. K. Chen, “Mining Control Patterns from Java Program corpora, “ Journal of Information Science and Engineering, Vol. 20, No. 1, 2004, pp. 57-83. (pdf)

12.  Chung-Chien Hwang, Shih-Kun Huang, Min-Shong Lin, and Deng-Jyi Chen,” Dynamic Java Program Corpus Analysis- Part 1: The Analyzer,” Journal of Object-Oriented Programming, May 2001.

13.  Chung-Chien Hwang, Shih-Kun Huang, Min-Shong Lin, and Deng-Jyi Chen,” Dynamic Java Program Corpus Analysis- Part 2: The Control Pattern Analysis”, Journal of Object-Oriented Programming, July 2001.

14.  何建明、黃世昆、莊庭瑞、李德財, 典藏數位化資訊環境之探討, Journal of Library & Information Science,  Vol 26, No.2 , October/2000, pp. 38-48.

15.  D. J. Chen, C. S. Koong, S. K. Huang, and N. van Diepen, “Integration of Reusable components into a Visual Construction Approach,” Journal of Information Science and Engineering, vol. 16, no. 6, Nov., 2000, pp. 863-884.

16.  C. S. Lu, S. K. Huang, C. J. Sze, and H. Y. Liao, “Cocktail Watermarking for Digital Image Protection,” IEEE Transactions on Multimedia, December 2000, Vol 2., No. 4, pp. 209-224.

17.  D.J. Chen, S.K. Huang, W. C. Chen and Pao-Hsu Shih, ‘A New Method Dispatcher to Improve Execution Speed for Object-Oriented Programming Systems,’ Journal of Information Science and Engineering, No. 11, 1995, pp. 649-661.

18.  D.J. Chen, W.C. Chen, S. K. Huang and David T. K. Chen, ‘A Survey of the Influence of Programming Constructs and Mechanisms on Software Quality,’ Journal of Information Science and Engineering, No. 10, 1994, pp. 177-201.

19.  Deng-Jyi Chen and Shih-Kun Huang, ‘Interface of Reusable Software Components,’ Journal of Object-Oriented Programming, Vol. 5, No. 8, January 1993, pp. 1-12.

20.  Shih-Kun Huang and Deng-Jyi Chen, ‘Efficcient Algorithm for Method  Dispatch in Object-Oriented Programming Systems,’ Journal of  Object-Oriented Programming, Vol. 5, No. 5, September 1992, pp. 43-54.

21.  D.J. Chen, P.J. Lee, and Shih-Kun Huang, ‘Requirement Organization Approach for Object-based Construction of Software Systems,’ Information and Software Technology, Vol. 34, No. 7, July 1992, pp 485-493.

22.  Ching-Jung Chen, Lee-Chang Chuang, Shih-Kun Huang, May June Liu, and Shu- Yuen Hwang, ‘Implementation of an Object-Oriented Lisp Programming Environment,’ Journal of Computers, Vol 3, No. 1, pp. 11-19, 1991.

 

B.研討會論文

1.  Hsiao-Yu Shih, Han-Lin Lu, Chao-Chun Yeh, Hsu-Chun Hsiao and Shih-Kun Huang, “A Generic Web Application Testing and Attack Data Generation Method,”  2017 International Conference on Security with Intelligent Computing and Big-data Services (SICBS’17), Dec. 15-17, 2017, Hualien, Taiwan

2. 蘇翌帆、呂翰霖、葉肇鈞、黃世昆,”路徑限制式管理優化Web 程式安全測試效能”, 全國計算機會議,12月13-15日 ,花蓮

3. Chao-Chun Yeh, Sheng-An Chang, Yi-Chin Chu, Xuan-Yi Lin, Yichiao Sun, Jiazheng Zhou and Shih-Kun Huang, “T-Brain: A Collaboration Platform for Data Scientists,” 2017 International Conference on Security with Intelligent Computing and Big-data Services (SICBS’17), Dec. 15-17, 2017, Hualien, Taiwan

4. Chao-Chun Yeh, Han-Lin Lu, Jia-Jun Yeh, and Shih-Kun Huang, “Path Exploration Based on Monte Carlo Tree Search for Symbolic Execution,” The 22nd Annual Conference on Technologies and Applications of Artificial Intelligence (TAAI2017), Taipei, Taiwan, Dec. 1-3 2017.

5. Chao-Chun Yeh, Han-Lin Lu, Yi-Hsuan Lee, Wei-Sheng Chou, and Shih-Kun Huang. “CraxTriage: A Coverage Based Triage System,” IEEE Conference on Dependable and Secure Computing, Taipei, Taiwan, Aug. 2017

6. Chao-Chun Yeh, JiazHeng Zhou, Sheng-An Chang, Xuan-Yi Lin, yichiao Sun AND Shih-Kun Huang. “BigExplorer: A Configuration Recommendation System for Big Data Platform” The 21th Conference on Technologies and Applications of Artificial Intelligence, 2016

7.      Yeh, Chao Chun, Pang-Chieh Wang, Yu-Hsuan Pan, Ming-Chih Kao AND Shih-Kun Huang. “A Scalable Privacy Preserving System for Open Data” International Computer Symposium, 2016

8.      Han-Lin Lu, Shih-Kun Huang, Ruizhi Gao, and W. Eric Wong, “Spectrum-Base Fault Localization by Exploiting the Failure Path,” International Computer Symposium, 2016

9.      Ruizhi Gao, Linghuan Hu, W. Eric Wong, Han-Lin Lu, and Shih-Kun Huang , “Effective Test Generation for Combinatorial Decision Coverage,” in IEEE International Conference on Software Quality, Reliability & Security (QRS 2016), 2016 August. Vienna of Austria.

10.       Hsia-Hsiang Chen, Da-Qun Zheng and Shih-Kun Huang, “Automatic Defense by Fault Localization and Dynamic Patch,” in IEEE International Conference on Software Quality, Reliability & Security (QRS 2016), 2016 August. Vienna of Austria.

11.      Ying-Dar Lin, Feng Ze Liao, Shih-Kun Huang and Yuan-Cheng Lai, “Browser Fuzzing by Scheduled Mutation and Generation of Document Object Models,” in International Carnahan Conference on Security Technology (ICCST) 2015, Sep. 21 2015, Taipei, Taiwan

12.      Hsia-Hsiang Chen, Han-Lin Lu, Shih-Kun Huang, Ruizhi Gao and Weichen Eric Wong, “Diagnosing SDN Network Problems by Using Spectrum-based Fault Localization Techniques,” IEEE International Conference on Software Quality, Reliability & Security, Aug. 2015, Vancouver Canada

13.      Chao-Chun Yeh, Hsiang Chung, and Shih-Kun Huang, “CRAXfuzz: Target-Aware Symbolic Fuzz Testing,” Proceedings of the 39th Annual International Computer Software & Applications Conference (CompSAC’2015), July 1-5, 2015, Taichung, Taiwan.

14.      Hung-Wen Chen, and Shih-Kun Huang, “A Systematic Exploit Strengthening Method Combining with Penetration Testing Framework,”, Cryptology and Information Security Conference 2015 (CISC2015), Kaohsiung, Taiwan, 28-29 May, 2015.

15. Hsia-Hsiang Chen, Shih-Kun Huang. A Multi-Agent Intelligence Hybrid System Technique for Detection and Defense of DDoS Attacks. International Computer Symposium (ICS2014), Taichung, Taiwan, Dec, 2014.

16. Wei-Jun Chen, Hsiao-Rong Tyan, and Shih-Kun Huan, “On the Effectiveness of Scheduling Fuzz Testing,” International Computer Symposium (ICS2014), Taichung, Taiwan, Dec. 2014.

17. Chao Chun Yeh, Han Lin Lu, Chun Yen Chen, Kee Kiat Khor, Shih Kun Huang, “CRAXDroid: Automatic Android System Testing by Selective Symbolic Execution. 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion (SERE-C), San Francisco, California, USA, Jun, 2014.

18. Chao-Chun Yeh, Shih-Kun Huang, Sung-Yen Chang. A black-box based android GUI testing system. Proceeding of the 11th annual international conference on Mobile systems, applications, and services, Taipei, Taiwan, Jun. 2013.

19. Shih-Kun Huang, Han-Lin Lu, Wai-Meng Leong, and Huan Liu, “CRAXweb: Automatic Web Application Testing and Attack Genertion,” IEEE 2013 International Conference on Software Security and Reliability (SERE 2013),Gaithersburg, MD, USA., Gaithersburg, MD, USA..

20. 楊詠仁,陳奕任,黃世昆(2012年10月)。運用虛擬化技術快速佈署大規模程

式檢定應用探討 以交通大學CPE建置開發為例。TANET2012,桃園龜山

21.  黃世昆、黃銘祥、黃博彥、呂翰霖,自動脅迫產生器發展現況與威脅分析、Communications of the CCISA、2012/7

22.  Huang, Shih-Kun; Huang, Min-Hsiang; Huang, Po-Yen; Lai, Chung-Wei; Lu, Han-Lin; Leong, Wai-Meng; , “CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations,” IEEE Sixth International Conference on Software Security and Reliability (SERE), Gaithersburg, MD, USA, pp.78-87, 20-22 June 2012

23.  Wen-Chien Weng and Shih-Kun Huang, “Scalable Security Property Checking by Loop Dependence and Constraint,” 第一屆兩岸軟體技術學術研討會, Mar. 2010.

24.  Kuen-Han Huang and Shin-Kun Huang, “Detecting Buffer Overflow Vulnerabilities by Search-based Testing,” Cryptology and Information Security Conference 2010, May 2010.

25.  蔡昌憲、許立文、吳孟勳、黃世昆, “作業系統核心安全驗證技術探討,” Communications of the CCISA, Apr. 2008, Vol. 14, No. 2 pp. 89-98

26.  Chang-Hsien Tsai, Shih-Kun Huang, “Testing Heap Overflow Bugs Caused by Integer Overflows,”  Proc. of the International Computer Symposium (ICS),  Dec. 2006

27.  Shih-Kun Huang, and Kang-Min Liu, “Mining Version Histories for Verifying Learning Process of Legitimate Peripheral Participants,” International Workshop on Mining Software Repositories, Saint Louis, Missouri, USA, May 17, 2005. (Lightening talk award, cited count: 11)

28.  陳鴻吉、田筱榮、黃世昆, “運用易質資訊提升入侵警報正確率,” Proceedings of the Taiwan Academic Network Conference 2004 (TANet 2004), Oct. 27-29, 2004, Taitung, Taiwan, page 1209-1203.

29.  林宗伯、洪偉能、黃世昆, “OpenDReaMS: 數位內容交換與管理系統,” 第三屆數位典藏技術研討會,Taipei, July 2004.

30.  Chang-Hsien Tsai, Shih-Hung Liu, Shuen-Wen Huang, Shih-Kun Huang, and Deron Liang, “BEAGLE: Tracking System Failures for Reproducing Security Faults,” Proceedings of Workshop on Advanced Developments in Software and Systems Security, December 2003

31.  林宗伯、洪偉能、黃世昆, “以安全執行環境限制之內容保護機制,” 第二屆數位典藏技術研討會,Taipei, July 2003.

32.  Yao-Wen Huang, Shih-Kun Huang, Tsung-Po Lin, and Chung-Hung Tsai. “Web Application Security Assessment by Fault Injection and Behavior Monitoring, ” In Proceedings of the Twelfth International Conference on World Wide Web (WWW2003), May 21-25 2003, Budapest, Hungary, pp. 148-159. Best Paper Finalists. (pdf)

33.  蔡和諺、黃世昆, “網頁安全威脅分析與程式靜態檢查技術,” Communications of the CCISA, Sep. 2002, Vol. 8, No. 4.

34.  黃世昆、林宗伯、鍾永良, “數位內容保護與追蹤機制,” 第一屆數位典藏技術研討會,Taipei, July 2002.

35.  李駿偉、田筱榮、黃世昆, “入侵偵測分析方法評估與比較,” Communications of the CCISA, Mar. 2002, Vol. 8, No. 2, pp. 21-37.

36.  黃世昆、林宗伯,”數位內涵保護平台,” 資訊系統可信賴作業體制研討會,新竹交通大學,90年12月5日。

37.  Deng-Jyi Chen, Chung-Chien Hwang, Shih-Kun Huang, David T.K. Chen, “Object-Oriented Program Behavior Analysis Based on Control Patterns,” the Asia-Pacific Conference on Quality Software, APAQS 2001, Hong Kong, Dec. 10-11, 2001, pp. 81-87.

38.  Yaw-Wen Huang, and Shih-Kun Huang, “A Survey and Assessment of Network Mapping Methods and Techniques,” Information Security Newsletter, Mar. 2001, Vol. 7, No. 2, pp. 52-75.

39.  Shih-Kun Huang, ”防止攻擊跳板主機的安全管理策略”, 2000 年第二屆網際空間:資訊、法律與社會, Dec 2000, pp. 121-127.

40.  Chwen-Jye Sze, Hong-Yuan Mark Liao, Shih-Kun Huang, Chun-Shien Lu, “Dyadic Wavelet-Based Nonlinear Conduction Equation: Theory and Applications,” Proceedings of the 2000 International Conference on Image Processing (ICIP 2000), Vancouver, BC, Canada, September 10-13, 2000.

41.  Jan-Ming Ho, Shih-Kun Huang and D.T. Lee, “Content Management of Academia Sinica Digital Library, “ In Proc. 3rd International Conference on Sinology, Academia Sinica, June 29-July 1, 2000, Taiwan.

42.  Shih-Kun Huang, “電腦網路危機處理機制─從防震級Y2K 應變談網路安全存活管理政策”, Information Security Newsletter, Mar. 2000, Vol. 6, No.2, pp. 106-118.

43.  Shih-Kun Huang, Nian-Shing Chen, Chia-Mei Chen, and Biing-Jong Lin, “Survival Acceptability Evaluation and Incident Case Report in Taiwan,” 12th Annual Computer Security Incident Handling Conference (FIRST 2000), Chicago, Illinois, June 25-30, 2000.

44.  Tyng-Ruey Chuang, Jan-Ming Ho, Shih-Kun Huang, Ching-Yi Liu, and Da-Wei Wang, “To trade or not to trade?: Thoughts on the failed smart card based national ID initiative in Taiwan,” First Australian Institute of Computer Ethics Conference. Melbourne, Victoria, Australian, July 1999.

45.  C. S. Lu, H. Y. Mark Liao, S. K. Huang, and C. J. Sze, “Cocktail Watermarking on Images,” in Proc. 3rd International workshop on Information Hiding, Dresden, Germany, Nov. 1999, Lecture Notes in Computer Science.

46.  C. S. Lu, H. Y. Mark Liao, S. K. Huang, and C. J. Sze, “Highly Robust Image Watermarking Using Complementary Modulations, ” in Proc. 2nd Information Security Workshop, Malaysia, March 2000. Lecture Notes in Computer Science.

47.  Shih-Kun Huang, “軟體系統安全弱點初探”, Information Security Newsletter, Dec. 1998, Vol. 5, No.1, pp. 41-50.

48.  Chung-Chien Hwang, Shih-Kun Huang, Min-Shong Lin, Chorng-Shiuh Koong and Deng-Jyi Chen, “Dynamic Java Program Corpus Analysis, “Proc. of the International Computer Symposium (ICS), Dec. 17-19,1998, Tainan, Taiwan, pp.154-161.

49.  Chorng-Shiuh Koong, Wu-Chi Chen, Chung-Chien Hwang, Deng-Jyi Chen and Shih-Kun Huang, “Visual Requirement Representation, “Proc. of the International Computer Symposium (ICS), Dec. 17-19,1998, Tainan, Taiwan, pp. 201-208.

50.  Chin-Chuang Han, Shih-Kun Huang, Hsiao-Rong Tyan, and Hong-Yuan Mark Liao, “Improving the Visual Quality of JPEG-encoded Images, “ ISMIP’97 Proceeding, Dec 11-13, 1997, Academia Sinica, Taipei, Taiwan, pp. 145-150.

51.  S. K. Huang, M. F. Chen, J. J. Yang, C. S. Chen, and T. C. Liu, ‘Design and Application of Gateways between Internet BBS and NetNews,’ TANet’95 Conference, Oct 23-24, 1995, pp. F46-F51.

52.  Shih-Kun Huang and Deng-Jyi Chen, ‘Two-way Coloring Approaches for Method Dispatching in Object-Oriented Programming Systems,’ Proceedings of the Sixteenth Annual International Computer Software & Applications Conference (CompSAC’92), September 21-25, 1992, Chicago, Illinois, pp. 39-44.

53.  Deng-Jyi Chen and Shih-Kun Huang, ‘Interface for Reusable Software Components, ‘ Information Processing 92 – Proceedings of the 12th World Computer Congress Madrid, Spain, 7-11 September 1992/Volume I, pp. 3-9.

54.  D. J. Chen, P.F. Chen, S.K. Huang, and W.C. Chang, ‘A Software-IC Construction Approach To Achieve Software Reuse, ‘ Conference Proceedings of the SCOOP 1991, Oct. 28-31, 1991, London, UK, pp. 63-92

55.  D. J. Chen and S.K. Huang, ‘A Requirement Organization Approach for Object- Based Construction of Software Systems, ‘ Proc. of the International Computer Symposium (ICS), Dec. 17-19, 1990, pp. 779-784.

C. Book Chapters

1. Chun-Shien Lu, Shih-Kun Huang, Chwen-Jye Sze, and Hong-Yuan Mark Liao, “A New Watermarking Technique for Multimedia Protection,” in L. Guan, S. Y. Kung, and J. Larsen (Eds.), Multimedia Image and Video Processing, Chap. 18, pp. 507-530, CRC Press, 2001.

2. 李駿偉、田筱榮、黃世昆,” 入侵偵測分析方法評估與比較,”國科會資通安全專輯之四:系統安全,第四章,2002

3. 蔡和諺、黃世昆,”軟體安全性分析,” 國科會資通安全專輯之十三:資訊與通訊系統之程式安全,第二章,pp. 9-20, 2004.

4. 蔡昌憲、黃世昆,”輸入參數確證,” 國科會資通安全專輯之十三:資訊與通訊系統之程式安全,第三章,pp. 21-32, 2004.

5. 劉世弘、蔡忠宏、黃世昆,”軟體安全性測試與稽核,” 國科會資通安全專輯之十三:資訊與通訊系統之程式安全,第七章,pp. 72-87, 2004.

6. Chang-Hsien Tsai, Shih-Hung Liu, Shuen-Wen Huang, Shih-Kun Huang, and Deron Liang, “BEAGLE: Tracking System Failures for Reproducing Security Faults, “ book chapter in Computer Security in the 21st Century, Lee, D.T.; Shieh, S.P.; Tygar, J.D. (Eds.) , 2005, ISBN: 0-387-24005-5

 

(Visited 444 times, 1 visits today)