Weihan Goh

Weihan Goh

Associate Professor

Singapore Institute of Technology

Biography

Dr Weihan Goh is an Assistant Professor at the Singapore Institute of Technology (SIT), where he teaches primarily in the Information Security degree programme. His teaching and research interests include security testing and digital forensics, as well as technologies for cybersecurity education such as cyber ranges, CTF / CDX, and anti-fraud / anti-cheat systems. He leads the GoSecure vulnerability assessment programme funded by the Infocomm Media Development Authority of Singapore (IMDA), and is a Kaspersky Academy certified instructor on Malware Reverse Engineering and Analysis.

Beyond research, Dr Goh also participates in capture-the-flag exercises, and have mentored student teams participating in cybersecurity hackathons to successes both locally and internationally. Dr Goh received his PhD and BEng, both in Computer Engineering, from the Nanyang Technological University, Singapore, in 2013 and 2008 respectively. He goes by the CTF handler ‘icebear’.

Publications

  Journal Papers
  • W. Goh and C. K. Yeo, “Teaching an Old TPM New Tricks: Repurposing for Identity-Based Signatures,” IEEE Security & Privacy Magazine, vol. 11, no. 5, pp. 28-35, Sep. 2013.

  • W. Goh, P. C. Leong, and C. K. Yeo, “A Plausibly-Deniable, Practical Trusted Platform Module Based Anti-Forensics Client-Server System,” IEEE Journal on Selected Areas in Communications, vol. 29, no. 7, pp. 1377-1391, Aug. 2011.

  Conference Papers
  • Z. X. Lim, X. Q. Ho, D. Z. Tan, and W. Goh, “Ensuring Web Integrity through Content Delivery Networks,” in 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, Jun. 2022, pp. 494-500, doi: 10.1109/AIIoT54504.2022.9817199.

  • S. R. Toh, W. Goh, and C. K. Yeo, “Data Exchange via Multiplexed Color QR Codes on Mobile Devices,” in 2016 Wireless Telecommunications Symposium (WTS), London, United Kingdom, Apr. 2016, pp. 1-6.

  • A. Q. Chen and W. Goh, “Two Factor Authentication Made Easy,” in 2015 International Conference on Web Engineering (ICWE 2015), Rotterdam, The Netherlands, Jun. 2015, pp. 449-458.

  • C. Lee, L. Yi, L.-H. Tan, W. Goh, B. S. Lee, and C. K. Yeo, “A Wavelet Entropy-Based Change Point Detection on Network Traffic: A Case Study of Heartbleed Vulnerability,” in 2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom 2014), Singapore, Dec. 2014, pp. 995-1000.

  • W. Goh and C. K. Yeo, “Cryptanalyzing the Efficient Identity-Based RSA and GQ Multisignature Schemes,” in 2014 International Wireless Communications and Mobile Computing Conference (IWCMC 2014), Nicosia, Cyprus, Aug. 2014, pp. 875-880.

  • W. Goh and C. K. Yeo, “Anonymity-Preserving Identity-Based Multisignature Scheme with Provision for Origin Self-Revelation,” in 2013 IEEE Global Telecommunications Conference (GLOBECOM 2013), Atlanta, GA, Dec. 2013, pp. 855-860.

  • W. Goh and C. K. Yeo, “Threat Mitigation in Tactical-Level Disruption Tolerant Networks,” in 2012 IEEE Global Telecommunications Conference (GLOBECOM 2012), Anaheim, CA, Dec. 2012, pp. 997-1003.

  • F. C. Lee, W. Goh, and C. K. Yeo, “A Queuing Mechanism to Alleviate Flooding Attacks in Probabilistic Delay Tolerant Networks,” in 2010 Sixth Advanced International Conference on Telecommunications (AICT 2010), Barcelona, Spain, May 2010, pp. 329-334.

  • W. Goh, P. C. Leong, and C. K. Yeo, “A Trusted Platform Module Based Anti-Forensics System,” in IFIP International Conference on Network and Service Security, 2009 (N2S ‘09), Paris, France, Jun. 2009, pp. 1-5.

Interests
  • Security testing
  • Cyber ranges, cyber defense exercises, and capture-the-flag
  • Anti-fraud / Anti-cheat for education
  • Digital forensics and anti-forensics
  • Automation for cybersecurity / digital forensics
  • Blockchain and applied cryptography
Education
  • PhD (Computer Engineering)

    Nanyang Technological University , Singapore

  • BEng (Computer Engineering)

    Nanyang Technological University , Singapore

Latest