Reading Seminar

Score Board

View All

Name Main Opponent
Mahdi Daghmehchi 7 9
Seunghun Cha 7 9
Geumhwan Cho 7 6
Junsung Cho 6 5
Jusop Choi 5 4
Jaewoo Park 4 6
Sora Lee 4 6
Jinwoo Kim 4 5
Sangjun Ko 4 3
Soyoung Kim 4 1
Hyunjae Choi 3 3
Eunsoo Kim 3 3
MinChang Kim 2 3
Sangmin Lee 1 1
Munkhzorig Dorjmyagmar 1 1
Kuyju Kim 1 1
Seungjin Lee 1 1
Heejun Jang 1 0
Soolin Kim 0 1
Teakkyung Oh 0 1
Nakmun Jung 0 0
Yuri Son 0 0
Moongyu Jung 0 0
Stepan Dvorak 0 0

List

View All    Update List

Date Main Opponent Title
17.2.1 Jaewoo Park Seungjin Lee Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
17.2.15 Jinwoo Kim Eunsoo Kim To Befriend Or Not? A Model of Friend Request Acceptance on Facebook
17.2.24 Hyunjae Choi Seunghun Cha Exploiting Content Delivery Networks for covert channel communications
17.3.6 Sangjun Ko Soolin Kim Scalable Graph-based Bug Search for Firmware Images
17.3.13 Soyoung Kim Sangmin Lee Protecting Privacy of BLE Device Users
17.3.20 Eunsoo Kim Kuyju Kim Mind your SMSes: Mitigating social engineering in second factor authentication
17.3.27 MinChang Kim Mahdi Daghmehchi KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting
17.4.3 Sangmin Lee Jinwoo Kim On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis
17.4.10 Kuyju Kim Jusop Choi Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices
17.4.17 Seungjin Lee Teakkyung Oh k-fingerprinting: A Robust Scalable Website Fingerprinting Technique
17.5.1 Soolin Kim Heejun Jang Password Manager : Attacks and Defenses
17.5.1 Stepan Dvorak Soyoung Kim Ad Injection at Scale: Assessing Deceptive Advertisement Modifications
17.5.8 Yuri Son
17.5.15 Moongyu Jung
17.5.29 Teakkyung Oh
17.6.5 Sangmin Lee
17.6.12 Sora Lee
17.6.19 Jaewoo Park
17.6.26 Seunghun Cha
17.7.3 Hyunjae Choi
17.7.10 Munkhzorig Dorjmyagmar
17.7.17 Kuyju Kim
17.7.24 Seungjin Lee