Date | Main | Opponent | Title |
---|
2025-06-10 | Woojin Jeon | - | |
2025-06-03 | Yejin Do | - | |
2025-05-27 | Soolin Kim | - | |
2025-05-20 | Seyoung Jin | - | |
2025-05-13 | Heewon Baek | - | |
2025-04-29 | Sukyeong Bang | - | |
2025-04-22 | Chaejin Lim | - | |
2025-04-15 | Yooshick Moon | - | |
2025-04-08 | Nivedita Singh | - | |
2025-04-01 | Eun Jung | - | |
2025-03-25 | Sangjun Chae | - | |
2025-03-18 | Sanghak Oh | - | Packet-Level Open-World App Fingerprinting on Wireless Traffic |
2025-03-11 | Heesung Jeong | Jieun Hwang | An Empirical Study to Evaluate AIGC Detectors on Code Content |
2025-03-04 | Yena Cho | Yerim Kim | Less Defined Knowledge and More True Alarms: Reference-based Phishing Detection without a Pre-defined Reference List |
2025-02-25 | Bedeuro Kim | Heesung Jeong | Organic or Diffused: Can We Distinguish Human Art from AI-generated Images? |
2025-02-18 | Seungho Kim | Heewon Baek | Gopher: High-Precision and Deep-Dive Detection of Cryptographic API Misuse in the Go Ecosystem |
2025-02-11 | Seonghyeon Song | Taeyoung Kim | AutoDroid: LLM-powered Task Automation in Android |
2025-02-04 | Eunsoo Kim | Eun Jung | Breaking Security-Critical Voice Authentication |
2025-01-21 | Taeyoung Kim | - | VETEOS: Statically Vetting EOSIO Contracts for the "Groundhog Day" Vulnerabilities |
2025-01-21 | Seonhye Park | Seyoung Jin | Casual Users and Rational Choices within Differential Privacy |
2025-01-14 | Beomjin Jin | Chaejin Lim | A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild |
2025-01-07 | Sanghak Oh | Woojin Jeon | TrafficFormer: An Efficient Pre-trained Model for Traffic Data |
2024-12-30 | Soolin Kim | - | Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning |
2024-12-23 | Eunsoo Kim | Sukyeong Bang | Beyond Typosquatting: An In-depth Look at Package Confusion |
2024-12-09 | Seungho Kim | Seonhye Park | VulExplainer: A Transformer-Based Hierarchical Distillation for Explaining Vulnerability Types |
2024-11-25 | Yejin Do | Beomjin Jin | Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models |
2024-11-18 | Seyoung Jin | Nivedita Singh | CamPro: Camera-based Anti-Facial Recognition |
2024-11-11 | Heewon Baek | Seyoung Jin | TrojanPuzzle: Covertly Poisoning Code-Suggestion Models |
2024-11-04 | Nivedita Singh | Seyoung Jin | Towards Automated Regulation Analysis for Effective Privacy Compliance |
2024-10-28 | Chaejin Lim | Beomjin Jin | EaTVul:ChatGPT-based Evasion Attack Against Software Vulnerability Detection |
2024-10-07 | Woojin Jeon | Sanghak Oh | Using Motion Forecasting for Behavior-Based Virtual Reality (VR) Authentication |
2024-09-30 | Hyun Min Choi | - | Differentially Private Synthetic Data via Foundation Model APIs 1: Images |
2024-09-23 | Jihun Kim | Heesung Jeong | Defense Against Adversarial Attacks on No-Reference Image Quality Models with Gradient Norm Regularization |
2024-09-09 | Seonhye Park | Nivedita Singh | On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning |
2024-08-27 | Taeyoung Kim | Chaejin Lim | Large Language Models for Code: Security Hardening and Adversarial Testing |
2024-08-20 | Bedeuro Kim | Sukyeong Bang | MGTBench: Benchmarking Machine-Generated Text Detection |
2024-08-13 | Giwon Lee | - | V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques |
2024-08-06 | Eun Jung | Yejin Do | VGX: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability Analyses |
2024-07-23 | Yena Cho | Jihun Kim | Vision Transformer Adapter for dense predictions |
2024-07-16 | Seonghyeon Song | Taeyoung Kim | FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy |
2024-07-09 | Beomjin Jin | Yejin Do | PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection |
2024-06-18 | Jihun Kim | Seonhye Park | HE3DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption |
2024-06-11 | - | - | 2024 1st semester final exam period |
2024-06-04 | Seonhye Park | Nivedita Singh | On the Usability of HTTPS Deployment |
2024-05-28 | Bedeuro Kim | Woojin Jeon | Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools |
2024-05-21 | Seungho Kim | Seonhye Park | Coca: Improving and Explaining Graph Neural Network-Based Vulnerability Detection Systems |
2024-05-14 | - | - | Esorics Review |
2024-05-07 | Heewon Baek | Soolin Kim | Transformer-Based Language Models for Software Vulnerability Detection |
2024-04-30 | Seyoung Jin | Heewon Baek | The Influence of Human Factors on the Intention to Report Phishing Emails |
2024-04-16 | Nivedita Singh | Seonhye Park | The Great Request Robbery: An Empirical Study of Client-side Request Hijacking Vulnerabilities on the Web |
2024-04-09 | Sanghak Oh | Woojin Jeon | ``It Basically Started Using Me:'' An Observational Study of Password Manager Usage |
2024-04-02 | Eun Jung | Chaejin Lim | CodeAttack Code-Based Adversarial Attacks for Pre-trained Programming Language Models |
2024-03-26 | Woojin Jeon | Heewon Baek | SoundLock: A Novel User Authentication Scheme for VR Devices Using Auditory-Pupillary Response |
2024-03-19 | Chaejin Lim | Beomjin Jin | Extending a Hand to Attackers: Browser Privilege Escalation Attacks via Extensions |
2024-03-06 | Chanjong Lee | - | A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments |
2024-02-28 | Soolin Kim | Seungho Kim | DeepVD: Toward Class-Separation Features for Neural Network Vulnerability Detection |
2024-02-21 | Taeyoung Kim | - | MASTERKEY: Automated Jailbreaking of Large Language Model Chatbots |
2024-02-14 | Yejin Do | Woojin Jeon | Teach LLMs to Phish: Stealing Private Information from Language Models |
2024-02-07 | Hyun Min Choi | Jihun Kim | Grote: Group Testing for Privacy-Preserving Face Identification |
2024-01-24 | Beomjin Jin | Taeyoung Kim | PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior |
2024-01-10 | Eunsoo Kim | - | User Perceptions of Five-Word Passwords |
2024-01-03 | Hyun Min Choi | Nivedita Singh | Multiparty Homomorphic Encryption from Ring-Learning-with-Errors |
2023-12-27 | Kiho Lee | Seonhye Park | Machine Unlearning |
2023-12-20 | Sanghak Oh | Woojin Jeon | Spying through Your Voice Assistants: Realistic Voice Command Fingerprinting |
2023-12-06 | Chanjong Lee | - | Zero-shot Adversarial Quantization |
2023-11-29 | Jungkon Kim | Hyun Min Choi | FlexRound: Learnable Rounding based on Element-wise Division for Post-Training Quantization |
2023-11-22 | Daehoon Ko | Soolin Kim | Trust Dies in Darkness: Shedding Light on Samsungs TrustZone Keymaster Design |
2023-11-08 | Chaejin Lim | Woojin Jeon | BitDance: Manipulating UART Serial Communication with IEMI |
2023-11-01 | Nivedita Singh | Soolin Kim | DarkDialogs: Automated detection of 10 dark patterns on cookie dialogs |
2023-10-11 | Seyoung Jin | Nivedita Singh | Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality |
2023-10-04 | Heewon Baek | Sanghak Oh | Detecting Cryptography Misuses With Machine Learning: Graph Embeddings, Transfer Learning and Data Augmentation in Source Code Related Tasks |
2023-09-27 | Beomjin Jin | Eunsoo Kim | Limits of I/O Based Ransomware Detection: An Imitation Based Attack |
2023-09-20 | Seonhye Park | Taeyoung Kim | Industrial practitioners' mental models of adversarial machine learning |
2023-09-06 | Taeyoung Kim | Kiho Lee | Pelican: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis |
2023-08-22 | Seungho Kim | Jihun Kim | Optimized Privacy-Preserving CNN Inference With Fully Homomorphic Encryption |
2023-08-08 | Yejin Do | Nivedita Singh | Automated Cookie Notice Analysis and Enforcement |
2023-08-01 | Soolin Kim | Taeyoung Kim | MVD: memory-related vulnerability detection based on flow-sensitive graph neural networks |
2023-07-25 | Eunsoo Kim | Kiho Lee | Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants |
2023-06-27 | Woojin Jeon | Seungho Kim | Going Incognito in the Metaverse: Achieving Theoretically Optimal Privacy-Usability Tradeoffs in VR |
2023-06-20 | Nivedita Singh | Yejin Do | A US-UK Usability Evaluation of Consent Management Platform Cookie Consent Interface Design on Desktop and Mobile |
2023-06-13 | Beomjin Jin | Chaejin Lim | Humans vs. Machines in Malware Classification |
2023-05-16 | Beomjin Jin | - | TIPCE: A Longitudinal Threat Intelligence Platform Comprehensiveness Analysis |
2023-05-09 | Kiho Lee | Beomjin Jin | AutoFR: Automated Filter Rule Generation for Adblocking |
2023-05-02 | Bedeuro Kim | Heewon Baek | Does Knowledge Distillation Really Work? |
2023-04-25 | Taeyoung Kim | Soolin Kim | Peculiar: Smart Contract Vulnerability Detection Based on Crucial Data Flow Graph and Pre-training Techniques |
2023-04-11 | Seonhye Park | Kiho Lee | Membership Inference Attacks by Exploiting Loss Trajectory |
2023-04-04 | Chanjong Lee | Yurak Choe | Hidden in Plain Sight: Exploring Encrypted Channels in Android Apps |
2023-03-28 | Sanghak Oh | Seungho Kim | A Large-scale Investigation into Geodifferences in Mobile Apps |
2023-03-21 | Soolin Kim | Taeyoung Kim | Automating Cookie Consent and GDPR Violation Detection |
2023-02-28 | Jeongyong Park | Nivedita Singh | Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment |
2023-02-21 | Eunsoo Kim | Kiho Lee | Understanding and Detecting Remote Infection on Linux-based IoT Devices |
2023-02-14 | Seyoung Jin | Seonhye Park | Users' Perceptions of Chrome Compromised Credential Notification |
2023-02-07 | Yejin Do | Eunsoo Kim | Watch Out for Race Condition Attacks When Using Android External Storage |
2023-01-31 | Seungho Kim | Nivedita Singh | Privacy Limitations of Interest-based Advertising on The Web: A Post-mortem Empirical Analysis of Google's FLoC |
2023-01-17 | Chaejin Lim | Sanghak Oh | Phishing URL Detection: A Network-based Approach Robust to Evasion |
2023-01-10 | Yurak Choe | Chanjong Lee | Rushmore: securely displaying static and animated images using TrustZone |
2023-01-03 | Mohsen Ali | Minseo Park | Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints |
2022-12-27 | Minseo Park | Jeongyong Park | Behind the Scenes of RPKI |
2022-12-27 | Heewon Baek | Kiho Lee | Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement |
2022-11-21 | Sanghak Oh | Eunsoo Kim | Exploring the Characteristics and Security Risks of Emerging Emoji Domain Names |
2022-10-24 | Beomjin Jin | Kiho Lee | Wobfuscator: Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly |
2022-09-19 | Yejin Do | Sanghak Oh | A Study on Screen Logging Risks of Secure Keyboards of Android Financial Apps |
2022-09-05 | Soolin Kim | Taeyoung Kim | CodeReviewer: Pre-Training for Automating Code Review |
2022-08-22 | Minseo Park | Mohsen Ali | Web Cache Deception Escalates! |
2022-08-08 | Jaek Yun | Chanjong Lee | CENTRIS: A Precise and Scalable Approach for Identifying Modified Open-Source Software Reuse |
2022-07-25 | Mohsen Ali | Bedeuro Kim | MMAuth: A Continuous Authentication Framework on Smartphones Using Multiple Modalities |
2022-07-18 | Seungho Kim | Beomjin Jin | WtaGraph: Web Tracking and Advertising Detection using Graph Neural Networks |
2022-07-11 | Eunsoo Kim | - | Phishing in Organizations: Findings from a Large-Scale and Long-Term Study |
2022-06-27 | Taeyoung Kim | Soolin Kim | SODA: A Generic Online Detection Framework for Smart Contracts |
2022-06-20 | Jeongyong Park | Taeyoung Kim | What went wrong and when? Instance-wise feature importance for time-series black-box models |
2022-06-13 | Seunghyun Park | Seonhye Park | MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation |
2022-05-23 | Seonhye Park | Seunghyun Park | Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models |
2022-05-16 | Chanjong Lee | Jaek Yun | DeepReflect: Discovering Malicious Functionality through Binary Reconstruction |
2022-05-09 | Kiho Lee | Bedeuro Kim | A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks |
2022-05-02 | Bedeuro Kim | Kiho Lee | Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems |
2022-04-25 | Jeongyong Park | Seonhye Park | Time Series Anomaly Detection Using Convolutional Neural Networks and Transfer Learning |
2022-04-18 | Sanghak Oh | Seunghyun Park | ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification |
2022-04-04 | Soolin Kim | Beomjin Jin | AdGraph: A Graph-Based Approach to Ad and Tracker Blocking |
2022-03-28 | Eunsoo Kim | Beomjin Jin | Helping hands: Measuring the impact of a large threat intelligence sharing community. |
2022-03-15 | Bedeuro Kim | Kiho Lee | HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes. |
2022-03-08 | Minwook Lee | Sanghak Oh | Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques |
2022-02-22 | Beomjin Jin | Eunsoo Kim | An Inside Look into the Practice of Malware Analysis |
2022-02-15 | Seunghyun Park | Seonhye Park | On the Difficulty of Membership Inference Attacks |
2022-02-08 | Taeyoung Kim | Gilhee Lee | ETHBMC: A Bounded Model Checker for Smart Contracts |
2022-01-25 | Yunhee Jang | Chanjong Lee | Blockchain Denial-of-Service |
2022-01-11 | Jaek Yun | Minwook Lee | PDiff: Semantic-based Patch Presence Testing for Downstream Kernels |
2022-01-04 | Seonhye Park | Taeyoung Kim | MLCapsule: Guarded Offline Deployment of Machine Learning as a Service |
2021-12-28 | Jusop Choi | Eunsoo Kim | Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking |
2021-12-21 | Jeongseok Choi | Beomjin Jin | Black Widow: Blackbox Data-driven Web Scanning |
2021-11-23 | Mohsen Ali | Sanghak Oh | Chaperone: Real-time Locking and Loss Prevention for Smartphones |
2021-11-16 | Chanjong Lee | Yunhee Jang | ACES: Automatic Compartments for Embedded Systems |
2021-11-09 | Wonseok Jin | - | - |
2021-11-02 | Gilhee Lee | Yunhee Jang | Smart Contract Vulnerablilities: Vulnerable Does Not Imply Exploited |
2021-10-26 | Sanghak Oh | Seonhye Park | New Directions in Automated Traffic Analysis |
2021-10-15 | Jeongseok Choi | - | Automatically Evading Classifiers |
2021-09-28 | Minwook Lee | - | How Did That Get In My Phone? Unwanted App Distribution on Android Devices |
2021-09-14 | Soolin Kim | Jusop Choi | Shadow Attacks: Hiding and Replacing Content in Signed PDFs |
2021-09-07 | Bedeuro Kim | Jeongyong Park | Dompteur: Taming Audio Adversarial Examples |
2021-09-03 | Mohsen Ali | Eunsoo Kim | Multi-X: Identifying Multiple Authors from Source Code Files |
2021-08-24 | Beomjin Jin | Chanjong Lee | Obfuscation-Resilient Executable Payload Extraction From Packed Malware |
2021-08-17 | Yunhee Jang | - | LaKSA: A Probabilistic Proof-of-Stake Protocol |
2021-08-06 | Eunsoo Kim | Mohsen Ali | Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages |
2021-07-27 | Jusop Choi | Beomjin Jin | Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios |
2021-07-23 | Jaewan Joh | Yunhee Jang | Adapting SecurityWarnings to Counter Online Disinformation |
2021-07-13 | Seunghyun Park | Jusop Choi | Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code |
2021-07-06 | Chanjong Lee | Min Jang | A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks |
2021-06-22 | Seonhye Park | Geumhwan Cho | Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication |
2021-06-15 | Jeongyong Park | Soolin Kim | TEXTSHIELD: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation |
2021-06-08 | Wonseok Jin | Jeongseok Choi | CAN-ADF: The controller area network attack detection framework |
2021-05-25 | Min Jang | Taegeun Moon | Preventing Use-After-Free Attacks with Fast Forward Allocation |
2021-05-18 | Gilhee Lee | Taegeun Moon | The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts |
2021-05-11 | Taegeun Moon | Minwook Lee | Extracting Taint Specifications for JavaScript Libraries |
2021-05-04 | Jeongseok Choi | Wonseok Jin | One Pixel Attack for Fooling Deep Neural Networks |
2021-04-20 | Minwook Lee | Eunsoo Kim | On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices |
2021-04-06 | Yunhee Jang | Gilhee Lee | Blockene: A High-throughput Blockchain Over Mobile Devices |
2021-03-23 | Mohsen Ali | Bedeuro Kim | Identifying Child Users via Touchscreen Interactions |
2021-03-16 | Beomjin Jin | Seunghyun Park | Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem |
2021-03-09 | Soolin Kim | Minwook Lee | Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps |
2021-03-02 | Eunsoo Kim | Sanghak Oh | FINN: Fingerprinting Network Flows using Neural Networks |
2021-02-16 | Jusop Choi | Yunhee Jang | Harvey: A Greybox Fuzzer for Smart Contracts |
2021-02-09 | Geumhwan Cho | Soolin Kim | Continuous Authentication for Voice Assistants |
2021-02-02 | Sanghak Oh | Eunsoo Kim | FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic |
2021-01-19 | Bonha Koo | Yunhee Jang | Estonian Electronic Identity Card: Security Flaws in Key Management |
2021-01-12 | Bedeuro Kim | Mohsen Ali | "It's the Company, the Government, You and I": User Perceptions of Responsibility for Smart Home Privacy and Security. |
2021-01-05 | Gilhee Lee | Yunhee Jang | Bitcoin Lightweight Client Privacy using Trusted Execution |
2020-12-30 | Jeongseok Choi | Wonseok Jin | GIDS: GAN based Intrusion Detection System for In-Vehicle Network |
2020-12-23 | Minwook Lee | Jusop Choi | CRYLOGGER: Detecting Crypto Misuses Dynamically |
2020-12-08 | Yunhee Jang | Gilhee Lee | FlyClient: Super-Light Clients for Cryptocurrencies |
2020-11-24 | Taegeun Moon | Beomjin Jin | Everything Old is New Again: Binary Security of WebAssembly |
2020-11-17 | Aishwarya Ram-Vinay | Mohsen Ali | Adversarial Examples for Evaluating Reading Comprehension Systems |
2020-11-10 | Bedeuro Kim | Taegeun Moon | The Web’s Identity Crisis: Understanding the Effectiveness of Website Identity Indicators |
2020-11-03 | Mohsen Ali | Aishwarya Ram-Vinay | AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors |
2020-10-27 | Beomjin Jin | Jusop Choi | Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines |
2020-10-20 | Soolin Kim | Minwook Lee | Security Analysis of Unified Payments Interface and Payment Apps in India |
2020-10-13 | Jusop Choi | Soolin Kim | Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization |
2020-10-06 | Eunsoo Kim | Bonha Koo | Detecting Fake Accounts in Online Social Networks at the Time of Registrations |
2020-09-15 | Junsung Cho | Mohsen Ali | Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks |
2020-09-01 | Dongwon Lee | Yongwoo Oh | That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers |
2020-08-25 | Hanbin Jang | Taegeun Moon | Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack |
2020-08-11 | Wonseok Jin | Hyunjae Choi | READ: Reverse Engineering of Automotive Data Frames |
2020-08-04 | Min Jang | Minwook Lee | FANS: Fuzzing Android Native System Services via Automated Interface Analysis |
2020-07-28 | Geumhwan Cho | Jusop Choi | When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features |
2020-07-21 | Beomjin Jin | Eunsoo Kim | Neurlux: Dynamic Malware Analysis Without Feature Engineering |
2020-07-07 | Jusop Choi | Taegeun Moon | Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing |
2020-06-24 | Junsung Cho | Min Jang | Total Recall: Persistence of Passwords in Android |
2020-06-17 | Taegeun Moon | Hanbin Jang | HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs |
2020-06-03 | Jeongseok Choi | Minwook Lee | CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices |
2020-05-27 | Minwook Lee | Taegeun Moon | Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation |
2020-05-20 | Seunghun Cha | Yunhee Jang | The Anatomy of a Cryptocurrency Pump-and-Dump Scheme |
2020-05-13 | Gitae I | Dongwon Lee | Self-encrypting deception: weaknesses in the encryption of solid state drives |
2020-05-06 | Yunhee Jang | Gilhee Lee | Fast Bootstrapping for Cryptocurrencies |
2020-04-29 | Aishwarya Ram-Vinay | Mohsen Ali | Fake news on Twitter during the 2016 U.S. presidential election |
2020-04-22 | Mohsen Ali | Aishwarya Ram-Vinay | EchoLock: Towards Low Effort Mobile User Identification |
2020-04-16 | Geumhwan Cho | Eunsoo Kim | This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs |
2020-04-08 | Gilhee Lee | Yunhee Jang | BEAT: Asynchronous BFT Made Practical |
2020-04-01 | Eunsoo Kim | Jusop Choi | Cybersecurity Event Detection with New and Re-emerging |
2020-03-25 | Heejun Jang | Mohsen Ali | DEEPINTENT: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps |
2020-02-11 | Hanbin Jang | Taegeun Moon | Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices |
2020-02-04 | Beomjin Jin | Hanbin Jang | AIMED: Evolving Malware with Genetic Programming to Evade Detection |
2020-01-28 | Mohsen Ali | Taegeun Moon | End-to-End Measurements of Email Spoofing Attacks. |
2020-01-21 | Heejun Jang | Minwook Lee | DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications |
2020-01-14 | Geumhwan Cho | Hanbin Jang | Detecting and Characterizing Lateral Phishing at Scale |
2020-01-07 | Jusop Choi | Heejun Jang | Why is a Ravencoin Like a TokenDesk? An Exploration of Code Diversity in the Cryptocurrency Landscape |
2019-12-31 | Junsung Cho | Eunsoo Kim | Continuous Authentication of Smartphones Based on Application Usage |
2019-12-24 | Eunsoo Kim | Beomjin Jin | Reading the Tea Leaves: A Comparative Analysis of Threat Intelligence |
2019-12-17 | Seunghun Cha | Yunhee Jang | TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum |
2019-12-03 | Gitae I | - | Another Look on Bucketing Attack to Defeat White-Box Implementations |
2019-11-26 | Minwook Lee | Taegeun Moon | BridgeTaint: A Bi-Directional Dynamic Taint Tracking Method for JavaScript Bridges in Android Hybrid Applications |
2019-11-19 | Yunhee Jang | Maryam Hashmi | Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability |
2019-11-12 | Aishwarya Ram-Vinay | Maryam Hashmi | ARE WE SAFE YET? THE LIMITATIONS OF DISTRIBUTIONAL FEATURES FOR FAKE NEWS DETECTION |
2019-11-05 | Jeongseok Choi | Minwook Lee | 1 Trillion Dollar Refund - How To Spoof PDF Signatures |
2019-10-29 | Hanbin Jang | Woojoong Ji | Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications |
2019-10-08 | Soolin Kim | Junsung Cho | Short text, Large Effect_Measuring the Impact of user reviews on android app security and privacy |
2019-10-01 | Bedeuro Kim | Maryam Hashmi | A Usability Study of Five Two-Factor Authentication Methods |
2019-09-24 | Woojoong Ji | Minwook Lee | Finding Flaws from Password Authentication Code in Android Apps |
2019-09-17 | Daehwa Lee | Yunhee Jang | Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web |
2019-09-10 | Junhwi Bae | Soolin Kim | Leaky Images: Targeted Privacy Attacks in the Web |
2019-09-03 | Mohsen Ali | Aishwarya Ram-Vinay | Breaking LTE on Layer Two |
2019-08-27 | Yongwoo Oh | Dongwon Lee | GraphSE^2: An Encrypted Graph Database for Privacy-Preserving Social Search |
2019-08-20 | Woojoong Ji | Hanbin Jang | What Happens After You Leak Your Password Understanding Credential Sharing on Phishing Sites |
2019-08-13 | Beomjin Jin | Eunsoo Kim | Efficient Signature Generation for Classifying Cross-Architecture IoT Malware |
2019-08-06 | Heejun Jang | Dongsoon Shin | Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization |
2019-07-30 | Junsung Cho | Eunsoo Kim | "If you want, I can store the encrypted password." A Password-Storage Field Study with Freelance Developers |
2019-07-16 | Yunhee Jang | Hojoon Ryu | Tracing Transactions Across Cryptocurrency Ledgers |
2019-07-09 | Jusop Choi | Beomjin Jin | Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries |
2019-07-02 | Soolin Kim | Yunhee Jang | We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy |
2019-06-25 | Eunsoo Kim | Jusop Choi | Countering Malicious Processes with Process-DNS Association |
2019-06-11 | Taeyun Kim | Junsung Cho | Demystifying Hidden Privacy Settings in Mobile Apps |
2019-06-04 | Wonseok Choi | Bedeuro Kim | Monitoring Smart Home Apps from Encrypted Traffic |
2019-05-28 | William Aiken | Mohsen Ali | Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks |
2019-05-21 | Dongsoon Shin | Heejun Jang | Exploiting Speculative Execution |
2019-05-14 | Hanbin Jang | Beomjin Jin | Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces |
2019-05-10 | Gitae I | Dongsoon Shin | Differential Computation Analysis: Hiding your White-Box Designs is Not Enough |
2019-04-30 | Geumhwan Cho | Bedeuro Kim | Rethinking Access Control and Authentication for the Home Interner of Things (IoT) |
2019-04-16 | Aishwarya Ram-Vinay | Geumhwan Cho | A Tale of Two Studies: The Best and Worst of YubiKey Usability |
2019-04-09 | Bedeuro Kim | William Aiken | Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes |
2019-04-02 | Junhwi Bae | Aishwarya Ram-Vinay | Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels |
2019-03-26 | Yongwoo Oh | Eunsoo Kim | Revealing and Detecting Malicious Retweeter Groups |
2019-03-19 | Seok Hong | Soolin Kim | A Dynamic App Anti-Debugging Approach on Android ART Runtime |
2019-03-12 | Daehwa Lee | Mohsen Ali | Bitcoin-NG: A Scalable Blockchain Protocol |
2019-02-22 | Woojoong Ji | Junsung Cho | Source Attribution of Cryptographic API Misuse in Android Applications |
2019-02-22 | Beomjin Jin | Jusop Choi | Countering Android Malware: A Scalable Semi-Supervised Approach for Family-Signature Generation |
2019-02-01 | Dongsoon Shin | Junhwi Bae | Driller: Augmenting Fuzzing Through Selective Symbolic Execution |
2019-01-25 | William Aiken | Mohsen Ali | Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples |
2019-01-18 | Soolin Kim | Heejun Jang | Precise and Accurate Patch Presence Test for Binaries |
2019-01-11 | Wonseok Choi | Eunsoo Kim | Mystique: Uncovering Information Leakage from Browser Extensions |
2019-01-04 | Heejun Jang | Jusop Choi | Complete, High-Assurance Determination of Loop Bounds and Infeasible Paths for WCET Analysis |
2018-12-11 | Teakkyung Oh | Beomjin Jin | BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid |
2018-12-04 | Geumhwan Cho | Mohsen Ali | Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location |
2018-11-27 | Seungjin Lee | Teakkyung Oh | Skill Squatting Attacks on Amazon Alexa |
2018-11-20 | Taeyun Kim | Bedeuro Kim | On the Accuracy of Password Strength Meters |
2018-11-13 | Kuyju Kim | Heejun Jang | JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework .. |
2018-11-06 | Eunsoo Kim | William Aiken | “What was that site doing with my Facebook password?” Designing Password-Reuse Notifications |
2018-10-30 | Jusop Choi | Teakkyung Oh | MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation |
2018-10-02 | Daehwa Lee | Bedeuro Kim | On the Security and Performance of Proof of Work Blockchains |
2018-09-18 | Junsung Cho | Beomjin Jin | Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing |
2018-09-11 | Seok Hong | Jusop Choi | Tackling runtime-based obfuscation in Android with TIRO |
2018-08-28 | Woojoong Ji | Beomjin Jin | The Wolf of Name Street: Hijacking Domains Through Their Nameservers |
2018-08-21 | Dongsoon Shin | Jusop Choi | Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels |
2018-08-14 | Beomjin Jin | Seungjin Lee | Removing Secrets from Android's TLS |
2018-08-07 | William Aiken | - | Embedding Watermarks into Deep Neural Networks |
2018-07-31 | Taeyun Kim | Geumhwan Cho | GuidedPass: Helping Users to Create Strong and Memorable Passwords |
2018-07-24 | Wonseok Choi | Geumhwan Cho | AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings |
2018-07-17 | Teakkyung Oh | Yongwoo Oh | DeWiCam: Detecting Hidden Wireless Cameras via Smartphones |
2018-07-10 | Heejun Jang | Dongsoon Shin | Ramblr: Making Reassembly Great Again |
2018-07-03 | Soolin Kim | Kuyju Kim | Reliable Third-Party Library Detection in Android and its Security Applications |
2018-06-25 | Moongyu Jung | Seok Hong | Towards On-Device Non-Invasive Mobile Malware Analysis for ART |
2018-06-18 | Kuyju Kim | Soolin Kim | ARTist: The Android Runtime Instrumentation and Security Toolkit |
2018-05-28 | Eunsoo Kim | Heejun Jang | Code-Reuse Attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script Gadgets |
2018-05-21 | Jusop Choi | Woojoong Ji | ZEUS: Analyzing Safety of Smart Contracts |
2018-05-14 | Junsung Cho | Taeyun Kim | SafeKeeper: Protecting Web Passwords using Trusted Execution Environments |
2018-05-10 | Geumhwan Cho | Wonseok Choi | VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones |
2018-04-30 | Mohsen Ali | Yuri Son | 6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices |
2018-04-16 | Yongwoo Oh | Teakkyung Oh | Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems |
2018-04-09 | Yuri Son | Mohsen Ali | SmartAuth: User-Centered Authorization for the Internet of Things |
2018-04-02 | Seungjin Lee | Geumhwan Cho | Authentication on the Go: Assessing the Effect of Movement on Mobile Device Keystroke Dynamics |
2018-03-26 | Heejun Jang | Eunsoo Kim | Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials |
2018-03-19 | Teakkyung Oh | William Aiken | Rocking Drones with International Sound Noise on Gyroscopic Sensors |
2018-03-12 | Soolin Kim | Woojoong Ji | Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android |
2018-02-20 | Seungjin Lee | Taeyun Kim | Design and Evaluation of a Data-Driven Password Meter |
2018-02-13 | Kuyju Kim | Beomjin Jin | AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services |
2018-02-06 | Munkhzorig Dorjmyagmar | Dongsoon Shin | Breaking Ad-hoc Runtime Integrity Protection Mechanisms in Android Financial Apps |
2018-01-30 | Sangmin Lee | Heejun Jang | A Stitch in Time Supporting Android Developers in Writing Secure Code |
2018-01-23 | Eunsoo Kim | Wonseok Choi | Detecting Credential Spearphishing in Enterprise Settings |
2018-01-16 | Jusop Choi | Heejun Jang | Fuzzing with Code Fragments |
2018-01-09 | Junsung Cho | Mahdi Daghmehchi | Diversify to Survive: Making Passwords Stronger with Adaptive Policies |
2018-01-02 | Geumhwan Cho | Soolin Kim | Towards Baselines for Shoulder Surfing on Mobile Authentication |
2017-12-26 | Jihyeon Ryu | Kuyju Kim | RiskTeller: Predicting the Risk of Cyber Incidents |
2017-12-12 | Sungsu Kwak | Seungjin Lee | zxcvbn : Low-Budget Password Strength Estimation |
2017-12-05 | Beomjin Jin | Taekgeun Moon | A Privacy Analysis of Cross-device Tracking |
2017-11-28 | Taekgeun Moon | Beomjin Jin | BootStomp: On the Security of Bootloaders in Mobile Devices |
2017-11-21 | William Aiken | Geumhwan Cho | Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks |
2017-11-14 | Taeyun Kim | Jihyeon Ryu | Ensuring Authorized Updates in Multi-user Database-Backed Applications |
2017-10-31 | Wonseok Choi | Taekgeun Moon | Practical Keystroke Timing Attacks in Sandboxed JavaScript |
2017-10-17 | Donghoon Lee | William Aiken | IMF: Inferred Model-based Fuzzer |
2017-10-10 | Eunsoo Kim | Jusop Choi | unCaptcha: A Low-Resource Defeat of reCaptcha’s Audio Challenge |
2017-09-26 | Soyoung Kim | Taeyun Kim | Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures |
2017-09-19 | Jinwoo Kim | Eunsoo Kim | Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies |
2017-09-12 | Sangjun Ko | Wonseok Choi | Stay Cool! Understanding Thermal Attacks on Mobile-based User Authentication |
2017-09-05 | Jusop Choi | Mahdi Daghmehchi | DeTor: Provably Avoiding Geographic Regions in Tor |
2017-08-29 | Junsung Cho | Geumhwan Cho | User Interactions and Permission Use on Android |
2017-08-22 | Mahdi Daghmehchi | Soyoung Kim | The Onions Have Eyes: A Comprehensive Structure and Privacy Analysis of Tor Hidden Services |
2017-08-08 | Geumhwan Cho | Seungjin Lee | Itus: An Implicit Authentication Framework for Android. |
2017-08-01 | Soolin Kim | Geumhwan Cho | All your browser-saved passwords could belong to us: a security analysis and a cloud-based new design |
2017-07-25 | Seungjin Lee | Soyoung Kim | Protecting Insecure Communications with Topology-aware Network Tunnels |
2017-07-18 | Kuyju Kim | Jinwoo Kim | The Password Reset MitM Attack |
2017-07-11 | Hyunjae Choi | Soolin Kim | Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop |
2017-07-04 | Munkhzorig Dorjmyagmar | Mahdi Daghmehchi | Drammer: Deterministic Rowhammer Attacks on Mobile Platforms |
2017-06-26 | Sora Lee | Jaewoo Park | Fake Co-visitation Injection Attacks to Recommender Systems |
2017-06-19 | Jaewoo Park | Seunghun Cha | Hijacking Bitcoin: Routing Attacks on Cryptocurrencies |
2017-06-12 | Sangmin Lee | Seungjin Lee | Cross processor cache attacks |
2017-06-05 | Heejun Jang | Mahdi Daghmehchi | Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud |
2017-05-29 | Teakkyung Oh | Soolin Kim | The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio |
2017-05-15 | Moongyu Jung | Sangjun Ko | PayBreak : Defense Against Cryptographic Ransomware |
2017-05-08 | Yuri Son | Jusop Choi | BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection |
2017-05-01 | Stepan Dvorak | Soyoung Kim | Ad Injection at Scale: Assessing Deceptive Advertisement Modifications |
2017-05-01 | Soolin Kim | Heejun Jang | Password Manager : Attacks and Defenses |
2017-04-17 | Seungjin Lee | Teakkyung Oh | k-fingerprinting: A Robust Scalable Website Fingerprinting Technique |
2017-04-10 | Kuyju Kim | Jusop Choi | Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices |
2017-04-03 | Sangmin Lee | Jinwoo Kim | On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis |
2017-03-27 | MinChang Kim | Mahdi Daghmehchi | KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting |
2017-03-20 | Eunsoo Kim | Kuyju Kim | Mind your SMSes: Mitigating social engineering in second factor authentication |
2017-03-13 | Soyoung Kim | Sangmin Lee | Protecting Privacy of BLE Device Users |
2017-03-06 | Sangjun Ko | Soolin Kim | Scalable Graph-based Bug Search for Firmware Images |
2017-02-24 | Hyunjae Choi | Seunghun Cha | Exploiting Content Delivery Networks for covert channel communications |
2017-02-15 | Jinwoo Kim | Eunsoo Kim | To Befriend Or Not? A Model of Friend Request Acceptance on Facebook |
2017-02-01 | Jaewoo Park | Seungjin Lee | Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack |
2017-01-25 | Sora Lee | Jinwoo Kim | Authentication of LZ-77 Compressed Data |
2017-01-18 | Jusop Choi | Mahdi Daghmehchi | Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition |
2017-01-11 | Junsung Cho | Seunghun Cha | Using Reflexive Eye Movements for Fast Challenge-Response Authentication |
2017-01-04 | Geumhwan Cho | Munkhzorig Dorjmyagmar | I Am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs |
2016-12-28 | Mahdi Daghmehchi | MinChang Kim | BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications |
2016-12-22 | Seunghun Cha | Sora Lee | Inferring User Routes and Locations using Zero-Permission Mobile Sensors |
2016-12-08 | Munkhzorig Dorjmyagmar | Mahdi Daghmehchi | Statistical Deobfuscation of Android Applications |
2016-12-01 | MinChang Kim | Mahdi Daghmehchi | TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime |
2016-11-24 | Eunsoo Kim | Sora Lee | Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications. |
2016-11-17 | Soyoung Kim | Jaegwan Yu | Exit from Hell? Reducing the Impact of Amplification DDoS Attacks |
2016-11-03 | Hyunjae Choi | Sanghak Oh | A Comprehensive Measurement Study of Domain Generating Malware |
2016-10-20 | Jinwoo Kim | Jaewoo Park | Looking at the Bag is not Enough to Find the Bomb: An Evasion of Structural Methods for Malicious PDF Files Detection |
2016-10-13 | Sangjun Ko | Geumhwan Cho | Understanding Password Choices: How Frequently Entered Passwords are Re-used Across Websites |
2016-10-06 | Jaewoo Park | Jinwoo Kim | A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata emb |
2016-09-29 | Sora Lee | Junsung Cho | I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security |
2016-09-22 | Jaegwan Yu | Jusop Choi | The Remote Malicious Butler Did It! |
2016-09-08 | Junsung Cho | Soyoung Kim | Hidden Voice Commands |
2016-08-23 | Geumhwan Cho | MinChang Kim | Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones |
2016-08-16 | Mahdi Daghmehchi | Hyunjae Choi | An Experimental Study of TLS Forward Secrecy Deployments |
2016-08-09 | Seunghun Cha | Jaewoo Park | FingerIO: Using Active Sonar for Fine-Grained Finger Tracking |
2016-08-02 | Sanghak Oh | Mahdi Daghmehchi | On Scalability of Software-Defined Networking |
2016-07-19 | Jusop Choi | - | Security Analysis of Emerging Smart Home Applications |
2016-07-12 | Kyungwon Park | Seunghun Cha | Last-Level Cache Side-Channel Attacks are Practical |
2016-07-05 | Jaegwan Yu | Sangjun Ko | Protocol State Fuzzing of TLS Implementations |
2016-06-28 | Geumhwan Cho | Jinwoo Kim | Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices |
2016-06-14 | Jaewoo Park | Geumhwan Cho | Results and Lessons Learned from a User Study of Display Effectiveness with Experienced Cyber Security Network Analysts |
2016-06-07 | Joonghwan Lee | Mahdi Daghmehchi | Lithe: Lightweight Secure CoAP for the Internet of Things |
2016-05-31 | Seunghun Cha | Kyungwon Park | Gyrophone: Recognizing Speech from Gyroscope Signals |
2016-05-24 | Sanghak Oh | Hyunjae Choi | The Myth of the Average User: Improving Privacy and Security Systems through Individualization |
2016-05-17 | Junsung Cho | Eunsoo Kim | - |
2016-05-17 | Sora Lee | MinChang Kim | I Do Not Know What You Visited Last Summer: Protecting Users from Third-party Web Tracking with TrackingFree Browser |
2016-05-03 | Mahdi Daghmehchi | Junsung Cho | Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice |
2016-04-26 | Sangjun Ko | Sora Lee | WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths |
2016-04-12 | Jinwoo Kim | Chansu Suh | A Search Engine Backed by Internet-Wide Scanning |
2016-04-05 | Eunsoo Kim | Sanghak Oh | The Clock is Still Ticking: Timing Attacks in the Modern Web |
2016-03-29 | Jinmok Kim | Sangjun Ko | SKEE: A Lightweight Secure Kernel-level Execution Environment for ARM |
2016-03-22 | Kyungwon Park | Seunghun Cha | A Comprehensive Study of Frequency, Interference, and Training of Multiple Graphical Passwords |
2016-03-15 | Soyoung Kim | Eunsoo Kim | Your Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging |
2016-03-09 | Hyunjae Choi | Sora Lee | It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services |
2016-03-02 | Jusop Choi | Sangjun Ko | Mobiflage: Deniable Storage Encryption for Mobile Devices |
2016-02-17 | Jaegwan Yu | Hyunjae Choi | Attacking the Network Time Protocol |
2016-02-03 | Kyungwon Park | Jaewoo Park | Who Are You? A Statistical Approach to Measuring User Authenticity |
2016-01-27 | Jinwoo Kim | Junsung Cho | Face/Off: Preventing Privacy Leakage From Photos in Social Networks |
2016-01-20 | Seunghun Cha | Sanghak Oh | Screenmilker: How to Milk Your Android Screen for Secrets |
2016-01-13 | Soyoung Kim | Kyungwon Park | - |
2016-01-06 | Junsung Cho | Jinwoo Kim | Attacks on Public WLAN-based Positioning Systems |
2015-12-30 | Sangjun Ko | Seunghun Cha | HELDROID: Dissecting and Detecting Mobile Ransomware |
2015-12-23 | Sanghak Oh | Sora Lee | Monte Carlo Strength Evaluation: Fast and Reliable Password Checking |
2015-12-09 | Mahdi Daghmehchi | Jaewoo Park | GNFC: Towards Network Function Cloudification |
2015-12-02 | EunHyun Kim | Seunghun Cha | When Firmware Modifications Attack: A Case Study of Embedded Exploitation |
2015-11-25 | Geumhwan Cho | Jaewoo Park | Delayed-Dictionary Compression for Packet Networks |
2015-11-11 | Kyungwon Park | Seongyeol Oh | - |
2015-11-04 | Joonghwan Lee | Mahdi Daghmehchi | Delegation-based Authentication and Authorization for the IP-based Internet of Things |
2015-10-28 | Jinmok Kim | Seunghun Cha | Evaluating the Effectiveness of Current Anti-ROP Defenses |
2015-10-07 | Jusop Choi | Seongyeol Oh | Hacking Blind |
2015-09-23 | Jaegwan Yu | Kyungwon Park | Using Hardware Features for Increased Debugging Transparency |
2015-09-16 | Junsung Cho | Jaewoo Park | On the Impact of Touch ID on iPhone Passcodes |
2015-09-09 | Geumhwan Cho | EunHyun Kim | Towards Reliable Storage of 56-bit Secrets in Human Memory |
2015-09-02 | Seunghun Cha | Seongyeol Oh | PowerSpy: Location Tracking using Mobile Device Power Analysis |
2015-08-25 | Sanghak Oh | Junsung Cho | Crying Wolf? On the Price Discrimination of Online Airline Tickets |
2015-08-11 | Jaewoo Park | Mahdi Daghmehchi | - |
2015-07-21 | Mahdi Daghmehchi | Sora Lee | - |
2015-07-14 | Yunseok Choi | Seunghun Cha | What the App is That? Deception and Countermeasures in the Android User Interface |
2015-07-07 | EunHyun Kim | Sanghak Oh | Characterizing hypervisor vulnerabilities in cloud computing servers |
2015-06-30 | Sora Lee | Jaegwan Yu | Automatically Detecting Vulnerable Websites Before They Turn Malicious |
2015-06-23 | Seongyeol Oh | Jusop Choi | Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components |
2015-06-10 | Sungsu Kwak | Seongyeol Oh | - |
2015-06-03 | Joonghwan Lee | Geumhwan Cho | - |
2015-05-27 | Jinmok Kim | Kyungwon Park | - |
2015-05-20 | Yunseok Choi | Sanghak Oh | - |
2015-05-06 | Junsung Cho | Geumhwan Cho | - |
2015-04-29 | Geumhwan Cho | Seongyeol Oh | - |
2015-04-15 | Mahdi Daghmehchi | Kyungwon Park | - |
2015-04-08 | Jaegwan Yu | Seongyeol Oh | - |
2015-04-01 | Seunghun Cha | Sungsu Kwak | - |
2015-03-25 | EunHyun Kim | Yunseok Choi | - |
2015-03-11 | Sanghak Oh | Mahdi Daghmehchi | - |
2015-02-25 | Kyungwon Park | Jaegwan Yu | - |
2015-02-17 | Youngbae Song | Sungsu Kwak | - |
2015-01-28 | Jina Kang | Geumhwan Cho | - |
2015-01-21 | Seongyeol Oh | Jusop Choi | - |
2015-01-14 | Jaegwan Yu | Yunseok Choi | - |
2014-12-31 | Youngbae Song | EunHyun Kim | - |
2014-12-23 | Kyungwon Park | Junsung Cho | - |
2014-12-02 | Geumhwan Cho | Jina Kang | - |
2014-11-25 | Seongyeol Oh | Kyungwon Park | - |
2014-11-18 | Mahdi Daghmehchi | Jaegwan Yu | - |
2014-11-07 | Jusop Choi | Sanghak Oh | Cookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting |
2014-10-28 | Sungsu Kwak | Seunghun Cha | - |
2014-09-24 | Yunseok Choi | Kyungwon Park | - |
2014-09-17 | Seunghun Cha | Seongyeol Oh | - |
2014-09-11 | EunHyun Kim | Geumhwan Cho | - |
2014-09-04 | Sanghak Oh | Jaegwan Yu | - |
2014-08-20 | Jina Kang | Kyungwon Park | - |