Reading Seminar

Score Board

View All
Geumhwan Cho1513
Junsung Cho138
Jusop Choi1213
Eunsoo Kim1012
Seunghun Cha910
Soolin Kim77
Beomjin Jin68
Mohsen Ali47
Yunhee Jang35
Hanbin Jang34
Aishwarya Ram-Vinay33
Yongwoo Oh31
Gitae I30
Minwook Lee25
Bedeuro Kim24
Jeongseok Choi20
Taegeun Moon15
Gilhee Lee11
Min Jang11
Maryam Hashmi03
Dongwon Lee02
Wonseok Jin00


View All    Update List
20.5.13Gitae IDongwon LeeSelf-encrypting deception: weaknesses in the encryption of solid state drives
20.5.20Seunghun ChaYunhee JangThe Anatomy of a Cryptocurrency Pump-and-Dump Scheme
20.5.27Minwook LeeTaegeun MoonMaster of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation
20.6.3Jeongseok ChoiMinwook LeeCryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices
20.6.17Taegeun MoonHanbin JangHideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs
20.6.24Junsung ChoMin JangTotal Recall: Persistence of Passwords in Android
20.7.7Jusop ChoiTaegeun MoonIntriguer: Field-Level Constraint Solving for Hybrid Fuzzing
20.7.21Beomjin JinEunsoo KimNeurlux: Dynamic Malware Analysis Without Feature Engineering
20.7.28Geumhwan ChoJusop ChoiWhen Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features
20.8.4Min JangMinwook LeeFANS: Fuzzing Android Native System Services via Automated Interface Analysis
20.8.11Wonseok Jin-READ: Reverse Engineering of Automotive Data Frames
20.8.18Hanbin Jang-Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack
20.8.25Dongwon Lee--
20.9.1Junsung Cho--
20.9.8Jusop Choi--
20.9.15Eunsoo Kim--
20.9.22Soolin Kim--
20.9.29Beomjin Jin--
20.10.6Mohsen Ali--
20.10.13Bedeuro Kim--
20.10.20Aishwarya Ram-Vinay--
20.10.27Yongwoo Oh--
20.11.3Yunhee Jang--
20.11.10Seunghun Cha--