(Here, papers are restricted to academic use within not-for-profit institutions.)
2024
[17] “The Silence of the Phishers: Early-Stage Voice Phishing Detection with Runtime Permission Requests”, Chanjong Lee, Bedeuro Kim, and Hyoungshick Kim, Computers & Security, 2024. (under major revision)
[16] “Crumbled Cookies: Exploring E-commerce Websites’ Cookie Policies with Data Protection Regulations”, Nivedita Singh, Yejin Do, Yongsang Yu, Imane Fouad, Jungrae Kim, and Hyoungshick Kim, ACM Transactions on the Web, 2024. [accepted]
[15] “Patch or Perish: Managing Ethereum Smart Contract Vulnerabilities”, Taeyoung Kim, Gilhee Lee, and Hyoungshick Kim, AICompS: The 1st International Conference on Artificial Intelligence Computing and Systems, 2024. [accepted]
[14] “Behind the Screen: How Cookies Become Your Identity’s Price Tag”, Nivedita Singh and Hyoungshick Kim, AICompS: The 1st International Conference on Artificial Intelligence Computing and Systems, 2024. [accepted]
[13] “Improving the Robustness of Rumor Detection Models with Metadata-Augmented Evasive Rumor Datasets”, Larry Huynh, Andrew Gansemer, Hyoungshick Kim and Jin Hong, WISE: The 25th International Conference on Web Information Systems Engineering, Doha, Qatar, 2024. [accepted]
[12] “Blind-Match: Efficient Homomorphic Encryption-Based 1:N Matching for Privacy-Preserving Biometric Identification”, Hyumin Choi, Jiwon Kim, Chiyoung Song, Simon S. Woo, and Hyoungshick Kim, CIKM: The 33rd ACM International Conference on Information and Knowledge Management [Applied research track], Boise, USA, 2024. pdf
[11] “CryptoLLM: Harnessing the Power of LLMs to Detect Cryptographic API Misuse”, Heewon Baek, Minwook Lee, and Hyoungshick Kim, ESORICS: The 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, 2024. pdf
[10] “I Experienced More than 10 DeFi Scams: On DeFi Users’ Perception of Security Breaches and Countermeasures”, Mingyi Liu, Jun Ho Huh, Hyungseok Han, Jaehyuk Lee, Jihae Ahn, Frank Li, Hyoungshick Kim, and Taesoo Kim, USENIX Security: The 33rd USENIX Security Symposium, Boston, USA, 2024. pdf
[9] “UniHENN: Designing Faster and More Versatile Homomorphic Encryption-based CNNs without im2col”, Hyunmin Choi, Jihun Kim, Seungho Kim, Seonhye Park, Jeongyong Park, Wonbin Choi, Hyoungshick Kim, IEEE Access, 2024. pdf
[8] “(In)visible Privacy Indicator: Security Analysis of Privacy Indicator on Android Devices”, Yurak Choe, Hyungseok Yu, Taeho Kim, Shinjae Lee, Hojoon Lee and Hyoungshick Kim, ASIACCS: The 17th ACM Asia Conference on Computer and Communications Security, Singapore, 2024. pdf
[7] “SingleADV: Single-Class Target-Specific Attack against Interpretable Deep Learning Systems”, Eldor Abdukhamidov, Mohammed Abuhamad, George Thiruvathukal, Hyoungshick Kim, and Tamer Abuhmed, IEEE Transactions on Information Forensics and Security, 2024. pdf
[6] “MotionID: Towards Practical Behavioral Biometrics-Based Implicit User Authentication on Smartphones”, Mohsen Ali Alawami, Tamer AbuHamed, Mohammed AbuHamed, and Hyoungshick Kim, Pervasive and Mobile Computing, 2024. pdf
[5] “Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers’ Coding Practices with Insecure Suggestions from Poisoned AI Models”, Sanghak Oh, Kiho Lee, Seonhye Park, Doowon Kim, and Hyoungshick Kim, S&P: The 45th IEEE Symposium on Security and Privacy, San Francisco, USA, 2024. pdf video code [Readable, Jul. 29, 2024]
[4] “AdFlush: A Real-World Deployable Machine Learning Solution for Effective Advertisement and Web Tracker Prevention”, Kiho Lee, Chaejin Lim, Beomjin Jin, Taeyoung Kim, and Hyoungshick Kim, WWW: The 33rd Web Conference, Singapore, 2024. pdf video1 video2 code dataset
[3] “Design and Evaluation of Highly Accurate Smart Contract Code Vulnerability Detection Framework”, Sowon Jeon, Gilhee Lee, Hyoungshick Kim, and Simon Woo, Data Mining and Knowledge Discovery, 2024. pdf
[2] “Sharing cyber threat intelligence: Does it really help?”, Beomjin Jin, Eunsoo Kim, Hyunwoo Lee, Elisa Bertino, Doowon Kim, Hyoungshick Kim, NDSS: The 31st Network and Distributed System Security Symposium, San Diego, USA, 2024. pdf code
[1] “Blind-Touch: Homomorphic Encryption-Based Distributed Neural Network Inference for Privacy-Preserving Fingerprint Authentication”, Hyunmin Choi, Simon Woo, and Hyoungshick Kim, AAAI: The 38th Annual AAAI Conference on Artificial Intelligence [AI for Social Impact track], Vancouver, Canada, 2024. pdf code
2023
[14] “DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks”, Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, and Surya Nepal, ACSAC: The 39th Applied Computer Security Applications Conference, Austin, USA, 2023. pdf
[13] “BTFuzzer: a profile-based fuzzing framework for Bluetooth protocols”, Min Jang, Yuna Hwang, Yonghwi Kwon, Hyoungshick Kim, ICISC: The 26th Annual International Conference on Information Security and Cryptology, Seoul, Korea, 2023. [Best Paper Award] pdf
[12] “DID We Miss Anything?: Towards Privacy-Preserving Decentralized ID Architecture”, Siwon Huh, Myungkyu Shim, Jihwan Lee, Simon Woo, Hyoungshick Kim, and Hojoon Lee, IEEE Transactions on Dependable and Secure Computing, 2023. pdf
[11] “Why Johnny Can’t Use Secure Docker Images: Investigating the Usability Challenges in Using Docker Image Vulnerability Scanners through Heuristic Evaluation”, Taeyoung Kim, Seonhye Park, and Hyoungshick Kim, RAID: The 26th International Symposium on Research in Attacks, Intrusions, and Defenses, Hong Kong, 2023. pdf
[10] “BlindFilter: Privacy-Preserving Spam Email Detection Using Homomorphic Encryption”, Dongwon Lee, Myeonghwan Ahn, Hyesun Kwak, Jin B. Hong, Hyoungshick Kim, SRDS: The 42nd International Symposium on Reliable Distributed Systems, Marrakech, Morocco, 2023. pdf
[9] “On the Long-Term Effects of Continuous Keystroke Authentication: Keeping User Frustration Low through Behavior Adaptation”, Jun Ho Huh, Sungsu Kwag, Iljoo Kim, Alexandr Popov, Younghan Park, Geumhwan Cho, Juwon Lee, Hyoungshick Kim, and Choong-Hoon Lee, UbiComp: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Cancún, Mexico, 2023. pdf
[8] “An ICN-based data marketplace model based on a game theoretic approach using quality-data discovery and profit optimization”, Eunil Seo, Hyoungshick Kim, Bhaskar Krishnamachari, and Erik Elmroth, IEEE Transactions on Cloud Computing, 2023. pdf
[7] “SmartMark: Software Watermarking Scheme for Smart Contracts”, Taeyoung Kim, Yunhee Jang, Chanjong Lee, Hyungjoon Koo, and Hyoungshick Kim, ICSE: The 45th International Conference on Software Engineering, Melbourne, Australia, 2023. pdf
[6] “AppSniffer: Towards Robust Mobile App Fingerprinting Against VPN”, Sanghak Oh, Minwook Lee, Hyunwoo Lee, Elisa Bertino, and Hyoungshick Kim, WWW: The 32nd Web Conference, Austin, USA, 2023. pdf
[5] “PP-GSM: Privacy-Preserving Graphical Security Model for Security Assessment as a Service”, Dongwon Lee, Yongwoo Oh, Jin Hong, Hyoungshick Kim, and Dongseong Kim, Future Generation Computer Systems, 2023. pdf
[4] “On the effectiveness of perturbations in generating evasive malware variants”, Beomjin Jin, Jusop Choi, Jin B. Hong, and Hyoungshick Kim, IEEE Access, 2023. pdf
[3] “A Comparative Study of Time Series Anomaly Detection Models for Industrial Control Systems”, Bedeuro Kim, Mohsen Ali Alawami, Eunsoo Kim, Sanghak Oh, Jeongyong Park, and Hyoungshick Kim, Sensors, 2023. pdf
[2] “MENDEL: Time series anomaly detection using transfer learning for industrial control systems”, Jeongyong Park, Bedeuro Kim, and Hyoungshick Kim, BigComp: The 10th IEEE International Conference on Big Data and Smart Computing, Jeju Island, Korea, 2023. pdf
[1] “When social networks meet payment: a security perspective”, Nivedita Singh, Mohsen Ali, and Hyoungshick Kim, IMCOM: The 17th International Conference on Ubiquitous Information Management and Communication, Seoul, Korea, 2023. pdf
2022
[8] “LocID: A secure and usable location-based smartphone unlocking scheme using Wi-Fi signals and light intensity”, Mohsen Alawami, Aishwarya Ram Vinay, and Hyoungshick Kim, IEEE Internet of Things, 2022. pdf
[7] “Mutexion: Mutually Exclusive Compression System for Mitigating Compression Side-Channel Attacks”, Taegeun Moon, Hyoungshick Kim, and Sangwon Hyun, ACM Transactions on the Web, 2022. pdf
[6] “Adversarial Perturbation Attacks on the State-of-the-Art Cryptojacking Detection System in IoT Networks”, Kiho Lee, Sanghak Oh, and Hyoungshick Kim, CCS: The 29th ACM Conference on Computer and Communications Security (Poster), Los Angeles, USA, 2022. pdf
[5] “VulDeBERT: A Vulnerability Detection System Using BERT”, Soolin Kim, Jusop Choi, Muhammad Ejaz Ahmed, Surya Nepal, and Hyoungshick Kim, ISSRE: The 33rd International Symposium on Software Reliability Engineering (Industry track), Charlotte, USA, 2022. pdf
[4] “Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for IoT?”, Jihyeon Ryu, Yansong Gao, Alsharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang, Wireless Networks, 2022. pdf
[3] “Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things”, Yansong Gao, Minki Kim, Chandra Thapa, Alsharif Abuadbba, Zhi Zhang, Seyit Camtepe, Hyoungshick Kim, and Surya Nepal, IEEE Transactions on Computers, 2022. pdf
[2] “Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks”, Yansong Gao, Yeonjae Kim, Bao Gia Doan, Zhi Zhang, Gongxuan Zhang, Surya Nepal, Damith C. Ranasinghe, and Hyoungshick Kim, IEEE Transactions on Dependable and Secure Computing, 2022. pdf
[1] “MES-FPMIPv6: MIH-Enabled and Enhanced Secure Fast Proxy Mobile IPv6 Handover Protocol for 5G Networks”, Fikadu Degefa, Jihyeon Ryu, Hyoungshick Kim, and Dongho Won, PLOS ONE, 2022. pdf
2021
[13] “Security Evaluation of n-Choose-k-Sum PUFs against Modeling Attacks”, Pang Lihui, Hyoungshick Kim, Bin Yang, Xinlin Wang, and Yangsong Gao, IEEE Access, 2021. pdf
[12] “Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure”, Beom Heyn Kim and Hyoungshick Kim, ACSAC: The 37th Annual Computer Security Applications Conference, Virtual, 2021. pdf
[11] “ARGH!: Automated Rumor Generation Hub”, Larry Huynh, Manh Duy Thai Nguyen, Joshua Goh, Hyoungshick Kim, and Jin Hong, CIKM: The 30th ACM International Conference on Information and Knowledge Management [Applied research track][Best Paper Nominations], Virtual, 2021. pdf
[10] “Peeler: Profiling Kernel-Level Events to Detect Ransomware”, Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, and Surya Nepal, ESORICS: The 26th European Symposium on Research in Computer Security, Virtual, 2021. pdf
[9] “On the robustness of intrusion detection systems for vehicles against adversarial attacks”, Jeongseok Choi and Hyoungshick Kim, WISA: The 22nd World Conference on Information Security Applications, Jeju Island, Korea, 2021. pdf
[8] “SmartConDetect: Highly Accurate Smart Contract Code Vulnerability Detection Mechanism using BERT”, Sowon Jeon, Gilhee Lee, Hyoungshick Kim, and Simon Woo, PLP: The 1st KDD Workshop on Programming Language Processing, Virtual, 2021. (Best Paper Award) pdf
[7] “Towards Usable and Secure Location-based Smartphone Authentication”, Geumhwan Cho, Sungsu Kwag, Jun Ho Huh, Bedeuro Kim, Choong-Hoon Lee, and Hyoungshick Kim, SOUPS: The 17th Symposium On Usable Privacy and Security, Virtual, 2021. pdf
[6] “Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks”, William Aiken, Hyoungshick Kim, Simon Woo, and Jungwoo Ryoo, Computers & Security, 2021. pdf
[5] “Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN”, Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Surya Nepal, and Hyoungshick Kim, DSN: The 51st IEEE/IFIP International Conference on Dependable Systems and Networks, 2021. pdf
[4] “Fine with “1234”? An Analysis of SMS One-Time Password Randomness in Android Apps”, Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diet Ostry, and Cong Sun, ICSE: The 43rd International Conference on Software Engineering, Madrid, Spain, 2021. pdf
[3] “FUMVar: A Practical Framework for Generating Fully-working and Unseen Malware Variants”, Beomjin Jin, Jusop Choi, Hyoungshick Kim, and Jin B. Hong, SAC: The 36th ACM/SIGAPP Symposium On Applied Computing, Gwangju, Korea, 2021. pdf
[2] “DeepiSign: Invisible Fragile Watermark to Protect the Integrity and Authenticity of CNN”, Sharif Abuadbba, Hyoungshick Kim and Surya Nepal, SAC: The 36th ACM/SIGAPP Symposium On Applied Computing, Gwangju, Korea, 2021. pdf
[1] “A Security Analysis of Blockchain-Based DID Services”, Bong Gon Kim, Young-Seob Cho, Seok-Hyun Kim, Hyoungshick Kim, and Simon S. Woo, IEEE Access, 2021. pdf
2020
[28] “Can We Create a Cross-Domain Federated Identity for the Industrial Internet of Things without Google?”, Eunsoo Kim, Young-Seob Cho, Bedeuro Kim, Woojoong Ji, Seok-hyun Kim, Simon S. Woo, and Hyoungshick Kim, IEEE Internet of Things Magazine, 2021. pdf
[27] “ConTheModel: Can we modify tweets to confuse classifier models?”, Aishwarya Ram Vinay, Mohsen Ali Alawami and Hyoungshick Kim, The Silicon Valley Cybersecurity Conference, 2020. pdf
[26] “MurQRI: Encrypted Multi-Layer QR Codes for Electronic Identity Management”, Bonha Koo, Taegeun Moon and Hyoungshick Kim, The Silicon Valley Cybersecurity Conference, 2020. pdf
[25] “A secure and lightweight 3 factor-based authentication scheme for smart healthcare systems”, Jihyeon Ryu, Dongwoo Kang, Hakjun Lee, Hyoungshick Kim, and Dongho Won, Sensors, 2020. pdf
[24] “DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation”, Bedeuro Kim, Abuadbba Sharif and Hyoungshick Kim, ACISP: The 25th Australasian Conference on Information Security and Privacy, Perth, Australia, 2020. pdf video
[23] “Design and Evaluation of Enumeration Attacks on Package Tracking Systems”, Hanbin Jang, Woojung Ji, Simon Woo and Hyoungshick Kim, ACISP: The 25th Australasian Conference on Information Security and Privacy, Perth, Australia, 2020. pdf video
[22] “eATP: enhancing APT with a mirror site resolver”, Gilhee Lee, Taegeun Moon, Min Jang, and Hyoungshick Kim, ISSRE: The 31st International Symposium on Software Reliability Engineering (Industry track), Coimbra, Portugal, 2020. pdf code
[21] “Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?”, Alsharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit A. Camtepe, Yansong Gao, Hyoungshick Kim and Surya Nepal, ASIACCS: The 13rd ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, 2020. pdf
[20] “PassTag: A Graphical-Textual Hybrid Fallback Authentication System”, Joon Kuy Han, Simon Woo and Hyoungshick Kim, ASIACCS: The 13rd ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, 2020. pdf
[19] “End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things”, Yansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa, Kyuyeon Kim, Seyit A. Camtepe, Hyoungshick Kim, and Surya Nepal, SRDS: The 39th International Symposium on Reliable Distributed Systems, Shanghai, China, 2020. pdf video code
[18] “On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better?”, Geumhwan Cho, Jun Ho Huh, Soolin Kim, Junsung Cho, Heesung Park, Yenah Lee, Konstantin Beznosov, and Hyoungshick Kim, ACM Transactions on Privacy and Security, 2020. pdf
[17] “Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection”, Young-hwan Kim, Huy Kang Kim, Hyoungshick Kim, and Jin Hong, IEEE Access, 2020. pdf
[16] “Void: A fast and light voice liveness detection system”, Muhammad Ejaz Ahmed, Ilyoup Kwak, Jun Ho Huh, Iljoo Kim, Taekkyung Oh, and Hyoungshick Kim, USENIX Security: The 29th USENIX Security Symposium, Boston, USA, 2020. pdf video
(There’s press coverage. [techAU, Jun. 22, 2020][FutureFive, Jun. 23, 2020][ZDNet, Jun. 22, 2020])
[15] “A Three-factor Anonymous User Authentication Scheme for Internet of Things Environments”, Hakjun Lee, Dongwoo Kang, Jihyeon Ryu, Sewan Ha, Dongho Won, and Hyoungshick Kim, Journal of Information Security and Applications, 2020. pdf
[14] “Gesture Authentication for Smartphones: Evaluation of Gesture Password Selection Policies”, Eun yong Cheon, Yonghwan Shin, Jun Ho Huh, Hyoungshick Kim and Ian Oakley, S&P: The 41st IEEE Symposium on Security and Privacy, San Francisco, USA, 2020. pdf video 1 video 2
[13] “SENTINEL: A Secure and Efficient Authentication Framework for Unmanned Aerial Vehicles”, Geumhwan Cho, Junsung Cho, Sangwon Hyun, and Hyoungshick Kim, Applied Sciences, 2020. pdf
[12] “I’ve Got Your Packages: Harvesting customers’ delivery order information using package tracking number enumeration”, Simon Woo, Hanbin Jang, Woojung Ji and Hyoungshick Kim, WWW: The 29th Web Conference, Taipei, Taiwan, 2020. pdf
[11] “ACIDroid: A Practical App Cache Integrity Protection System on Android Runtime”, Jusop Choi, Soolin Kim, Junsung Cho, Kuyju Kim, Seok Hong and Hyoungshick Kim, SAC: The 35th ACM/SIGAPP Symposium On Applied Computing, Brno, Czech Republic, 2020. pdf video
[10] “IBCS: Intent-Based Cloud Services for Security Applications”, Jinyong (Tim) Kim, Eunsoo Kim, Jinhyuk Yang, Jaehoon (Paul) Jeong, Hyoungshick Kim, Sangwon Hyun, Hyunshik Yang, Jaewook Oh, Younghan Kim, Susan Hares, and Linda Dunbar, IEEE Communications Magazine, 2020. pdf
[9] “Towards Secure and Usable Certificate-Based Authentication System Using a Secondary Device for an Industrial Internet of Things”, Jusop Choi, Junsung Cho, Sangwon Hyun, and Hyoungshick Kim, Applied Sciences, 2020. pdf
[8] “LightLock: user identification system using light intensity readings on smartphones”, Mohsen Alawami, William Aiken, and Hyoungshick Kim, IEEE Sensors, 2020. pdf
[7] “Design of a framework to detect device spoofing attacks using network characteristics”, Jaegwan Yu, Eunsoo Kim, Hyoungshick Kim and Jun Ho Huh, IEEE Consumer Electronics Magazine (feature article), 2020. pdf
[6] “Efficient privacy preserving fingerprint-based authentication system using fully homomorphic encryption”, Taeyun Kim, Yongwoo Oh and Hyoungshick Kim, Security and Communication Networks, 2020. pdf code
[5] “Tale of Two Browsers: Understanding Users’ Web Browser Choices in South Korea”, Simon Woo, Hyoungshick Kim, Ji Won Choi, Soyoon Jeon, Jihye Woo and Joon Han, AsiaUSEC, 2020. pdf
[4] “Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms”, Mahdi Daghmehchi Firoozjaei, Ali Ghorbani, Hyoungshick Kim, and JaeSeung Song, Sensors, 2020. pdf
[3] “LocAuth: A Fine-grained Indoor Location-based Authentication System using Wireless Networks Characteristics”, Mohsen Alawami and Hyoungshick Kim, Computers & Security, 2020. pdf
[2] “Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment”, Jihyeon Ryu, Hyoungshick Kim, Youngsook Lee, and Dongho Won , IMCOM(ICUIMC): The 14th International Conference on Ubiquitous Information Management and Communication, Taichung, Taiwan, 2020. pdf
[1] “On the robustness of Lightning Network in Bitcoin”, Seungjin Lee and Hyoungshick Kim, Pervasive and Mobile Computing, 2020. pdf
2019
[21] “Cryptanalysis of Kumar et al.’s authentication protocol for wireless sensor networks”, Sewan Ha, Jihyeon Ryu, Hyoungshick Kim, Dongho Won, and Youngsook Lee, ICISA: The 10th International Conference on Information Science and Applications, 2019. pdf
[20] “AMVG: Adaptive Malware Variant Generation Framework Using Machine Learning”, Jusop Choi, Dongsoon Shin, Hyoungshick Kim, Jason Seotis and Jin B. Hong, PRDC: The 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019. pdf
[19] “Kerberoid: A practical Android app decompilation system with multiple decompilers”, Heejun Jang, Beomjin Jin, Sangwon Hyun and Hyoungshick Kim, CCS: The 26th ACM Conference on Computer and Communications Security (Poster), London, UK, 2019. pdf video code
[18] “A Proof-of-Stake (PoS) blockchain protocol using fair and dynamic sharding management”, Daehwa Rayer Lee, Yunhee Jang and Hyoungshick Kim, CCS: The 26th ACM Conference on Computer and Communications Security (Poster), London, UK, 2019. pdf
[17] “Nickel to Lego: Using Foolgle to Create Adversarial Examples to fool Google Cloud Speech-to-Text API”, Joon Kuy Han, Hyoungshick Kim and Simon Woo, CCS: The 26th ACM Conference on Computer and Communications Security (Poster), London, UK, 2019. pdf
[16] “CBDN: Cloud-Based Drone Navigation for Efficient Battery Charging in Drone Networks”, Jinyong Kim, Seokhwa Kim, Jaehoon Jeong, Hyoungshick Kim, Jung-Soo Park, Taeho Kim, IEEE Transactions on Intelligent Transportation Systems, 2019. pdf
[15] “An Eye for an Eye: Economics of Retaliation in Mining Pools”, Yujin Kwon, Hyoungshick Kim, Yung Yi and Yongdae Kim, AFT: The 1st ACM conference on Advances in Financial Technologies, Zurich, Switzerland, 2019. pdf
[14] “EVChain: A Blockchain-based Credit Sharing in Electric Vehicles Charging”, Mahdi Daghmehchi Firoozjaei, Ali Ghorbani, Hyoungshick Kim and Jaeseung Song, PST: The 17th International Conference on Privacy, Security and Trust, Fredericton, Canada, 2019. pdf
[13] “Profiling-based classification algorithms for security applications in Internet of Things”, Eunil Seo, Hyoungshick Kim, and Tai-Myoung Chung, ICIOT: The 3rd IEEE International Congress on Internet of Things, Milan, Italy, 2019. pdf
[12] “Understanding Users’ Risk Perceptions about Personal Health Records Shared on Social Networking Services”, Yuri Son, Geumhwan Cho, Hyoungshick Kim and Simon Woo, ASIACCS: The 12nd ACM Asia Conference on Computer and Communications Security, Auckland, New Zealand, 2019. pdf
[11] “Automated cash mining attacks on mobile advertising networks”, Woojoong Ji, Taeyun Kim, Kuyju Kim and Hyoungshick Kim, ACISP: The 24th Australasian Conference on Information Security and Privacy, Christchurch, New Zealand, 2019. pdf
[10] “80% of block propagation rate is enough: towards secure and efficient PoW-based blockchain consensus”, Daehwa Rayer Lee, Yunhee Jang, Hanbin Jang and Hyoungshick Kim, MobiSys: The 17th ACM International Conference on Mobile Systems, Applications, and Services (Poster), Seoul, Korea, 2019. pdf
[9] “The Light will be with you. Always: A novel continuous mobile authentication with the light sensor”, Mohsen A. Alawami, William Aiken and Hyoungshick Kim, MobiSys: The 17th ACM International Conference on Mobile Systems, Applications, and Services (Poster), Seoul, Korea, 2019. pdf
[8] “O2TR: Offline OTR Messaging System under Network Disruption”, Mahdi D Firoozjaei, Minchang Kim, Jaeseung Song and Hyoungshick Kim, Computers & Security, 2019. pdf
[7] “Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems”, Jusop Choi, Jaegwan Yu, Sangwon Hyun and Hyoungshick Kim, Digital Investigation, 2019. pdf
[6] “Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems”, Jusop Choi, Jaegwan Yu, Sangwon Hyun and Hyoungshick Kim, DFRWS EU: Digital Forensic Research Workshop EU, 2019. pdf
[5] “Statistical Application Fingerprinting for DDoS Attack Mitigation”, Muhammad Ejaz Ahmed, Saeed Ullah, and Hyoungshick Kim, IEEE Transactions on Information Forensics and Security, 2019. pdf
[4] “Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?”, Yujin Kwon, Hyoungshick Kim, Jinwoo Shin and Yongdae Kim, S&P: The 40th IEEE Symposium on Security and Privacy, San Francisco, USA, 2019. pdf video
[3] “A Framework for DNS Naming Services for Internet-of-Things Devices”, Keuntae Lee, Seokhwa Kim, Jaehoon Jeong, Sejun Lee, Hyoungshick Kim and Jung-Soo Park, Future Generation Computer Systems, 2019. pdf
[2] “Data-driven Selection of Security Application Frameworks During Architectural Design”, Humberto Cervantes, Rick Kazman, Jungwoo Ryoo, Junsung Cho, Geumhwan Cho, Hyoungshick Kim and Jina Kang, HICSS: The 52nd Hawaii International Conference on System Sciences, 2019. pdf
[1] “Efficient Software Implementation of Homomorphic Encryption for Addition and Multiplication Operations”, Yongwoo Oh, Taeyun Kim and Hyoungshick Kim, IMCOM(ICUIMC): The 13rd International Conference on Ubiquitous Information Management and Communication, Phuket, Thailand, 2019. pdf
2018
[26] “Secure and Efficient Three-factor Protocol for Wireless Sensor Networks”, Jihyeon Ryu, Hakjun Lee, Hyoungshick Kim and Dongho Won, Sensors, 2018. pdf
[25] “When Harry met Tinder: Security analysis of dating apps on Android”, Kuyju Kim, Taeyun Kim, Seungjin Lee, Soolin Kim and Hyoungshick Kim, NordSec: The 23rd Nordic Conference on Secure IT Systems, 2018. pdf
[24] “MEDUSA: Malware detection using statistical analysis of system’s behavior”, Muhammad Ejaz Ahmed, Surya Nepal and Hyoungshick Kim, CIC: The 4th IEEE International Conference on Collaboration and Internet Computing, Philadelphia, USA, 2018. pdf
[23] “Cryptanalysis of Improved and Provably Secure Three-Factor User Authentication Scheme for Wireless Sensor Networks”, Jihyeon Ryu, Taeui Song, Jongho Moon, Hyoungshick Kim and Dongho Won, ICCST: The 5th International Conference on Computational Science and Technology, Kota Kinabalu, Malaysia, 2018. pdf
[22] “The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns”, Julian Rauchberger, Sebastian Schrittwieser, Tobias Dam, Robert Luh, Damjan Buhov, Gerhard Pötzelsberger and Hyoungshick Kim, ARES: The 13rd International Conference on Availability, Reliability and Security, Hamburg, Germany, 2018. pdf
[21] “An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks”, William Aiken, Jungwoo Ryoo, Hyoungshick Kim and Mary Beth Rosson, PST: The 16th International Conference on Privacy, Security and Trust, Belfast, United Kingdom, 2018. pdf
[20] “Threat modeling and analysis of voice assistant applications”, Geumhwan Cho, Jusop Choi, Hyoungshick Kim, Sangwon Hyun and Jungwoo Ryoo, WISA: The 19th World Conference on Information Security Applications, Jeju Island, Korea, 2018. pdf
[19] “An Analysis of Research Trends in Computer Security over the Last Decade”, Daehwa Lee and Hyoungshick Kim, ICSSA: The 4th International Conference on Software Security and Assurance, Seoul, Korea, 2018. pdf
[18] “Hey Siri – are you there?: Jamming of voice commands using the resonance effect”, Taekkyung Oh, William Aiken and Hyoungshick Kim, ICSSA: The 4th International Conference on Software Security and Assurance, Seoul, Korea, 2018. pdf
[17] “Cloud-Based Battery Replacement Scheme for Smart Electric Bus System”, Jinyong Kim, Jaehoon Jeong, Hyoungshick Kim and Jung-Soo Park, IETE Journal of Research, 2018. pdf
[16] “Design and Analysis of Push Notification-Based Malware on Android”, Sangwon Hyun, Junsung Cho, Geumhwan Cho and Hyoungshick Kim, Security and Communication Networks, 2018. pdf video
[15] “Two-Thumbs-Up: Physical Protection for PIN Entry Secure against Recording Attacks”, DaeHun Nyang, Hyoungshick Kim, Woojoo Lee, Sung-bae Kang, Geumhwan Cho, Mun-Kyu Lee and Aziz Mohaisen, Computers & Security, 2018. pdf
[14] “CyTIME: Cyber Threat Intelligence ManagEment framework for automatically generating security rules”, Eunsoo Kim, Kuyju Kim, Dongsoon Shin, Beomjin Jin and Hyoungshick Kim, CFI: The 13rd International Conference on Future Internet Technologies, 2018. pdf
[13] “The Personal Identification Chord: A Four Button Authentication System for Smartwatches”, Ian Oakley, Jun Ho Huh, Junsung Cho, Geumhwan Cho, MD. Rasel Islam and Hyoungshick Kim, ASIACCS: The 11st ACM Asia Conference on Computer and Communications Security, Incheon, Korea, 2018. pdf video
[12] “DeepCRACk: Using Deep learning to automatically CRack Audio CAPTCHAs”, William Aiken and Hyoungshick Kim, ASIACCS: The 11st ACM Asia Conference on Computer and Communications Security (poster), Incheon, Korea, 2018. pdf
[11] “Can we use biometric authentication on cloud?: Fingerprint authentication using homomorphic encryption”, Taeyun Kim and Hyoungshick Kim, ASIACCS: The 11st ACM Asia Conference on Computer and Communications Security (poster), Incheon, Korea, 2018. pdf
[10] “I can’t hear this because I am human: A novel design of audio CAPTCHA system”, Jusop Choi, Taekkyung Oh, William Aiken, Simon S. Woo and Hyoungshick Kim, ASIACCS: The 11st ACM Asia Conference on Computer and Communications Security (poster), Incheon, Korea, 2018. pdf
[9] “Efficient and Secure Biometric-based User Authenticated Key Agreement Scheme with Anonymity”, Dongwoo Kang, Jaewook Jung, Youngsook Lee, Dongho Won and Hyoungshick Kim, Security and Communication Networks, 2018. pdf
[8] “User Credential Cloning Attacks in Android Applications”, Junsung Cho, Dayeon Kim and Hyoungshick Kim, IEEE Consumer Electronics Magazine, 2018. pdf
[7] “I’m Listening to your Location! Inferring User Location with Acoustic Side Channel”, Youngbae Jeon, Minchul Kim, Hyunsoo Kim, Hyoungshick Kim, Jun Ho Huh and Ji Won Yoon, WWW: The 27th Web Conference, Lyon, France, 2018. pdf
[6] “No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games”, Eunjo Lee, Jiyoung Woo, Hyoungshick Kim and Huy Kang Kim, WWW: The 27th Web Conference (Industry track), Lyon, France, 2018. pdf
[5] “An Improved Anonymous Authentication Scheme for Roaming in Ubiquitous Networks”, Hakjun Lee, Donghoon Lee, Jongho Moon, Jaewook Jung, Dongwoo Kang, Hyoungshick Kim and Dongho Won, PLOS ONE, 2018. pdf
[4] “Secure and DoS-Resilient Fragment Authentication in CCN-based Vehicular Networks”, Sangwon Hyun and Hyoungshick Kim, Wireless Communications and Mobile Computing, 2018. pdf
[3] “Interface to Network Security Functions for Cloud-based Security Services”, Sangwon Hyun, Jinyong Kim, Hyoungshick Kim, Jaehoon Jeong, Susan Hares, Linda Dunbar, Adrian Farrel, IEEE Communications Magazine, 2018. pdf video code
[2] “Bypassing DRM Protection in E-Book Applications on Android”, Sangmin Lee, Kuyju Kim, Jina Kang and Hyoungshick Kim, ICOIN: The 32nd International Conference on Information Networking, Chiang Mai, Thailand, 2018. pdf video
[1] “A Framework for Managing User-defined Security Policies to Support Network Security Functions”, Eunsoo Kim, Kuyju Kim, Seungjin Lee, Jaehoon Jeong and Hyoungshick Kim, IMCOM(ICUIMC): The 12nd ACM International Conference on Ubiquitous Information Management and Communication, Langkawi, Malaysia, 2018. pdf
2017
[26] “Hello, Facebook! Here is the stalkers’ paradise!: Design and analysis of enumeration attack using phone numbers on Facebook”, Jinwoo Kim, Kuyju Kim, Junsung Cho, Hyoungshick Kim and Sebastian Schrittwieser, ISPEC: The 13rd International Conference on Information Security Practice and Experience, Melbourne, Australia, 2017. pdf
[25] “Adversarial Examples for Classifiers in High-Dimensional Network Data”, Muhammad Ejaz Ahmed and Hyoungshick Kim, CCS: The 24th ACM Conference on Computer and Communications Security (Poster), Dallas, USA, 2017. pdf
[24] “Mitigating DNS Query-Based DDoS Attacks with Machine Learning on Software-Defined Networking”, Muhammad Ejaz Ahmed, Hyoungshick Kim and Moosung Park, MILCOM: The 36th IEEE Military Communications Conference, Baltimore, USA, 2017. pdf
[23] “Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices”, Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim, MobiSec: The 2nd International Symposium on Mobile Internet Security, Jeju Island, Korea, 2017. pdf video
[22] “Preventing DNS amplification attacks using the history of DNS queries with SDN”, Soyoung Kim, Sora Lee, Geumhwan Cho, Muhammad Ejaz Ahmed, Jaehoon Paul Jeong and Hyoungshick Kim, ESORICS: The 22nd European Symposium on Research in Computer Security, Oslo, Norway, 2017. pdf
[21] “O2TR: Offline Off-the-Record (OTR) messaging”, Mahdi D Firoozjaei, Sangmin Lee and Hyoungshick Kim, WISA: The 18th World Conference on Information Security Applications, Jeju Island, Korea, 2017. pdf
[20] “COAT: Code ObfuscAtion Tool to evaluate the performance of code plagiarism detection tools”, Sangjun Ko, Jusop Choi and Hyoungshick Kim, ICSSA: The 3rd International Conference on Software Security and Assurance, Altoona, USA, 2017. pdf
[19] “IoE Security Threats and You”, Jungwoo Ryoo, Soyoung Kim, Junsung Cho, Hyoungshick Kim, Simon Tjoa and Christopher Derobertis, ICSSA: The 3rd International Conference on Software Security and Assurance, Altoona, USA, 2017. pdf
[18] “Security analysis and enhanced user authentication in proxy mobile IPv6 networks”, Dongwoo Kang, Jaewook Jung, Donghoon Lee, Hyoungshick Kim, Dongho Won, PLOS ONE, 2017. pdf
[17] “Security and Privacy Challenges in the Internet of Things”, Jong-Hyouk Lee and Hyoungshick Kim, IEEE Consumer Electronics Magazine, 2017. (selected as “Best Impacts, Joint Award”) pdf
[16] “TARD: Temporary Access Rights Delegation for Guest Network Devices”, Joonghwan Lee, Jaewoo Seo, Hoon Ko and Hyoungshick Kim, Journal of Computer and System Sciences, 2017. pdf
[15] “SysPal: System-guided Pattern Locks for Android”, Geumhwan Cho, Jun Ho Huh, Junsung Cho, Seongyeol Oh, Youngbae Song and Hyoungshick Kim, S&P: The 38th IEEE Symposium on Security and Privacy, San Jose, USA, 2017. pdf presentation
[14] “Design of Backdoor on Android Devices”, Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim, S&P: The 38th IEEE Symposium on Security and Privacy (Poster), San Jose, USA, 2017. pdf
[13] “I’m too busy to reset my LinkedIn password: On the effectiveness of password reset emails”, Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Konstantin Beznosov and Swathi Sri V Rayala, CHI: The 35th ACM SIGCHI Conference on Human Factors in Computing Systems, Denver, USA, 2017. pdf video
[12] “DDoS Attack Mitigation in Internet of Things Using Software Defined Networking”, M. Ejaz Ahmed and Hyoungshick Kim, BigDataSecurity: The 1st Workshop on Big Data Security and Services, held in conjunction with IEEE Big Data Service, San Francisco, USA, 2017. pdf
[11] “Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks”, Seunghun Cha, Sungsu Kwag, Hyoungshick Kim and Jun Ho Huh, ASIACCS: The 10th ACM Asia Conference on Computer and Communications Security, Abu Dhabi, UAE, 2017. pdf
[10] “Design of a secure digital recording protection system with network connected devices”, Hyoungshick Kim, DC2: The 4th Workshop on Device Centric Cloud held in conjunction with IEEE AINA, Taipei, Taiwan, 2017. pdf
[9] “Wrong Siren! A location spoofing attack on indoor positioning systems: the Starbucks case study”, Junsung Cho, Jaegwan Yu, Sanghak Oh, Jungwoo Ryoo, Jaeseung Song and Hyoungshick Kim, IEEE Communications Magazine, 2017. pdf video
[8] “k-Depth Mimicry Attack to Secretly Embed Shellcode into PDF”, Jaewoo Park and Hyoungshick Kim, ICISA: The 8th International Conference on Information Science and Applications, Macau, China, 2017. pdf
[7] “I Don’t Use Apple Pay Because It’s Less Secure …: Perception of Security and Usability in Mobile Tap-and-Pay”, Jun Ho Huh, Saurabh Verma, Swathi Sri V Rayala, Rakesh Bobba, Konstantin Beznosov and Hyoungshick Kim, USEC: The 5th Usable Security Conference, San Diego, USA, 2017. pdf
[6] “Security Analysis of Samsung Knox”, Munkhzorig Dorjmyagmar, MinChang Kim and Hyoungshick Kim, ICACT: The 19th International Conference on Advanced Communication Technology, Pheonix Park, Korea, 2017. pdf
[5] “Forensic analysis of the backup database file in KakaoTalk messenger”, Jusop Choi, Jaewoo Park and Hyoungshick Kim, BigComp: The 4th IEEE International Conference on Big Data and Smart Computing, Jeju Island, Korea, 2017. pdf
[4] “Security Challenges with Network Functions Virtualization”, Mahdi D Firoozjaei, Jaehoon Jeong, Hoon Ko and Hyoungshick Kim, Future Generation Computer Systems, 2017. pdf
[3] “Privacy-Preserving Nearest Neighbor Queries Using Geographical Features of Cellular Networks”, Mahdi D Firoozjaei, Jaegwan Yu, Hyoungkee Choi and Hyoungshick Kim, Computer Communications, 2017. pdf
[2] “A Flexible Architecture for Orchestrating Network Security Functions to Support High-Level Security Policies”, Sanghak Oh, Eunsoo Kim, Jaehoon Jeong, Hoon Ko and Hyoungshick Kim, IMCOM(ICUIMC): The 11st ACM International Conference on Ubiquitous Information Management and Communication, Beppu, Japan, 2017. pdf
[1] “Analysis and Comparison of Fax Spam Detection Algorithms”, Jaekwang Kim, Hyoungshick Kim and Jee-Hyoung Lee, IMCOM(ICUIMC): The 11st ACM International Conference on Ubiquitous Information Management and Communication, Beppu, Japan, 2017. pdf
2016
[18] “WiPING: Wi-Fi signal-based PIN Guessing attack”, Seunghun Cha, Jaewoo Park, Geumhwan Cho, Jun Ho Huh and Hyoungshick Kim, CCS: The 23rd ACM Conference on Computer and Communications Security (Poster), Vienna, Austria, 2016. pdf video
[17] “Secure DNS Name Autoconfiguration for IPv6 Internet-of-Things Devices”, Keuntae Lee, Hyungsuk Kang, Jaehoon (Paul) Jeong, Hyoungshick Kim, and Jung-Soo Park, ICTC 2016: The 7th International Conference on ICT Convergence, Jeju, Korea, 2016. pdf
[16] “SDN-Based Network Security Functions for VoIP and VoLTE Services”, Daeyoung Hyun, Jinyoug Kim, Jaehoon (Paul) Jeong, Hyoungshick Kim, Jung-Soo Park, and Taejin Ahn, ICTC 2016: The 7th International Conference on ICT Convergence, Jeju, Korea, 2016. pdf
[15] “Detecting encrypted traffic: a machine learning approach”, Seunghun Cha and Hyoungshick Kim, WISA: The 17th World Conference on Information Security Applications, Jeju Island, Korea, 2016. pdf
[14] “Empirical analysis of SSL/TLS weaknesses in real websites: Who cares?”, Sanghak Oh, Eunsoo Kim, and Hyoungshick Kim, WISA: The 17th World Conference on Information Security Applications, Jeju Island, Korea, 2016. pdf
[13] “Towards Automated Exploit Generation for Embedded Systems”, Matthew Ruffell, Jin Hong, Hyoungshick Kim and Dong-Seong Kim, WISA: The 17th World Conference on Information Security Applications, Jeju Island, Korea, 2016. pdf
[12] “A security analysis of paid subscription video-on-demand services for online learning”, Sora Lee, Jinwoo Kim, Sangjun Ko and Hyoungshick Kim, ICSSA: The 2nd International Conference on Software Security and Assurance, St. Pölten, Austria, 2016. (Runner-up) pdf
[11] “A framework for detecting MAC and IP spoofing attacks with network characteristics”, Jaegwan Yu, Eunsoo Kim, Hyoungshick Kim and Jun Ho Huh, ICSSA: The 2nd International Conference on Software Security and Assurance, St. Pölten, Austria, 2016. pdf
[10] “On the Guessability of Resident Registration Numbers in South Korea”, Youngbae Song, Hyoungshick Kim and Jun Ho Huh, ACISP: The 21st Australasian Conference on Information Security and Privacy, Melbourne, Australia, 2016. pdf video
[9] “PassBYOP: Bring Your Own Picture for Securing Graphical Passwords”, Andrea Bianchi, Ian Oakley and Hyoungshick Kim, IEEE Transactions on Human-Machine Systems, Vol. 46(3), 2016. pdf video
[8] “Developer-Friendly Software Security”, Victoria McIntyre, Jungwoo Ryoo, Kyungwon Park and Hyoungshick Kim, Encyclopedia of Software Engineering (book chapter), 2016. pdf
[7] “SAN: Self-Adaptive Navigation for Drone Battery Charging in Wireless Drone Networks”, Jinyong Kim, Jinho Lee, Jaehoon Jeong, Hyoungshick Kim, Jung-Soo Park, and Taeho Kim, DC2: The 3rd Workshop on Device Centric Cloud held in conjunction with IEEE AINA, Crans-Montana, Switzerland, 2016. (selected as “best paper”) pdf
[6] “Detecting False Emergency Requests Using Callers’ Reporting Behaviors and Locations”, Mahdi D Firoozjaei, Jaewoo Park and Hyoungshick Kim, DC2: The 3rd Workshop on Device Centric Cloud held in conjunction with IEEE AINA, Crans-Montana, Switzerland, 2016. pdf
[5] “A Healthcare Information System for Secure Delivery and Remote Management of Medical Records”, Hyoung-Kee Choi, Ki-Eun Shin and Hyoungshick Kim, IEICE Transactions on Information and Systems, 2016. pdf
[4] “You are a Game Bot!: Uncovering game bots in MMORPGs via self-similarity in the wild”, Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Aziz Mohaisen and Huy Kang Kim, NDSS: The 23rd Network and Distributed System Security Symposium, San Diego, USA, 2016. pdf
[3] “Combating online fraud attacks in mobile-based advertising”, Geumhwan Cho, Junsung Cho, Youngbae Song, Donghyun Choi and Hyoungshick Kim, EURASIP Journal on Information Security, Vol. 2016(1), 2016. pdf
[2] “Bypassing the Integrity Checking of Rights Objects in OMA DRM: a Case Study with the MelOn Music Service”, Jusop Choi, William Aiken, Jungwoo Ryoo and Hyoungshick Kim, IMCOM(ICUIMC): The 10th ACM International Conference on Ubiquitous Information Management and Communication, Danang, Vietnam, 2016. pdf video
[1] “Threat Assessment in the Cloud Environment – A Quantitative Approach for Security Pattern Selection”, Priya Anand, Jungwoo Ryoo, Hyoungshick Kim and Eunhyun Kim, IMCOM(ICUIMC): The 10th ACM International Conference on Ubiquitous Information Management and Communication, Danang, Vietnam, 2016. pdf
2015
[20] “Surpass: System-initiated user-replaceable passwords”, Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstantin Beznosov, Apurva Mohan, and S. Raj Rajagopalan, CCS: The 22nd ACM Conference on Computer and Communications Security, Denver, USA, 2015. pdf
[19] “SDN-based Security Services using Interface to Network Security Functions”, Jinyong Kim, Mahdi D Firoozjaei, Jaehoon Jeong, Hyoungshick Kim, and Jung-Soo Park, ICTC: The 6th International Conference on ICT Convergence, Jeju Island, Korea, 2015. pdf
[18] “An empirical study of click fraud in mobile advertising networks”, Geumhwan Cho, Junsung Cho, Youngbae Song and Hyoungshick Kim, IWCC: The 4th Workshop on Cyber Crime held in conjunction with ARES, Toulouse, France, 2015. pdf
[17] “Encryption Is Not Enough: Inferring user activities on KakaoTalk with traffic analysis”, Kyungwon Park and Hyoungshick Kim, WISA: The 16th International Workshop on Information Security Applications, Jeju Island, Korea, 2015. pdf
[16] “A new technique using a shuffling method to protect confidential documents from shoulder surfers”, Hyunsoo Kim, Ji Won Yoon and Hyoungshick Kim, ICSSA: The 1st International Conference on Software Security and Assurance, Suwon, Korea, 2015. (Best Student Paper) pdf
[15] “Performing clickjacking attacks in the wild: 99% are still vulnerable!”, Daehyun Kim and Hyoungshick Kim, ICSSA: The 1st International Conference on Software Security and Assurance, Suwon, Korea, 2015. pdf
[14] “Addressing security challenges in cloud computing – a pattern-based approach”, Priya Anand, Jungwoo Ryoo and Hyoungshick Kim, ICSSA: The 1st International Conference on Software Security and Assurance, Suwon, Korea, 2015. pdf
[13] “On the Memorability of System-generated PINs: Can Chunking Help?”, Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Masooda Bashir and Konstantin Beznosov, SOUPS: The 11st Symposium On Usable Privacy and Security, Ottawa, Canada, 2015. pdf
[12] “Devil in a Box: Installing Backdoors in Electronic Door Locks”, Seongyeol Oh, Joon-Sung Yang, Andrea Bianchi and Hyoungshick Kim, PST: The 13rd International Conference on Privacy, Security and Trust, Izmir, Turkey, 2015. pdf
[11] “Keyboard or Keylogger?: a security analysis of third-party keyboards on Android”, Junsung Cho, Geumhwan Cho and Hyoungshick Kim, PST: The 13rd International Conference on Privacy, Security and Trust, Izmir, Turkey, 2015. pdf
[10] “Enhancing Conformance Testing using Symbolic Execution for Network Protocols”, Jaeseung Song, Hyoungshick Kim, and Soojin Park, IEEE Transactions on Reliability, Vol. 64(3), 2015. pdf
[9] “Design and analysis of enumeration attacks on finding friends with phone numbers: a case study with KakaoTalk”, Eunhyun Kim, Kyungwon Park, Hyoungshick Kim and Jaeseung Song, Computers & Security, Vol. 52, 2015. pdf
[8] “Visual Honey Encryption: Application to steganography”, Jiwon Yoon, Hyoungshick Kim, Hyunjoo Jo, Hyelim Lee and Kwangsu Lee, IH&MMSec: The 3rd ACM Workshop on Information Hiding and Multimedia Security, Portland, USA, 2015. pdf
[7] “Visualizing Privacy Risks of Mobile Applications through a Privacy Meter”, Jina Kang, Hyoungshick Kim, Yun Gyung Cheong and Jun Ho Huh, ISPEC: The 11st International Conference on Information Security Practice and Experience, Beijing, China, 2015. pdf
[6] “On the Effectiveness of Pattern Lock Strength Meters – Measuring the Strength of Real World Pattern Locks”, Youngbae Song, Geumhwan Cho, Seongyeol Oh, Hyoungshick Kim and Jun Ho Huh, CHI: The 33rd ACM SIGCHI Conference on Human Factors in Computing Systems, Seoul, Korea, 2015. pdf video
[5] “Privacy Preserving Nearest Neighbor Search based on Topologies in Cellular Networks”, Mahdi D Firoozjaei, Jaegwan Yu and Hyoungshick Kim, DC2: The 2nd Workshop on Device Centric Cloud held in conjunction with IEEE AINA, Gwangju, Korea, 2015. (Best Paper) pdf
[4] “SBUS: Smart e-Bus Battery Substitution Scheme in Vehicular Networks”, Jihyeok Seo, Jaehoon Jeong, Hyoungshick Kim and Jung-Soo Park, DC2: The 2nd Workshop on Device Centric Cloud held in conjunction with IEEE AINA, Gwangju, Korea, 2015. (Best Student Paper) pdf
[3] “A Framework for Security Services Based on Software-Defined Networking”, Jaehoon Jeong, Jihyeok Seo, Geumhwan Cho, Hyoungshick Kim and Jung-Soo Park, DC2: The 2nd Workshop on Device Centric Cloud held in conjunction with IEEE AINA, Gwangju, Korea, 2015. pdf
[2] “A Study on the Influential Neighbors to Maximize Information Diffusion in Online Social Networks”, Hyoungshick Kim, Konstantin Beznosov and Eiko Yoneki, Computational Social Networks, Vol. 2(3), 2015. pdf
[1] “KaaSP: Keying as a Service Provider for Small and Medium Enterprises Using Untrusted Cloud Services”, William Aiken, Jungwoo Ryoo and Hyoungshick Kim, IMCOM(ICUIMC): The 9th ACM International Conference on Ubiquitous Information Management and Communication, Bali, Indonesia, 2015. pdf
2014
[8] “I’ve Got Your Number: Harvesting users’ personal data via contacts sync for the KakaoTalk messenger”, Eunhyun Kim, Kyung-won Park, Hyoungshick Kim and Jaeseung Song, WISA: The 15th International Workshop on Information Security Applications, Jeju Island, Korea, 2014. (Best paper) pdf
[7] “Analyzing unnecessary permissions requested by Android apps based on users’ opinions”, Jina Kang, Daehyun Kim, Hyoungshick Kim and Jun Ho Huh, WISA: The 15th International Workshop on Information Security Applications, Jeju Island, Korea, 2014. pdf
[6] “A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain”, Youngbae Song, Hyoungshick Kim and Aziz Mohaisen, TrustBus: The 11st International Conference on Trust, Privacy & Security in Digital Business, Munich, Germany, 2014. pdf
[5] “iVisher: A system for real-time caller ID spoofing detection”, Jaeseung Song and Hyoungshick Kim, ETRI Journal, Vol. 36(5), 2014. pdf
[4] “On the Memorability of System-generated PINs: Can Chunking Help”, Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Masooda Bashir and Konstantin Beznosov, WAY: Workshop on Who are you?! Adventures in Authentication held in conjunction with ACM SOUPS, Menlo Park, USA, 2014. pdf
[3] “Power Replay Attack in Electronic Door Locks”, Seongyeol Oh, Joon-sung Yang, Andrea Bianchi and Hyoungshick Kim, S&P: The 35th IEEE Symposium on Security and Privacy (Poster), San Jose, USA, 2014. pdf
[2] “Finding Influential Neighbors to Maximize Information Diffusion in Twitter”, Hyoungshick Kim, Konstantin Beznosov and Eiko Yoneki, SIMPLEX: The 6th Annual Workshop on Simplifying Complex Networks for Practitioners, held in conjunction with WWW, Seoul, Korea, 2014. (Runner-up) pdf
[1] “Don’t Count The Number of Friends When You Are Spreading Information in Social Networks”, Hyoungshick Kim, IMCOM(ICUIMC): The 8th ACM International Conference on Ubiquitous Information Management and Communication, Siem Reap, Cambodia, 2014. pdf
2013
[4] “We are still vulnerable to clickjacking attacks: about 99% of Korean websites are dangerous”, Daehyun Kim and Hyoungshick Kim, WISA: The 14th International Workshop on Information Security Applications, Jeju Island, Korea, 2013. pdf (tested websites)
[3] “What’s in Twitter, I Know What Parties are Popular and Who You are Supporting Now!”, Antoine Boutet, Hyoungshick Kim and Eiko Yoneki, Social Network Analysis and Mining, Vol. 3(4), 2013. pdf
[2] “Social network analysis of patent infringement lawsuits”, Hyoungshick Kim and Jaeseung Song, Technological Forecasting & Social Change, Vol. 80(5), 2013. pdf
[1] “An Experimental Evaluation of Robustness of Networks”, Hyoungshick Kim and Ross Anderson, IEEE Systems Journal, Vol. 7(2), 2013. pdf
2012
[13] “What’s in Twitter: I Know What Parties are Popular and Who You are Supporting Now!”, Antoine Boutet, Hyoungshick Kim and Eiko Yoneki, ASONAM: The 4th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Istanbul, Turkey, 2012. pdf
[12] “Influential Neighbours Selection for Information Diffusion in Online Social Networks”, Hyoungshick Kim and Eiko Yoneki, ICCCN: The 21st IEEE International Conference on Computer Communication Networks, Munich, Germany, 2012. pdf
[11] “Efficient Channel Selection Using Hierarchical Clustering”, Hyoungshick Kim, Jon Crowcroft and Fernando M.V. Ramos, WoWMoM: The 13rd IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, San Francisco, USA, 2012. pdf
[10] “STOP: Socio-Temporal Opportunistic Patching of Short Range Mobile Malware”, John Tang, Hyoungshick Kim, Cecilia Mascolo and Mirco Musolesi, WoWMoM: The 13rd IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, San Francisco, USA, 2012. pdf
[9] “Who did you call last”, Hyoungshick Kim and Konstantin Beznosov, U-PriSM: Workshop on Usable Privacy & Security for Mobile Devices, held in conjunction with ACM SOUPS, Washington DC, USA, 2012. pdf
[8] “Polymorphic Attacks against Sequence-based Software Birthmarks”, Hyoungshick Kim, Wei Ming Khoo and Pietro Lio’, SSP: The 2nd ACM SIGPLAN Workshop on Software Security and Protection, held in conjunction with ACM PLDI, Beijing, China, 2012. pdf
[7] “What’s in Your Tweets? I Know Who You Supported in the UK 2010 General Election”, Antoine Boutet, Hyoungshick Kim and Eiko Yoneki, ICWSM: The 6th International AAAI Conference on Weblogs and Social Media, Dublin, Ireland, 2012. pdf
[6] “PIN selection policies: Are they really effective?”, Hyoungshick Kim and Jun Ho Huh, Computers & Security, Vol. 31(4), 2012. pdf
[5] “Social Authentication: Harder than it Looks”, Hyoungshick Kim, John Tang and Ross Anderson, FC: The 16th IFCA International Conference on Financial Cryptography and Data Security, Kralendijk, Bonaire, 2012. pdf
There’s press coverage. [New Scientist, Jan. 25, 2012] [Light Blue Touchpaper, Feb. 22, 2012]
[4] “Centrality Prediction in Dynamic Human Contact Networks”, Hyoungshick Kim, John Tang, Ross Anderson and Cecilia Mascolo, Computer Networks, Vol. 56(3), 2012. pdf
[3] “Temporal Node Centrality in Complex Networks”, Hyoungshick Kim and Ross Anderson, Physical Review E, Vol. 85(2), 2012. pdf
There’s press coverage. [University of Cambridge Research News, Feb. 20, 2012] [Light Blue Touchpaper, Jan. 18, 2012]
[2] “Privacy-Enhancing Queries in Personalized Search with Untrusted Service Providers”, Yunsang Oh, Hyoungshick Kim and Takashi Obi, IEICE Transactions on Information and Systems, Vol. 95-D(1), 2012. pdf
[1] “Network Analysis of Temporal Trends in Scholarly Research Productivity”, Hyoungshick Kim, Ji Won Yoon and Jon Crowcroft, Journal of Informetrics, Vol. 6(1), 2012. pdf
2011
[6] “Achieving attestation with less effort: an indirect and configurable approach to integrity reporting”, Jun Ho Huh, Hyoungshick Kim, John Lyle and Andrew Martin, STC: The 6th ACM Workshop on Scalable Trusted Computing, held in conjunction with ACM CCS, Chicago, USA, 2011.pdf
[5] “RAD: Recipient-Anonymous Data Delivery based on Public Routing Proxies”, Hyoungshick Kim and Jaehoon Jeong, Computer Networks, Vol. 55(15), 2011. pdf
[4] “Detecting DNS Poisoning Based Phishing Attacks from their Network Performance Characteristics”, Hyoungshick Kim and Jun Ho Huh, Electronics Letters, Vol. 47(11), 2011. (Research Highlight in brief) pdf
[3] “Phishing Detection with Popular Search Engines: Simple and Effective”, Jun Ho Huh and Hyoungshick Kim, FPS: The 4th MITACS Workshop on Foundations & Practice of Security, Paris, France, 2011. pdf
[2] “A Perfect Collision-free Pseudonym System”, Ji Won Yoon and Hyoungshick Kim, IEEE Communications Letters, Vol. 15(6), 2011. pdf
[1] “Effective measurement selection in truncated kernel density estimator”, Ji Won Yoon, Hyoung-joo Lee and Hyoungshick Kim, ICUIMC: The 5th ACM International Conference on Ubiquitous Information Management and Communication, Suwon, Korea, 2011. pdf
2010
[3] “An image encryption scheme with a pseudorandom permutation based on chaotic maps”, Ji Won Yoon and Hyoungshick Kim, Communications in Nonlinear Science and Numerical Simulations, Vol. 15(12), 2010. pdf
[2] “Hybrid Spam Filtering for Mobile Communication”, Ji Won Yoon, Hyoungshick Kim and Jun Ho Huh, Computers & Security, Vol. 29(4), 2010. pdf
[1] “On the Security of Internet Banking in South Korea”, Hyoungshick Kim, Jun Ho Huh and Ross Anderson, Oxford University Technical Report, RR-10-01, 2010. pdf [Another Version]
There’s press coverage. [Light Blue Touchpaper, May 12, 2012][etnews, May 3, 2010][boan news, Apr. 29. 2010][itnews, Apr. 29. 2010][edaily, Apr. 29. 2010][MK business News, Apr. 29. 2010][Mozilla in Asia, Apr. 28. 2010][etnews, Mar. 15, 2010][Yonhap News, Mar. 15, 2010][inews, Mar. 14, 2010][JoongAng Sunday, Feb. 28, 2010][Seoul Newspaper, Feb. 20, 2010][etnews, Feb. 8, 2010]
2009
[4] “Privacy-Enhanced Public View for Social Graphs”, Hyoungshick Kim and Joseph Bonneau, SWSM: The 2nd ACM Workshop on Social web search and mining, held in conjunction with ACM CIKM, Hong Kong, China, 2009. pdf
[3] “A Spatial Cloaking Framework based on Range Search for Nearest Neighbor Search”, Hyoungshick Kim, DPM: The 4th Workshop on Data Privacy Management, held in conjunction with ESORICS, St-Malo, France, 2009. pdf
[2] “A New Collision-free Pseudonym Scheme in Mobile Ad Hoc Networks”, Ji Won Yoon and Hyoungshick Kim, RAWNET/WNC3: The 5th Workshop on Resource Allocation, Cooperation and Competition in Wireless Networks, held in conjunction with WiOpt, Seoul, Korea, 2009. pdf
[1] “Dynamic Mashup Platform for Mobile Web Applications”, Seongho Cho, Hyoungshick Kim, Dongshin Jung and Ho-Yeon Park, ICCE: The 27th IEEE International Conference on Consumer Electronics, Las Vegas, USA, 2009. pdf
2007
[4] “Scalable DRM System for Media Portability”, Hyoungshick Kim, ASIAN: The 12nd Annual Asian Computing Science Conference, Doha, Qatar, 2007. pdf
[3] “Self-authorized Public Key Management for Home Networks”, Hyoungshick Kim and S. Jae Oh, NCUS: The 3rd Workshop on Network Centric Ubiquitous Systems, held in conjunction with EUC, Taipei, Taiwan, 2007. pdf
[2] “Secure Scalable Streaming for Integrity Verification of Media Data”, Hyoungshick Kim, ICACT: The 9th International Conference on Advanced Communication Technology, Pheonix Park, Korea, 2007. pdf
[1] “N-times Consumable Digital Ticket and Its Application to Content Access Service”, Hyoungshick Kim, CCNC: The 4th IEEE International Consumer Communications Conference, Las Vegas, USA, 2007. pdf