default search action
BibTeX records: Jusop Choi
@article{DBLP:journals/access/JinCHK23, author = {Beomjin Jin and Jusop Choi and Jin B. Hong and Hyoungshick Kim}, title = {On the Effectiveness of Perturbations in Generating Evasive Malware Variants}, journal = {{IEEE} Access}, volume = {11}, pages = {31062--31074}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3262265}, doi = {10.1109/ACCESS.2023.3262265}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/JinCHK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/KimCANK22, author = {Soolin Kim and Jusop Choi and Muhammad Ejaz Ahmed and Surya Nepal and Hyoungshick Kim}, title = {VulDeBERT: {A} Vulnerability Detection System Using {BERT}}, booktitle = {{IEEE} International Symposium on Software Reliability Engineering Workshops, {ISSRE} 2022 - Workshops, Charlotte, NC, USA, October 31 - Nov. 3, 2022}, pages = {69--74}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISSREW55968.2022.00042}, doi = {10.1109/ISSREW55968.2022.00042}, timestamp = {Tue, 03 Jan 2023 17:09:36 +0100}, biburl = {https://dblp.org/rec/conf/issre/KimCANK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-08678, author = {Jusop Choi and Wonseok Choi and William Aiken and Hyoungshick Kim and Jun Ho Huh and Taesoo Kim and Yongdae Kim and Ross J. Anderson}, title = {Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild}, journal = {CoRR}, volume = {abs/2201.08678}, year = {2022}, url = {https://arxiv.org/abs/2201.08678}, eprinttype = {arXiv}, eprint = {2201.08678}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-08678.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/JinCKH21, author = {Beomjin Jin and Jusop Choi and Hyoungshick Kim and Jin B. Hong}, editor = {Chih{-}Cheng Hung and Jiman Hong and Alessio Bechini and Eunjee Song}, title = {FUMVar: a practical framework for generating fully-working and unseen malware variants}, booktitle = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, Republic of Korea, March 22-26, 2021}, pages = {1656--1663}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3412841.3442039}, doi = {10.1145/3412841.3442039}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/JinCKH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ChoiKCKHK20, author = {Jusop Choi and Soolin Kim and Junsung Cho and Kuyju Kim and Seok Hong and Hyoungshick Kim}, editor = {Chih{-}Cheng Hung and Tom{\'{a}}s Cern{\'{y}} and Dongwan Shin and Alessio Bechini}, title = {ACIDroid: a practical app cache integrity protection system on Android Runtime}, booktitle = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30 - April 3, 2020}, pages = {376--383}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3341105.3374037}, doi = {10.1145/3341105.3374037}, timestamp = {Thu, 02 Apr 2020 17:08:04 +0200}, biburl = {https://dblp.org/rec/conf/sac/ChoiKCKHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChoiYHK19, author = {Jusop Choi and Jaegwan Yu and Sangwon Hyun and Hyoungshick Kim}, title = {Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and {QQ} messenger}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S50--S59}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.011}, doi = {10.1016/J.DIIN.2019.01.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ChoiYHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/ChoiSKSH19, author = {Jusop Choi and Dongsoon Shin and Hyoungshick Kim and Jason Seotis and Jin B. Hong}, title = {{AMVG:} Adaptive Malware Variant Generation Framework Using Machine Learning}, booktitle = {24th {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2019, Kyoto, Japan, December 1-3, 2019}, pages = {246--255}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PRDC47002.2019.00055}, doi = {10.1109/PRDC47002.2019.00055}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/prdc/ChoiSKSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChoiOAWK18, author = {Jusop Choi and Taekkyung Oh and William Aiken and Simon S. Woo and Hyoungshick Kim}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{POSTER:} {I} Can't Hear This Because {I} Am Human: {A} Novel Design of Audio {CAPTCHA} System}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {833--835}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3201590}, doi = {10.1145/3196494.3201590}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChoiOAWK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoCKHR18, author = {Geumhwan Cho and Jusop Choi and Hyoungshick Kim and Sangwon Hyun and Jungwoo Ryoo}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Threat Modeling and Analysis of Voice Assistant Applications}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {197--209}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_16}, doi = {10.1007/978-3-030-17982-3\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ChoCKHR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigcomp/ChoiPK17, author = {Jusop Choi and Jaewoo Park and Hyoungshick Kim}, title = {Forensic analysis of the backup database file in KakaoTalk messenger}, booktitle = {2017 {IEEE} International Conference on Big Data and Smart Computing, BigComp 2017, Jeju Island, South Korea, February 13-16, 2017}, pages = {156--161}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/BIGCOMP.2017.7881732}, doi = {10.1109/BIGCOMP.2017.7881732}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/bigcomp/ChoiPK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/KoCK17, author = {Sangjun Ko and Jusop Choi and Hyoungshick Kim}, title = {{COAT:} Code Obfuscation Tool to Evaluate the Performance of Code Plagiarism Detection Tools}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2017, Altoona, PA, USA, July 24-25, 2017}, pages = {32--37}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2017.29}, doi = {10.1109/ICSSA.2017.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/KoCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/ChoiARK16, author = {Jusop Choi and William Aiken and Jungwoo Ryoo and Hyoungshick Kim}, title = {Bypassing the Integrity Checking of Rights Objects in {OMA} {DRM:} a Case Study with the MelOn Music Service}, booktitle = {Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, {IMCOM} 2016, Danang, Vietnam, January 4-6, 2016}, pages = {62:1--62:5}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2857546.2857609}, doi = {10.1145/2857546.2857609}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icuimc/ChoiARK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.