Reading Seminar

Score Board

View All
Jusop Choi1517
Junsung Cho148
Eunsoo Kim1315
Soolin Kim1010
Beomjin Jin910
Mohsen Ali711
Sanghak Oh77
Yunhee Jang69
Minwook Lee58
Bedeuro Kim55
Jeongseok Choi41
Gilhee Lee33
Min Jang22
Wonseok Jin22
Jeongyong Park11
Chanjong Lee11
Seunghyun Park11
Seonhye Park10
Jaewan Joh10
Jaek Yun00


View All    Update List
21.7.6Chanjong LeeMin JangA Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks
21.7.13Seunghyun ParkJusop ChoiFinding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code
21.7.23Jaewan JohYunhee JangAdapting SecurityWarnings to Counter Online Disinformation
21.7.27Jusop ChoiBeomjin JinUnderstanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios
21.8.6Eunsoo KimMohsen AliPhishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages
21.8.17Yunhee Jang-LaKSA: A Probabilistic Proof-of-Stake Protocol
21.8.24Beomjin JinChanjong LeeObfuscation-Resilient Executable Payload Extraction From Packed Malware
21.9.3Mohsen AliEunsoo KimMulti-X: Identifying Multiple Authors from Source Code Files
21.9.7Bedeuro KimJeongyong ParkDompteur: Taming Audio Adversarial Examples
21.9.14Soolin KimJusop ChoiShadow Attacks: Hiding and Replacing Content in Signed PDFs
21.9.28Minwook Lee-How Did That Get In My Phone? Unwanted App Distribution on Android Devices
21.10.5Jeongseok Choi--
21.10.12Gilhee Lee--
21.10.19Min Jang--
21.10.26Wonseok Jin--
21.11.2Sanghak Oh--