Publications (selected)

We list selected publications only. For a full publications list, please click here.
(Here papers are restricted to academic use within not-for-profit institutions.)



  • “Mitigating DNS Query-Based DDoS Attacks with Machine Learning on Software-Defined Networking”, Muhammad Ejaz Ahmed,  Hyoungshick Kim and Moosung Park, MILCOM: The 36th IEEE Military Communications Conference, Baltimore, USA, 2017. (accepted)
  • “Preventing DNS amplification attacks using the history of DNS queries with SDN”, Soyoung Kim, Sora Lee, Geumhwan Cho, Muhammad Ejaz Ahmed, Jaehoon Paul Jeong and Hyoungshick Kim, ESORICS: The 22nd European Symposium on Research in Computer Security, Oslo, Norway, 2017. (accepted)
  • “SysPal: System-guided Pattern Locks for Android”, Geumhwan Cho, Jun Ho Huh, Junsung Cho, Seongyeol Oh, Youngbae Song and Hyoungshick Kim, S&P: The 38th IEEE Symposium on Security and Privacy, San Jose, USA, 2017. pdf presentation
  • “I’m too busy to reset my LinkedIn password: On the effectiveness of password reset emails”, Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Konstantin Beznosov and Swathi Sri V Rayala, CHI: The 35th ACM SIGCHI Conference on Human Factors in Computing Systems, Denver, USA, 2017. pdf
  • “Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks”, Seunghun ChaSungsu Kwag, Hyoungshick Kim and Jun Ho Huh, ASIACCS: The 10th ACM Asia Conference on Computer and Communications Security, Abu Dhabi, UAE, 2017. pdf
  • “Wrong Siren! A location spoofing attack on indoor positioning systems: the Starbucks case study”, Junsung Cho, Jaegwan Yu, Sanghak Oh, Jungwoo Ryoo, Jaeseung Song and Hyoungshick Kim, IEEE Communications Magazine, 2017. pdf
  • “I Don’t Use Apple Pay Because It’s Less Secure …: Perception of Security and Usability in Mobile Tap-and-Pay”, Jun Ho Huh, Saurabh Verma, Swathi Sri V Rayala, Rakesh Bobba, Konstantin Beznosov and Hyoungshick Kim, USEC: The 5th Usable Security Conference, San Diego, USA, 2017. pdf
  • “Security Challenges with Network Functions Virtualization”, Mahdi D Firoozjaei, Jaehoon Jeong, Hoon Ko and Hyoungshick Kim, Future Generation Computer Systems, 2017. pdf
  • “Privacy-Preserving Nearest Neighbor Queries Using Geographical Features of Cellular Networks”, Mahdi D Firoozjaei, Jaegwan Yu, Hyoungkee Choi and Hyoungshick Kim, Computer Communications, 2017. pdf



  • “On the Guessability of Resident Registration Numbers in South Korea”, Youngbae Song, Hyoungshick Kim and Jun Ho Huh, ACISP: The 21st Australasian Conference on Information Security and Privacy, Melbourne, Australia, 2016. pdf video
  • “PassBYOP: Bring Your Own Picture for Securing Graphical Passwords”, Andrea Bianchi, Ian Oakley and Hyoungshick Kim, IEEE Transactions on Human-Machine Systems, Vol. 46(3), 2016. pdf video
  • “You are a Game Bot!: Uncovering game bots in MMORPGs via self-similarity in the wild”, Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Aziz Mohaisen and Huy Kang Kim, NDSS: The 23rd Network and Distributed System Security Symposium, San Diego, USA, 2016. pdf



  • “Surpass: System-initiated user-replaceable passwords”, Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstantin Beznosov, Apurva Mohan, and S. Raj Rajagopalan, CCS: The 22nd ACM  Conference on Computer and Communications Security, Denver, USA, 2015. pdf
  • “On the Memorability of System-generated PINs: Can Chunking Help?”, Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Masooda Bashir and Konstantin Beznosov, SOUPS: The 11st Symposium On Usable Privacy and Security, Ottawa, Canada, 2015. pdf
  • “Enhancing Conformance Testing using Symbolic Execution for Network Protocols”, Jaeseung Song, Hyoungshick Kim, and Soojin Park, IEEE Transactions on Reliability, Vol. 64(3), 2015. pdf
  • “Design and analysis of enumeration attacks on finding friends with phone numbers: a case study with KakaoTalk”, Eunhyun Kim, Kyung-won Park, Hyoungshick Kim and Jaeseung Song, Computers & Security, Vol. 52, 2015. pdf
  • “Visual Honey Encryption: Application to steganography”, Jiwon Yoon, Hyoungshick Kim, Hyunjoo Jo, Hyelim Lee and Kwangsu Lee, IH&MMSec: The 3rd ACM Workshop on Information Hiding and Multimedia Security, Portland, USA, 2015. pdf
  • “On the Effectiveness of Pattern Lock Strength Meters – Measuring the Strength of Real World Pattern Locks”, Youngbae Song, Geumhwan Cho, Seongyeol Oh, Hyoungshick Kim and Jun Ho Huh, CHI: The 33rd ACM SIGCHI Conference on Human Factors in Computing Systems, Seoul, Korea, 2015. pdf video



  • “I’ve Got Your Number: Harvesting users’ personal data via contacts sync for the KakaoTalk messenger”, Eunhyun Kim, Kyung-won Park, Hyoungshick Kim and Jaeseung Song, WISA: The 15th International Workshop on Information Security Applications, Jeju Island, Korea, 2014.  (selected as “best paper”) pdf
  • “Finding Influential Neighbors to Maximize Information Diffusion in Twitter”, Hyoungshick Kim, Konstantin Beznosov and Eiko Yoneki, SIMPLEX: The 6th Annual Workshop on Simplifying Complex Networks for Practitioners, held in conjunction with WWW, Seoul, Korea, 2014. (selected as “runner-up”) pdf



  • “Social network analysis of patent infringement lawsuits”, Hyoungshick Kim and Jaeseung Song, Technological Forecasting & Social Change, Vol. 80(5), 2013. pdf
  • “An Experimental Evaluation of Robustness of Networks”, Hyoungshick Kim and Ross Anderson, IEEE Systems Journal, Vol. 7(2), 2013. pdf



  • “What’s in Twitter: I Know What Parties are Popular and Who You are Supporting Now!”, Antoine Boutet, Hyoungshick Kim and Eiko Yoneki, ASONAM: The 4th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Istanbul, Turkey, 2012. pdf
  • “Influential Neighbours Selection for Information Diffusion in Online Social Networks”, Hyoungshick Kim and Eiko Yoneki, ICCCN: The 21st IEEE International Conference on Computer Communication Networks, Munich, Germany, 2012. pdf
  • “Efficient Channel Selection Using Hierarchical Clustering”, Hyoungshick Kim, Jon Crowcroft and Fernando M.V. Ramos, WoWMoM: The 13rd IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, San Francisco, USA, 2012. pdf
  • “STOP: Socio-Temporal Opportunistic Patching of Short Range Mobile Malware”, John Tang, Hyoungshick Kim, Cecilia Mascolo and Mirco Musolesi, WoWMoM: The 13rd IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, San Francisco, USA, 2012. pdf
  • “What’s in Your Tweets? I Know Who You Supported in the UK 2010 General Election”, Antoine Boutet, Hyoungshick Kim and Eiko Yoneki, ICWSM: The 6th International AAAI Conference on Weblogs and Social Media, Dublin, Ireland, 2012. pdf
  • “PIN selection policies: Are they really effective?”, Hyoungshick Kim and Jun Ho Huh, Computers & Security, Vol. 31(4), 2012. pdf
  • “Social Authentication: Harder than it Looks”, Hyoungshick Kim, John Tang and Ross Anderson, FC: The 16th IFCA International Conference on Financial Cryptography and Data Security, Kralendijk, Bonaire, 2012. pdf

(There’s press coverage. [New Scientist, Jan. 25, 2012] [Light Blue Touchpaper, Feb. 22, 2012])

  • “Centrality Prediction in Dynamic Human Contact Networks”, Hyoungshick Kim, John Tang, Ross Anderson and Cecilia Mascolo, Computer Networks, Vol. 56(3), 2012. pdf
  • “Temporal Node Centrality in Complex Networks”, Hyoungshick Kim and Ross Anderson, Physical Review E, Vol. 85(2), 2012. pdf

(There’s press coverage. [University of Cambridge Research News, Feb. 20, 2012] [Light Blue Touchpaper, Jan. 18, 2012])

  • “Privacy-Enhancing Queries in Personalized Search with Untrusted Service Providers”, Yunsang Oh, Hyoungshick Kim and Takashi Obi, IEICE Transactions on Information and Systems, Vol. 95-D(1), 2012. (selected as ISS award) pdf
  • “Network Analysis of Temporal Trends in Scholarly Research Productivity”, Hyoungshick Kim, Ji Won Yoon and Jon Crowcroft, Journal of Informetrics, Vol. 6(1), 2012. pdf



  • “RAD: Recipient-Anonymous Data Delivery based on Public Routing Proxies”, Hyoungshick Kim and Jaehoon Jeong, Computer Networks, Vol. 55(15), 2011. pdf
  • “Detecting DNS Poisoning Based Phishing Attacks from their Network Performance Characteristics”, Hyoungshick Kim and Jun Ho Huh, Electronics Letters, Vol. 47(11), 2011. (selected as a research highlight in briefpdf
  • “A Perfect Collision-free Pseudonym System”, Ji Won Yoon and Hyoungshick Kim, IEEE Communications Letters, Vol. 15(6), 2011. pdf



  • “An image encryption scheme with a pseudorandom permutation based on chaotic maps”, Ji Won Yoon and Hyoungshick Kim, Communications in Nonlinear Science and Numerical Simulations, Vol. 15(12), 2010. pdf
  • “Hybrid Spam Filtering for Mobile Communication”, Ji Won Yoon, Hyoungshick Kim and Jun Ho Huh, Computers & Security, Vol. 29(4), 2010. pdf
  • “On the Security of Internet Banking in South Korea”, Hyoungshick Kim, Jun Ho Huh and Ross Anderson, Technical Report, RR-10-01, 2010. pdf [Another Version]

(There’s press coverage. [Light Blue Touchpaper, May 12, 2012][etnews, May 3, 2010][boan news, Apr. 29. 2010][itnews, Apr. 29. 2010][edaily, Apr. 29. 2010][MK business News, Apr. 29. 2010][Mozilla in Asia, Apr. 28. 2010][etnews, Mar. 15, 2010][Yonhap News, Mar. 15, 2010][inews, Mar. 14, 2010][JoongAng Sunday, Feb. 28, 2010][Seoul Newspaper, Feb. 20, 2010][etnews, Feb. 8, 2010])