/bin/bash
jc0818@portfolio:~$ ./introduce.sh
jc0818
Studying
0x01 | Certificate
K-Shield Jr. 13th
Vulnerability Analysis Process
Kisa Bug Hunting
Intermediate Course
Information processing industry engineer
White Hat School(pre-BOB)_3rd
0x02 | ️Activity
- 2025.05 ~ Current: DONGGUK University Plass Undergraduate Researcher In Computer Security, Vulnerability Analysis
- 2025.03 ~ 2025.09: KITRI - White Hat School(pre-BOB)_3rd
- 2025.05 ~ 2025.08: KITRI - White Hat School(pre-BOB)_3rd Team Project - SeaBugs (Selection of Outstanding Project)
- 2024.04 ~ 2025.05: DONGGUK University Wise_Undergraduate Researcher In Computer Science
- 2024.11 ~ 2024.12: 2024 Korea Gyeongbuk Regional Problem Solving Hackathon Management Team
- 2024.03 ~ 2024.11: DONGGUK University Wise_Developer Web Site PM
- 2024.07 ~ 2024.08: K-Shield Jr. 13th Team Project PM
- 2024.05 ~ 2024.11: Radio Frequency Attack Detection Platform. DONGGUK University Wise StartUp Club(WaveFort)
- 2024.03 ~ 2024.06: DONGGUK University Wise_DGU-Stack-Up
- 2024.05: Scenario for Establishing a Securities Company Network Using GNS3
- 2023.03 ~ 2024.01: SEMYEONG COMPUTER HIGH SCHOOL_Game Dev Club
0x03 | Paper
CISC'25: Analysis of ECDIS Cybersecurity Threat Scenarios Applying the S-100 Standard: A STRIDE Model-based Approach
CISC'25: A Methodology for Cyber Threat Assessment of ECDIS IP Interfaces in Compliance with the S-100 Standard
CISC'25: Mitigating the Risks of Chart Deletion Updates in ECDIS: A Procedural Approach
WISA_2025: NMEA Under Siege: Dynamic Flooding Attacks and Defenses
WISA_2025: Visual Tampering in S-52: Threats and Protections
ISIS_2025: Quantum Neural Network Approach for Classifying Dummy Power Traces in Side-Channel Analysis