Jaehyeok Han

Ph.D candidate

About Me

I received B.S. in Natural Science College of Mathematics from University of Seoul (UOS) and M.E. degrees in School of Cybersecurity from Korea University in 2011 and 2016, respectively. Since March 2016, I have studied as a Ph.D. student in with the School of Cybersecurity at Korea University, and have worked as a researcher of Digital Forensic Research Center (DFRC) at Institute of Cyber Security & Privacy (ICSP).

My research interests include Digital forensics, Cyber security, and Cryptoanalysis.

Education

Korea University, Seoul, South Korea

Ph.D student, School of Cybersecurity (March 2016 - Present)

Korea University, Seoul, South Korea, 2016

M.E. in Information security

Master's Thesis: Analysis of the HIKVISION DVR filesystem

Supervised by Sangjin Lee

University of Seoul, Seoul, South Korea, 2011

B.S in Mathematics

Supervised by Jaechul Sung

Professional Experience

2022

Development of New Technology for Data Privacy Enhancement on Edge Cloud Environment and Cultivating Next Generation Creative Talent
July 2022 -- December 2027. Supported by Ministry of Science and ICT (MSIT) for Information Technology Research Center (ITRC)
Keywords: Privacy Enhanced Sensing Signal Generation, Quantum-Safe&Light weight Symmetric Encryption, Full-Scale SCA-resistant PQC, Privacy Preserving Encrypted Data Processing and Federated Learning

Comprehensive Policy for Developing Scientific Criminal Investigation and Forensic Science (The 5th Industrial Revolution)- Review of relevant laws and policies on the criminal Jjstice reform in the era of post-COVID19 [report]
May 2022 -- December 2022. Supported by Korean Institute of Criminology and Justice (JICJ)
Criminal justice reform by AI-applied digital forensic technology

2021

The development of information management system and security tools to avoid the invasion threat of CDM information security based on laws for utilization of distributed research network
January 2021 -- December 2021. Supported by Ministry of Health & Welfare (MW)
Keywords: Common data model (CDM), Distributed research network, Information security manager

2019

Development of Digital Forensic Technique for Navigational Equipment to Ensure the Integrity and the admissibility of Digital Evidence
August 2019 -- June 2023. Supported by Korea Institute of Marine Science & Technology Promotion (KIMST) for Korea Coast Guard
Keywords: Maritime equipment, Embedded device forensics, NAND dump analysis, Reverse engineering, Coordinates

2018

CARPE Forensics: Development of Digital Forensic Integration Platform [link][src]
May 2018 -- December 2020. Supported by IITP, Ministry of Science and ICT
CARPE (Comprehensive Analysis and Research Platform for digital Evidence) is digital forensic integration framework. For the digital forensicist, this technology enables efficient work in the analysis process through automated modules, and for the software developer, it can be used to implement not only digital forensic research but also own tool by utilizing open source

A Research on ReFS (Resilient File System) file system analysis and recovery technology
April 2018 -- October 2018. Supported by Affiliated Institute of ETRI (NSR)

2017

Cyber command and control framework research
August 2017 -- December 2018. Supported by Agency for Defense Development
Identification of the fundermental technologies for the future of the cyber forensic system in the realm of defence

Development of the neural network-based password analysis system
March 2017 -- November 2017. Supported by Affiliated Institute of ETRI (NSR)

2016

Bigdata platform research for cyber risk prediction based on global malware data analysis
April 2016 -- December 2016. Supported by IITP, Ministry of Science, ICT and Future Planning
Collection and Acquisition of the information on predicting the cyber risk of national's Internet networks, and Securing the basis for standardization of malcious codes detection

Vulnerability analysis on the Smart Grid embedded device and PoC code development to exploit vulnerabilites
October 2016 -- October 2017. Supported by Korea Electric Power Corporation (KEPCO) Research Institute
Analyis of the firmware binary code with reverse engineering for a detailed understanding of mechanism on the DCU (Data Collection Unit)s and smart meters

2015

A Research on EnScript programming techniques and development of educational materials
May 2015 -- February 2015. Supported by SPO, Ministry of Justice
Program development using scripting language EnScript on EnCase for the domestic investigation environment

2014

Digital forensics wikipedia [link]
June 2014 -- November 2014. Supported by SPO, Ministry of Justice
An archive of knowledge in the digital forensics focused on the tools and techniques for investigators

Teaching Experience

Academic

Korea University Sejong Campus
AICS327: Fundamentals and Practice in Digital Forensics. (Fall 2022)

Sungkyunkwan University
FSI5058: Mobile Forensics. (Spring 2022)

Korean National Police University (KNPU)
202121400801: Introduction to Digital Forensics. (Fall 2021)

Ewha University
38497: Digital forensics. (Fall 2020; Spring 2021; Spring 2022)

Dongguk University
PAS4022: Mobile forensics. (Spring 2020; Spring 2021)

Korea University
ITCS403: Mobile forensics. (Fall 2017; Fall 2018; Fall 2019; Fall 2020; Fall 2021)
IMS4001: Practical affairs in digital forensic. (Winter 2018; Winter 2019; Winter 2020; Winter 2021)

Tutorials/
Invited Talks

2021-05-21 File fingerprint for provenance tracking, SECREV2021

2021-03-04 Mobile Device Security and forensic analaysis, Korea Intellectual Property Protection Agency (KOIPA)

2020-11-03 Windows Forensic Analysis: Advanced , Naval Education & Training Command

2019-10-30 Windows Forensic Analysis: Basic, Naval Education & Training Command

2019-09-20 Linux and EXT4 Forensic Analysis, A unit under the Ministry of National Defense

2018-11-16 Smartphone Forensic Analysis In-Depth, A unit under the Korean National Police Agency

2018-10-31 Digital Forensics:Case-study & Usage of Tools, Korea Internet & Security Agency (KISA)

2018-10-11 Digital Forensic Techniques Management Platform, Institute of Information Security (KIISC)

2017-11-08 Android Malware Detection Techniques, F1 Security

2017-05-19 Smartphone backup data as a digital evidence: A practical approach, Kookmin Univ.

2016-10-21 Computer Forensics using EnCase, Korea International Cooperation Agency (KOICA)

Publication

Journal articles

6. Data reconstruction and recovery of deduplicated files having non-resident attributes in NTFS volume [DOI]
An, S., Lee, S., & Han, J. (2023). Forensic Science International: Digital Investigation.

5. A Study on the Processing of Timestamps in the Creation of Multimedia Files on Mobile Devices [DOI]
Han, J., & Lee, S. (2022). Journal of Information Processing Systems.

4. File fingerprinting of the ZIP format for identifying and tracking provenance [DOI]
Um, M., Han, J., & Lee, S. (2021). Forensic Science International: Digital Investigation.

3. 5W1H-based Expression for the Effective Sharing of Information in Digital Forensic Investigations [arXiv]
Han, J., Kim, J., & Lee, S. (2020). arXiv preprint arXiv:2010.15711.

2. Forensic analysis of the Windows telemetry for diagnostics [arXiv]
Han, J., Park, J., Chung, H., & Lee, S. (2020). arXiv preprint arXiv:2002.12506.

1. Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness [DOI]
Park, M., Han, J., Oh, H., & Lee, K. (2019). Wireless Communications and Mobile Computing.

Conforence papers

12. I can login without your password: Data acquisition from web based server using user credential attack
Han, J., Chung, H., & Lee, S. (January 2021). DFRWS APAC 2021 (short paper).

11. Information Sharing for Effective Digital ForensicInvestigations
Han, J., Kim, J., & Lee, S. (January 2020). Sixteenth Annual IFIP WG 11.9 International Conference on Digital Forensics.

10. A Study on the Processing of Timestamps in Creating Multimedia Files on Mobile devices
Han, J., & Lee, S. (December 2020). The 12th International Conference Computer Science and its Applications (CSA2020).

9. Replay attack to DRM in music streaming service on Android
Lim, S., Han, J., & Lee, S. (December 2020). The 12th International Conference on Internet (ICONI) 2020.

8. Situational Awareness Framework for Threat Intelligence Measurement of Android Malware
Park, M., Seo, J., Han, J., Oh, H., & Lee, K. (2018). . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 9(3), 25-38.

7. Situational Awareness for Hybrid Warfare: Risk Measurement Between Cyber Warfare and Nuclear Warfare
Park, M., Seo, J., Han, J., Oh, H., & Lee, K. (2018). 17th European Conference on Cyber Warfare and Security (ECCWS) 2018.

6. Situational Awareness for Cyber Threat Intelligence Using LSTM Based RNN
Park, M., Han, J., Park, M., & Lee, K. (2018). International Conference on Platform Technology and Service (PlatCon-18).

5. What is Next September. 11? Risk Measurement of Hybrid Warfare about Boeing 787 Dreamliner using FAIR Model
Park, M., Han, J., Park, M., & Lee, K. (2017). The 9th International Conference on Internet (ICONI) 2017.

4. Analysis model for Digital Forensic Intelligence in case of the Confidential Leaks
Han, J., Park, M., Park, M ., Lee, K. & Lee, S. (2017). The 9th International Conference on Internet(ICONI) 2017.

3. FAIR-Based Cyber Influence Damage Assessment for Exploit in Mobile Device
Park, M., Han, J., Seo, J., Oh, H., & Lee, K. (October 2017). In International Symposium on Mobile Internet Security (pp. 51-64). Springer, Singapore.

2. A practical approach to analyze smartphone backup data as a digital evidence [pdf]
Han, J., & Lee, S. (August 2016). DFRWS USA 2016 (presentation).

1. Analysis of the HIKVISION DVR file system [DOI]
Han, J., Jeong, D., & Lee, S. (October 2015). In International Conference on Digital Forensics and Cyber Crime (pp. 189-199). Springer, Cham.

Book

EnScript Programming for Digital Forensic Analysis: Learn Basics and Usages with 8 Hands-On Examples [shop][src]
디지털 포렌식 분석을 위한 EnScript 프로그래밍: 8가지 실전 예제로 배우는 EnScript 기초 및 활용
Author: Minsik Kim, Sangjin Lee, & Jaehyeok Han.
Published by BJ Republic on 20 July 2017. (ISBN: 9791186697382; 1186697385)
Review: TBC

Standards

4. Guidelines on Mobile Device Forensics (모바일 기기 포렌식 지침) [link]
Standard Number: TTAK.KO-12.0059/R1., Issued date: 10 December 2020.

3. Data Expression Standard for Digital Forensic Investigation (디지털 포렌식 조사를 위한 통합 정보 처리 규격)
- Part 1. Overview and Requirements (개요 및 요구사항) [link]
- Part 2. Data Types and Definition (데이터 종류별 규격 정의) [link];
- Part 3. Examples Reference Model for Data Processing Interoperability (데이터 처리 상호 호환을 위한 참조 모델) [link]
Standard Number: TTAK.KO-12.0353-Part1--Part3. (Series), Issued date: 11 December 2019.

2. Guidelines of Packet Processing for Network Forensics (네트워크 포렌식을 위한 패킷 처리 지침) [link]
Standard Number: TTAK.KO-12.0339., Issued date: 19 December 2018.

1. Guidelines for Collection, Acquisition, and Preservation of Digital Evidence (디지털 증거 수집 보존 가이드라인) [link]
Standard Number: TTAK.KO-12.0058/R1., Issued date: 13 December 2017.

Domestics
(in Korea)

Journal articles
& Conference papers

24. A Study on Characteristics of PDF File Creator Program for Digital Forensic Investigation [ePrint]
PDF 파일 내 생성프로그램 특징 및 출처 조사 기법 연구
Kang, S., Han, J., Hur, G., Park, J., & Lee, S. (December 2022). Journal of Digital Forensics, 16(4), 15-27.

23. Real IP address tracking techniques for illegal sites using Cyber Threat Intelligence search services [ePrint]
사이버 위협정보 검색 서비스를 활용한 불법사이트 실 IP 주소 추적 기법
Hwang, Y., Han, J., & Lee, S. (June 2022). Journal of Digital Forensics, 16(2), 116-125.

22. A Study on How to Reach a Consensus on Triage of Smartphone Data for Corporate Internal Investigations [ePrint]
기업 내부조사 시 스마트폰 데이터의 선별 합의 방안 연구
Yang, H., Han, J., & Lee, S. (December 2021). Journal of Digital Forensics, 15(4), 156-172.

21. Forensic Analysis of HEIF Files on Android and Apple Devices [ePrint]
스마트폰에서 촬영된 HEIF 파일 특징 분석에 관한 연구
Kwon, Y., Bang, S., Han, J., & Lee, S. (May 2021). The KIPS Spring Conference 2021
* This study was received the participation award.

20. A study on forensic analysis for Windows search utility Everything [ePrint]
검색 유틸리티 Everything에 대한 포렌식 분석 및 활용 기법 연구
Kim, D., Han, J., & Lee, S. (March 2020). Journal of Digital Forensics, 14(3), 279-289.
* This study was presented at WDFS-s 2020, KDFS., and received the best paper award.

19. Improvements of Searching and Seizing Steganographic Evidence [ePrint]
심층암호 증거물 압수수색의 법적 한계와 개선방안
Yoon, S., Han, J., Kwon, H., & Lee, S. (February 2020). Korean Lawyers Association Journal, 69(6), 184-225.

18. Secure File Transfer Method and Forensic Readiness by converting file format in Network Segmentation Environment [ePrint]
망분리 환경에서 파일형식 변환을 통한 안전한 파일 전송 및 포렌식 준비도 구축 연구
Han, J., Yoon, Y., Hur, G., Lee, J., Choi, J., Hong, S., & Lee, S. (August 2019). Journal of the Korea Institute of Information Security & Cryptology, 29(4), 859-866.

17. Structural features of ZIP files by method for creating the file in Windows
윈도우에서 ZIP 파일 생성 프로그램 추정 기법
Um, M., Han, J., & Lee, S. (July 2020). Conference on Information Security and Cryptography-Summer 2020 (CISC-S’20).

16. A Study on Digital Evidence Authentication and Tool Testing System
디지털증거 인증 및 디지털포렌식 도구 검증제도에 관한 연구
Han, J., & Kwon, Y. (2019). The Autumn Convention of Korean Society of Forensic Science, KSFS.

15. 5W1H based Information Expression Standard for efficient digital forensic investigation [ePrint]
효율적인 디지털 포렌식 조사를 위한 육하원칙 중심의 정보 처리 규격
Yun, W., Han, J., & Lee, S. (2019). Journal of Digital Forensics, 13(2), 127-136.
* This study was presented at WDFS-s 2019., KDFS.

14. A Study on Profiling Technique by Feature Extraction of Windows Executables
윈도우 실행파일의 특징 추출을 통한 프로파일링 기법 연구
Lee, S., Han, J., & Lee, S. (2019). Conference on Information Security and Cryptography-Summer 2019 (CISC-S’19).
* This study was received the best paper award.

13. Study on History Tracking Technique of the Document File through RSID Analysis in MS Word [ePrint]
MS 워드의 RSID 분석을 통한 문서파일 이력 추적 기법 연구
Joun, J., Han, J., Jung, D., & Lee, S. (2018). Journal of the Korea Institute of Information Security & Cryptology, 28(6), 1439-1448.

12. A Study on Detecting Data Hiding Area of Removable Storage Device Based on Flash Memory [ePrint]
플래시 메모리 기반 이동식 저장장치의 데이터 은닉 영역 탐지 방안에 대한 연구
Kim, S., Han, J., & Lee, S. (2018). Journal of Digital Forensics, 12(2), 21-29.
* This study was presented at WDFS-s 2018., KDFS.

11. A Study on the Possibility of Recovering Deleted Data through Analysis of SQLite Journal in Messenger Application [ePrint]
메신저 애플리케이션의 SQLite 저널 분석을 통한 삭제된 메시지 복구 가능성에 대한 연구
Jung, B., Han, J., Choi, H., & Lee, S. (2018). Journal of Digital Forensics, 12(2), 11-20.
* This study was presented at WDFS-s 2018., KDFS., and received the best paper award.

10. The Method of Recovery for Deleted Record of Realm Database [ePrint]
Realm 데이터베이스의 삭제된 레코드 복구 기법
Kim, J., Han, J., Choi, J. H., & Lee, S. (2018). Journal of the Korea Institute of Information Security & Cryptology, 28(3), 625-633.

9. A Study of Method to Restore Deduplicated Files in Windows Server 2012 [ePrint]
윈도우 서버 2012에서 데이터 중복 제거 기능이 적용된 파일의 복원 방법에 관한 연구
Son, G., Han, J., & Lee, S. (2017). Journal of the Korea Institute of Information Security & Cryptology, 27(6), 1373-1383.

8. A method of recovery for damaged ZIP files [ePrint]
손상된 ZIP 파일 복구 기법
Jung, B., Han, J., & Lee, S. (2017). Journal of the Korea Institute of Information Security & Cryptology, 27(5), 1107-1115.

7. Fake GPS Detection for the Online Game Service on Server-Side [ePrint]
모의 위치 서비스를 이용한 온라인 게임 악용 탐지 방안
Han, J., & Lee, S. (2017). Journal of the Korea Institute of Information Security & Cryptology, 27(5), 1069-1076.

6. Analysis of windows telemetry log file and comparison with the windows registry’s information
윈도우 텔레메트리 로그파일 분석 및 레지스트리 정보와 비교
Lee, S., Han, J., & Lee, S. (2017). Workshop of Digital forensics-Summer (WDFS-s) 2017.

5. Advanced Web Browser Forensic Analysis using the Login Data files
로그인 정보 분석을 통한 웹 브라우저 포렌식 개선 방안
Kim, J., Han, J., & Lee, S. (2017). Conference on Information Security and Cryptography-Summer 2017 (CISC-S’17).

4. A study on API wrapping in Themida and unpacking technique [ePrint]
Themida의 API 난독화 분석과 복구방안 연구
Lee, J, Han, J., Lee, M, Choi, J, Baek, H., & Lee, S. (2017). Journal of the Korea Institute of Information Security & Cryptology, 27(1), 67-77.

3. A Recovery Technique of PDF File in the Unit of Page [ePrint]
PDF 파일의 페이지단위 복구 기법
Jang, J., Bang, S. G., Han, J., & Lee, S. J. (2017). KIPS Transactions on Computer and Communication Systems, 6(1), 25-30.

2. An improvement method for recovering lost data in ZIP
ZIP 파일 복구 도구의 성능한계와 개선방안
Jung, B., Han, J., & Lee, S. (2016). Workshop of Digital forensics-Winter (WDFS-w) 2016.

1. An effective detection method for hiding data in compound-document files [ePrint]
복합문서 파일에 은닉된 데이터 탐지 기법에 대한 연구
Kim, E., Jeon, S., Han, J., Lee, M., & Lee, S. (2015). Journal of the Korea Institute of Information Security & Cryptology, 25(6), 1485-1494.

Supports for the common good

- 페이스북, 통화·문자 다 엿봤다…방통위 조사 착수 (27 March 2018). [link]

- 쟁점 태블릿PC의 검찰 포렌식 분석결과에 대한 해설서 (2 November 2017).

- 해킹, 보이지 않는 위협 (25 May 2016). [link]

- 전화번호·가족까지… 30분만에 인터넷서 발가벗겨졌다 (5 May 2016). [link]