Publications

(Here papers are restricted to academic use within not-for-profit institutions.)

2017

[18] “User Credential Cloning Attacks in Android Applications”, Junsung Cho, Dayeon Kim and Hyoungshick Kim, IEEE Consumer Electronics Magazine, 2017. (under major revision)

[17] “Security and Privacy Challenges in the Internet of Things”, Jong-Hyouk Lee and Hyoungshick Kim, IEEE Consumer Electronics Magazine, 2017. (accepted)

[16] “TARD: Temporary Access Rights Delegation for Guest Network Devices”, Joonghwan Lee, Jaewoo Seo, Hoon Ko and  Hyoungshick Kim, Journal of Computer and System Sciences, 2017. pdf
[15] “SysPal: System-guided Pattern Locks for Android”, Geumhwan Cho, Jun Ho Huh, Junsung Cho, Seongyeol Oh, Youngbae Song and Hyoungshick Kim, S&P: The 38th IEEE Symposium on Security and Privacy, San Jose, USA, 2017. pdf
[14] “Design of Backdoor on Android Devices”, Junsung ChoGeumhwan Cho, Sangwon Hyun and Hyoungshick Kim, S&P: The 38th IEEE Symposium on Security and Privacy (Poster), San Jose, USA, 2017.
[13] “I’m too busy to reset my LinkedIn password: On the effectiveness of password reset emails”, Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Konstantin Beznosov and Swathi Sri V Rayala, CHI: The 35th ACM SIGCHI Conference on Human Factors in Computing Systems, Denver, USA, 2017. pdf
[12] “DDoS Attack Mitigation in Internet of Things Using Software Defined Networking”, M. Ejaz Ahmed and Hyoungshick Kim, BigDataSecurity: The 1st Workshop on Big Data Security and Services, held in conjunction with IEEE Big Data Service, San Francisco, USA, 2017. pdf
[11] “Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks”, Seunghun ChaSungsu Kwag, Hyoungshick Kim and Jun Ho Huh, ASIACCS: The 10th ACM Asia Conference on Computer and Communications Security, Abu Dhabi, UAE, 2017. pdf
[10] “Design of a secure digital recording protection system with network connected devices”, Hyoungshick Kim, DC2: The 4th Workshop on Device Centric Cloud held in conjunction with IEEE AINA, Taipei, Taiwan, 2017. pdf
[9] “Wrong Siren! A location spoofing attack on indoor positioning systems: the Starbucks case study”, Junsung Cho, Jaegwan Yu, Sanghak Oh, Jungwoo Ryoo, Jaeseung Song and Hyoungshick Kim, IEEE Communications Magazine, 2017. pdf

[8] “k-Depth Mimicry Attack to Secretly Embed Shellcode into PDF”, Jaewoo Park and  Hyoungshick Kim, ICISA: The 8th International Conference on Information Science and Applications, Macau, China, 2017. pdf

[7] “I Don’t Use Apple Pay Because It’s Less Secure …: Perception of Security and Usability in Mobile Tap-and-Pay”, Jun Ho Huh, Saurabh Verma, Swathi Sri V Rayala, Rakesh Bobba, Konstantin Beznosov and Hyoungshick Kim, USEC: The 5th Usable Security Conference, San Diego, USA, 2017. pdf

[6] “Security Analysis of Samsung Knox”, Munkhzorig Dorjmyagmar, MinChang Kim and  Hyoungshick Kim, ICACT: The 19th International Conference on Advanced Communication Technology, Pheonix Park, Korea, 2017. pdf

[5] “Forensic analysis of the backup database file in KakaoTalk messenger”, Jusop Choi, Jaewoo Park and Hyoungshick Kim, BigComp: The 4th IEEE International Conference on Big Data and Smart Computing, Jeju Island, Korea, 2017. pdf
[4] “Security Challenges with Network Functions Virtualization”, Mahdi D Firoozjaei, Jaehoon Jeong, Hoon Ko and Hyoungshick Kim, Future Generation Computer Systems, 2017. pdf
[3] “Privacy-Preserving Nearest Neighbor Queries Using Geographical Features of Cellular Networks”, Mahdi D Firoozjaei, Jaegwan Yu, Hyoungkee Choi and Hyoungshick Kim, Computer Communications, 2017. pdf
[2] “A Flexible Architecture for Orchestrating Network Security Functions to Support High-Level Security Policies”, Sanghak Oh, Eunsoo Kim, Jaehoon Jeong, Hoon Ko and Hyoungshick Kim, IMCOM(ICUIMC): The 11st ACM International Conference on Ubiquitous Information Management and Communication, Beppu, Japan, 2017. pdf
[1] “Analysis and Comparison of Fax Spam Detection Algorithms”, Jaekwang Kim, Hyoungshick Kim and Jee-Hyoung Lee, IMCOM(ICUIMC): The 11st ACM International Conference on Ubiquitous Information Management and Communication, Beppu, Japan, 2017. pdf

2016

[18] “WiPING: Wi-Fi signal-based PIN Guessing attack”, Seunghun Cha, Jaewoo Park, Geumhwan Cho, Jun Ho Huh and Hyoungshick Kim, CCS: The 23rd ACM  Conference on Computer and Communications Security (Poster), Vienna, Austria, 2016. pdf video
[17] “Secure DNS Name Autoconfiguration for IPv6 Internet-of-Things Devices”, Keuntae Lee, Hyungsuk Kang, Jaehoon (Paul) Jeong, Hyoungshick Kim, and Jung-Soo Park, ICTC 2016: The 7th International Conference on ICT Convergence, Jeju, Korea, 2016. pdf
[16] “SDN-Based Network Security Functions for VoIP and VoLTE Services”, Daeyoung Hyun, Jinyoug Kim, Jaehoon (Paul) Jeong, Hyoungshick Kim, Jung-Soo Park, and Taejin Ahn, ICTC 2016: The 7th International Conference on ICT Convergence, Jeju, Korea, 2016. pdf
[15] “Detecting encrypted traffic: a machine learning approach”, Seunghun Cha and Hyoungshick Kim, WISA: The 17th World Conference on Information Security Applications, Jeju Island, Korea, 2016. pdf
[14] “Empirical analysis of SSL/TLS weaknesses in real websites: Who cares?”, Sanghak Oh, Eunsu Kim, and Hyoungshick Kim, WISA: The 17th World Conference on Information Security Applications, Jeju Island, Korea, 2016. pdf
[13] “Towards Automated Exploit Generation for Embedded Systems”, Matthew Ruffell, Jin Hong, Hyoungshick Kim and Dong-Seong Kim, WISA: The 17th World Conference on Information Security Applications, Jeju Island, Korea, 2016. pdf
[12] “A security analysis of paid subscription video-on-demand services for online learning”, Sora Lee, Jinwoo Kim, Sangjun Ko and Hyoungshick Kim, ICSSA: The 2nd International Conference on Software Security and Assurance, St. Pölten, Austria, 2016. (selected as “runner-up”) pdf
[11] “A framework for detecting MAC and IP spoofing attacks with network characteristics”, Jaegwan Yu, Eunsoo Kim, Hyoungshick Kim and Jun Ho Huh, ICSSA: The 2nd International Conference on Software Security and Assurance, St. Pölten, Austria, 2016. pdf
[10] “On the Guessability of Resident Registration Numbers in South Korea”, Youngbae Song, Hyoungshick Kim and Jun Ho Huh, ACISP: The 21st Australasian Conference on Information Security and Privacy, Melbourne, Australia, 2016. pdf video
[9] “PassBYOP: Bring Your Own Picture for Securing Graphical Passwords”, Andrea Bianchi, Ian Oakley and Hyoungshick Kim, IEEE Transactions on Human-Machine Systems, Vol. 46(3), 2016. pdf video
[8] “Developer-Friendly Software Security”, Victoria McIntyre, Jungwoo Ryoo, Kyungwon Park  and Hyoungshick KimEncyclopedia of Software Engineering (book chapter), 2016. pdf
[7] “SAN: Self-Adaptive Navigation for Drone Battery Charging in Wireless Drone Networks”, Jinyong Kim, Jinho Lee, Jaehoon Jeong, Hyoungshick Kim, Jung-Soo Park, and Taeho Kim, DC2: The 3rd Workshop on Device Centric Cloud held in conjunction with IEEE AINA, Crans-Montana, Switzerland, 2016. (selected as “best paper”) pdf
[6] “Detecting False Emergency Requests Using Callers’ Reporting Behaviors and Locations”, Mahdi D Firoozjaei, Jaewoo Park and Hyoungshick Kim, DC2: The 3rd Workshop on Device Centric Cloud held in conjunction with IEEE AINA, Crans-Montana, Switzerland, 2016. pdf
[5] “A Healthcare Information System for Secure Delivery and Remote Management of Medical Records”, Hyoung-Kee Choi, Ki-Eun Shin and Hyoungshick Kim, IEICE Transactions on Information and Systems, 2016. pdf
[4] “You are a Game Bot!: Uncovering game bots in MMORPGs via self-similarity in the wild”, Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Aziz Mohaisen and Huy Kang Kim, NDSS: The 23rd Network and Distributed System Security Symposium, San Diego, USA, 2016. pdf
[3] “Combating online fraud attacks in mobile-based advertising”,  Geumhwan Cho, Junsung Cho, Youngbae Song, Donghyun Choi and Hyoungshick Kim, EURASIP Journal on Information Security, Vol. 2016(1), 2016. pdf
[2] “Bypassing the Integrity Checking of Rights Objects in OMA DRM: a Case Study with the MelOn Music Service”, Jusop Choi, William Aiken, Jungwoo Ryoo and Hyoungshick Kim, IMCOM(ICUIMC): The 10th ACM International Conference on Ubiquitous Information Management and Communication, Danang, Vietnam, 2016. pdf video
[1] “Threat Assessment in the Cloud Environment – A Quantitative Approach for Security Pattern Selection”, Priya Anand, Jungwoo Ryoo, Hyoungshick Kim and Eunhyun Kim, IMCOM(ICUIMC): The 10th ACM International Conference on Ubiquitous Information Management and Communication, Danang, Vietnam, 2016. pdf

2015

[20] “Surpass: System-initiated user-replaceable passwords”, Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstantin Beznosov, Apurva Mohan, and S. Raj Rajagopalan, CCS: The 22nd ACM  Conference on Computer and Communications Security, Denver, USA, 2015. pdf
[19] “SDN-based Security Services using Interface to Network Security Functions”, Jinyong Kim, Mahdi D Firoozjaei, Jaehoon Jeong, Hyoungshick Kim, and Jung-Soo Park, ICTC: The 6th International Conference on ICT Convergence, Jeju Island, Korea, 2015. pdf
[18] “An empirical study of click fraud in mobile advertising networks”,  Geumhwan Cho, Junsung Cho, Youngbae Song and Hyoungshick Kim, IWCC: The 4th Workshop on Cyber Crime held in conjunction with ARES, Toulouse, France, 2015. pdf
[17] “Encryption Is Not Enough: Inferring user activities on KakaoTalk with traffic analysis”,  Kyungwon Park  and Hyoungshick Kim, WISA: The 16th International Workshop on Information Security Applications, Jeju Island, Korea, 2015. pdf
[16] “A new technique using a shuffling method to protect confidential documents from shoulder surfers”,  Hyunsoo Kim, Ji Won Yoon  and Hyoungshick Kim, ICSSA: The 1st International Conference on Software Security and Assurance, Suwon, Korea, 2015. (selected as “best student paper”) pdf
[15] “Performing clickjacking attacks in the wild: 99% are still vulnerable!”,  Daehyun Kim  and Hyoungshick Kim, ICSSA: The 1st International Conference on Software Security and Assurance, Suwon, Korea, 2015. pdf
[14] “Addressing security challenges in cloud computing – a pattern-based approach”, Priya Anand, Jungwoo Ryoo  and Hyoungshick Kim, ICSSA: The 1st International Conference on Software Security and Assurance, Suwon, Korea, 2015. pdf
[13] “On the Memorability of System-generated PINs: Can Chunking Help?”, Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Masooda Bashir and Konstantin Beznosov, SOUPS: The 11st Symposium On Usable Privacy and Security, Ottawa, Canada, 2015. pdf
[12] “Devil in a Box: Installing Backdoors in Electronic Door Locks”,  Seongyeol Oh, Joon-Sung Yang, Andrea Bianchi and Hyoungshick Kim, PST: The 13rd International Conference on Privacy, Security and Trust, Izmir, Turkey, 2015. pdf
[11] “Keyboard or Keylogger?: a security analysis of third-party keyboards on Android”,  Junsung ChoGeumhwan Cho and Hyoungshick Kim, PST: The 13rd International Conference on Privacy, Security and Trust, Izmir, Turkey, 2015. pdf
[10] “Enhancing Conformance Testing using Symbolic Execution for Network Protocols”, Jaeseung Song, Hyoungshick Kim, and Soojin Park, IEEE Transactions on Reliability, Vol. 64(3), 2015. pdf
[9] “Design and analysis of enumeration attacks on finding friends with phone numbers: a case study with KakaoTalk”, Eunhyun Kim, Kyung-won Park, Hyoungshick Kim and Jaeseung Song, Computers & Security, Vol. 52, 2015. pdf
[8] “Visual Honey Encryption: Application to steganography”, Jiwon Yoon, Hyoungshick Kim, Hyunjoo Jo, Hyelim Lee and Kwangsu Lee, IH&MMSec: The 3rd ACM Workshop on Information Hiding and Multimedia Security, Portland, USA, 2015. pdf
[7] “Visualizing Privacy Risks of Mobile Applications through a Privacy Meter”, Jina Kang, Hyoungshick Kim, Yun Gyung Cheong and Jun Ho Huh, ISPEC: The 11st International Conference on Information Security Practice and Experience, Beijing, China, 2015. pdf
[6] “On the Effectiveness of Pattern Lock Strength Meters – Measuring the Strength of Real World Pattern Locks”, Youngbae Song, Geumhwan Cho, Seongyeol Oh, Hyoungshick Kim and Jun Ho Huh, CHI: The 33rd ACM SIGCHI Conference on Human Factors in Computing Systems, Seoul, Korea, 2015. pdf video
[5] “Privacy Preserving Nearest Neighbor Search based on Topologies in Cellular Networks”, Mahdi D Firoozjaei, Jaegwan Yu and Hyoungshick Kim, DC2: The 2nd Workshop on Device Centric Cloud held in conjunction with IEEE AINA, Gwangju, Korea, 2015.  (selected as “best paper”) pdf
[4] “SBUS: Smart e-Bus Battery Substitution Scheme in Vehicular Networks”, Jihyeok Seo, Jaehoon Jeong, Hyoungshick Kim and Jung-Soo Park, DC2: The 2nd Workshop on Device Centric Cloud held in conjunction with IEEE AINA, Gwangju, Korea, 2015.  (selected as “best student paper”) pdf
[3] “A Framework for Security Services Based on Software-Defined Networking”, Jaehoon Jeong, Jihyeok Seo, Geumhwan Cho, Hyoungshick Kim and Jung-Soo Park, DC2: The 2nd Workshop on Device Centric Cloud held in conjunction with IEEE AINA, Gwangju, Korea, 2015. pdf
[2] “A Study on the Influential Neighbors to Maximize Information Diffusion in Online Social Networks”, Hyoungshick Kim, Konstantin Beznosov and Eiko Yoneki, Computational Social Networks, Vol. 2(3), 2015.  pdf
[1] “KaaSP: Keying as a Service Provider for Small and Medium Enterprises Using Untrusted Cloud Services”, William Aiken, Jungwoo Ryoo and Hyoungshick Kim, IMCOM(ICUIMC): The 9th ACM International Conference on Ubiquitous Information Management and Communication, Bali, Indonesia, 2015. pdf

2014

[8] “I’ve Got Your Number: Harvesting users’ personal data via contacts sync for the KakaoTalk messenger”, Eunhyun Kim, Kyung-won Park, Hyoungshick Kim and Jaeseung Song, WISA: The 15th International Workshop on Information Security Applications, Jeju Island, Korea, 2014.  (selected as “best paper”) pdf
[7] “Analyzing unnecessary permissions requested by Android apps based on users’ opinions”, Jina Kang, Daehyun KimHyoungshick Kim and Jun Ho Huh, WISA: The 15th International Workshop on Information Security Applications, Jeju Island, Korea, 2014. pdf
[6] “A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain”, Youngbae Song, Hyoungshick Kim and Aziz Mohaisen, TrustBus: The 11st International Conference on Trust, Privacy & Security in Digital Business, Munich, Germany, 2014. pdf
[5] “iVisher: A system for real-time caller ID spoofing detection”, Jaeseung Song and Hyoungshick Kim, ETRI Journal, Vol. 36(5), 2014. pdf
[4] “On the Memorability of System-generated PINs: Can Chunking Help”, Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Masooda Bashir and Konstantin Beznosov, WAY: Workshop on Who are you?! Adventures in Authentication held in conjunction with ACM SOUPS, Menlo Park, USA, 2014. pdf
[3] “Power Replay Attack in Electronic Door Locks”, Seongyeol Oh, Joon-sung Yang, Andrea Bianchi and Hyoungshick Kim, S&P: The 35th IEEE Symposium on Security and Privacy (Poster), San Jose, USA, 2014. pdf
[2] “Finding Influential Neighbors to Maximize Information Diffusion in Twitter”, Hyoungshick Kim, Konstantin Beznosov and Eiko Yoneki, SIMPLEX: The 6th Annual Workshop on Simplifying Complex Networks for Practitioners, held in conjunction with WWW, Seoul, Korea, 2014. (selected as “runner-up”) pdf
[1] “Don’t Count The Number of Friends When You Are Spreading Information in Social Networks”, Hyoungshick Kim, IMCOM(ICUIMC): The 8th ACM International Conference on Ubiquitous Information Management and Communication, Siem Reap, Cambodia, 2014. pdf

2013

[4] “We are still vulnerable to clickjacking attacks: about 99% of Korean websites are dangerous”, Daehyun Kim and Hyoungshick Kim, WISA: The 14th International Workshop on Information Security Applications, Jeju Island, Korea, 2013. pdf (tested websites)
[3] “What’s in Twitter, I Know What Parties are Popular and Who You are Supporting Now!”, Antoine Boutet, Hyoungshick Kim and Eiko Yoneki, Social Network Analysis and Mining, Vol. 3(4), 2013. pdf
[2] “Social network analysis of patent infringement lawsuits”, Hyoungshick Kim and Jaeseung Song, Technological Forecasting & Social Change, Vol. 80(5), 2013. pdf
[1] “An Experimental Evaluation of Robustness of Networks”, Hyoungshick Kim and Ross Anderson, IEEE Systems Journal, Vol. 7(2), 2013. pdf

2012

[13] “What’s in Twitter: I Know What Parties are Popular and Who You are Supporting Now!”, Antoine Boutet, Hyoungshick Kim and Eiko Yoneki, ASONAM: The 4th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Istanbul, Turkey, 2012. pdf
[12] “Influential Neighbours Selection for Information Diffusion in Online Social Networks”, Hyoungshick Kim and Eiko Yoneki, ICCCN: The 21st IEEE International Conference on Computer Communication Networks, Munich, Germany, 2012. pdf
[11] “Efficient Channel Selection Using Hierarchical Clustering”, Hyoungshick Kim, Jon Crowcroft and Fernando M.V. Ramos, WoWMoM: The 13rd IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, San Francisco, USA, 2012. pdf
[10] “STOP: Socio-Temporal Opportunistic Patching of Short Range Mobile Malware”, John Tang, Hyoungshick Kim, Cecilia Mascolo and Mirco Musolesi, WoWMoM: The 13rd IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, San Francisco, USA, 2012. pdf
[9] “Who did you call last”, Hyoungshick Kim and Konstantin Beznosov, U-PriSM: Workshop on Usable Privacy & Security for Mobile Devices, held in conjunction with ACM SOUPS, Washington DC, USA, 2012. pdf
[8] “Polymorphic Attacks against Sequence-based Software Birthmarks”, Hyoungshick Kim, Wei Ming Khoo and Pietro Lio’, SSP: The 2nd ACM SIGPLAN Workshop on Software Security and Protection, held in conjunction with ACM PLDI, Beijing, China, 2012. pdf
[7] “What’s in Your Tweets? I Know Who You Supported in the UK 2010 General Election”, Antoine Boutet, Hyoungshick Kim and Eiko Yoneki, ICWSM: The 6th International AAAI Conference on Weblogs and Social Media, Dublin, Ireland, 2012. pdf
[6] “PIN selection policies: Are they really effective?”, Hyoungshick Kim and Jun Ho Huh, Computers & Security, Vol. 31(4), 2012. pdf
[5] “Social Authentication: Harder than it Looks”, Hyoungshick Kim, John Tang and Ross Anderson, FC: The 16th IFCA International Conference on Financial Cryptography and Data Security, Kralendijk, Bonaire, 2012. pdf

There’s press coverage. [New Scientist, Jan. 25, 2012] [Light Blue Touchpaper, Feb. 22, 2012]
[4] “Centrality Prediction in Dynamic Human Contact Networks”, Hyoungshick Kim, John Tang, Ross Anderson and Cecilia Mascolo, Computer Networks, Vol. 56(3), 2012. pdf
[3] “Temporal Node Centrality in Complex Networks”, Hyoungshick Kim and Ross Anderson, Physical Review E, Vol. 85(2), 2012. pdf

There’s press coverage. [University of Cambridge Research News, Feb. 20, 2012] [Light Blue Touchpaper, Jan. 18, 2012]
[2] “Privacy-Enhancing Queries in Personalized Search with Untrusted Service Providers”, Yunsang Oh, Hyoungshick Kim and Takashi Obi, IEICE Transactions on Information and Systems, Vol. 95-D(1), 2012. pdf
[1] “Network Analysis of Temporal Trends in Scholarly Research Productivity”, Hyoungshick Kim, Ji Won Yoon and Jon Crowcroft, Journal of Informetrics, Vol. 6(1), 2012. pdf

2011

[6] “Achieving attestation with less effort: an indirect and configurable approach to integrity reporting”, Jun Ho Huh, Hyoungshick Kim, John Lyle and Andrew Martin, STC: The 6th ACM Workshop on Scalable Trusted Computing, held in conjunction with ACM CCS, Chicago, USA, 2011.pdf
[5] “RAD: Recipient-Anonymous Data Delivery based on Public Routing Proxies”, Hyoungshick Kim and Jaehoon Jeong, Computer Networks, Vol. 55(15), 2011. pdf
[4] “Detecting DNS Poisoning Based Phishing Attacks from their Network Performance Characteristics”, Hyoungshick Kim and Jun Ho Huh, Electronics Letters, Vol. 47(11), 2011. (selected as a research highlight in briefpdf
[3] “Phishing Detection with Popular Search Engines: Simple and Effective”, Jun Ho Huh and Hyoungshick Kim, FPS: The 4th MITACS Workshop on Foundations & Practice of Security, Paris, France, 2011. pdf
[2] “A Perfect Collision-free Pseudonym System”, Ji Won Yoon and Hyoungshick Kim, IEEE Communications Letters, Vol. 15(6), 2011. pdf
[1] “Effective measurement selection in truncated kernel density estimator”, Ji Won Yoon, Hyoung-joo Lee and Hyoungshick Kim, ICUIMC: The 5th ACM International Conference on Ubiquitous Information Management and Communication, Suwon, Korea, 2011. pdf

2010

[3] “An image encryption scheme with a pseudorandom permutation based on chaotic maps”, Ji Won Yoon and Hyoungshick Kim, Communications in Nonlinear Science and Numerical Simulations, Vol. 15(12), 2010. pdf
[2] “Hybrid Spam Filtering for Mobile Communication”, Ji Won Yoon, Hyoungshick Kim and Jun Ho Huh, Computers & Security, Vol. 29(4), 2010. pdf
[1] “On the Security of Internet Banking in South Korea”, Hyoungshick Kim, Jun Ho Huh and Ross Anderson, Technical Report, RR-10-01, 2010. pdf [Another Version]

There’s press coverage. [Light Blue Touchpaper, May 12, 2012][etnews, May 3, 2010][boan news, Apr. 29. 2010][itnews, Apr. 29. 2010][edaily, Apr. 29. 2010][MK business News, Apr. 29. 2010][Mozilla in Asia, Apr. 28. 2010][etnews, Mar. 15, 2010][Yonhap News, Mar. 15, 2010][inews, Mar. 14, 2010][JoongAng Sunday, Feb. 28, 2010][Seoul Newspaper, Feb. 20, 2010][etnews, Feb. 8, 2010]

2009

[4] “Privacy-Enhanced Public View for Social Graphs”, Hyoungshick Kim and Joseph Bonneau, SWSM: The 2nd ACM Workshop on Social web search and mining, held in conjunction with ACM CIKM, Hong Kong, China, 2009. pdf
[3] “A Spatial Cloaking Framework based on Range Search for Nearest Neighbor Search”, Hyoungshick Kim, DPM: The 4th Workshop on Data Privacy Management, held in conjunction with ESORICS, St-Malo, France, 2009. pdf
[2] “A New Collision-free Pseudonym Scheme in Mobile Ad Hoc Networks”, Ji Won Yoon and Hyoungshick Kim, RAWNET/WNC3: The 5th Workshop on Resource Allocation, Cooperation and Competition in Wireless Networks, held in conjunction with WiOpt, Seoul, Korea, 2009. pdf
[1] “Dynamic Mashup Platform for Mobile Web Applications”, Seongho Cho, Hyoungshick Kim, Dongshin Jung and Ho-Yeon Park, ICCE: The 27th IEEE International Conference on Consumer Electronics, Las Vegas, USA, 2009. pdf

2007

[4] “Scalable DRM System for Media Portability”, Hyoungshick Kim, ASIAN: The 12th Annual Asian Computing Science Conference, Doha, Qatar, 2007. pdf
[3] “Self-authorized Public Key Management for Home Networks”, Hyoungshick Kim and S. Jae Oh, NCUS: The 3rd Workshop on Network Centric Ubiquitous Systems, held in conjunction with EUC, Taipei, Taiwan, 2007. pdf
[2] “Secure Scalable Streaming for Integrity Verification of Media Data”, Hyoungshick Kim, ICACT: The 9th International Conference on Advanced Communication Technology, Pheonix Park, Korea, 2007. pdf
[1] “N-times Consumable Digital Ticket and Its Application to Content Access Service”, Hyoungshick Kim, CCNC: The 4th IEEE International Consumer Communications Conference, Las Vegas, USA, 2007. pdf