Reading Seminar

Score Board

View All
NameMainOpponent
Geumhwan Cho1513
Junsung Cho138
Jusop Choi1213
Eunsoo Kim1012
Seunghun Cha910
Soolin Kim77
Beomjin Jin68
Mohsen Ali47
Yunhee Jang35
Hanbin Jang34
Aishwarya Ram-Vinay33
Yongwoo Oh31
Gitae I30
Minwook Lee25
Bedeuro Kim24
Jeongseok Choi20
Taegeun Moon15
Gilhee Lee11
Min Jang11
Maryam Hashmi03
Dongwon Lee02
Wonseok Jin00

List

View All    Update List
DateMainOpponentTitle
20.5.13Gitae IDongwon LeeSelf-encrypting deception: weaknesses in the encryption of solid state drives
20.5.20Seunghun ChaYunhee JangThe Anatomy of a Cryptocurrency Pump-and-Dump Scheme
20.5.27Minwook LeeTaegeun MoonMaster of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation
20.6.3Jeongseok ChoiMinwook LeeCryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices
20.6.17Taegeun MoonHanbin JangHideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs
20.6.24Junsung ChoMin JangTotal Recall: Persistence of Passwords in Android
20.7.7Jusop ChoiTaegeun MoonIntriguer: Field-Level Constraint Solving for Hybrid Fuzzing
20.7.21Beomjin JinEunsoo KimNeurlux: Dynamic Malware Analysis Without Feature Engineering
20.7.28Geumhwan ChoJusop ChoiWhen Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features
20.8.4Min JangMinwook LeeFANS: Fuzzing Android Native System Services via Automated Interface Analysis
20.8.11Wonseok Jin-READ: Reverse Engineering of Automotive Data Frames
20.8.18Hanbin Jang-Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack
20.8.25Dongwon Lee--
20.9.1Junsung Cho--
20.9.8Jusop Choi--
20.9.15Eunsoo Kim--
20.9.22Soolin Kim--
20.9.29Beomjin Jin--
20.10.6Mohsen Ali--
20.10.13Bedeuro Kim--
20.10.20Aishwarya Ram-Vinay--
20.10.27Yongwoo Oh--
20.11.3Yunhee Jang--
20.11.10Seunghun Cha--