程式控制流程劫持反制措施 Program Control Hijacking Countermeasures
程式控制流程劫持反制措施 Program Control Hijacking Countermeasures
Gemini detector-Client side solutions to detect the evil twin access point
亞旭電腦
針對遠端緩衝區溢位攻擊之自動化即時反擊系統 ARCS: Automatic Real-Time Counterback System against Remote Buffer Overflow Attacks
中央大學資訊工程系博士班 中華電信研究所
CIDP Treatment: An Innovative Mobile Botnet Covert Channel based on Caller IDs with P8 Treatment
中華電信數據分公司
Shark: Phishing Information Recycling from Spam Mails
國立中央大學資訊工程學系博士班 中華電信研究所
Cyber Security Engineer, Ministry of National Defense, 2000-present
Virtual Machine | DDoS
LSProxy: A Low Bandwidth Tolerable Solution to Protect Systems Against Low and Slow DoS Attacks
Software Engineer
Github : https://github.com/jason19970210
Skills: https://jason19970210.github.io/about#skills
Projects: https://jason19970210.github.io/about#projects-&-researches
Work Exp. : https://jason19970210.github.io/about#experience
Detecting Phishing Websites Based on Webpage Content Features of Page Jumping