Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sang Su Lee is active.

Publication


Featured researches published by Sang Su Lee.


Ksii Transactions on Internet and Information Systems | 2011

GPU-Accelerated Password Cracking of PDF Files

Keonwoo Kim; Sang Su Lee; Dowon Hong; Jae-Cheol Ryou

Digital document file such as Adobe Acrobat or MS-Office is encrypted by its own ciphering algorithm with a user password. When this password is not known to a user or a forensic inspector, it is necessary to recover the password to open the encrypted file. Password cracking by brute-force search is a perfect approach to discover the password but a time consuming process. This paper presents a new method of speeding up password recovery on Graphic Processing Unit (GPU) using a Compute Unified Device Architecture (CUDA). PDF files are chosen as a password cracking target, and the Abode Acrobat password recovery algorithm is examined. Experimental results show that the proposed method gives high performance at low cost, with a cluster of GPU nodes significantly speeding up the password recovery by exploiting a number of computing nodes. Password cracking performance is increased linearly in proportion to the number of computing nodes and GPUs.


international conference on future generation communication and networking | 2007

A New Anti-Forensic Tool Based on a Simple Data Encryption Scheme

Sang Su Lee; Ku-Young Chang; Deokgyu Lee; Do Won Hong

In this paper, we discuss a simple encryption scheme in which a secret file is encrypted twice: one by a common encryption algorithm like AES and another by XOR. Despite the first key is revealed by guessing or dictionary-based attack, the attacker can not reconstruct the original secret until knows the files used to derive the second key block according to our scheme. We also give an explanation about the tool in which the proposed scheme is implemented. It consists of 1 main module and 5 sub-modules: main routine, command parser, file 10, buffer manager, cipher, and time handler. The design goals of the tool include encrypting a file with or without the second encryption and modifying times tamp values such as MAC time information. In addition, the second key can be derived from 3 files at most which are selected and specified as input arguments by a user.


international symposium on consumer electronics | 2008

A high speed disk imaging system

Sang Su Lee; Un Sung Kyong; Do Won Hong

Recently, the capacity of digital storages for PCs gets larger, and forensic investigators need a system or a tool for imaging them in high speed. In this paper, we describe the high speed disk imaging system for the forensic purpose and report its performance.


Archive | 2010

Remote forensics system based on network

Jooyoung Lee; Sung Kyong Un; Youngsoo Kim; Geon Kim; Sang Su Lee; Su Hyung Jo; Youn Hee Gil; Woo Yong Choi; Do Won Hong; Hyun Sook Cho


Archive | 2011

METHOD FOR DATA ANALYSIS AND DIGITAL FORENSICS AND SYSTEM USING THE SAME

Youn Hee Gil; Jooyoung Lee; Su Hyung Jo; Youngsoo Kim; Keon Woo Kim; Sang Su Lee; Woo Yong Choi; Sung Kyong Un; Do Won Hong; Hyun Sook Cho


Archive | 2009

APPARATUS AND METHOD FOR COLLECTING EVIDENCE DATA

Jooyoung Lee; Su Hyung Jo; Youn-Hee Gil; Youngsoo Kim; Keonwoo Kim; Sang Su Lee; Sung Kyong Un; Do Won Hong


Archive | 2012

Forensic index method and apparatus by distributed processing

Jooyoung Lee; Youn Hee Gil; Do Won Hong; Keon Woo Kim; Youngsoo Kim; Sung Kyong Un; Sang Su Lee; Su Hyung Jo; Woo Yong Choi; Hyun Sook Cho


Archive | 2013

Similarity calculating method and apparatus

Jooyoung Lee; Sung Kyong Un; Hyun Sook Cho; Youn Hee Gil; Keon Woo Kim; Youngsoo Kim; Sang Su Lee; Su Hyung Jo; Woo Yong Choi


Archive | 2012

APPARATUS AND METHOD FOR CALCULATING INTIMACY

Sung Kyong Un; Do Won Hong; Hyun-Sook Cho; Youn-Hee Gil; Keonwoo Kim; Youngsoo Kim; Sang Su Lee; Jooyoung Lee; Su Hyung Jo; Woo Yong Choi


Archive | 2012

Apparatus and method for visualizing data

Keon Woo Kim; Do Won Hong; Sung Kyong Un; Youngsoo Kim; Woo Yong Choi; Sang Su Lee; Jooyoung Lee; Su Hyung Jo; Youn Hee Gil

Collaboration


Dive into the Sang Su Lee's collaboration.

Top Co-Authors

Avatar

Su Hyung Jo

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Sung Kyong Un

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Woo Yong Choi

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Youngsoo Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Do Won Hong

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Keon Woo Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Keonwoo Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Hyun Sook Cho

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Youn Hee Gil

Electronics and Telecommunications Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge