Reading Seminar

Score Board

View All

Name Main Opponent
Mahdi Daghmehchi 7 11
Geumhwan Cho 7 6
Junsung Cho 6 5
Jaewoo Park 5 7
Sora Lee 5 6
Jusop Choi 5 5
Jinwoo Kim 4 6
Sangjun Ko 4 4
Soyoung Kim 4 3
Hyunjae Choi 4 3
Eunsoo Kim 3 3
MinChang Kim 2 3
Seungjin Lee 2 2
Sangmin Lee 2 1
Munkhzorig Dorjmyagmar 2 1
Kuyju Kim 2 1
Soolin Kim 1 3
Teakkyung Oh 1 1
Heejun Jang 1 1
Yuri Son 1 0
Moongyu Jung 1 0
Stepan Dvorak 1 0
Nakmun Jung 0 0

List

View All    Update List

Date Main Opponent Title
17.5.1 Soolin Kim Heejun Jang Password Manager : Attacks and Defenses
17.5.1 Stepan Dvorak Soyoung Kim Ad Injection at Scale: Assessing Deceptive Advertisement Modifications
17.5.8 Yuri Son Jusop Choi BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection
17.5.15 Moongyu Jung Sangjun Ko PayBreak : Defense Against Cryptographic Ransomware
17.5.29 Teakkyung Oh Soolin Kim The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio
17.6.5 Heejun Jang Mahdi Daghmehchi Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud
17.6.12 Sangmin Lee Seungjin Lee Cross processor cache attacks
17.6.19 Jaewoo Park Seunghun Cha Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
17.6.26 Sora Lee Jaewoo Park Fake Co-visitation Injection Attacks to Recommender Systems
17.7.4 Munkhzorig Dorjmyagmar Mahdi Daghmehchi Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
17.7.11 Hyunjae Choi Soolin Kim Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop
17.7.18 Kuyju Kim Jinwoo Kim The Password Reset MitM Attack
17.7.25 Seungjin Lee Soyoung Kim Protecting Insecure Communications with Topology-aware Network Tunnels
17.8.1 Soolin Kim Geumhwan Cho All your browser-saved passwords could belong to us: a security analysis and a cloud-based new design
17.8.8 Geumhwan Cho
17.8.14 Mahdi Daghmehchi
17.8.21 Junsung Cho
17.8.28 Jusop Choi
17.9.4 Sangjun Ko
17.9.11 Jinwoo Kim
17.9.18 Soyoung Kim
17.9.25 Eunsoo Kim
17.10.2 MinChang Kim