Reading Seminar

Score Board

View All
Geumhwan Cho1213
Jusop Choi1011
Junsung Cho107
Eunsoo Kim87
Soolin Kim66
Heejun Jang47
William Aiken44
Beomjin Jin37
Dongsoon Shin33
Woojoong Ji22
Daehwa Lee20
Mohsen Ali15
Bedeuro Kim14
Junhwi Bae11
Aishwarya Ram-Vinay11
Yunhee Jang11
Hanbin Jang10
Gitae Lee10
Hojoon Ryu01


View All    Update List
19.4.30Geumhwan ChoBedeuro KimRethinking Access Control and Authentication for the Home Interner of Things (IoT)
19.5.10Gitae LeeDongsoon ShinDifferential Computation Analysis: Hiding your White-Box Designs is Not Enough
19.5.14Hanbin JangBeomjin Jin Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces
19.5.21Dongsoon ShinHeejun Jang Exploiting Speculative Execution
19.5.28William AikenMohsen AliNeural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks
19.6.4Wonseok ChoiBedeuro KimMonitoring Smart Home Apps from Encrypted Traffic
19.6.11Taeyun KimJunsung ChoDemystifying Hidden Privacy Settings in Mobile Apps
19.6.25Eunsoo KimJusop ChoiCountering Malicious Processes with Process-DNS Association
19.7.2Soolin KimYunhee JangWe Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy
19.7.9Jusop ChoiBeomjin JinAutomating Patching of Vulnerable Open-Source Software Versions in Application Binaries
19.7.16Yunhee JangHojoon RyuTracing Transactions Across Cryptocurrency Ledgers
19.7.30Junsung ChoEunsoo Kim"If you want, I can store the encrypted password." A Password-Storage Field Study with Freelance Developers
19.8.6Heejun Jang-Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization
19.8.13Beomjin Jin--
19.8.20Woojoong Ji--
19.8.27Daehwa Lee--
19.9.3Yongwoo Oh--
19.9.10Mohsen Ali--
19.9.17Junhwi Bae--