Reading Seminar – List

DateMainOpponentTitle
2019-03-05Junhwi Bae--
2019-02-26Yongwoo Oh--
2019-02-19Seok Hong--
2019-02-12Daehwa Rayer Lee--
2019-01-29Woojoong Ji--
2019-01-22Beomjin Jin--
2019-01-15Dongsoon Shin--
2018-01-08William Aiken--
2018-12-18Taeyun Kim--
2018-12-11Wonseok Choi--
2018-12-04Heejun Jang--
2018-11-27Teakkyung Oh--
2018-11-20Geumhwan Cho--
2018-11-13Soolin Kim--
2018-11-06Seungjin Lee--
2018-10-30Kuyju Kim--
2018-10-23Eunsoo Kim--
2018-10-16Jusop Choi--
2018-10-02Daehwa Rayer Lee-On the Security and Performance of Proof of Work Blockchains
2018-09-18Junsung ChoBeomjin JinAway From Prying Eyes: Analyzing Usage and Understanding of Private Browsing
2018-09-11Seok HongKuyju KimTackling runtime-based obfuscation in Android with TIRO
2018-08-28Woojoong JiBeomjin JinThe Wolf of Name Street: Hijacking Domains Through Their Nameservers
2018-08-21Dongsoon ShinJusop ChoiPrecise and Scalable Detection of Double-Fetch Bugs in OS Kernels
2018-08-14Beomjin JinSeungjin LeeRemoving Secrets from Android's TLS
2018-08-07William Aiken-Embedding Watermarks into Deep Neural Networks
2018-07-31Taeyun KimGeumhwan ChoGuidedPass: Helping Users to Create Strong and Memorable Passwords
2018-07-24Wonseok ChoiGeumhwan ChoAWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings
2018-07-17Teakkyung OhYongwoo OhDeWiCam: Detecting Hidden Wireless Cameras via Smartphones
2018-07-10Heejun JangDongsoon ShinRamblr: Making Reassembly Great Again
2018-07-03Soolin KimKuyju KimReliable Third-Party Library Detection in Android and its Security Applications
2018-06-25Moongyu JungSeok HongTowards On-Device Non-Invasive Mobile Malware Analysis for ART
2018-06-18Kuyju KimSoolin KimARTist: The Android Runtime Instrumentation and Security Toolkit
2018-05-28Eunsoo KimHeejun JangCode-Reuse Attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script Gadgets
2018-05-21Jusop ChoiWoojoong JiZEUS: Analyzing Safety of Smart Contracts
2018-05-14Junsung ChoTaeyun KimSafeKeeper: Protecting Web Passwords using Trusted Execution Environments
2018-05-10Geumhwan ChoWonseok ChoiVoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones
2018-04-30Mohsen AliYuri Son6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices
2018-04-16Yongwoo OhTeakkyung OhBlue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems
2018-04-09Yuri SonMohsen AliSmartAuth: User-Centered Authorization for the Internet of Things
2018-04-02Seungjin LeeGeumhwan ChoAuthentication on the Go: Assessing the Effect of Movement on Mobile Device Keystroke Dynamics
2018-03-26Heejun JangEunsoo KimData Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials
2018-03-19Teakkyung OhWilliam AikenRocking Drones with International Sound Noise on Gyroscopic Sensors
2018-03-12Soolin KimWoojoong JiLife after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android
2018-02-20Seungjin LeeTaeyun KimDesign and Evaluation of a Data-Driven Password Meter
2018-02-13Kuyju KimBeomjin JinAUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services
2018-02-06Munkhzorig DorjmyagmarDongsoon ShinBreaking Ad-hoc Runtime Integrity Protection Mechanisms in Android Financial Apps
2018-01-30Sangmin LeeHeejun JangA Stitch in Time Supporting Android Developers in Writing Secure Code
2018-01-23Eunsoo KimWonseok ChoiDetecting Credential Spearphishing in Enterprise Settings
2018-01-16Jusop ChoiHeejun JangFuzzing with Code Fragments
2018-01-09Junsung ChoMahdi DaghmehchiDiversify to Survive: Making Passwords Stronger with Adaptive Policies
2018-01-02Geumhwan ChoSoolin KimTowards Baselines for Shoulder Surfing on Mobile Authentication
2017-12-26Jihyeon RyuKuyju KimRiskTeller: Predicting the Risk of Cyber Incidents
2017-12-12Sungsu KwakSeungjin Leezxcvbn : Low-Budget Password Strength Estimation
2017-12-05Beomjin JinTaekgeun MoonA Privacy Analysis of Cross-device Tracking
2017-11-28Taekgeun MoonBeomjin JinBootStomp: On the Security of Bootloaders in Mobile Devices
2017-11-21William AikenGeumhwan ChoFast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks
2017-11-14Taeyun KimJihyeon RyuEnsuring Authorized Updates in Multi-user Database-Backed Applications
2017-10-31Wonseok ChoiTaekgeun MoonPractical Keystroke Timing Attacks in Sandboxed JavaScript
2017-10-17Donghoon LeeWilliam AikenIMF: Inferred Model-based Fuzzer
2017-10-10Eunsoo KimJusop ChoiunCaptcha: A Low-Resource Defeat of reCaptcha’s Audio Challenge
2017-09-26Soyoung KimTaeyun KimPoisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures
2017-09-19Jinwoo KimEunsoo KimExtension Breakdown: Security Analysis of Browsers Extension Resources Control Policies
2017-09-12Sangjun KoWonseok ChoiStay Cool! Understanding Thermal Attacks on Mobile-based User Authentication
2017-09-05Jusop ChoiMahdi DaghmehchiDeTor: Provably Avoiding Geographic Regions in Tor
2017-08-29Junsung ChoGeumhwan ChoUser Interactions and Permission Use on Android
2017-08-22Mahdi DaghmehchiSoyoung KimThe Onions Have Eyes: A Comprehensive Structure and Privacy Analysis of Tor Hidden Services
2017-08-08Geumhwan ChoSeungjin LeeItus: An Implicit Authentication Framework for Android.
2017-08-01Soolin KimGeumhwan ChoAll your browser-saved passwords could belong to us: a security analysis and a cloud-based new design
2017-07-25Seungjin LeeSoyoung KimProtecting Insecure Communications with Topology-aware Network Tunnels
2017-07-18Kuyju KimJinwoo KimThe Password Reset MitM Attack
2017-07-11Hyunjae ChoiSoolin KimCloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop
2017-07-04Munkhzorig DorjmyagmarMahdi DaghmehchiDrammer: Deterministic Rowhammer Attacks on Mobile Platforms
2017-06-26Sora LeeJaewoo ParkFake Co-visitation Injection Attacks to Recommender Systems
2017-06-19Jaewoo ParkSeunghun ChaHijacking Bitcoin: Routing Attacks on Cryptocurrencies
2017-06-12Sangmin LeeSeungjin LeeCross processor cache attacks
2017-06-05Heejun JangMahdi DaghmehchiHello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud
2017-05-29Teakkyung OhSoolin KimThe Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio
2017-05-15Moongyu JungSangjun KoPayBreak : Defense Against Cryptographic Ransomware
2017-05-08Yuri SonJusop ChoiBinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection
2017-05-01Stepan DvorakSoyoung KimAd Injection at Scale: Assessing Deceptive Advertisement Modifications
2017-05-01Soolin KimHeejun JangPassword Manager : Attacks and Defenses
2017-04-17Seungjin LeeTeakkyung Ohk-fingerprinting: A Robust Scalable Website Fingerprinting Technique
2017-04-10Kuyju KimJusop ChoiForensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices
2017-04-03Sangmin LeeJinwoo KimOn Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis
2017-03-27MinChang KimMahdi DaghmehchiKEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting
2017-03-20Eunsoo KimKuyju KimMind your SMSes: Mitigating social engineering in second factor authentication
2017-03-13Soyoung KimSangmin LeeProtecting Privacy of BLE Device Users
2017-03-06Sangjun KoSoolin KimScalable Graph-based Bug Search for Firmware Images
2017-02-24Hyunjae ChoiSeunghun ChaExploiting Content Delivery Networks for covert channel communications
2017-02-15Jinwoo KimEunsoo KimTo Befriend Or Not? A Model of Friend Request Acceptance on Facebook
2017-02-01Jaewoo ParkSeungjin LeeStubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
2017-01-25Sora LeeJinwoo KimAuthentication of LZ-77 Compressed Data
2017-01-18Jusop ChoiMahdi DaghmehchiCocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition
2017-01-11Junsung ChoSeunghun ChaUsing Reflexive Eye Movements for Fast Challenge-Response Authentication
2017-01-04Geumhwan ChoMunkhzorig DorjmyagmarI Am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs
2016-12-28Mahdi DaghmehchiMinChang KimBabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications
2016-12-22Seunghun ChaSora LeeInferring User Routes and Locations using Zero-Permission Mobile Sensors
2016-12-08Munkhzorig DorjmyagmarMahdi DaghmehchiStatistical Deobfuscation of Android Applications
2016-12-01MinChang KimMahdi DaghmehchiTaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime
2016-11-24Eunsoo KimSora LeeEvaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications.
2016-11-17Soyoung KimJaegwan YuExit from Hell? Reducing the Impact of Amplification DDoS Attacks
2016-11-03Hyunjae ChoiSanghak OhA Comprehensive Measurement Study of Domain Generating Malware
2016-10-20Jinwoo KimJaewoo ParkLooking at the Bag is not Enough to Find the Bomb: An Evasion of Structural Methods for Malicious PDF Files Detection
2016-10-13Sangjun KoGeumhwan ChoUnderstanding Password Choices: How Frequently Entered Passwords are Re-used Across Websites
2016-10-06Jaewoo ParkJinwoo KimA data hiding method based on information sharing via PNG images for applications of color image authentication and metadata emb
2016-09-29Sora LeeJunsung ChoI Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security
2016-09-22Jaegwan YuJusop ChoiThe Remote Malicious Butler Did It!
2016-09-08Junsung ChoSoyoung KimHidden Voice Commands
2016-08-23Geumhwan ChoMinChang KimAsk Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones
2016-08-16Mahdi DaghmehchiHyunjae ChoiAn Experimental Study of TLS Forward Secrecy Deployments
2016-08-09Seunghun ChaJaewoo ParkFingerIO: Using Active Sonar for Fine-Grained Finger Tracking
2016-08-02Sanghak OhMahdi DaghmehchiOn Scalability of Software-Defined Networking
2016-07-19Jusop Choi-Security Analysis of Emerging Smart Home Applications
2016-07-12Kyungwon ParkSeunghun ChaLast-Level Cache Side-Channel Attacks are Practical
2016-07-05Jaegwan YuSangjun KoProtocol State Fuzzing of TLS Implementations
2016-06-28Geumhwan ChoJinwoo KimUse the Force: Evaluating Force-Sensitive Authentication for Mobile Devices
2016-06-14Jaewoo ParkGeumhwan ChoResults and Lessons Learned from a User Study of Display Effectiveness with Experienced Cyber Security Network Analysts
2016-06-07Joonghwan LeeMahdi DaghmehchiLithe: Lightweight Secure CoAP for the Internet of Things
2016-05-31Seunghun ChaKyungwon ParkGyrophone: Recognizing Speech from Gyroscope Signals
2016-05-24Sanghak OhHyunjae ChoiThe Myth of the Average User: Improving Privacy and Security Systems through Individualization
2016-05-17Junsung ChoEunsoo Kim-
2016-05-17Sora LeeMinChang KimI Do Not Know What You Visited Last Summer: Protecting Users from Third-party Web Tracking with TrackingFree Browser
2016-05-03Mahdi DaghmehchiJunsung ChoImperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
2016-04-26Sangjun KoSora LeeWebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths
2016-04-12Jinwoo KimChansu SuhA Search Engine Backed by Internet-Wide Scanning
2016-04-05Eunsoo KimSanghak OhThe Clock is Still Ticking: Timing Attacks in the Modern Web
2016-03-29Jinmok KimSangjun KoSKEE: A Lightweight Secure Kernel-level Execution Environment for ARM
2016-03-22Kyungwon ParkSeunghun ChaA Comprehensive Study of Frequency, Interference, and Training of Multiple Graphical Passwords
2016-03-15Soyoung KimEunsoo KimYour Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging
2016-03-09Hyunjae ChoiSora LeeIt's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services
2016-03-02Jusop ChoiSangjun KoMobiflage: Deniable Storage Encryption for Mobile Devices
2016-02-17Jaegwan YuHyunjae ChoiAttacking the Network Time Protocol
2016-02-03Kyungwon ParkJaewoo ParkWho Are You? A Statistical Approach to Measuring User Authenticity
2016-01-27Jinwoo KimJunsung ChoFace/Off: Preventing Privacy Leakage From Photos in Social Networks
2016-01-20Seunghun ChaSanghak OhScreenmilker: How to Milk Your Android Screen for Secrets
2016-01-13Soyoung KimKyungwon Park-
2016-01-06Junsung ChoJinwoo KimAttacks on Public WLAN-based Positioning Systems
2015-12-30Sangjun KoSeunghun ChaHELDROID: Dissecting and Detecting Mobile Ransomware
2015-12-23Sanghak OhSora LeeMonte Carlo Strength Evaluation: Fast and Reliable Password Checking
2015-12-09Mahdi DaghmehchiJaewoo ParkGNFC: Towards Network Function Cloudification
2015-12-02EunHyun KimSeunghun ChaWhen Firmware Modifications Attack: A Case Study of Embedded Exploitation
2015-11-25Geumhwan ChoJaewoo ParkDelayed-Dictionary Compression for Packet Networks
2015-11-11Kyungwon ParkSeongyeol Oh-
2015-11-04Joonghwan LeeMahdi DaghmehchiDelegation-based Authentication and Authorization for the IP-based Internet of Things
2015-10-28Jinmok KimSeunghun ChaEvaluating the Effectiveness of Current Anti-ROP Defenses
2015-10-07Jusop ChoiSeongyeol OhHacking Blind
2015-09-23Jaegwan YuKyungwon ParkUsing Hardware Features for Increased Debugging Transparency
2015-09-16Junsung ChoJaewoo ParkOn the Impact of Touch ID on iPhone Passcodes
2015-09-09Geumhwan ChoEunHyun KimTowards Reliable Storage of 56-bit Secrets in Human Memory
2015-09-02Seunghun ChaSeongyeol OhPowerSpy: Location Tracking using Mobile Device Power Analysis
2015-08-25Sanghak OhJunsung ChoCrying Wolf? On the Price Discrimination of Online Airline Tickets
2015-08-11Jaewoo ParkMahdi Daghmehchi-
2015-07-21Mahdi DaghmehchiSora Lee-
2015-07-14Yunseok ChoiSeunghun ChaWhat the App is That? Deception and Countermeasures in the Android User Interface
2015-07-07EunHyun KimSanghak OhCharacterizing hypervisor vulnerabilities in cloud computing servers
2015-06-30Sora LeeJaegwan YuAutomatically Detecting Vulnerable Websites Before They Turn Malicious
2015-06-23Seongyeol OhJusop ChoiBlanket Execution: Dynamic Similarity Testing for Program Binaries and Components
2015-06-10Sungsu KwakSeongyeol Oh-
2015-06-03Joonghwan LeeGeumhwan Cho-
2015-05-27Jinmok KimKyungwon Park-
2015-05-20Yunseok ChoiSanghak Oh-
2015-05-06Junsung ChoGeumhwan Cho-
2015-04-29Geumhwan ChoSeongyeol Oh-
2015-04-15Mahdi DaghmehchiKyungwon Park-
2015-04-08Jaegwan YuSeongyeol Oh-
2015-04-01Seunghun ChaSungsu Kwak-
2015-03-25EunHyun KimYunseok Choi-
2015-03-11Sanghak OhMahdi Daghmehchi-
2015-02-25Kyungwon ParkJaegwan Yu-
2015-02-17Youngbae SongSungsu Kwak-
2015-01-28Jina KangGeumhwan Cho-
2015-01-21Seongyeol OhJusop Choi-
2015-01-14Jaegwan YuYunseok Choi-
2014-12-31Youngbae SongEunHyun Kim-
2014-12-23Kyungwon ParkJunsung Cho-
2014-12-02Geumhwan ChoJina Kang-
2014-11-25Seongyeol OhKyungwon Park-
2014-11-18Mahdi DaghmehchiJaegwan Yu-
2014-11-07Jusop ChoiSanghak OhCookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting
2014-10-28Sungsu KwakSeunghun Cha-
2014-09-24Yunseok ChoiKyungwon Park-
2014-09-17Seunghun ChaSeongyeol Oh-
2014-09-11EunHyun KimGeumhwan Cho-
2014-09-04Sanghak OhJaegwan Yu-
2014-08-20Jina KangKyungwon Park-