Publications

2018

(Submitted)
Charles Lim, Suryadi, Kalamullah Ramli, Yohanes Syailendra Kotualubun, Mal-Flux: Rendering Hidden-Code of Packed Binary Executable, TBA

(Presented)
Charles Lim, Suryadi, Kalamullah Ramli, Suhandi, Mal-XT: Higher Accuracy Hidden-code Extraction of Packed Binary Executable, International Conference on Design, Engineering and Computer Sciences 2018 (ICDECS 2018), Jakarta, 2018. 

(Presented)
Gregorius Aldo Radityatama, Charles Lim, Heru P. Ipung, Toward Full Enterprise Software Support on nDPIThe 6th International Conference on Information and Communication Technology (ICOICT), Bandung, Indonesia, 2018.

Rinkel Hananto, Charles Lim, Heru P. Ipung, Detecting Network Security Threats Using Domain Name System and NetFlow Traffic2018 the 2nd International Conference on Cryptography, Security and Privacy, China, 2018

2016

Charles Lim, Yohanes Syailendra Kotualubun, Suryadi, Kalamullah Ramli, Mal-Xtract: Hidden Code Extraction using Memory Analysis,  1st International Conference on Computing and Applied Informatics (ICCAI 2016), Medan, Indonesia, 2016

Rasyid Naif Dahbul, Charles Lim, James Purnama, Enhancing Honeypot Deception Capability Through Network Service Fingerprinting1st International Conference on Computing and Applied Informatics (ICCAI 2016), Medan, Indonesia, 2016.

Gede Widagdo, Charles Lim, Analysis of Hybrid DDoS Defense to Mitigate DDoS ImpactThe 2016 International Conference on Internet Technology and Data Engineering (Internet-Data 2016), Denpasar, Indonesia, 2016

Kalpin E. Silaen, Charles Lim, A novel countermeasure to prevent XMLRPC WordPress attack, 3rd International Conference on Data and Software Engineering (ICODSE) 2016, Denpasar, Indonesia, 2016

Rangga Nehemia, Charles Lim, Maulahikmah Galinium, Ahmad Rinaldi Widianto, GPU Accelerated Multipattern Matching for Intrusion Detection System2016 IAES International Conference on Electrical Engineering, Computer Science and Informatics (EECSI 2016), Semarang, Indonesia 2016

Kris Ivan Santosa, Charles Lim, Alva Erwin, Analysis of Educational Institution DNS Network Traffic for Insider ThreatsThe 2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA 2016), BSD City, Indonesia, 2016

Semi Yulianto, Charles Lim, Benfano Soewito, Information Security Maturity Model – A Best Practice Driven Approach to PCI DSS Compliance, TENSYMP 2016Bali, Indonesia, 2016

2015

Joshua Tommy Juwono, Charles Lim, Alva Erwin, A Comparative Study of Behavior Analysis Sandboxes in Malware DetectionThe 3rd International Conference on New Media 2015, Jakarta, Indonesia, 2015. (PDF)

Ahmad Rinaldi Widianto, Charles Lim, I. Eng Kho, Improving Performance of Intrusion Detection System Using OpenCL Based General-purpose Computing on Graphic Processing Unit (GPGPU)The 3rd International Conference on New Media 2015, Jakarta, Indonesia, 2015.  (PDF)

Kevin Junta Kurniawan, Charles Lim, Kho I Eng, XMPP Performance Analysis using large volume traffic from honeypot sensor, The International Conference on Innovation, Enterpreneurship, and Technology (ICONIET 2015), BSD City, 25-26 November 2015.

Charles Lim, Nicsen, Mal-EVE Static Detection Model for Evasive Malware10th EAI International Conference on Communications and Networking in China, Shanghai, China, 2015

Charles Lim, Darryl Y. Sulistyan, Suryadi, and Kalamullah Ramli, Experiences in Instrumented Binary Analysis for MalwareThe 3rd International Conference on Internet Services Technology and Information Engineering 2015 (ISTIE 2015), Bali, 2015.  10.1166/asl.2015.6487

2014

Charles Lim, Meily, Nicsen, and Herry Ahmadi, Forensics Analysis of USB Flash Drives in Educational Environment,  The 8th International Conference on Information & Communication Technology and Systems, Surabaya, 2014.  (PDF)

Chris Tjandra, Charles Lim, and I Eng Kho. Analysis Model of Promotion Strategies to Increase the Usage of Cloud RetailThe 8th International Conference on Information & Communication Technology and Systems, Surabaya, 2014. 10.1109/ICTS.2014.7010587

Charles Lim, Mario Marcello, Andrew Japar, Joshua Tommy, and I Eng Kho, Development of Distributed Honeypot Using Raspberry Pi. The 8th International Conference on Information & Communication Technology and Systems, Surabaya, 2014 (PDF)

Kevin Syahlie, Kho I Eng, Charles Lim, and Maulahikmah Galinium, Hypervisors Assessment in Education Industry: Using OpenBRR MethodologyThe 8th International Conference on Information & Communication Technology and Systems, Surabaya, 2014. 10.1109/ICTS.2014.7010601

Charles Lim, and Kalamullah Ramli, Mal-ONE: A Unified Framework for Fast and Efficient Malware Detection2014 2nd International Conference on Technology, Informatics, Management, Engineering & Environment, Bandung, 2014.  10.1109/TIME-E.2014.7011581

Joseph Johnson, Susan J. Lincke, Ralf Imhof, and Charles LimA Comparison of International Information Security Regulations, Interdisciplinary Journal of Information, Knowledge, and Management, 9, 89-116, 2014

Bobby Suryajaya, Charles Lim, and Budi Ibrahim, SKK Migas Sistem Operasi Terpadu – Performance Evaluation for Secure Data Exchange for Oil and Gas ContractorsAdv. Sci. Lett. 20, 128-132 (2014)10.1166/asl.2014.5248

2013

Charles Lim, Louis Lukito, Malware Attacks Intelligence in Higher Education NetworksInformation Systems International Conference (ISICO), 2 – 4 December 2013.

Glenn Ekaputra, Charles Lim, Kho I Eng,  Minecraft, a game as an Education and scientific learning tool, Information Systems International Conference (ISICO), 2 – 4 December 2013.

Bobby Suryajaya, Charles Lim,  PRODML Performance Evaluation as SOT Data Exchange Standard,  The International Conference on Computer, Control, Informatics and its Applications 2013 (IC3INA 2013), Jakarta, 19-20 November 2013.  10.1109/IC3INA.2013.6819191

Charles Lim, Ivan Firdausi, Andry Bresnev, Forensics Analysis of Corporate and Personal Information Remaining on Hard Disk Drives Sold on the Secondhand Market in IndonesiaThe 2013 Annual International Conference on Advances Technology in Telecommunication, Broadcasting, and Satellite (TelSaTech), Jakarta, 2-3 August 2013

Yanuarizki Amanatullah, Charles Lim, Heru Purnomo Ipung, Arkav Juliandri, Toward Cloud Computing Reference Architecture: Cloud Service Management PerspectiveInternational Conference On ICT For Smart Society 2013, Jakarta, 13-14 Juni, 2013

Bobby Suryajaya, Charles Lim,  SKMIGAS SOT – Performance Evaluation for Secure Data Exchange for Oil & Gas Contractors2013 International Conference on Internet Services Technology and Information Engineering (ISTIE 2013), Bogor, 11-12 May, 2013

2012

Charles Lim, Alex Suparman, Risk Analysis and Comparative Study of The Different Cloud Computing Providers in Indonesia, International Conference on Cloud Computing and Social Networking 2012, Bandung, Indonesia, 26-27 April 2012. Paper can be downloaded here *).

2011

Ivan Lukianto, Charles Lim, Analysis of BINUS International University Information Technology’s Business Architecture1st International Conference on Information Systems For Business Competitiveness, Semarang, December 2011 (paper)

Aravada Kevindra Darwis, Charles LimDesign and Implementation of e-KTP (Indonesian Electronic Identity Card) Key Management SystemInternational Conference on Advance Computer Science and Information System 2011, December 2011

Andree A. K. Surya, Anto S. Nugroho, and Charles LimEvaluation of Fingerprint Orientation Field Correction MethodsInternational Conference on Advance Computer Science and Information System 2011, December 2011

Agustinus Biotamalo Lumbantoruan, Charles LimDesigning Video Encoding For Efficient Video Processing Business Services, The First International Conference Integrated Government Academic and Business, Lampung, Indonesia, 2011

Darmanto Lie, Charles LimRisk Assessment of E-KTP Web Application Vulnerability Based on NIST 800-30 Framework, The First International Conference Integrated Government Academic and Business, Lampung, Indonesia, 2011

Adi Kurniawan, Charles LimMoving Toward A Secured Cloud ComputingThe First International Conference Integrated Government Academic and Business, Lampung, Indonesia, 2011

2010

Ivan Firdausi, Charles Lim, Alva Erwin, Anto Satriyo Nugroho, “Analysis of Machine learning Techniques Used in Behavior-Based Malware Detection,” 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies, Jakarta, Indonesia, 2010. 10.1109/ACT.2010.33

David Allister Simanjuntak, Heru Ipung Purnomo, Charles Lim, Nugroho A. S., “Text Classification Techniques Used to Faciliate Cyber Terrorism Investigation,” 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies, Jakarta, Indonesia, 2010. 10.1109/ACT.2010.40

Rocky Christian, Charles Lim, Anto Satrio Nugroho, Marsudi Kisworo, “Integrating Dynamic Analysis Using Clustering Techniques for local Malware in Indonesia,” 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies, Jakarta, Indonesia, 2010. 10.1109/ACT.2010.30

Endy, Charles Lim, Kho I Eng, Anto Satrio Nugroho, “Implementation of Intelligent Searching Using Self-Organizing Map for Webmining Used in Document Containing Information in Relation to Cyber Terrorism,” 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies, Jakarta, Indonesia, 2010. 10.1109/ACT.2010.35

2009

Charles Lim, “Building an Indonesian Digital Forensic Laboratory”, the Fifth International Conference on Telecommunications, Bandung, Indonesia, 2009

Irene Salomo, Charles Lim, “Cybercrime From Islamic Law Point Of View,” the Fifth International Conference on Telecommunications, Bandung, Indonesia, 2009

Bhavna. C.K. Nathani, Charles Lim, “Mobile Banking: Safe, at least for now,” the Fifth International Conference on Telecommunications, Bandung, Indonesia, 2009

David Allister, Michael, Charles Lim,“ Eastern Cyber Laws Exposed: The Penetration Testing Way,” the Fifth International Conference on Telecommunications, Bandung, 17th November 2009

Charles Lim, “Implementasi Open Source Software Di Swiss German University – Sebuah Pengalaman”, Seminar Nasional Teknologi Informasi Universitas Tarumanagara, Jakarta, 2009

Souza Windiartono, Rana Lubis, Alva Erwin, Charles Lim, Harya Widiputra, “Multi-staged Classification Data Mining Technique Based On Information Gain for Misuse Detection System”, The Fifth International Conference on Information & Communication Technology and Systems (ICTS), Surabaya, Indonesia, 2009

Dimas Isyanuar D., Pierre Dana, Willy Yulianto, Charles Lim, Kho I Eng, Husni Fahmi, Haret Faidah, “Integration of transport layer to connectionless mode network service in Aeronautical Telecommunication Network (ATN)”, the Fifth International Conference on Information & Communication Technology and Systems (ICTS), Surabaya, Indonesia, 2009.

2008

Husni Fahmi, Haret Faidah, Tadeus Prastowo, Charles Lim, “Implementation of CLNP for the ATN with BSD Socket”, the Fourth  International Conference on Telecommunications, Bandung, 2008

2007

Stella Maris, Maulana Galinium M., Husni Fahmi, Haret Faridah, James Purnama, Charles Lim, Harya Damar, “Design and Implementation of the End System To Intermediate System (ES-IS) Routing Information Exchange Protocol As A Loadable Kernel Module in Linux Kernel 2.6”, the 9th International Conference on Information Integration and Web-based Applications & Services, Jakarta, 2007

Computer Security Research Publication World Ranking

International Conference Ranking

*) Note: all conference papers are copyrighted by the relevant publishers, the papers provided here are limited to educational use only.  Any other commercial use of the papers, the relevant publisher such as IEEE Digital Library should be contacted.