Reading Seminar – List

Date Main Opponent Title
2017-10-02 MinChang Kim
2017-09-25 Eunsoo Kim
2017-09-18 Soyoung Kim
2017-09-11 Jinwoo Kim
2017-09-04 Sangjun Ko
2017-08-28 Jusop Choi
2017-08-21 Junsung Cho
2017-08-14 Mahdi Daghmehchi
2017-08-07 Geumhwan Cho
2017-07-31 Soolin Kim
2017-07-24 Seungjin Lee
2017-07-17 Kuyju Kim
2017-07-10 Hyunjae Choi
2017-07-03 Munkhzorig Dorjmyagmar
2017-06-26 Sora Lee Jaewoo Park Fake Co-visitation Injection Attacks to Recommender Systems
2017-06-19 Jaewoo Park Seunghun Cha Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
2017-06-12 Sangmin Lee Seungjin Lee Cross processor cache attacks
2017-06-05 Heejun Jang Mahdi Daghmehchi Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud
2017-05-29 Teakkyung Oh Soolin Kim The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio
2017-05-15 Moongyu Jung Sangjun Ko PayBreak : Defense Against Cryptographic Ransomware
2017-05-08 Yuri Son Jusop Choi BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection
2017-05-01 Stepan Dvorak Soyoung Kim Ad Injection at Scale: Assessing Deceptive Advertisement Modifications
2017-05-01 Soolin Kim Heejun Jang Password Manager : Attacks and Defenses
2017-04-17 Seungjin Lee Teakkyung Oh k-fingerprinting: A Robust Scalable Website Fingerprinting Technique
2017-04-10 Kuyju Kim Jusop Choi Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices
2017-04-03 Sangmin Lee Jinwoo Kim On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis
2017-03-27 MinChang Kim Mahdi Daghmehchi KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting
2017-03-20 Eunsoo Kim Kuyju Kim Mind your SMSes: Mitigating social engineering in second factor authentication
2017-03-13 Soyoung Kim Sangmin Lee Protecting Privacy of BLE Device Users
2017-03-06 Sangjun Ko Soolin Kim Scalable Graph-based Bug Search for Firmware Images
2017-02-24 Hyunjae Choi Seunghun Cha Exploiting Content Delivery Networks for covert channel communications
2017-02-15 Jinwoo Kim Eunsoo Kim To Befriend Or Not? A Model of Friend Request Acceptance on Facebook
2017-02-01 Jaewoo Park Seungjin Lee Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
2017-01-25 Sora Lee Jinwoo Kim Authentication of LZ-77 Compressed Data
2017-01-18 Jusop Choi Mahdi Daghmehchi Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition
2017-01-11 Junsung Cho Seunghun Cha Using Reflexive Eye Movements for Fast Challenge-Response Authentication
2017-01-04 Geumhwan Cho Munkhzorig Dorjmyagmar I Am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs
2016-12-28 Mahdi Daghmehchi MinChang Kim BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications
2016-12-22 Seunghun Cha Sora Lee Inferring User Routes and Locations using Zero-Permission Mobile Sensors
2016-12-08 Munkhzorig Dorjmyagmar Mahdi Daghmehchi Statistical Deobfuscation of Android Applications
2016-12-01 MinChang Kim Mahdi Daghmehchi TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime
2016-11-24 Eunsoo Kim Sora Lee Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications.
2016-11-17 Soyoung Kim Jaegwan Yu Exit from Hell? Reducing the Impact of Amplification DDoS Attacks
2016-11-03 Hyunjae Choi Sanghak Oh A Comprehensive Measurement Study of Domain Generating Malware
2016-10-20 Jinwoo Kim Jaewoo Park Looking at the Bag is not Enough to Find the Bomb: An Evasion of Structural Methods for Malicious PDF Files Detection
2016-10-13 Sangjun Ko Geumhwan Cho Understanding Password Choices: How Frequently Entered Passwords are Re-used Across Websites
2016-10-06 Jaewoo Park Jinwoo Kim A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata emb
2016-09-29 Sora Lee Junsung Cho I Think They’re Trying to Tell Me Something: Advice Sources and Selection for Digital Security
2016-09-22 Jaegwan Yu Jusop Choi The Remote Malicious Butler Did It!
2016-09-08 Junsung Cho Soyoung Kim Hidden Voice Commands
2016-08-23 Geumhwan Cho MinChang Kim Ask Me Again But Don’t Annoy Me: Evaluating Re-authentication Strategies for Smartphones
2016-08-16 Mahdi Daghmehchi Hyunjae Choi An Experimental Study of TLS Forward Secrecy Deployments
2016-08-09 Seunghun Cha Jaewoo Park FingerIO: Using Active Sonar for Fine-Grained Finger Tracking
2016-08-02 Sanghak Oh Mahdi Daghmehchi On Scalability of Software-Defined Networking
2016-07-19 Jusop Choi Security Analysis of Emerging Smart Home Applications
2016-07-12 Kyungwon Park Seunghun Cha Last-Level Cache Side-Channel Attacks are Practical
2016-07-05 Jaegwan Yu Sangjun Ko Protocol State Fuzzing of TLS Implementations
2016-06-28 Geumhwan Cho Jinwoo Kim Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices
2016-06-14 Jaewoo Park Geumhwan Cho Results and Lessons Learned from a User Study of Display Effectiveness with Experienced Cyber Security Network Analysts
2016-06-07 Joonghwan Lee Mahdi Daghmehchi Lithe: Lightweight Secure CoAP for the Internet of Things
2016-05-31 Seunghun Cha Kyungwon Park Gyrophone: Recognizing Speech from Gyroscope Signals
2016-05-24 Sanghak Oh Hyunjae Choi The Myth of the Average User: Improving Privacy and Security Systems through Individualization
2016-05-17 Junsung Cho Eunsoo Kim
2016-05-17 Sora Lee MinChang Kim I Do Not Know What You Visited Last Summer: Protecting Users from Third-party Web Tracking with TrackingFree Browser
2016-05-03 Mahdi Daghmehchi Junsung Cho Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
2016-04-26 Sangjun Ko Sora Lee WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths
2016-04-12 Jinwoo Kim Chansu Suh A Search Engine Backed by Internet-Wide Scanning
2016-04-05 Eunsoo Kim Sanghak Oh The Clock is Still Ticking: Timing Attacks in the Modern Web
2016-03-29 Jinmok Kim Sangjun Ko SKEE: A Lightweight Secure Kernel-level Execution Environment for ARM
2016-03-22 Kyungwon Park Seunghun Cha A Comprehensive Study of Frequency, Interference, and Training of Multiple Graphical Passwords
2016-03-15 Soyoung Kim Eunsoo Kim Your Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging
2016-03-09 Hyunjae Choi Sora Lee It’s Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services
2016-03-02 Jusop Choi Sangjun Ko Mobiflage: Deniable Storage Encryption for Mobile Devices
2016-02-17 Jaegwan Yu Hyunjae Choi Attacking the Network Time Protocol
2016-02-03 Kyungwon Park Jaewoo Park Who Are You? A Statistical Approach to Measuring User Authenticity
2016-01-27 Jinwoo Kim Junsung Cho Face/Off: Preventing Privacy Leakage From Photos in Social Networks
2016-01-20 Seunghun Cha Sanghak Oh Screenmilker: How to Milk Your Android Screen for Secrets
2016-01-13 Soyoung Kim Kyungwon Park
2016-01-06 Junsung Cho Jinwoo Kim Attacks on Public WLAN-based Positioning Systems
2015-12-30 Sangjun Ko Seunghun Cha HELDROID: Dissecting and Detecting Mobile Ransomware
2015-12-23 Sanghak Oh Sora Lee Monte Carlo Strength Evaluation: Fast and Reliable Password Checking
2015-12-09 Mahdi Daghmehchi Jaewoo Park GNFC: Towards Network Function Cloudification
2015-12-02 EunHyun Kim Seunghun Cha When Firmware Modifications Attack: A Case Study of Embedded Exploitation
2015-11-25 Geumhwan Cho Jaewoo Park Delayed-Dictionary Compression for Packet Networks
2015-11-11 Kyungwon Park Seongyeol Oh
2015-11-04 Joonghwan Lee Mahdi Daghmehchi Delegation-based Authentication and Authorization for the IP-based Internet of Things
2015-10-28 Jinmok Kim Seunghun Cha Evaluating the Effectiveness of Current Anti-ROP Defenses
2015-10-07 Jusop Choi Seongyeol Oh Hacking Blind
2015-09-23 Jaegwan Yu Kyungwon Park Using Hardware Features for Increased Debugging Transparency
2015-09-16 Junsung Cho Jaewoo Park On the Impact of Touch ID on iPhone Passcodes
2015-09-09 Geumhwan Cho EunHyun Kim Towards Reliable Storage of 56-bit Secrets in Human Memory
2015-09-02 Seunghun Cha Seongyeol Oh PowerSpy: Location Tracking using Mobile Device Power Analysis
2015-08-25 Sanghak Oh Junsung Cho Crying Wolf? On the Price Discrimination of Online Airline Tickets
2015-08-11 Jaewoo Park Mahdi Daghmehchi
2015-07-21 Mahdi Daghmehchi Sora Lee
2015-07-14 Yunseok Choi Seunghun Cha What the App is That? Deception and Countermeasures in the Android User Interface
2015-07-07 EunHyun Kim Sanghak Oh Characterizing hypervisor vulnerabilities in cloud computing servers
2015-06-30 Sora Lee Jaegwan Yu Automatically Detecting Vulnerable Websites Before They Turn Malicious
2015-06-23 Seongyeol Oh Jusop Choi Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components
2015-06-10 Sungsu Kwak Seongyeol Oh
2015-06-03 Joonghwan Lee Geumhwan Cho
2015-05-27 Jinmok Kim Kyungwon Park
2015-05-20 Yunseok Choi Sanghak Oh
2015-05-06 Junsung Cho Geumhwan Cho
2015-04-29 Geumhwan Cho Seongyeol Oh
2015-04-15 Mahdi Daghmehchi Kyungwon Park
2015-04-08 Jaegwan Yu Seongyeol Oh
2015-04-01 Seunghun Cha Sungsu Kwak
2015-03-25 EunHyun Kim Yunseok Choi
2015-03-11 Sanghak Oh Mahdi Daghmehchi
2015-02-25 Kyungwon Park Jaegwan Yu
2015-02-17 Youngbae Song Sungsu Kwak
2015-01-28 Jina Kang Geumhwan Cho
2015-01-21 Seongyeol Oh Jusop Choi
2015-01-14 Jaegwan Yu Yunseok Choi
2014-12-31 Youngbae Song EunHyun Kim
2014-12-23 Kyungwon Park Junsung Cho
2014-12-02 Geumhwan Cho Jina Kang
2014-11-25 Seongyeol Oh Kyungwon Park
2014-11-18 Mahdi Daghmehchi Jaegwan Yu
2014-11-07 Jusop Choi Sanghak Oh Cookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting
2014-10-28 Sungsu Kwak Seunghun Cha
2014-09-24 Yunseok Choi Kyungwon Park
2014-09-17 Seunghun Cha Seongyeol Oh
2014-09-11 EunHyun Kim Geumhwan Cho
2014-09-04 Sanghak Oh Jaegwan Yu
2014-08-20 Jina Kang Kyungwon Park