Traditional digital forensics research focusing on user behavior analysis on PCs, mobile devices, IoT devices, and various ICT systems
Research on incident response techniques and methodologies
Analysis of chipset and firmware vulnerabilities (including bootloaders and kernels) in IoT devices such as smartphones and drones
Research on local privilege escalation vulnerabilities and exploitation techniques
Reverse engineering of PE, ELF, and DEX executables to analyze encryption algorithms used in application data
Analysis of software protectors for securing executable files (e.g., PE, APK)
Research on Retrieval-Augmented Generation (RAG) and Large Language Models (LLMs) for analyzing large-scale user logs