Reading Seminar

Score Board

View All

Name Main Opponent
Mahdi Daghmehchi 8 11
Geumhwan Cho 8 7
Junsung Cho 6 5
Jaewoo Park 5 7
Sora Lee 5 6
Jusop Choi 5 5
Jinwoo Kim 4 6
Sangjun Ko 4 4
Soyoung Kim 4 4
Hyunjae Choi 4 3
Eunsoo Kim 3 3
MinChang Kim 2 3
Soolin Kim 2 3
Seungjin Lee 2 3
Kuyju Kim 2 1
Munkhzorig Dorjmyagmar 2 1
Sangmin Lee 2 1
Heejun Jang 1 1
Teakkyung Oh 1 1
Moongyu Jung 1 0
Yuri Son 1 0
Stepan Dvorak 1 0
Nakmun Jung 0 0

List

View All    Update List

Date Main Opponent Title
17.5.29 Teakkyung Oh Soolin Kim The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio
17.6.5 Heejun Jang Mahdi Daghmehchi Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud
17.6.12 Sangmin Lee Seungjin Lee Cross processor cache attacks
17.6.19 Jaewoo Park Seunghun Cha Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
17.6.26 Sora Lee Jaewoo Park Fake Co-visitation Injection Attacks to Recommender Systems
17.7.4 Munkhzorig Dorjmyagmar Mahdi Daghmehchi Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
17.7.11 Hyunjae Choi Soolin Kim Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop
17.7.18 Kuyju Kim Jinwoo Kim The Password Reset MitM Attack
17.7.25 Seungjin Lee Soyoung Kim Protecting Insecure Communications with Topology-aware Network Tunnels
17.8.1 Soolin Kim Geumhwan Cho All your browser-saved passwords could belong to us: a security analysis and a cloud-based new design
17.8.8 Geumhwan Cho Seungjin Lee Itus: An Implicit Authentication Framework for Android.
17.8.22 Mahdi Daghmehchi Soyoung Kim The Onions Have Eyes: A Comprehensive Structure and Privacy Analysis of Tor Hidden Services
17.8.29 Junsung Cho User Interactions and Permission Use on Android
17.9.5 Jusop Choi DeTor: Provably Avoiding Geographic Regions in Tor
17.9.12 Sangjun Ko
17.9.19 Jinwoo Kim
17.9.26 Soyoung Kim
17.10.3 Eunsoo Kim
17.10.10 MinChang Kim