Publications

(Here papers are restricted to academic use within not-for-profit institutions.)

2020

[1] “Gesture Authentication for Smartphones: Evaluation of Gesture Password Selection Policies”, Eun yong Cheon, Yonghwan Shin, Jun Ho Huh, Hyoungshick Kim and Ian Oakley, S&P: The 41th IEEE Symposium on Security and Privacy, San Francisco, USA, 2020. (accepted)

2019

[25] “On the Security and Usability Implications of Multiple Authentication Choices”, Geumhwan Cho, Jun Ho Huh, Soolin Kim, Junsung Cho, Heesung Park, Yenah Lee,  Konstantin Beznosov, and Hyoungshick Kim, ACM Transactions on Privacy and Security, 2019. (in minor revision)
[24] “LightLock: continuous user authentication using light intensity readings on smartphones”, Mohsen Alawami, William Aiken, and Hyoungshick Kim, IEEE Sensors, 2019. (accepted)
[23] “On the robustness of Lightning Network in Bitcoin”, Seungjin Lee and Hyoungshick Kim, Pervasive and Mobile Computing, 2019. (accepted)
[22] “Cryptanalysis of Kumar et al.’s authentication protocol for wireless sensor networks”, Sewan Ha, Jihyeon Ryu, Hyoungshick Kim, Dongho Won, and Youngsook Lee, ICISA: The 10th International Conference on Information Science and Applications, 2019. pdf
[21] “AMVG: Adaptive Malware Variant Generation Framework Using Machine Learning”, Jusop Choi, Dongsoon Shin, Hyoungshick Kim, Jason Seotis and Jin B. Hong, PRDC: The 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019. (accepted)
[20] “Design of a framework to detect device spoofing attacks using network characteristics”, Jaegwan Yu, Eunsoo KimHyoungshick Kim and Jun Ho Huh, IEEE Consumer Electronics Magazine, 2019. (accepted)
[19] “Kerberoid: A practical Android app decompilation system with multiple decompilers”, Heejun Jang, Beomjin Jin, Sangwon Hyun and Hyoungshick Kim, CCS: The 26th ACM  Conference on Computer and Communications Security (Poster), London, UK, 2019. pdf video code
[18] “A Proof-of-Stake (PoS) blockchain protocol using fair and dynamic sharding management”,  Daehwa Rayer Lee, Yunhee Jang and Hyoungshick Kim, CCS: The 26th ACM  Conference on Computer and Communications Security (Poster), London, UK, 2019. pdf
[17] “Nickel to Lego: Using Foolgle to Create Adversarial Examples to fool Google Cloud Speech-to-Text API”, Joon Kuy Han, Hyoungshick Kim and Simon Woo, CCS: The 26th ACM  Conference on Computer and Communications Security (Poster), London, UK, 2019. pdf
[16] “CBDN: Cloud-Based Drone Navigation for Efficient Battery Charging in Drone Networks”, Jinyong Kim, Seokhwa Kim, Jaehoon Jeong, Hyoungshick Kim, Jung-Soo Park, Taeho Kim, IEEE Transactions on Intelligent Transportation Systems, 2019. pdf
[15] “An Eye for an Eye: Economics of Retaliation in Mining Pools”, Yujin Kwon, Hyoungshick Kim, Yung Yi and Yongdae Kim, AFT: The 1st ACM conference on Advances in Financial Technologies, Zurich, Switzerland, 2019. pdf
[14] “EVChain: A Blockchain-based Credit Sharing in Electric Vehicles Charging”, Mahdi Daghmehchi Firoozjaei, Ali Ghorbani, Hyoungshick Kim and Jaeseung Song, PST: The 17th International Conference on Privacy, Security and Trust, Fredericton, Canada, 2019.
[13] “Profiling-based classification algorithms for security applications in Internet of Things”, Eunil Seo, Hyoungshick Kim, and Tai-Myoung Chung, ICIOT: The 3rd IEEE International Congress on Internet of Things, Milan, Italy, 2019. pdf
[12] “Understanding Users’ Risk Perceptions about Personal Health Records Shared on Social Networking Services”, Yuri SonGeumhwan ChoHyoungshick Kim and Simon Woo, ASIACCS: The 12th ACM Asia Conference on Computer and Communications Security, Auckland, New Zealand, 2019. pdf
[11] “Automated cash mining attacks on mobile advertising networks”, Woojoong Ji, Taeyun Kim, Kuyju Kim and Hyoungshick Kim, ACISP: The 24th Australasian Conference on Information Security and Privacy, Christchurch, New Zealand, 2019. pdf
[10] “80% of block propagation rate is enough: towards secure and efficient PoW-based blockchain consensus”, Daehwa Rayer Lee, Yunhee Jang, Hanbin Jang and Hyoungshick Kim, MobiSys: The 17th ACM International Conference on Mobile Systems, Applications, and Services (Poster), Seoul, Korea, 2019. pdf
[9] “The Light will be with you. Always: A novel continuous mobile authentication with the light sensor”, Mohsen A. Alawami, William Aiken and Hyoungshick Kim, MobiSys: The 17th ACM International Conference on Mobile Systems, Applications, and Services (Poster), Seoul, Korea, 2019. pdf
[8] “Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?”, Yujin Kwon, Hyoungshick Kim, Jinwoo Shin and Yongdae Kim, S&P: The 40th IEEE Symposium on Security and Privacy, San Francisco, USA, 2019. pdf video
[7] “O2TR: Offline OTR Messaging System under Network Disruption”, Mahdi D FiroozjaeiMinchang Kim, Jaeseung Song and Hyoungshick Kim, Computers & Security, 2019. pdf
[6] “Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems”, Jusop Choi, Jaegwan Yu, Sangwon Hyun and Hyoungshick Kim, Digital Investigation, 2019. pdf
[5] “Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems”, Jusop Choi, Jaegwan Yu, Sangwon Hyun and Hyoungshick Kim, DFRWS EU: Digital Forensic Research Workshop EU, 2019. pdf
[4] “Statistical Application Fingerprinting for DDoS Attack Mitigation”, Muhammad Ejaz Ahmed, Saeed Ullah, and Hyoungshick Kim, IEEE Transactions on Information Forensics and Security, 2019. pdf
[3] “A Framework for DNS Naming Services for Internet-of-Things Devices”, Keuntae Lee, Seokhwa Kim, Jaehoon Jeong, Sejun Lee, Hyoungshick Kim  and Jung-Soo Park, Future Generation Computer Systems, 2019. pdf
[2] “Data-driven Selection of Security Application Frameworks During Architectural Design”, Humberto Cervantes, Rick Kazman, Jungwoo Ryoo, Junsung Cho, Geumhwan Cho, Hyoungshick Kim and Jina Kang, HICSS: The 52nd Hawaii International Conference on System Sciences, 2019. pdf
[1] “Efficient Software Implementation of Homomorphic Encryption for Addition and Multiplication Operations”, Yongwoo Oh, Taeyun Kim and Hyoungshick Kim, IMCOM(ICUIMC): The 13th ACM International Conference on Ubiquitous Information Management and Communication, Phuket, Thailand, 2019. pdf

2018

[26] “Secure and Efficient Three-factor Protocol for Wireless Sensor Networks”, Jihyeon Ryu, Hakjun Lee, Hyoungshick Kim and Dongho Won, Sensors, 2018. pdf
[25] “When Harry met Tinder: Security analysis of dating apps on Android”, Kuyju Kim, Taeyun Kim, Seungjin Lee, Soolin Kim and Hyoungshick Kim, NordSec: The 23th Nordic Conference on Secure IT Systems, 2018. pdf
[24] “MEDUSA: Malware detection using statistical analysis of system’s behavior”, Muhammad Ejaz Ahmed, Surya Nepal and Hyoungshick Kim, CIC: The 4th IEEE International Conference on Collaboration and Internet Computing, Philadelphia, USA, 2018. pdf
[23] “Cryptanalysis of Improved and Provably Secure Three-Factor User Authentication Scheme for Wireless Sensor Networks”, Jihyeon Ryu, Taeui Song, Jongho Moon, Hyoungshick Kim and Dongho Won, ICCST: The 5th International Conference on Computational Science and Technology, Kota Kinabalu, Malaysia, 2018. pdf
[22] “The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns”, Julian Rauchberger, Sebastian Schrittwieser, Tobias Dam, Robert Luh, Damjan Buhov, Gerhard Pötzelsberger and Hyoungshick Kim, ARES: The 13th International Conference on Availability, Reliability and Security, Hamburg, Germany2018. pdf
[21] “An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks”, William Aiken, Jungwoo Ryoo, Hyoungshick Kim and Mary Beth Rosson, PST: The 16th International Conference on Privacy, Security and Trust, Belfast, United Kingdom, 2018.  pdf
[20] “Threat modeling and analysis of voice assistant applications”, Geumhwan Cho, Jusop Choi, Hyoungshick Kim, Sangwon Hyun and Jungwoo Ryoo, WISA: The 19th World Conference on Information Security Applications, Jeju Island, Korea, 2018.  pdf
[19] “An Analysis of Research Trends in Computer Security over the Last Decade”, Daehwa Lee and Hyoungshick Kim, ICSSA: The 4th International Conference on Software Security and Assurance, Seoul, Korea, 2018. pdf
[18] “Hey Siri – are you there?: Jamming of voice commands using the resonance effect”, Taekkyung Oh, William Aiken and Hyoungshick Kim, ICSSA: The 4th International Conference on Software Security and Assurance, Seoul, Korea, 2018. pdf
[17] “Cloud-Based Battery Replacement Scheme for Smart Electric Bus System”, Jinyong Kim, Jaehoon Jeong, Hyoungshick Kim and Jung-Soo Park, IETE Journal of Research, 2018. pdf
[16] “Design and Analysis of Push Notification-Based Malware on Android”, Sangwon Hyun, Junsung Cho, Geumhwan Cho and Hyoungshick Kim, Security and Communication Networks, 2018. pdf video
[15] “Two-Thumbs-Up: Physical Protection for PIN Entry Secure against Recording Attacks”, DaeHun Nyang, Hyoungshick Kim, Woojoo Lee, Sung-bae Kang, Geumhwan Cho, Mun-Kyu Lee and Aziz Mohaisen, Computers & Security, 2018. pdf
[14] “CyTIME: Cyber Threat Intelligence ManagEment framework for automatically generating security rules”, Eunsoo Kim, Kuyju Kim, Dongsoon Shin, Beomjin Jin and Hyoungshick Kim, CFI: The 13th International Conference on Future Internet Technologies, 2018. pdf
[13] “The Personal Identification Chord: A Four Button Authentication System for Smartwatches”, Ian Oakley, Jun Ho Huh, Junsung ChoGeumhwan Cho, MD. Rasel Islam and Hyoungshick Kim, ASIACCS: The 11th ACM Asia Conference on Computer and Communications Security, Incheon, Korea, 2018. pdf video
[12] “DeepCRACk: Using Deep learning to automatically CRack  Audio CAPTCHAs”, William Aiken and Hyoungshick Kim, ASIACCS: The 11th ACM Asia Conference on Computer and Communications Security (poster), Incheon, Korea, 2018. pdf
[11] “Can we use biometric authentication on cloud?: Fingerprint authentication using homomorphic encryption”, Taeyun Kim and Hyoungshick Kim, ASIACCS: The 11th ACM Asia Conference on Computer and Communications Security (poster), Incheon, Korea, 2018. pdf
[10] “I can’t hear this because I am human: A novel design of audio CAPTCHA system”, Jusop Choi, Taekkyung Oh, William Aiken, Simon S. Woo and Hyoungshick Kim, ASIACCS: The 11th ACM Asia Conference on Computer and Communications Security (poster), Incheon, Korea, 2018. pdf
[9] “Efficient and Secure Biometric-based User Authenticated Key Agreement Scheme with Anonymity”, Dongwoo Kang, Jaewook Jung, Youngsook Lee, Dongho Won and Hyoungshick Kim, Security and Communication Networks, 2018. pdf
[8] “User Credential Cloning Attacks in Android Applications”, Junsung Cho, Dayeon Kim and Hyoungshick Kim, IEEE Consumer Electronics Magazine, 2018. pdf
[7] “I’m Listening to your Location! Inferring User Location with Acoustic Side Channel”, Youngbae Jeon, Minchul Kim, Hyunsoo Kim, Hyoungshick Kim, Jun Ho Huh and Ji Won Yoon, WWW: The 27th Web Conference, Lyon, France, 2018. pdf
[6] “No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games”, Eunjo Lee, Jiyoung Woo, Hyoungshick Kim and Huy Kang Kim, WWW: The 27th Web Conference (Industry track), Lyon, France, 2018. pdf
[5] “An Improved Anonymous Authentication Scheme for Roaming in Ubiquitous Networks”, Hakjun Lee, Donghoon Lee, Jongho Moon, Jaewook Jung, Dongwoo Kang, Hyoungshick Kim and Dongho Won, PLOS ONE, 2018. pdf
[4] “Secure and DoS-Resilient Fragment Authentication in CCN-based Vehicular Networks”, Sangwon Hyun and Hyoungshick Kim, Wireless Communications and Mobile Computing, 2018. pdf
[3] “Interface to Network Security Functions for Cloud-based Security Services”, Sangwon Hyun, Jinyong Kim, Hyoungshick Kim, Jaehoon Jeong, Susan Hares, Linda Dunbar, Adrian Farrel, IEEE Communications Magazine, 2018. pdf video code
[2] “Bypassing DRM Protection in E-Book Applications on Android”, Sangmin Lee, Kuyju Kim, Jina Kang and Hyoungshick Kim, ICOIN: The 32th International Conference on Information Networking, Chiang Mai, Thailand, 2018. pdf video
[1] “A Framework for Managing User-defined Security Policies to Support Network Security Functions”, Eunsoo Kim, Kuyju Kim, Seungjin Lee, Jaehoon Jeong and Hyoungshick Kim, IMCOM(ICUIMC): The 12th ACM International Conference on Ubiquitous Information Management and Communication, Langkawi, Malaysia, 2018. pdf

2017

[26] “Hello, Facebook! Here is the stalkers’ paradise!: Design and analysis of enumeration attack using phone numbers on Facebook”, Jinwoo Kim, Kuyju Kim, Junsung Cho, Hyoungshick Kim and Sebastian Schrittwieser, ISPEC: The 13th International Conference on Information Security Practice and Experience, Melbourne, Australia, 2017. pdf
[25] “Adversarial Examples for Classifiers in High-Dimensional Network Data”, Muhammad Ejaz Ahmed and Hyoungshick Kim, CCS: The 24th ACM  Conference on Computer and Communications Security (Poster), Dallas, USA, 2017. pdf
[24] “Mitigating DNS Query-Based DDoS Attacks with Machine Learning on Software-Defined Networking”, Muhammad Ejaz Ahmed,  Hyoungshick Kim and Moosung Park, MILCOM: The 36th IEEE Military Communications Conference, Baltimore, USA, 2017. pdf
[23] “Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices”, Junsung ChoGeumhwan Cho, Sangwon Hyun and Hyoungshick Kim, MobiSec: The 2nd International Symposium on Mobile Internet Security, Jeju Island, Korea, 2017. pdf video
[22] “Preventing DNS amplification attacks using the history of DNS queries with SDN”, Soyoung Kim, Sora Lee, Geumhwan Cho, Muhammad Ejaz Ahmed, Jaehoon Paul Jeong and Hyoungshick Kim, ESORICS: The 22th European Symposium on Research in Computer Security, Oslo, Norway, 2017. pdf
[21] “O2TR: Offline Off-the-Record (OTR) messaging”, Mahdi D Firoozjaei, Sangmin Lee and Hyoungshick Kim, WISA: The 18th World Conference on Information Security Applications, Jeju Island, Korea, 2017. pdf
[20] “COAT: Code ObfuscAtion Tool to evaluate the performance of code plagiarism detection tools”, Sangjun Ko, Jusop Choi and Hyoungshick Kim, ICSSA: The 3rd International Conference on Software Security and Assurance, Altoona, USA, 2017. pdf
[19] “IoE Security Threats and You”, Jungwoo Ryoo, Soyoung Kim, Junsung Cho, Hyoungshick Kim, Simon Tjoa and Christopher Derobertis, ICSSA: The 3rd International Conference on Software Security and Assurance, Altoona, USA, 2017. pdf
[18] “Security analysis and enhanced user authentication in proxy mobile IPv6 networks”, Dongwoo Kang, Jaewook Jung, Donghoon Lee, Hyoungshick Kim, Dongho Won, PLOS ONE, 2017. pdf
[17] “Security and Privacy Challenges in the Internet of Things”, Jong-Hyouk Lee and Hyoungshick Kim, IEEE Consumer Electronics Magazine, 2017.  (selected as “Best Impacts, Joint Award”)  pdf
[16] “TARD: Temporary Access Rights Delegation for Guest Network Devices”, Joonghwan Lee, Jaewoo Seo, Hoon Ko and  Hyoungshick Kim, Journal of Computer and System Sciences, 2017. pdf
[15] “SysPal: System-guided Pattern Locks for Android”, Geumhwan Cho, Jun Ho Huh, Junsung Cho, Seongyeol Oh, Youngbae Song and Hyoungshick Kim, S&P: The 38th IEEE Symposium on Security and Privacy, San Jose, USA, 2017. pdf presentation
[14] “Design of Backdoor on Android Devices”, Junsung ChoGeumhwan Cho, Sangwon Hyun and Hyoungshick Kim, S&P: The 38th IEEE Symposium on Security and Privacy (Poster), San Jose, USA, 2017. pdf
[13] “I’m too busy to reset my LinkedIn password: On the effectiveness of password reset emails”, Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Konstantin Beznosov and Swathi Sri V Rayala, CHI: The 35th ACM SIGCHI Conference on Human Factors in Computing Systems, Denver, USA, 2017. pdf video
[12] “DDoS Attack Mitigation in Internet of Things Using Software Defined Networking”, M. Ejaz Ahmed and Hyoungshick Kim, BigDataSecurity: The 1st Workshop on Big Data Security and Services, held in conjunction with IEEE Big Data Service, San Francisco, USA, 2017. pdf
[11] “Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks”, Seunghun ChaSungsu Kwag, Hyoungshick Kim and Jun Ho Huh, ASIACCS: The 10th ACM Asia Conference on Computer and Communications Security, Abu Dhabi, UAE, 2017. pdf
[10] “Design of a secure digital recording protection system with network connected devices”, Hyoungshick Kim, DC2: The 4th Workshop on Device Centric Cloud held in conjunction with IEEE AINA, Taipei, Taiwan, 2017. pdf
[9] “Wrong Siren! A location spoofing attack on indoor positioning systems: the Starbucks case study”, Junsung Cho, Jaegwan Yu, Sanghak Oh, Jungwoo Ryoo, Jaeseung Song and Hyoungshick Kim, IEEE Communications Magazine, 2017. pdf video
[8] “k-Depth Mimicry Attack to Secretly Embed Shellcode into PDF”, Jaewoo Park and  Hyoungshick Kim, ICISA: The 8th International Conference on Information Science and Applications, Macau, China, 2017. pdf
[7] “I Don’t Use Apple Pay Because It’s Less Secure …: Perception of Security and Usability in Mobile Tap-and-Pay”, Jun Ho Huh, Saurabh Verma, Swathi Sri V Rayala, Rakesh Bobba, Konstantin Beznosov and Hyoungshick Kim, USEC: The 5th Usable Security Conference, San Diego, USA, 2017. pdf
[6] “Security Analysis of Samsung Knox”, Munkhzorig Dorjmyagmar, MinChang Kim and  Hyoungshick Kim, ICACT: The 19th International Conference on Advanced Communication Technology, Pheonix Park, Korea, 2017. pdf
[5] “Forensic analysis of the backup database file in KakaoTalk messenger”, Jusop Choi, Jaewoo Park and Hyoungshick Kim, BigComp: The 4th IEEE International Conference on Big Data and Smart Computing, Jeju Island, Korea, 2017. pdf
[4] “Security Challenges with Network Functions Virtualization”, Mahdi D Firoozjaei, Jaehoon Jeong, Hoon Ko and Hyoungshick Kim, Future Generation Computer Systems, 2017. pdf
[3] “Privacy-Preserving Nearest Neighbor Queries Using Geographical Features of Cellular Networks”, Mahdi D Firoozjaei, Jaegwan Yu, Hyoungkee Choi and Hyoungshick Kim, Computer Communications, 2017. pdf
[2] “A Flexible Architecture for Orchestrating Network Security Functions to Support High-Level Security Policies”, Sanghak Oh, Eunsoo Kim, Jaehoon Jeong, Hoon Ko and Hyoungshick Kim, IMCOM(ICUIMC): The 11st ACM International Conference on Ubiquitous Information Management and Communication, Beppu, Japan, 2017. pdf
[1] “Analysis and Comparison of Fax Spam Detection Algorithms”, Jaekwang Kim, Hyoungshick Kim and Jee-Hyoung Lee, IMCOM(ICUIMC): The 11st ACM International Conference on Ubiquitous Information Management and Communication, Beppu, Japan, 2017. pdf

2016

[18] “WiPING: Wi-Fi signal-based PIN Guessing attack”, Seunghun Cha, Jaewoo Park, Geumhwan Cho, Jun Ho Huh and Hyoungshick Kim, CCS: The 23th ACM  Conference on Computer and Communications Security (Poster), Vienna, Austria, 2016. pdf video
[17] “Secure DNS Name Autoconfiguration for IPv6 Internet-of-Things Devices”, Keuntae Lee, Hyungsuk Kang, Jaehoon (Paul) Jeong, Hyoungshick Kim, and Jung-Soo Park, ICTC 2016: The 7th International Conference on ICT Convergence, Jeju, Korea, 2016. pdf
[16] “SDN-Based Network Security Functions for VoIP and VoLTE Services”, Daeyoung Hyun, Jinyoug Kim, Jaehoon (Paul) Jeong, Hyoungshick Kim, Jung-Soo Park, and Taejin Ahn, ICTC 2016: The 7th International Conference on ICT Convergence, Jeju, Korea, 2016. pdf
[15] “Detecting encrypted traffic: a machine learning approach”, Seunghun Cha and Hyoungshick Kim, WISA: The 17th World Conference on Information Security Applications, Jeju Island, Korea, 2016. pdf
[14] “Empirical analysis of SSL/TLS weaknesses in real websites: Who cares?”, Sanghak Oh, Eunsoo Kim, and Hyoungshick Kim, WISA: The 17th World Conference on Information Security Applications, Jeju Island, Korea, 2016. pdf
[13] “Towards Automated Exploit Generation for Embedded Systems”, Matthew Ruffell, Jin Hong, Hyoungshick Kim and Dong-Seong Kim, WISA: The 17th World Conference on Information Security Applications, Jeju Island, Korea, 2016. pdf
[12] “A security analysis of paid subscription video-on-demand services for online learning”, Sora Lee, Jinwoo Kim, Sangjun Ko and Hyoungshick Kim, ICSSA: The 2nd International Conference on Software Security and Assurance, St. Pölten, Austria, 2016. (selected as “runner-up”) pdf
[11] “A framework for detecting MAC and IP spoofing attacks with network characteristics”, Jaegwan Yu, Eunsoo Kim, Hyoungshick Kim and Jun Ho Huh, ICSSA: The 2nd International Conference on Software Security and Assurance, St. Pölten, Austria, 2016. pdf
[10] “On the Guessability of Resident Registration Numbers in South Korea”, Youngbae Song, Hyoungshick Kim and Jun Ho Huh, ACISP: The 21st Australasian Conference on Information Security and Privacy, Melbourne, Australia, 2016. pdf video
[9] “PassBYOP: Bring Your Own Picture for Securing Graphical Passwords”, Andrea Bianchi, Ian Oakley and Hyoungshick Kim, IEEE Transactions on Human-Machine Systems, Vol. 46(3), 2016. pdf video
[8] “Developer-Friendly Software Security”, Victoria McIntyre, Jungwoo Ryoo, Kyungwon Park  and Hyoungshick KimEncyclopedia of Software Engineering (book chapter), 2016. pdf
[7] “SAN: Self-Adaptive Navigation for Drone Battery Charging in Wireless Drone Networks”, Jinyong Kim, Jinho Lee, Jaehoon Jeong, Hyoungshick Kim, Jung-Soo Park, and Taeho Kim, DC2: The 3rd Workshop on Device Centric Cloud held in conjunction with IEEE AINA, Crans-Montana, Switzerland, 2016. (selected as “best paper”) pdf
[6] “Detecting False Emergency Requests Using Callers’ Reporting Behaviors and Locations”, Mahdi D Firoozjaei, Jaewoo Park and Hyoungshick Kim, DC2: The 3rd Workshop on Device Centric Cloud held in conjunction with IEEE AINA, Crans-Montana, Switzerland, 2016. pdf
[5] “A Healthcare Information System for Secure Delivery and Remote Management of Medical Records”, Hyoung-Kee Choi, Ki-Eun Shin and Hyoungshick Kim, IEICE Transactions on Information and Systems, 2016. pdf
[4] “You are a Game Bot!: Uncovering game bots in MMORPGs via self-similarity in the wild”, Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Aziz Mohaisen and Huy Kang Kim, NDSS: The 23th Network and Distributed System Security Symposium, San Diego, USA, 2016. pdf
[3] “Combating online fraud attacks in mobile-based advertising”,  Geumhwan Cho, Junsung Cho, Youngbae Song, Donghyun Choi and Hyoungshick Kim, EURASIP Journal on Information Security, Vol. 2016(1), 2016. pdf
[2] “Bypassing the Integrity Checking of Rights Objects in OMA DRM: a Case Study with the MelOn Music Service”, Jusop Choi, William Aiken, Jungwoo Ryoo and Hyoungshick Kim, IMCOM(ICUIMC): The 10th ACM International Conference on Ubiquitous Information Management and Communication, Danang, Vietnam, 2016. pdf video
[1] “Threat Assessment in the Cloud Environment – A Quantitative Approach for Security Pattern Selection”, Priya Anand, Jungwoo Ryoo, Hyoungshick Kim and Eunhyun Kim, IMCOM(ICUIMC): The 10th ACM International Conference on Ubiquitous Information Management and Communication, Danang, Vietnam, 2016. pdf

2015

[20] “Surpass: System-initiated user-replaceable passwords”, Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstantin Beznosov, Apurva Mohan, and S. Raj Rajagopalan, CCS: The 22th ACM  Conference on Computer and Communications Security, Denver, USA, 2015. pdf
[19] “SDN-based Security Services using Interface to Network Security Functions”, Jinyong Kim, Mahdi D Firoozjaei, Jaehoon Jeong, Hyoungshick Kim, and Jung-Soo Park, ICTC: The 6th International Conference on ICT Convergence, Jeju Island, Korea, 2015. pdf
[18] “An empirical study of click fraud in mobile advertising networks”,  Geumhwan Cho, Junsung Cho, Youngbae Song and Hyoungshick Kim, IWCC: The 4th Workshop on Cyber Crime held in conjunction with ARES, Toulouse, France, 2015. pdf
[17] “Encryption Is Not Enough: Inferring user activities on KakaoTalk with traffic analysis”,  Kyungwon Park  and Hyoungshick Kim, WISA: The 16th International Workshop on Information Security Applications, Jeju Island, Korea, 2015. pdf
[16] “A new technique using a shuffling method to protect confidential documents from shoulder surfers”,  Hyunsoo Kim, Ji Won Yoon  and Hyoungshick Kim, ICSSA: The 1st International Conference on Software Security and Assurance, Suwon, Korea, 2015. (selected as “best student paper”) pdf
[15] “Performing clickjacking attacks in the wild: 99% are still vulnerable!”,  Daehyun Kim  and Hyoungshick Kim, ICSSA: The 1st International Conference on Software Security and Assurance, Suwon, Korea, 2015. pdf
[14] “Addressing security challenges in cloud computing – a pattern-based approach”, Priya Anand, Jungwoo Ryoo  and Hyoungshick Kim, ICSSA: The 1st International Conference on Software Security and Assurance, Suwon, Korea, 2015. pdf
[13] “On the Memorability of System-generated PINs: Can Chunking Help?”, Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Masooda Bashir and Konstantin Beznosov, SOUPS: The 11st Symposium On Usable Privacy and Security, Ottawa, Canada, 2015. pdf
[12] “Devil in a Box: Installing Backdoors in Electronic Door Locks”,  Seongyeol Oh, Joon-Sung Yang, Andrea Bianchi and Hyoungshick Kim, PST: The 13th International Conference on Privacy, Security and Trust, Izmir, Turkey, 2015. pdf
[11] “Keyboard or Keylogger?: a security analysis of third-party keyboards on Android”,  Junsung ChoGeumhwan Cho and Hyoungshick Kim, PST: The 13th International Conference on Privacy, Security and Trust, Izmir, Turkey, 2015. pdf
[10] “Enhancing Conformance Testing using Symbolic Execution for Network Protocols”, Jaeseung Song, Hyoungshick Kim, and Soojin Park, IEEE Transactions on Reliability, Vol. 64(3), 2015. pdf
[9] “Design and analysis of enumeration attacks on finding friends with phone numbers: a case study with KakaoTalk”, Eunhyun Kim, Kyung-won Park, Hyoungshick Kim and Jaeseung Song, Computers & Security, Vol. 52, 2015. pdf
[8] “Visual Honey Encryption: Application to steganography”, Jiwon Yoon, Hyoungshick Kim, Hyunjoo Jo, Hyelim Lee and Kwangsu Lee, IH&MMSec: The 3rd ACM Workshop on Information Hiding and Multimedia Security, Portland, USA, 2015. pdf
[7] “Visualizing Privacy Risks of Mobile Applications through a Privacy Meter”, Jina Kang, Hyoungshick Kim, Yun Gyung Cheong and Jun Ho Huh, ISPEC: The 11st International Conference on Information Security Practice and Experience, Beijing, China, 2015. pdf
[6] “On the Effectiveness of Pattern Lock Strength Meters – Measuring the Strength of Real World Pattern Locks”, Youngbae Song, Geumhwan Cho, Seongyeol Oh, Hyoungshick Kim and Jun Ho Huh, CHI: The 33th ACM SIGCHI Conference on Human Factors in Computing Systems, Seoul, Korea, 2015. pdf video
[5] “Privacy Preserving Nearest Neighbor Search based on Topologies in Cellular Networks”, Mahdi D Firoozjaei, Jaegwan Yu and Hyoungshick Kim, DC2: The 2nd Workshop on Device Centric Cloud held in conjunction with IEEE AINA, Gwangju, Korea, 2015.  (selected as “best paper”) pdf
[4] “SBUS: Smart e-Bus Battery Substitution Scheme in Vehicular Networks”, Jihyeok Seo, Jaehoon Jeong, Hyoungshick Kim and Jung-Soo Park, DC2: The 2nd Workshop on Device Centric Cloud held in conjunction with IEEE AINA, Gwangju, Korea, 2015.  (selected as “best student paper”) pdf
[3] “A Framework for Security Services Based on Software-Defined Networking”, Jaehoon Jeong, Jihyeok Seo, Geumhwan Cho, Hyoungshick Kim and Jung-Soo Park, DC2: The 2nd Workshop on Device Centric Cloud held in conjunction with IEEE AINA, Gwangju, Korea, 2015. pdf
[2] “A Study on the Influential Neighbors to Maximize Information Diffusion in Online Social Networks”, Hyoungshick Kim, Konstantin Beznosov and Eiko Yoneki, Computational Social Networks, Vol. 2(3), 2015.  pdf
[1] “KaaSP: Keying as a Service Provider for Small and Medium Enterprises Using Untrusted Cloud Services”, William Aiken, Jungwoo Ryoo and Hyoungshick Kim, IMCOM(ICUIMC): The 9th ACM International Conference on Ubiquitous Information Management and Communication, Bali, Indonesia, 2015. pdf

2014

[8] “I’ve Got Your Number: Harvesting users’ personal data via contacts sync for the KakaoTalk messenger”, Eunhyun Kim, Kyung-won Park, Hyoungshick Kim and Jaeseung Song, WISA: The 15th International Workshop on Information Security Applications, Jeju Island, Korea, 2014.  (selected as “best paper”) pdf
[7] “Analyzing unnecessary permissions requested by Android apps based on users’ opinions”, Jina Kang, Daehyun KimHyoungshick Kim and Jun Ho Huh, WISA: The 15th International Workshop on Information Security Applications, Jeju Island, Korea, 2014. pdf
[6] “A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain”, Youngbae Song, Hyoungshick Kim and Aziz Mohaisen, TrustBus: The 11st International Conference on Trust, Privacy & Security in Digital Business, Munich, Germany, 2014. pdf
[5] “iVisher: A system for real-time caller ID spoofing detection”, Jaeseung Song and Hyoungshick Kim, ETRI Journal, Vol. 36(5), 2014. pdf
[4] “On the Memorability of System-generated PINs: Can Chunking Help”, Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Masooda Bashir and Konstantin Beznosov, WAY: Workshop on Who are you?! Adventures in Authentication held in conjunction with ACM SOUPS, Menlo Park, USA, 2014. pdf
[3] “Power Replay Attack in Electronic Door Locks”, Seongyeol Oh, Joon-sung Yang, Andrea Bianchi and Hyoungshick Kim, S&P: The 35th IEEE Symposium on Security and Privacy (Poster), San Jose, USA, 2014. pdf
[2] “Finding Influential Neighbors to Maximize Information Diffusion in Twitter”, Hyoungshick Kim, Konstantin Beznosov and Eiko Yoneki, SIMPLEX: The 6th Annual Workshop on Simplifying Complex Networks for Practitioners, held in conjunction with WWW, Seoul, Korea, 2014. (selected as “runner-up”) pdf
[1] “Don’t Count The Number of Friends When You Are Spreading Information in Social Networks”, Hyoungshick Kim, IMCOM(ICUIMC): The 8th ACM International Conference on Ubiquitous Information Management and Communication, Siem Reap, Cambodia, 2014. pdf

2013

[4] “We are still vulnerable to clickjacking attacks: about 99% of Korean websites are dangerous”, Daehyun Kim and Hyoungshick Kim, WISA: The 14th International Workshop on Information Security Applications, Jeju Island, Korea, 2013. pdf (tested websites)
[3] “What’s in Twitter, I Know What Parties are Popular and Who You are Supporting Now!”, Antoine Boutet, Hyoungshick Kim and Eiko Yoneki, Social Network Analysis and Mining, Vol. 3(4), 2013. pdf
[2] “Social network analysis of patent infringement lawsuits”, Hyoungshick Kim and Jaeseung Song, Technological Forecasting & Social Change, Vol. 80(5), 2013. pdf
[1] “An Experimental Evaluation of Robustness of Networks”, Hyoungshick Kim and Ross Anderson, IEEE Systems Journal, Vol. 7(2), 2013. pdf

2012

[13] “What’s in Twitter: I Know What Parties are Popular and Who You are Supporting Now!”, Antoine Boutet, Hyoungshick Kim and Eiko Yoneki, ASONAM: The 4th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Istanbul, Turkey, 2012. pdf
[12] “Influential Neighbours Selection for Information Diffusion in Online Social Networks”, Hyoungshick Kim and Eiko Yoneki, ICCCN: The 21st IEEE International Conference on Computer Communication Networks, Munich, Germany, 2012. pdf
[11] “Efficient Channel Selection Using Hierarchical Clustering”, Hyoungshick Kim, Jon Crowcroft and Fernando M.V. Ramos, WoWMoM: The 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, San Francisco, USA, 2012. pdf
[10] “STOP: Socio-Temporal Opportunistic Patching of Short Range Mobile Malware”, John Tang, Hyoungshick Kim, Cecilia Mascolo and Mirco Musolesi, WoWMoM: The 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, San Francisco, USA, 2012. pdf
[9] “Who did you call last”, Hyoungshick Kim and Konstantin Beznosov, U-PriSM: Workshop on Usable Privacy & Security for Mobile Devices, held in conjunction with ACM SOUPS, Washington DC, USA, 2012. pdf
[8] “Polymorphic Attacks against Sequence-based Software Birthmarks”, Hyoungshick Kim, Wei Ming Khoo and Pietro Lio’, SSP: The 2nd ACM SIGPLAN Workshop on Software Security and Protection, held in conjunction with ACM PLDI, Beijing, China, 2012. pdf
[7] “What’s in Your Tweets? I Know Who You Supported in the UK 2010 General Election”, Antoine Boutet, Hyoungshick Kim and Eiko Yoneki, ICWSM: The 6th International AAAI Conference on Weblogs and Social Media, Dublin, Ireland, 2012. pdf
[6] “PIN selection policies: Are they really effective?”, Hyoungshick Kim and Jun Ho Huh, Computers & Security, Vol. 31(4), 2012. pdf
[5] “Social Authentication: Harder than it Looks”, Hyoungshick Kim, John Tang and Ross Anderson, FC: The 16th IFCA International Conference on Financial Cryptography and Data Security, Kralendijk, Bonaire, 2012. pdf

There’s press coverage. [New Scientist, Jan. 25, 2012] [Light Blue Touchpaper, Feb. 22, 2012]
[4] “Centrality Prediction in Dynamic Human Contact Networks”, Hyoungshick Kim, John Tang, Ross Anderson and Cecilia Mascolo, Computer Networks, Vol. 56(3), 2012. pdf
[3] “Temporal Node Centrality in Complex Networks”, Hyoungshick Kim and Ross Anderson, Physical Review E, Vol. 85(2), 2012. pdf

There’s press coverage. [University of Cambridge Research News, Feb. 20, 2012] [Light Blue Touchpaper, Jan. 18, 2012]
[2] “Privacy-Enhancing Queries in Personalized Search with Untrusted Service Providers”, Yunsang Oh, Hyoungshick Kim and Takashi Obi, IEICE Transactions on Information and Systems, Vol. 95-D(1), 2012. pdf
[1] “Network Analysis of Temporal Trends in Scholarly Research Productivity”, Hyoungshick Kim, Ji Won Yoon and Jon Crowcroft, Journal of Informetrics, Vol. 6(1), 2012. pdf

2011

[6] “Achieving attestation with less effort: an indirect and configurable approach to integrity reporting”, Jun Ho Huh, Hyoungshick Kim, John Lyle and Andrew Martin, STC: The 6th ACM Workshop on Scalable Trusted Computing, held in conjunction with ACM CCS, Chicago, USA, 2011.pdf
[5] “RAD: Recipient-Anonymous Data Delivery based on Public Routing Proxies”, Hyoungshick Kim and Jaehoon Jeong, Computer Networks, Vol. 55(15), 2011. pdf
[4] “Detecting DNS Poisoning Based Phishing Attacks from their Network Performance Characteristics”, Hyoungshick Kim and Jun Ho Huh, Electronics Letters, Vol. 47(11), 2011. (selected as a research highlight in briefpdf
[3] “Phishing Detection with Popular Search Engines: Simple and Effective”, Jun Ho Huh and Hyoungshick Kim, FPS: The 4th MITACS Workshop on Foundations & Practice of Security, Paris, France, 2011. pdf
[2] “A Perfect Collision-free Pseudonym System”, Ji Won Yoon and Hyoungshick Kim, IEEE Communications Letters, Vol. 15(6), 2011. pdf
[1] “Effective measurement selection in truncated kernel density estimator”, Ji Won Yoon, Hyoung-joo Lee and Hyoungshick Kim, ICUIMC: The 5th ACM International Conference on Ubiquitous Information Management and Communication, Suwon, Korea, 2011. pdf

2010

[3] “An image encryption scheme with a pseudorandom permutation based on chaotic maps”, Ji Won Yoon and Hyoungshick Kim, Communications in Nonlinear Science and Numerical Simulations, Vol. 15(12), 2010. pdf
[2] “Hybrid Spam Filtering for Mobile Communication”, Ji Won Yoon, Hyoungshick Kim and Jun Ho Huh, Computers & Security, Vol. 29(4), 2010. pdf
[1] “On the Security of Internet Banking in South Korea”, Hyoungshick Kim, Jun Ho Huh and Ross Anderson, Oxford University Technical Report, RR-10-01, 2010. pdf [Another Version]

There’s press coverage. [Light Blue Touchpaper, May 12, 2012][etnews, May 3, 2010][boan news, Apr. 29. 2010][itnews, Apr. 29. 2010][edaily, Apr. 29. 2010][MK business News, Apr. 29. 2010][Mozilla in Asia, Apr. 28. 2010][etnews, Mar. 15, 2010][Yonhap News, Mar. 15, 2010][inews, Mar. 14, 2010][JoongAng Sunday, Feb. 28, 2010][Seoul Newspaper, Feb. 20, 2010][etnews, Feb. 8, 2010]

2009

[4] “Privacy-Enhanced Public View for Social Graphs”, Hyoungshick Kim and Joseph Bonneau, SWSM: The 2nd ACM Workshop on Social web search and mining, held in conjunction with ACM CIKM, Hong Kong, China, 2009. pdf
[3] “A Spatial Cloaking Framework based on Range Search for Nearest Neighbor Search”, Hyoungshick Kim, DPM: The 4th Workshop on Data Privacy Management, held in conjunction with ESORICS, St-Malo, France, 2009. pdf
[2] “A New Collision-free Pseudonym Scheme in Mobile Ad Hoc Networks”, Ji Won Yoon and Hyoungshick Kim, RAWNET/WNC3: The 5th Workshop on Resource Allocation, Cooperation and Competition in Wireless Networks, held in conjunction with WiOpt, Seoul, Korea, 2009. pdf
[1] “Dynamic Mashup Platform for Mobile Web Applications”, Seongho Cho, Hyoungshick Kim, Dongshin Jung and Ho-Yeon Park, ICCE: The 27th IEEE International Conference on Consumer Electronics, Las Vegas, USA, 2009. pdf

2007

[4] “Scalable DRM System for Media Portability”, Hyoungshick Kim, ASIAN: The 12th Annual Asian Computing Science Conference, Doha, Qatar, 2007. pdf
[3] “Self-authorized Public Key Management for Home Networks”, Hyoungshick Kim and S. Jae Oh, NCUS: The 3rd Workshop on Network Centric Ubiquitous Systems, held in conjunction with EUC, Taipei, Taiwan, 2007. pdf
[2] “Secure Scalable Streaming for Integrity Verification of Media Data”, Hyoungshick Kim, ICACT: The 9th International Conference on Advanced Communication Technology, Pheonix Park, Korea, 2007. pdf
[1] “N-times Consumable Digital Ticket and Its Application to Content Access Service”, Hyoungshick Kim, CCNC: The 4th IEEE International Consumer Communications Conference, Las Vegas, USA, 2007. pdf