Tae Oh Headshot

Tae Oh

Associate Professor
Department of Information Sciences and Technologies
Golisano College of Computing and Information Sciences

585-475-7642
Office Location
Office Mailing Address
Golisano College of Computing and Information Sciences Rochester Institute of Technology 152 Lomb Memorial Dri

Tae Oh

Associate Professor
Department of Information Sciences and Technologies
Golisano College of Computing and Information Sciences

Education

BS, Texas Tech University; MS, Ph.D., Southern Methodist University

Bio

Tae (Tom) Oh is an Associate Professor in the Dept. of Information Sciences and Technologies and the Dept. of Computing Security at Rochester Institute of Technology (RIT). His research focus has been mobile device security, mobile ad-hoc networks (MANET) and security, vehicular area networks (VANET), cyber security and smart grid. He has over 20 years of experience in networking and telecommunication as an engineer and researcher for several telecom and defense companies. Before he joined RIT, he was a Principle Systems Engineer at Rockwell Collins where he was leading the advanced architecture development of MANET and Security for military applications. Additionally, he lead/supported OPNET modeling and simulation team for secret projects and actively pursued funding from DARPA, Air Force Research Lab and Army Research Lab. While at RIT, he has been active in mobile device security research and received funding from the Office of Naval Research, Safe and Secure Mobile, Electronics and Telecommunication Research Institute, Department of Defense and American Packaging Corporation. He has published over 60 technical journal and conference articles. Lastly, he is a Technical Editor of IEEE Communications Magazine and IEEE Networks, and served numerous conferences as a technical program committee member.

Currently Teaching

HCIN-722
3 Credits
Mobile phones are now a major computing platform, and wearable and Internet of Things devices are emerging as major technologies. Each device offers different interaction opportunities and challenges. Students will learn about the research in interaction with these devices and how to design effective interactions for mobile, wearable, and ubiquitous devices.
HCIN-720
3 Credits
Wearable computers and Internet of Things devices involve both hardware and software. In order to design user experiences for these systems, professionals must understand how they are built. Students will learn how to rapidly prototype and evaluate wearable and IoT devices combining hardware and software. Experience in programming is helpful but not a prerequisite.
ISTE-792
1 Credits
This course supports the proposal development process for graduate students enrolled in the MS in information sciences and technologies, the MS in networking and system administration, or the MS in human-computer interaction program who are beginning the project or thesis experience and require additional structure and support. Students begin the development of an acceptable proposal and through weekly meetings students are guided toward the completion of the proposal, which is a prerequisite for formal thesis or project registration. Note: Students must have completed all their course work prior to enrollment which is by permission of the graduate program director.
NSSA-612
3 Credits
The course provides comprehensive exposition of the core concepts in network modeling and simulation. It will cover both graph theoretical and statistical models of complex networks such as the Internet and social networks. It also introduces different types of modeling techniques and simulation tools. The course also systematically addresses some practical and theoretical considerations for developing complex modeling. It offers real world examples to illustrate the process of modeling to address specific problems.
NSSA-620
3 Credits
Computer networking and computer system technologies have dramatically changed the way that businesses operate and how they accomplish their organizational goals. Most of the current technologies used today have their roots in the early days of the internet and computing. The changes that have occurred since then have been largely at the margins, rather than developed in a wholesale fashion. As our discipline moves forward there are a substantial number of emerging technologies in development to address the inadequacies of the currently deployed technologies. If widely adopted, these technologies will change how technologies support organizations and individuals creating a whole new paradigm for computing, networking, and the security of our computing environment. Students will be researching the current state of several of the most significant emerging technologies. The course will consist of a combination of lectures where technologies will be presented and explained; independent labs, modeling and simulation exercises that will reinforce the students’ understanding of the technologies by allowing them to work with them in a hands-on fashion; and independent literature research do serve as a foundation for future work in this degree program.
NSSA-789
3 Credits
This IST seminar course provides an opportunity for special one-time offerings of graduate topics or allows faculty to pilot possible new graduate offerings. Specific course details (such as the course topics, format, resource needs, and credit hours) will be determined by the faculty member(s) who propose a given seminar offering.
ISTE-799
3 Credits
The student will work independently, under the supervision of one or more faculty advisers, on a topic of mutual interest that is beyond the depth of or not covered in other courses.

Select Scholarship

Journal Paper
Jeong, Jaehoon, et al. "STMAC: Spatio-Temporal Coordination-Based MAC Protocol for Driving Safety in Urban Vehicular Networks." IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 19. 5 (2018): 1520-1536. Print. *
Jeong, Jaehoon, et al. "STMAC: Spatio-Temporal Coordination-Base MAC Protocol for Driving Safety in Urban Vehicular Networks." IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS. (2017): 17. Web. *
Jeong, Jaehoon Paul, et al. "Protocols and Applications in Vehicular Sensor Networks for Driving Safety, Driving Efficiency, and Data Services." International Journal of Distributed Sensor Networks 13. (2017): 3. Web. *
Ge, Changfeng, et al. "MEMS Based Tracking Devices for Measuring Distribution Hazards on the Product and Package." Journal of Applied Packaging Research 8. No. 2 Article 7 (2016): 56-67. Web. «
Jeong, Jaehoon and Tae (Tom) Oh. "Survey on Protocols and Applications for Vehicular Sensor Networks." International Journal of Distributed Sensor Networks 12. No. 8 (2016): 195-221. Web. «
Jeong, Jaehoon, et al. "SAINT: Self-Adaptive Interactive Navigation Tool for Cloud-Based Vehicular Traffic Optimization." IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 65. No. 6 (2016): 4053-4067. Web. «
Kim, Youngho, Oh, Tae, and Kim, Jeongnyeo. "Analyzing User Awareness of Privacy Data Leak in Mobile Applications." Mobile Information Systems 2015. Article ID 369489 (2015): 12 pages. Print. «
Jeong, Jaehoon, et al. "SAINT: Self-Adaptive Interactive Navigation Tool for Cloud-Based Vehicular Traffic Optimization." IEEE Transactions on Vehicular Technology. (2015): pp.1-1. Web. «
Tangs, Emma, et al. "Effect of Web Caching on Load Time." International Journal of Emerging Technology in Learning 8. 6 (2013): 21-26. Print. «
Choi, Young, Young Choe, and Tae Oh. "Future Direction for a Next Generation Web." International Journal of Emerging Technology in Learning 8. 6 (2013): 6-10. Print. «
Oh, Tae, et al. "Security Management Protocols and their Applications in Wireless Sensor Networks for Healthcare." International Journal of Mobile Communications. (2011): 187-207. Print. «
Published Conference Proceedings
Seralathan, Yogeesh, et al. "IoT Security Vulnerability: A Case Study of a Web Camera." Proceedings of the IEEE 20th International Conference on Advanced Communication Technology (ICACT). Ed. IEEE. Chuncheon-si, Gangwon-do: IEEE, 2018. Print. *
Myers, Jonathan, et al. "Dynamic Internet of Things Malware Detection Using Machine Learning." Proceedings of the IEEE International Conference on Software Security and Assurance. Ed. IEEE. Seoul, Korea, Korea: IEEE, 2018. Print. *
Jeong, Junsik, et al. "TOMS: TCP Context Migration Scheme for Efficient Data Services in Vehicular Networks." Proceedings of the 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA). Ed. IEEE. Piscataway, NJ: IEEE, 2017. Web. *
Margolis, Joel, et al. "An In-Depth Analysis of the Mirai Botnet." Proceedings of the IEEE International Conference on Software Security and Assurance. Ed. IEEE. Altoona, PA: IEEE, 2017. Web. *
Oh, Tae (Tom), et al. "The Roles of IT Education in IoT and Data Analytics." Proceedings of the ACM SIGITE 2017. Ed. ACM. Rochester, NY: ACM, 2017. Web. *
Jadhav, Suyash, Tae Tom Oh, and Jaehoon Paul Jeong. "An Assistive System for Android Malware Analysis to Increase Malware Analysis Efficiency." Proceedings of the 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA). Ed. IEEE. Piscataway, NJ: IEEE, 2017. Web. *
Mugabarigira, Bien Aime, et al. "Design and Implementation of Vehicular Network Simulator for Data Forwarding Scheme Evaluation." Proceedings of the 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA). Ed. IEEE. Piscataway, NJ: IEEE, 2017. Web. *
Oh, Tae, et al. "Android Malware Analysis and Conceptual Malware Mitigation Approaches." Proceedings of the IEEE International Conference on Information and Communication Technology Convergence (ICTC 2016). Ed. IEEE. Jeju Island, Korea: PP. 684-693, Web. *
Kang, Jai, et al. "Security Requirements Embedded in MS Programs in Information Sciences and Technologies." Proceedings of the ACM SIGITE 2016. Ed. ACM. Boston, MA: pp. 77-82, Web. *
Alatwi, Huda, Tae Oh, and Ernest Fokoue. "Android Malware Detection Using Category-Based Machine Learning Classifiers." Proceedings of the ACM SIGITE 2016. Ed. ACM. Boston, MA: pp.54-59, Web. *
Waggoner, Jonathan, Bill Stackpole, and Tae Oh. "A Hands-On Approach to Computing Security Education: Metasploit Module Development." Proceedings of the ACM CISSE. Ed. CISSE. Philadephia, PA: n.p., Web. *
Lee, Jinho, et al. "DCMAC: Data-oriented Cluster-based Media Access Control Protocol for Vehicular Networks." Proceedings of the IEEE 30th International Conference on Advanced Information Networking and Applications (2016 WAINA). Ed. IEEE. Crans-Montana, Switzerland: pp. 258-261, Web. *
Shen, Yiwen, et al. "CASD: A Framework of Context-Awareness Safety Driving in Vehicular Networks." Proceedings of the IEEE 30th International Conference on Advanced Information Networking and Applications (2016 WAINA). Ed. IEEE. Crans-Montana, Switzerland: pp. 252-257, Web. *
Oh, Tae, et al. "Intelligent Mobility Cane with Navigation." Proceedings of the UKC 2016. Ed. UKC. Dallas, Texas: n.p., Web. *
Victoria, Patricia Iglesias, Behm, Gary, and Oh, Tae. "Intelligent Mobility Cane for People Who are Blind and Deaf-Blind: A Multidisciplinary Design Project That Assists People with Disabilities." Proceedings of the ASME 2015 International Mechanical Engineering Conference & Exposition. Ed. ASME. Houston, TX: n.p., Print. * £
Jadhav, Suyash, et al. "Cloud-based Android Botnet Malware Detection System." Proceedings of the 17th IEEE International Conference on Advanced Communications Technology (IEEE ICACT 2015). Ed. ICACT. Phoenix Park, Korea: n.p., Print. * £
Jadhav, Suyash, et al. "Mobile Device Penetration Testing Framework and Platform for the Mobile Device Security Course." Proceedings of the 17th IEEE International Conference on Advanced Communications Technology (IEEE ICACT 2015). Ed. ICACT. Phoenix Park, Korea: n.p., 2015. Print. *
Campillo, Reiner and Oh, Tae. "Layer 2 Protocol to Protect the IP Communication in a Wired Ethernet Network." Proceedings of the ASIA 2015. Ed. ASIA. Albany, NY: n.p., 2015. Web. * £
Oh, Tae and Suyash Jadhav. "Android Botnet Categorization and Family Detection Based on Behavioural and Signature Data." Proceedings of the IEEE 6th International Conference of Information and Communication Technology Convergence (IEEE ICTC),. Ed. ICTC. Jeju Island, Korea: n.p., 2015. Print. £
Dutia, Shobit, Oh, Tae, and Young Ho Kim. "Developing Automated Input Generator for Android Mobile Device to Evaluate Malware Behaviour." Proceedings of the ACM SIGITE 2015. Ed. ACM. Chicago, IL: n.p., 2015. Print. £
Harmat, Bryan, et al. "The Security Implications of IMSI Catchers." Proceedings of the SAM 15 International Conference on Security and Management. Ed. SAM. Las Vegas, NV: n.p., 2015. Print. £
Mislan, Rick and Oh, Tae. "Implementing Flipped Classroom Model in Mobile Device Security and Vulnerability Exploitation Course." Proceedings of the KOCSEA 2015. Ed. KOCSEA. Clarmont, CA: n.p., 2015. Web. ˜
Dutia, Shobhit, et al. "Automated Input Generator to Detect Malicious Android Applications." Proceedings of the UKC 2015. Ed. UKC. Atlanta, GA: n.p., 2015. Web. ∆
Jadhav, Suyash, et al. "Advanced Android Malware Detection Techniques Using Android Memory Dump." Proceedings of the UKC 2015. Ed. UKC. Atlanta, GA: n.p., 2015. Web. ∆
Dutia, Shobhit, Youngho Kim, and Tae Oh. "Automated Input Generator for Android Applications." Proceedings of the Annual Symposium on Information Assurance 2014. Ed. ASIA 2014. Albany, New York: n.p., Web. *
Kushalnagar, Raja, Vignesh Ramachandran, and Tae Oh. "Tactile Captions: Augmenting Visual Captions." Proceedings of the 2014 International Conference on Computers Helping People with Special Needs. Ed. ICCHP 2014. Paris, France: n.p., Print. *
Paugh, Katie, Rick Mislan, and Tae Oh. "Virtual Malware Analysis Framework and Platform for Android." Proceedings of the 9th International Conference on Cyber Warfare and Security. Ed. ICCWS 2014. West Lafayette, Indiana: n.p., Print. *
Kim, Youngho and Tae Oh. "Analysis of Mobile Malware Based on the User Awareness." Proceedings of the SIGITE 2014. Ed. ACM. Atlanta, GA: n.p., 2014. Print. *
Kushainagar, Raja, Vignesh Ramachandran, and Tae Oh. "Creating Tactile Captions: Augmeting Visual Captions." Proceedings of the UKC 2014. Ed. UKC. San Francisco, CA: n.p., Print. £
Nacy, Sinan, Tae Oh, and Jim Leone. "Implementation of SHA-1 and ECDSA for Vehicular Ad-hoc Network using NS-3." Proceedings of the ACM SiGITE 2013 Orlando, FL, Oct. 2013, pp. 83-88. Ed. ACM. Orlando, FLorida: n.p., Print. *
Gonzalez, Carlos, Charles Border, and Tae Oh. "Teaching in Amazon's Elastic Cloud Computing." Proceedings of the SIGITE 2013, Orlando, FL, Oct. 2013, pp. 149-150. Ed. ACM. Orlando, FLorida: n.p., Print. *
Szost, Colin, et al. "Teaching Android Malware Behaviors for Android Platform Using Interactive Labs." Proceedings of the ASIA 2013, Albany, NY, June 2013, pp. 69-72. Ed. ASIA. Albany, NY: n.p., Print. *
Sharma, Kriti, et al. "Malware Analysis for Android Operating System." Proceedings of the ASIA 2013, Albany, NY, June 2013, pp. 31-35. Ed. ASIA. Albany, NY: n.p., Print. *
Mislan, Rick and Tae Oh. "Mobile Device Vulnerability Exploitation as a Security Curriculum Using the Flipped Classroom Model Approach." Proceedings of the ASIA 2013, Albany, NY, June 2013, pp 64-68. Ed. ASIA. Albany, NY: n.p., Print. *
Andrew, Ben, Tae Oh, and Bill Stackpole. "Android Malware Analysis Platform." Proceedings of the ASIA 2013, Albany, NY, June 2013, pp. 36-38. Ed. ASIA. Albany, NY: n.p., Print. *
Oh, Tae, et al. "Best Practices for Android, Blackberry, and iOS." Proceedings of the The First IEEE Workshop in enabling Technologies for Smartphone and Internet of Things 2012. Seoul, South Korea: IEEE, 2012. Print. «
Ramachandran, Rahul, Tae Oh, and William Stackpole. "Android Anti-virus Analysis." Proceedings of the ASIA and SKM 2012. Ed. Sanjay Goel. Albany, New York: ASIA, 2012. Print. «
Jeffery, Jaseem and Tae Oh. "Implementation of Secuirty Encruyption in MANET Reactive Routing Protocols Using OPNET." Proceedings of the OPNETWORK 2012. Ed. OPNET. Washington DC, DC: OPNET, 2012. Print. ˜
Sun, Yu, Tae Oh, and Shinyoung Lim. "Feasibility Study of Emergency Siren Detection for Deaf and Hard of Hearing Using Android Platform." Proceedings of the UKC 2012. Ed. UKC. Los Angeles, CA: UKC, 2012. Print. ∆
Gonzalez, Carlos, William Stackpole, and Tae Oh. "Anti-Spyware Analysis for iOS." Proceedings of the ASIA and SKM 2012. Ed. ASIA. Albany, NY: ASIA, 2012. Print. ˜
Cummins, Emily, Bill Stackpole, and Tae Oh. "Blackberry Structure and Anti-Malware Analysis." Proceedings of the ASIA and SKM 2012. Ed. ASIA. Albany, NY: ASIA, 2012. Print. ˜
Kim, HyunGon, Tae Oh, and Young Choi. "Nomadic Device Based CRL Acquisition Method for Vehicular Networks." Proceedings of the 6th International Conference of Convergence and Hybrid Information Technology (ICHIT 2012). Ed. Springer. Daejeon, South Korea: Springer, 2012. Print. *
Sajan, Susan and Tae Oh. "Simulation and Performance Evaluation in Neighborhood Area Network for Smart Grid Using Zigbee." Proceedings of the OPNETWORK 2011. Ed. OPNET. OPNET, 2011. Print. *
Oh, Tae, Young Choi, and Rajath Chouta. "RFID & Supply Chain Management: Generic and Military Applications." Proceedings of the Future Generation Communication and Networking 2011. Ed. SCIE. Jeju Island, South Korea: LNCS/CCIS, 2011. Print. *
Tang, Emma, et al. "Effect of Web Caching on Load Time." Proceedings of the AHList 2011. Ed. Association of HLST. Houston, TX: i-Jet, 2011. Web. *
Choi, Young, Yong Choe, and Tae Oh. "Future Direction for a Next Generation Web." Proceedings of the AHList 2011. Ed. Association of HLST. Houston, TX: i-Jet, 2011. Print. «
Lim, Shinyoung, Tae Oh, and Young Choe. "Assistive Technology for the People with Disabilities to Enhance Accessibility of Emergency Communications." Proceedings of the UKC 2011. Ed. UKC 2011. Park city, Utah: UKC, 2011. Print. *
Peer Reviewed/Juried Poster Presentation
Myers, Jonathan and Tae Oh. "IoT Malware Detection with Machine Learning." Proceedings of the B-Side. Ed. B-Side. Rochester, NY: n.p.. ˜
Oh, Tae. "IoT Solutions using Artificial Intelligence." Proceedings of the 2018 Global Cooperation: The Fast Track to Smart Future. Ed. KAIT. Seoul, Korea: n.p.. ˜
Margolis, Joel, et al. "Analysis and Impact of IoT Malware: Mirai, Imeij and The Moon." Proceedings of the ACM SIGITE 2017. Ed. ACM. New York, NY: ACM. *
Alatwi, Huda, et al. "Using the Machine Learning Approach to Detect Mobile Device Malware." Proceedings of the KOCSEA 2016. Ed. KOCSEA. Washington DC, DC: n.p.. *
Invited Article/Publication
Jeong, Jae, et al. "IP Based Vehicular Networking: Use Cases, Survey and Problem Statement." Internet Engineering Task Force (IETF). (2018). Print. ˜
Oh, Tae. "Spam Robocalls: How Can You Stop Them?" WHEC Channel 10. (2018). Web.
Jadhav, Suyash, et al. "Increasing Efficiency of Android Malware Analysis." UKC 2017. (2017). Web. *
Invited Keynote/Presentation
Oh, Tae. "IoT Malware Detection and Vehicular Area Network Security." KOCSEA 2018. KOCSEA. Los Angeles, CA. 18 Nov. 2018. Conference Presentation. ˜
Oh, Tae. "Digital Technologies: Current and Future Trends, Applications and Opportunities." UKC 2018. KSEA. New York, New York. 12 Aug. 2018. Keynote Speech. ˜
Oh, Tae. "Android and IoT Malware Detection System." KOCSEA 2017. KOCSEA. Las Vegas, NV. 11 Nov. 2017. Conference Presentation. ∆
Oh, Tae. "Intelligent Mobility Cane Development Process." I-Corp. RIT. Rochester, NY. 5 Mar. 2016. Lecture.
Oh, T. "Cloud-based Malware Mitigation Prototype for Android." KOCSEA 2014. KOCSEA. Yorktown Heights, New York. 11 Dec. 2014. Conference Presentation. ∆
Stackpole, Bill, Tae Oh, and Rick Mislan. "Implementing Flipped Classroom Model in Mobile Device Security and Vulnerability Exploitation Course." The Colloquium for Information Systems Security Education 2014. CISSE. San Diego, CA. 17 Jun. 2014. Conference Presentation. *
Oh, Tae. "OPNET Modeler in Networking Courses at RIT." OPNETWORK 2012. OPNET. Washington DC, DC. 13 Aug. 2012. Conference Presentation. ∆
Invited Paper
Jeong, Jaehoon Paul, et al. "IP-based Vehicular Networking: Use Cases, Survey and Problem Statement." IETF: draft-ietf-ipwave-vehicular-networking-01. (2017). Web. *
Jeong, J., et al. "Problem Statement for IP Wireless Access in Vehicular Environments." IETF: draft-jeong-ipwave-problem-statement-00. (2017). Web. *
Jeong, Jaehoon and Tae Oh. "Problem Statement for Vehicle-to-Infrastructure Networking." IETF: draft-jeong-its-v2i-problem-statement-00. (2016). Web. *
Provisional Patent
Ge, Changfeng, et al. "Real-Time Monitoring of Packaging Handling and Transportation." US Provisional Patent Application US, 61/889,914. 1 Sep. 2013. *
Book Chapter
Oh, Tae, Sumita Mishra, and Clark Hochgraf. "Smart Grid Security in the Last Mile." Security and Privacy in Smart Grids. Ed. Yang Xiao. Boca Raton, Florida: CRC Press, 2013. 271-291. Print. *
Choi, Young, Tae Oh, and Rajath Chouta. "RFID Implementation and Security Issues." Lecture Notes in Computer Science. Crete, Greece: Springer-Verlag Berlin Heidelberg, 2011. 236-249. Print. ∆