許家維 博士 (Dr. Chia-Wei Hsu, Vic Hsu)

Office:
TWISC@NCTU, DSNS Lab
國立交通大學網路安全實驗室
(at EC 622)

Ext:
03-5712121#54808

Contact at:
ⓗⓢⓤⓒⓦ@ⓒⓢ.ⓝⓒⓣⓤ.ⓔⓓⓤ.ⓣⓦ

許家維 (Chia-wei Hsu) received the M.S. and Ph.D. degrees from National Chiao Tung University (NCTU), Hsinchu, Taiwan, in 2009 and 2017, respectively. He is currently a researcher in TWISC@NCTU. His research focuses on computer security, mobile security, virtual machine, and machine learning.



Research


Dynamic Multi-Tasks Learning for Malware Detection

Group Member: Shen-Chieh Lan

Malware detection needs much more information to build up a comprehensive view of program behaviors. However, sophisticated malware usually equips analysis-resistant techniques to evade detection. Analysts need to devise new inspection methods for feature extraction. Since the features used for model training against malware is always varying, a dynamic approach to adding new features or new malware type is desirable. We propose a evolvable detection model that extends its detection capability over time.

Multi-Tasks learning

Learning Instruction Embeddings from Binaries

Group Member: Yang-Ting Chiang, Shen-Chieh Lan

Any first step for machine learning is to vectorize the data. Instructions represent a complete scope of program behaviors, but how to vectorize them is a difficult thing. To address this problem, we apply the same idea from Word Embedding, which maps discrete data to a high-dimensional space. However, using one-hot as the initial vectors faces storage explosion in instruction sets. We apply bloom-filter to achieve affordable space demand.

Instruction Embeddings

CAPTCHA Solver by Style Elimination

Group Member: Yun-Chih Kuo

We try to apply domain-adversarial learning to reduce the recognition error through distinguish digit part from the noise generated by various CAPTCHA styles. In our experiment, our CAPTCHA solver can eliminate styles and synthesize a new image with specified CAPTCHA styles.

Instruction Embeddings

Automatic ICC Data Reconstruction

Group Member: Shen-Ru Wei

To provide a comprehensive view, we propose Finder, an automatic ICC data reconstruction system, for recovering system runtime information. Finder automatically generates data resolvers corresponding to communication types through transpiling.

ICC data reconstruction

Semantics Modeling with Progressive Distillation

Group Member: Zong-Xian Shen

Our proposed scheme can generate discriminative models against the repacked malicious apps. These representative models of malicious semantics can be progressively distilled with malign and benign samples. Our experiment shows that, after two retraining rounds, Petridish achieved an average of 28 percent progressive detection improvement from 63 to 91.2 percent for the large families, exceeding 38 test samples in size.

petridish

Taint Tracking for Storage Access on Android

Group Member: Chia-Huei Chang

The off-the-shelf taint tracking systems lack byte-granularity support for storage tracking. We propose a fine-grained storage tracking technique to track data flow among Android storage. DROIT+ is able to reveal the composition of data flows. Storage tracking on Android is difficult since data flows of apps may span heterogeneous media including memory, SD cards, NAND Flash, and network adapters.

vog

Adaptive Virtual Gestures for GUI Testing

Group Member: Shan-Hsin Lee

The wide variety of smartphones might diminish app quality owing to insufficient testing. To complement in-depth testing, a proposed breadth-first approach employs fast, automated GUI testing for adaptive virtual gestures on various mobile devices.

vog

A Fine-grain Replaying VM Executions

Group Member: Chi-Wei Wang, Heng Yin

Replaying VM execution and the state transition of systems is very useful for software testing, malware analysis and post-attack recovery. We proposed a generic VM-based logging and replaying mechanism.

VM record and replay

LTE Security

Group Member: Ting-Yi Chang, Yang-Ting Chiang

LTE brings IP packets into its core network. Conventional attacks via IP network should be reviewed again in LTE. Moreover, HeNB, which is connected via insecure network, will damage LTE security if no essential security mechanism is not applied.

LTE Security

Aggregating Privacy from Online Data

Group Member: Chi-Pao Hung, Wei-Tse Tasi, Tzu-Jui Tung

A new kind of privacy leakage is devised through aggregating public data to derive sensitive and private information. We uncovered this kind of information leakage in practice and will use the Taiwan Uniform Sales Receipt System (TUSR) as an example to show the aggregation. Although the purchase information on a sales receipt does not contain any sensitive or private information, we will demonstrate in this paper the data association technique of aggregating and deriving a company’s revenue merely using a store sales receipt.

Aggregating Privacy from Online Data


Publication


Journal

  1. Zong-Xian Shen, Chia-Wei Hsu, Shiuhpyng Shieh, “Security Semantics Modeling with Progressive Distillation,” IEEE Transactions on Mobile Computing, vol. 16, no. 11, pp. 3196–3208, Nov. 2017.
  2. Chia-Wei Hsu, Chia-Huei Chang, Chi-Wei Wang, and Shiuhpyng Shieh, “DROIT+: Taint Tracking for Storage Access on Android,” Journal of Information Science and Engineering (JISE), vol. 33, no. 5, pp. 1237-1254, 2017.
  3. Chia-Wei Hsu, Shan-Hsin Lee, and Shiuhpyng Shieh, “Adaptive Virtual Gestures for GUI Testing on Smartphones, ” IEEE Software, vol. 34, no. 5, pp. 22–29, 2017.
  4. Chia-Wei Hsu, and Shiuhpyng Shieh, “Mobile Security Survey and Trends,” Journal of Electrical Engineering, vol. 3, 2015.
  5. Michael Cho, Chia-Wei Hsu, and Shiuhpyng Shieh, C. W. Wang, “Can Malware be Exterminated by Better Understanding its Roots?,” IT Professional, vol. 16, no. 6, pp. 47–53, 2014.
  6. Jia-Chun Lin, Shiuhpyng Shieh, and Chia-Wei Hsu, “Proactive Distributed Digital Evidence Preservation with Tamper Resistance, Perfect Secrecy and High Survivability,” Journal of Information Science and Engineering (JISE), vol. 30, no. 6, pp. 1847–1864, 2014.

Conference

  1. Yang-Ting Jiang, Ting-Yi Chang, Chia-Wei Hsu, and Shiuhpyng Shieh,“Security Requirements and Risk Assessment for LTE Mobile Networks,“ in the 27th Cryptology and Information Security Conference (CISC), Taiwan, 2017.
  2. Liang-Mei Huang, Chien-Ho Chao, Chia-Wei Hsu, Shiuhpyng Shieh, and P. X. Liu, “Android app behavior analysis assessment and workflow design,” in the 26th Cryptology and Information Security Conference (CISC), Taiwan, 2016.
  3. Chun-An Shieh, Chia-Wei Hsu, Chien-Ho Chao, and Shiuhpyng Shieh, “Behavior Graph Construction of Android Apps,” in the 25th Cryptology and Information Security Conference (CISC), 2015.
  4. Zhi-Kai Zhang, Michael Cho, Chia-Wei Wang, Chia-Wei Hsu, Chung-Kuan Chen, and Shiuhpyng Shieh, “IoT Security: Ongoing Challenges and Research Opportunities, ” in IEEE 7th International Conference on Service-Oriented Computing and Applications (SOCA), pp. 230-234, 2014.
  5. Chia-Wei Hsu, Fan-Shun Shih, Chi-Wei Wang, and Shiuhpyng Shieh, ”Divergence Detector: A Fine-Grained Approach to Detecting VM-Awareness Malware." Software Security and Reliability (SERE), 2013 IEEE 7th International Conference on. IEEE, pp. 80-89, 2013.
  6. Ying-Chang Sung, Michael Cho, Chi-Wei Wang, Chia-Wei Hsu, and Shiuhpyng Shieh, “Light-Weight CSRF Protection by Labeling User-Created Contents,” in the IEEE 7th International Conference on Software Security and Reliability (SERE), pp. 60–69, 2013.
  7. Zong-Xian Shen, Chia-Wei Hsu, and Shiuhpyng Shieh, “Real-Time Record and Replay on Android for Malware Analysis,” in the 23th Cryptology and Information Security Conference (CISC), 2013.
  8. Chung-Kuan Chen, Wei-Chi Chen, Chia-Wei Hsu, and Shiuhpyng Shieh, “Mutant Malware Discovery and Behavior Analysis for Cyber Crime Investigation,” in the 22th Cryptology and Information Security Conference (CISC), 2012.
  9. Yen-Ru Liu, Chi-Wei Wang, Chia-Wei Hsu, Tsi-Chien Tseng, and Shiuhpyng Shieh, “Extracting Hidden Code from Packed Malware based on Virtual Machine Memory Comparison,” in the 21th Cryptology and Information Security Conference (CISC), 2011.
  10. Chia-Wei Hsu, and Shiuhpyng Shieh, "FREE: A Fine-grain Replaying Executions by Using Emulation", The 20th Cryptology and Information Security Conference (CISC), Taiwan, 2010. (Best Student Paper Award).
  11. Chi-Wei Wang, Chia-Wei Wang, Chia-Wei Hsu, and Shiuhpyng Shieh,,”Malware Behavior Analysis Based on Virtual Machine Introspection and Snapshot Comparison”, The 20th Cryptology and Information Security Conference (CISC), Taiwan, 2010.

Patent

  1. Shiuhpyng Shieh, Chi-Wei Wang, Chia-Wei Wang, Chia-Wei Hsu, Automatic probe construction system and method thereof, US, Appl. no. 15/016,120, 2017.
  2. Shiuhpyng Shieh, Chi-Wei Wang, Chia-Wei Wang, Chia-Wei Hsu, Automatic probe construction system and method thereof, Taiwan, Appl. no. I551984, 2016.
  3. Chi-Wei Wang, Chia-Wei Wang, Chia-Wei Hsu, Shiuhpyng Shieh, Chia-Huei Chang, Privacy leakage detection system and method, Taiwan, Appl. no. I578158, 2017.