Reading Seminar – List

Date Main Opponent Title
2018-04-03 Yuri Son
2018-03-27 Moongyu Jung
2018-03-20 Heejun Jang
2018-03-13 Teakkyung Oh
2018-03-06 Soolin Kim
2018-02-27 Seungjin Lee
2018-02-20 Kuyju Kim
2018-02-13 Munkhzorig Dorjmyagmar
2018-02-06 Sangmin Lee
2018-01-30 MinChang Kim
2018-01-23 Eunsoo Kim
2018-01-16 Jusop Choi
2018-01-02 Junsung Cho
2017-01-02 Mahdi Daghmehchi
2017-12-26 Geumhwan Cho
2017-12-19 Yusin Sin
2017-12-12 Jihyun Yu
2017-12-05 Sungsu Kwak
2017-11-28 Beomjin Jin
2017-11-21 Taekgeun Moon
2017-11-14 William Aiken
2017-11-07 Taeyun Kim Ensuring Authorized Updates in Multi-user Database-Backed Applications
2017-10-31 Wonseok Choi Taekgeun Moon Practical Keystroke Timing Attacks in Sandboxed JavaScript
2017-10-17 Donghoon Lee William Aiken IMF: Inferred Model-based Fuzzer
2017-10-10 Eunsoo Kim Jusop Choi unCaptcha: A Low-Resource Defeat of reCaptcha’s Audio Challenge
2017-09-26 Soyoung Kim Taeyun Kim Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures
2017-09-19 Jinwoo Kim Eunsoo Kim Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies
2017-09-12 Sangjun Ko Wonseok Choi Stay Cool! Understanding Thermal Attacks on Mobile-based User Authentication
2017-09-05 Jusop Choi Mahdi Daghmehchi DeTor: Provably Avoiding Geographic Regions in Tor
2017-08-29 Junsung Cho Geumhwan Cho User Interactions and Permission Use on Android
2017-08-22 Mahdi Daghmehchi Soyoung Kim The Onions Have Eyes: A Comprehensive Structure and Privacy Analysis of Tor Hidden Services
2017-08-08 Geumhwan Cho Seungjin Lee Itus: An Implicit Authentication Framework for Android.
2017-08-01 Soolin Kim Geumhwan Cho All your browser-saved passwords could belong to us: a security analysis and a cloud-based new design
2017-07-25 Seungjin Lee Soyoung Kim Protecting Insecure Communications with Topology-aware Network Tunnels
2017-07-18 Kuyju Kim Jinwoo Kim The Password Reset MitM Attack
2017-07-11 Hyunjae Choi Soolin Kim Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop
2017-07-04 Munkhzorig Dorjmyagmar Mahdi Daghmehchi Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
2017-06-26 Sora Lee Jaewoo Park Fake Co-visitation Injection Attacks to Recommender Systems
2017-06-19 Jaewoo Park Seunghun Cha Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
2017-06-12 Sangmin Lee Seungjin Lee Cross processor cache attacks
2017-06-05 Heejun Jang Mahdi Daghmehchi Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud
2017-05-29 Teakkyung Oh Soolin Kim The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio
2017-05-15 Moongyu Jung Sangjun Ko PayBreak : Defense Against Cryptographic Ransomware
2017-05-08 Yuri Son Jusop Choi BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection
2017-05-01 Stepan Dvorak Soyoung Kim Ad Injection at Scale: Assessing Deceptive Advertisement Modifications
2017-05-01 Soolin Kim Heejun Jang Password Manager : Attacks and Defenses
2017-04-17 Seungjin Lee Teakkyung Oh k-fingerprinting: A Robust Scalable Website Fingerprinting Technique
2017-04-10 Kuyju Kim Jusop Choi Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices
2017-04-03 Sangmin Lee Jinwoo Kim On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis
2017-03-27 MinChang Kim Mahdi Daghmehchi KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting
2017-03-20 Eunsoo Kim Kuyju Kim Mind your SMSes: Mitigating social engineering in second factor authentication
2017-03-13 Soyoung Kim Sangmin Lee Protecting Privacy of BLE Device Users
2017-03-06 Sangjun Ko Soolin Kim Scalable Graph-based Bug Search for Firmware Images
2017-02-24 Hyunjae Choi Seunghun Cha Exploiting Content Delivery Networks for covert channel communications
2017-02-15 Jinwoo Kim Eunsoo Kim To Befriend Or Not? A Model of Friend Request Acceptance on Facebook
2017-02-01 Jaewoo Park Seungjin Lee Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
2017-01-25 Sora Lee Jinwoo Kim Authentication of LZ-77 Compressed Data
2017-01-18 Jusop Choi Mahdi Daghmehchi Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition
2017-01-11 Junsung Cho Seunghun Cha Using Reflexive Eye Movements for Fast Challenge-Response Authentication
2017-01-04 Geumhwan Cho Munkhzorig Dorjmyagmar I Am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs
2016-12-28 Mahdi Daghmehchi MinChang Kim BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications
2016-12-22 Seunghun Cha Sora Lee Inferring User Routes and Locations using Zero-Permission Mobile Sensors
2016-12-08 Munkhzorig Dorjmyagmar Mahdi Daghmehchi Statistical Deobfuscation of Android Applications
2016-12-01 MinChang Kim Mahdi Daghmehchi TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime
2016-11-24 Eunsoo Kim Sora Lee Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications.
2016-11-17 Soyoung Kim Jaegwan Yu Exit from Hell? Reducing the Impact of Amplification DDoS Attacks
2016-11-03 Hyunjae Choi Sanghak Oh A Comprehensive Measurement Study of Domain Generating Malware
2016-10-20 Jinwoo Kim Jaewoo Park Looking at the Bag is not Enough to Find the Bomb: An Evasion of Structural Methods for Malicious PDF Files Detection
2016-10-13 Sangjun Ko Geumhwan Cho Understanding Password Choices: How Frequently Entered Passwords are Re-used Across Websites
2016-10-06 Jaewoo Park Jinwoo Kim A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata emb
2016-09-29 Sora Lee Junsung Cho I Think They’re Trying to Tell Me Something: Advice Sources and Selection for Digital Security
2016-09-22 Jaegwan Yu Jusop Choi The Remote Malicious Butler Did It!
2016-09-08 Junsung Cho Soyoung Kim Hidden Voice Commands
2016-08-23 Geumhwan Cho MinChang Kim Ask Me Again But Don’t Annoy Me: Evaluating Re-authentication Strategies for Smartphones
2016-08-16 Mahdi Daghmehchi Hyunjae Choi An Experimental Study of TLS Forward Secrecy Deployments
2016-08-09 Seunghun Cha Jaewoo Park FingerIO: Using Active Sonar for Fine-Grained Finger Tracking
2016-08-02 Sanghak Oh Mahdi Daghmehchi On Scalability of Software-Defined Networking
2016-07-19 Jusop Choi Security Analysis of Emerging Smart Home Applications
2016-07-12 Kyungwon Park Seunghun Cha Last-Level Cache Side-Channel Attacks are Practical
2016-07-05 Jaegwan Yu Sangjun Ko Protocol State Fuzzing of TLS Implementations
2016-06-28 Geumhwan Cho Jinwoo Kim Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices
2016-06-14 Jaewoo Park Geumhwan Cho Results and Lessons Learned from a User Study of Display Effectiveness with Experienced Cyber Security Network Analysts
2016-06-07 Joonghwan Lee Mahdi Daghmehchi Lithe: Lightweight Secure CoAP for the Internet of Things
2016-05-31 Seunghun Cha Kyungwon Park Gyrophone: Recognizing Speech from Gyroscope Signals
2016-05-24 Sanghak Oh Hyunjae Choi The Myth of the Average User: Improving Privacy and Security Systems through Individualization
2016-05-17 Junsung Cho Eunsoo Kim
2016-05-17 Sora Lee MinChang Kim I Do Not Know What You Visited Last Summer: Protecting Users from Third-party Web Tracking with TrackingFree Browser
2016-05-03 Mahdi Daghmehchi Junsung Cho Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
2016-04-26 Sangjun Ko Sora Lee WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths
2016-04-12 Jinwoo Kim Chansu Suh A Search Engine Backed by Internet-Wide Scanning
2016-04-05 Eunsoo Kim Sanghak Oh The Clock is Still Ticking: Timing Attacks in the Modern Web
2016-03-29 Jinmok Kim Sangjun Ko SKEE: A Lightweight Secure Kernel-level Execution Environment for ARM
2016-03-22 Kyungwon Park Seunghun Cha A Comprehensive Study of Frequency, Interference, and Training of Multiple Graphical Passwords
2016-03-15 Soyoung Kim Eunsoo Kim Your Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging
2016-03-09 Hyunjae Choi Sora Lee It’s Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services
2016-03-02 Jusop Choi Sangjun Ko Mobiflage: Deniable Storage Encryption for Mobile Devices
2016-02-17 Jaegwan Yu Hyunjae Choi Attacking the Network Time Protocol
2016-02-03 Kyungwon Park Jaewoo Park Who Are You? A Statistical Approach to Measuring User Authenticity
2016-01-27 Jinwoo Kim Junsung Cho Face/Off: Preventing Privacy Leakage From Photos in Social Networks
2016-01-20 Seunghun Cha Sanghak Oh Screenmilker: How to Milk Your Android Screen for Secrets
2016-01-13 Soyoung Kim Kyungwon Park
2016-01-06 Junsung Cho Jinwoo Kim Attacks on Public WLAN-based Positioning Systems
2015-12-30 Sangjun Ko Seunghun Cha HELDROID: Dissecting and Detecting Mobile Ransomware
2015-12-23 Sanghak Oh Sora Lee Monte Carlo Strength Evaluation: Fast and Reliable Password Checking
2015-12-09 Mahdi Daghmehchi Jaewoo Park GNFC: Towards Network Function Cloudification
2015-12-02 EunHyun Kim Seunghun Cha When Firmware Modifications Attack: A Case Study of Embedded Exploitation
2015-11-25 Geumhwan Cho Jaewoo Park Delayed-Dictionary Compression for Packet Networks
2015-11-11 Kyungwon Park Seongyeol Oh
2015-11-04 Joonghwan Lee Mahdi Daghmehchi Delegation-based Authentication and Authorization for the IP-based Internet of Things
2015-10-28 Jinmok Kim Seunghun Cha Evaluating the Effectiveness of Current Anti-ROP Defenses
2015-10-07 Jusop Choi Seongyeol Oh Hacking Blind
2015-09-23 Jaegwan Yu Kyungwon Park Using Hardware Features for Increased Debugging Transparency
2015-09-16 Junsung Cho Jaewoo Park On the Impact of Touch ID on iPhone Passcodes
2015-09-09 Geumhwan Cho EunHyun Kim Towards Reliable Storage of 56-bit Secrets in Human Memory
2015-09-02 Seunghun Cha Seongyeol Oh PowerSpy: Location Tracking using Mobile Device Power Analysis
2015-08-25 Sanghak Oh Junsung Cho Crying Wolf? On the Price Discrimination of Online Airline Tickets
2015-08-11 Jaewoo Park Mahdi Daghmehchi
2015-07-21 Mahdi Daghmehchi Sora Lee
2015-07-14 Yunseok Choi Seunghun Cha What the App is That? Deception and Countermeasures in the Android User Interface
2015-07-07 EunHyun Kim Sanghak Oh Characterizing hypervisor vulnerabilities in cloud computing servers
2015-06-30 Sora Lee Jaegwan Yu Automatically Detecting Vulnerable Websites Before They Turn Malicious
2015-06-23 Seongyeol Oh Jusop Choi Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components
2015-06-10 Sungsu Kwak Seongyeol Oh
2015-06-03 Joonghwan Lee Geumhwan Cho
2015-05-27 Jinmok Kim Kyungwon Park
2015-05-20 Yunseok Choi Sanghak Oh
2015-05-06 Junsung Cho Geumhwan Cho
2015-04-29 Geumhwan Cho Seongyeol Oh
2015-04-15 Mahdi Daghmehchi Kyungwon Park
2015-04-08 Jaegwan Yu Seongyeol Oh
2015-04-01 Seunghun Cha Sungsu Kwak
2015-03-25 EunHyun Kim Yunseok Choi
2015-03-11 Sanghak Oh Mahdi Daghmehchi
2015-02-25 Kyungwon Park Jaegwan Yu
2015-02-17 Youngbae Song Sungsu Kwak
2015-01-28 Jina Kang Geumhwan Cho
2015-01-21 Seongyeol Oh Jusop Choi
2015-01-14 Jaegwan Yu Yunseok Choi
2014-12-31 Youngbae Song EunHyun Kim
2014-12-23 Kyungwon Park Junsung Cho
2014-12-02 Geumhwan Cho Jina Kang
2014-11-25 Seongyeol Oh Kyungwon Park
2014-11-18 Mahdi Daghmehchi Jaegwan Yu
2014-11-07 Jusop Choi Sanghak Oh Cookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting
2014-10-28 Sungsu Kwak Seunghun Cha
2014-09-24 Yunseok Choi Kyungwon Park
2014-09-17 Seunghun Cha Seongyeol Oh
2014-09-11 EunHyun Kim Geumhwan Cho
2014-09-04 Sanghak Oh Jaegwan Yu
2014-08-20 Jina Kang Kyungwon Park