Publications
Journal Articles
2024
Jin, P., Kim, N., Lee, S., & Jeong, D. (2024). Forensic investigation of the dark web on the Tor network: pathway toward the surface web. International Journal of Information Security, 23(1), 331-346.
Ryu, H., Park, A., Jung, S., & Jeong, D. (2024). A Study on Elemental Technology Identification of Sound Data for Audio Forensics. Journal of The Korea Institute of Information Security and Cryptology, 34(1), 115-127.
Park, W., Kim, M., Park, Y., Ryu, H., & Jeong, D. (2024). Taxonomy and Countermeasures for Generative Artificial Intelligence Crime Threats. Journal of The Korea Institute of Information Security and Cryptology, 34(2), 301-321.
Kim, J., Kim, M., Park, W., & Jeong, D. (2024). Research on Advanced Methods for Data Extraction from Corrupted OOXML Files. Journal of The Korea Institute of Information Security and Cryptology, 34(2), 193-206.
2023
Joo, D., Lee, J., & Jeong, D. (2023). A reference database of Windows artifacts for file‐wiping tool execution analysis. Journal of Forensic Sciences, 68(3), 856-870.
Park, Y., Kim, J., Kim, B., & Jeong, D. (2023). Analysis on the Performance of Duties by Police Officers and Policy Suggestions for Crime Response in Metaverse. Journal of Digital Forensics, 17(2), 130-135.
Park, A., Ryu, H., Park, W., & Jeong, D. (2023). Forensic investigation framework for cryptocurrency wallet in the end device. Computers & Security, 133, 103392.
Lee, J., Park, Y., Jeon, S., Chung, J., & Jeong, D. (2023). A Forensic Methodology for Detecting Image Manipulations. Journal of The Korea Institute of Information Security and Cryptology, 33(4), 671-685.
Jeon, S., Chung, J., & Jeong, D. (2023). A Study on the Risks of Technology Leakage Using Smartwatch and Its Countermeasures Focusing on Galaxy Watch. Journal of The Korea Institute of Information Security and Cryptology, 33(6), 893-906.
Park, Y., & Jeong, D. (2023). Conversational AI and Crime Response: Policy Trends and Legal Institutional Solutions, The Digital Ethics, 7(2), 22-28.
2022
Kim, J., Lee, S., & Jeong, D. (2022). Digital forensic investigation methodology for Storage Space: Based on the NIST digital forensic process. Journal of Forensic Sciences, 67(3), 989-1001.
Ryu, H., Park, A., Park, Y., Lee, J., Joo, D., Choi, H., & Jeong, D. (2022). A Study on Screening System for Vulnerable Users with RNN for Preventing Digital Sexual Crime. Journal of Digital Forensics, 16(1), 118-130.
Kim, W., Lee, K., Lee, S., & Jeong, D. (2022). A Deep Learning Approach for Identifying User Interest from Targeted Advertising. Journal of Information Processing Systems, 18(2), 245-257.
Park, Y., & Jeong, D. (2022). 메타버스 범죄 동향 및 디지털 포렌식 대응 방안. The Korea Institute of Information Security and Cryptology, 32(4), 41-47.
Lee, J., Jeon, S., & Jeong, D. (2022). Galaxy Image Editing Tool Analysis to Detect Manipulated Images. Korean Journal of Criminal Justice, 5(2), 61-84.
Joo, D., Lee, J., & Jeong, D. (2022). FILE WIPING 행위 탐지를 위한 WINDOWS 아티팩트 흔적 분석 연구. The Korea Institute of Information Security and Cryptology, 32(4), 41-47.
2021
Kwon, H., Lee, S., & Jeong, D. (2021). User profiling via application usage pattern on digital devices for digital forensics. Expert Systems with Applications, 168, 114488.
Choi, H., Lee, S., & Jeong, D. (2021). Forensic Recovery of SQL Server Database: Practical Approach. IEEE Access, 9, 14564-14575.
Lee, S., Park, J., Hwang, H., Lee, S., Lee, S., & Jeong, D. (2021). Forensic Analysis of ReFS Journaling. Forensic Science International: Digital Investigation, 38, 301136.
2020
Jeong, D., (2020). Artificial Intelligence Security Threat, Crime, and Forensics: Taxonomy and Open Issues. IEEE Access, 8, 184560-184574
2019
Jeong, D., & Lee, S. (2019). High-Speed Searching Target Data Traces Based on Statistical Sampling for Digital Forensics. IEEE Access, 7, 172264-172276.
Jeong, D., & Lee, S. (2019). Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts. Digital Investigation, 29, 21-27.
2018
Joun, J., Han, J., Jeong, D., & Lee, S. (2018). Study on History Tracking Technique of the Document File through RSID Analysis in MS Word. Journal of the Korea Institute of Information Security & Cryptology, 28(6), 1439-1448.
2017
Jeong, D., & Lee, S. (2017). Study on the tracking revision history of MS Word files for forensic investigation. Digital Investigation, 23, 3-10.
Jung, S. K., Jang, J. W., Jeong, D. W., & Lee, S. J. (2017). A Study on the Improvement Method of Deleted Record Recovery in MySQL InnoDB. KIPS Transactions on Computer and Communication Systems, 6(12), 487-496.
Lee, H. H., Bang, S. G., Baek, H. W., Jeong, D. W., & Lee, S. J. (2017). A Study on Image Acquisition and Usage Trace Analysis of Stick-PC. KIPS Transactions on Computer and Communication Systems, 6(7), 307-314.
Jang, J., Jeong, D., & Lee, S. J. (2017). The Recovery Method for MySQL InnoDB Using Feature of IBD Structure. KIPS Transactions on Computer and Communication Systems, 6(2), 59-66.
Park, A., Jeong, D., & Lee, S. J. (2017). Digital forensic investigation of HBase. KIPS Transactions on Computer and Communication Systems, 6(2), 95-104.
2016
Yoon, J., Jeong, D., Kang, C. H., & Lee, S. (2016). Forensic investigation framework for the document store NoSQL DBMS: MongoDB as a case study. Digital Investigation, 17, 53-65.
Kim, M., Jeong, D., & Lee, S. J. (2016). Building a database of DQT information to identify a source of the smartphone JPEG image file. Journal of the Korea Institute of Information Security & Cryptology, 26(2), 359-367.
Choi, J. M., Jeong, D. W., Yoon, J. S., & Lee, S. J. (2016). Digital forensics investigation of redis database. KIPS Transactions on Computer and Communication Systems, 5(5), 117-126.
Jeong, D., Breitinger, F., Kang, H., & Lee, S. (2016). Towards Syntactic Approximate Matching-A Pre-Processing Experiment. Journal of Digital Forensics, Security and Law, 11(2), 97-110.
2015
Han, J., Jeong, D., & Lee, S. (2015, October). Analysis of the HIKVISION DVR file system. In International Conference on Digital Forensics and Cyber Crime (pp. 189-199). Springer, Cham.
Jeong, D., Park, J., Lee, S., & Kang, C. (2015). Investigation methodology of a virtual desktop infrastructure for IoT. Journal of Applied Mathematics, 2015.
Kim, M., Jeong, D., & Lee, S. (2015). The Automatic Collection and Analysis System of Cloud Artifact. Journal of the Korea Institute of Information Security & Cryptology, 25(6), 1377-1383.
Kang, H., Jeong, D., & Lee, S. (2015). A Study on Preprocessing Method for Effective Semantic-based Similarity Measures using Approximate Matching Algorithm. Journal of the Korea Institute of Information Security & Cryptology, 25(3), 595-602.
2014
Lee, K., Jeong, D., Kang, C., & Lee, S. (2014). The Method of Recovery for Deleted Record in the DB2 Database. Journal of Digital Forensics, 8(2), 1-14.
Jeong, D., Chung, H., Hong, I., & Lee, S. (2014). New feature and SVM based advanced classification of Computer Graphics and Photographic Images. Journal of the Korea Institute of Information Security & Cryptology, 24(2), 311-318.
Yoon, J. S., Jung, D. W., Kang, C. H., & Lee, S. J. (2014). Digital forensic investigation of MongoDB. Journal of the Korea Institute of Information Security & Cryptology, 24(1), 123-134.
2013
Kim, J., Jeong, D. W., & Lee, K. (2013). A Study on the Integrity Assurance Process of Reliable Digital Evidence. Journal of Security Engineering, 10(5), 527-538.
Choi, J. H., Jeong, D. W., & Lee, S. (2013). The method of recovery for deleted record in Oracle Database. Journal of the Korea Institute of Information Security & Cryptology, 23(5), 947-955.
Conference
2024
김민수, 김도윤, 박윤지, 정두원. (2024, Aug). Development of an Expert Chatbot for Digital Forensics Using RAG Model Implementation. In PLATCON24
김병준, 전승제, 정두원. (2024, June). 영상 파일 분석을 통한 소형카메라 영상 식별에 관한 연구. In 2024 한국디지털포렌식학회 하계학술대회.
조경숙, 박윤지, 김지윤, 김병준, 정두원. (2024, June). 대화형 AI 서비스 포렌식 연구 - ChatGPT, Gemini, Copilot, Claude를 중심으로. In 2024 한국디지털포렌식학회 하계학술대회.
정재현. (2024, July). XR을 활용한 디지털 포렌식 교육의 효과성. In 2024 한국데이터포렌식학회 제2회 학술컨퍼런스.
2023
유혜진, 박윤지, 김지윤, 박아현, 박우빈, 정두원. (2023, Feburary). 스마트 컨트랙트 및 백서 기반 포렌식 조사방법론에 관한 연구. In 2023 한국핀테크학회 동계학술대회.
주다빈, 정두원. (2023, June).모바일 포렌식 도구의 신뢰도 검증 및 수치화 방안. In 2023 한국디지털포렌식학회 하계학술대회.
김지윤, 박우빈, 정재현, 주다빈, 정두원. (2023, June). 공용 PC에 저장된 사용자 암호 현황 분석. In 2023 한국정보보호학회 하계학술대회.
박우빈, 김민수, 박아현, 주다빈, 정두원. (2023, November). Advanced Tool Development for Investigating Forensic Artifacts on the latest version of MacOS. In Digital Forensics Challenge 2023 Awards.
김병준, 전승제, 정두원. (2023, November). Frame Extractor from unallocated space. In Digital Forensics Challenge 2023 Awards.
정두원. (2023, November). 신규 플랫폼에서의 범죄 대응 방안: 메타버스 사례를 중심으로. In 2023 한국인터넷윤리학회 추계학술대회.
유혜진, 박아현, 정두원. (2023, December). 오디오 포렌식을 위한 소리데이터의 요소 기술 식별 및 분류 연구. In 2023 한국디지털포렌식학회 동계학술대회.
김민수, 박우빈, 박윤지, 정두원. (2023, December). 생성형 인공지능 관련 범죄의 분류 및 대응 방안. In 2023 한국디지털포렌식학회 동계학술대회.
2022
박윤지, 정두원. (2022, June). 메타버스 플랫폼 아티팩트 분석에 관한 연구. In 2022 한국디지털포렌식학회 하계학술대회.
이지원, 전승제, 정두원. (2022, June). 포토에디터 아티팩트 분석을 통한 이미지 변조 탐지 기법. In 2022 한국디지털포렌식학회 하계학술대회.
유혜진, 김지윤, 박아현, 박윤지, 정두원. (2022, November). A Study on Forensic Investifation based on Smart Contract and White Paper. In Digital Forensics Challenge 2022 Awards.
박우빈, 박아현, 정두원. (2022, December). SIFT 기반 불법 복제 웹툰 탐지 연구. In 2023 한국디지털포렌식학회 동계학술대회.
2021
Lee, S., Park, J., Hwang, H., Lee, S., Lee, S., & Jeong, D. (2021, January). Forensic Analysis of ReFS Journaling. In DFRWS APAC 2021.
박아현, 유혜진, 박윤지, 이지원, 주다빈, 최혜인, 정두원. (2021, June). 디지털성범죄 예방을 위한 RNN 기반 취약군 선별 체계 연구. In 2021 한국디지털포렌식학회 하계학술대회.
전승제, 박아현, 박우빈, 유혜진, 주다빈, 정두원. (2021, November). 윈도우 아티팩트를 이용한 와이핑 툴 사용 흔적 탐지 연구. In 2021 한국디지털포렌식학회 동계학술대회.
이지원, 주다빈, 박윤지, 최하늘, 정두원. (2021, November). Image Retrieval 기반 영상 포렌식 기법 연구. In Digital Forensics Challenge 2022 Awards.
2020
Kim, W., Lee, K., Kwon, H., Hur, G., Choi, H., Lee, S., & Jeong, D. (2020, August). A Deep Learning Approach for Identifying User Interest from Targeted Advertising. In The International Conference on Big data, IoT, and Cloud Computing (BIC 2020).
Kim, J., Choi, J., Lee, S., & Jeong, D. (2020, August). Forensic Analysis of Storage Space: RAID System on Windows. In The International Conference on Big data, IoT, and Cloud Computing (BIC 2020).
2017
Jeong, D., Lee, S. (2017, March). Study on the Tracking Revision History of an MS Word File for Forensic Investigation. In DFRWS EU 2017 (Poster).
2016
Jeong, D., Breitinger, F., Kang, H., & Lee, S. (2016, September). Towards Syntactic Approximate Matching-A Pre-Processing Experiment. In 8th EAI International Conference on Digital Forensics & Cyber Crime (ICDF2C).
정두원, 이상진. (2016, December). MS 오피스 임시파일 포렌식 분석에 관한 연구. In 2016 한국디지털포렌식학회 동계학술대회.
2015
Han, J., Jeong, D., & Lee, S. (2015, October). Analysis of the HIKVISION DVR file system. In International Conference on Digital Forensics and Cyber Crime (pp. 189-199). Springer, Cham.
최재문, 윤종성, 정두원, 이상진. (2015, December). Redis 데이터베이스에서 AOF 파일을 통한 삭제된 데이터 복구 기법. In 2015 한국디지털포렌식학회 동계학술대회.
박아란, 정두원, 이상진. (2015, July). 외장형 저장장치에서의 완전삭제 프로그램 사용흔적에 관한 연구. In 2015 한국디지털포렌식학회 하계학술대회.
2014
김민식, 정두원, 이상진. (2014, August). 아이폰 이미지 파일의 편집 여부 및 출처 파악을 위한 DQT 및 EXIF 분석. In 2014 한국디지털포렌식학회 하계학술대회.
김은광, 정두원, 이상진, (2014, August). 저작권 보호를 위한 소스코드 유사도 비교 알고리즘 활용 방안에 대한 연구. In 2014 한국디지털포렌식학회 하계학술대회.
2013
윤종성, 정두원, 이상진. (2013, November). MongoDB에 대한 디지털포렌식 조사기법 연구. In 한국정보처리학회 추계학술대회
최종현, 정두원, 이상진. (2013, May). 데이터베이스 레코드 완전 삭제 방안 연구. In 한국포렌식학회 춘계학술대회
Patents
FORENSIC SYSTEM USING DIGITAL EVIDENCE AND CONTROLLING METHOD THEREOF, 10-2023-0140530, 2023.10.19.
FORENSIC SYSTEM BASED BLOCKCHAIN AND CONTROLLING METHOD THEREOF, 10-2023-0094272, 2023.07.20.
METHOD FOR WIPING OF UNALLOCATED AREA IN STORAGE AND METHOD FOR VERIFYING THE THEREOF, 10-1723482, 2017.03.30.
METHOD FOR RECOVERING DELETED DATA BY MYSQL INNODB DATABASE, 10-1670473, 2016.10.24.
A recovery method of deleted data for MySQL MyISAM database, 10-1657592, 2016.09.08.
Apparatus and method for recovering data in DB2 database, 10-1583283, 2015.12.31.
Apparatus and method for recovering data in oracle database, 10-1547466, 2015.08.20.
USER VERIFICATION SYSTEM VIA MOUSE MOVEMENT PATTERN AND METHOD THEREOF, 10-1451782, 2014.10.10.