Reading Seminar

Score Board

View All
NameMainOpponent
Geumhwan Cho1113
Junsung Cho106
Jusop Choi910
Eunsoo Kim77
Soolin Kim56
Heejun Jang46
Beomjin Jin35
William Aiken34
Wonseok Choi33
Taeyun Kim33
Woojoong Ji22
Dongsoon Shin22
Seok Hong21
Yongwoo Oh21
Daehwa Lee20
Mohsen Ali14
Bedeuro Kim12
Junhwi Bae11
Aishwarya Ram-Vinay11
Hanbin Jang00
Yunhee Jang00
Gitae Lee00

List

View All    Update List
DateMainOpponentTitle
19.1.25William AikenMohsen AliObfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples
19.2.1Dongsoon ShinJunhwi BaeDriller: Augmenting Fuzzing Through Selective Symbolic Execution
19.2.22Beomjin JinJusop ChoiCountering Android Malware: A Scalable Semi-Supervised Approach for Family-Signature Generation
19.2.22Woojoong JiJunsung ChoSource Attribution of Cryptographic API Misuse in Android Applications
19.3.12Daehwa LeeMohsen AliBitcoin-NG: A Scalable Blockchain Protocol
19.3.19Seok HongSoolin KimA Dynamic App Anti-Debugging Approach on Android ART Runtime
19.3.26Yongwoo OhEunsoo KimRevealing and Detecting Malicious Retweeter Groups
19.4.2Junhwi BaeAishwarya Ram-VinayEfail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels
19.4.9Bedeuro KimWilliam AikenUnveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes
19.4.16Aishwarya Ram-VinayGeumhwan ChoA Tale of Two Studies: The Best and Worst of YubiKey Usability
19.4.30Geumhwan Cho--
19.5.7Gitae Lee-Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
19.5.14Hanbin Jang--
19.5.21Dongsoon Shin--
19.5.28William Aiken--
19.6.4Wonseok Choi--
19.6.11Taeyun Kim--
19.6.18Eunsoo Kim--
19.6.25Soolin Kim--
19.7.2Jusop Choi--
19.7.9Yunhee Jang--
19.7.16Junsung Cho--