BibTeX records: Jusop Choi

download as .bib file

@article{DBLP:journals/access/JinCHK23,
  author       = {Beomjin Jin and
                  Jusop Choi and
                  Jin B. Hong and
                  Hyoungshick Kim},
  title        = {On the Effectiveness of Perturbations in Generating Evasive Malware
                  Variants},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {31062--31074},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3262265},
  doi          = {10.1109/ACCESS.2023.3262265},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/JinCHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/KimCANK22,
  author       = {Soolin Kim and
                  Jusop Choi and
                  Muhammad Ejaz Ahmed and
                  Surya Nepal and
                  Hyoungshick Kim},
  title        = {VulDeBERT: {A} Vulnerability Detection System Using {BERT}},
  booktitle    = {{IEEE} International Symposium on Software Reliability Engineering
                  Workshops, {ISSRE} 2022 - Workshops, Charlotte, NC, USA, October 31
                  - Nov. 3, 2022},
  pages        = {69--74},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISSREW55968.2022.00042},
  doi          = {10.1109/ISSREW55968.2022.00042},
  timestamp    = {Tue, 03 Jan 2023 17:09:36 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/KimCANK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-08678,
  author       = {Jusop Choi and
                  Wonseok Choi and
                  William Aiken and
                  Hyoungshick Kim and
                  Jun Ho Huh and
                  Taesoo Kim and
                  Yongdae Kim and
                  Ross J. Anderson},
  title        = {Attack of the Clones: Measuring the Maintainability, Originality and
                  Security of Bitcoin 'Forks' in the Wild},
  journal      = {CoRR},
  volume       = {abs/2201.08678},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.08678},
  eprinttype    = {arXiv},
  eprint       = {2201.08678},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-08678.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/JinCKH21,
  author       = {Beomjin Jin and
                  Jusop Choi and
                  Hyoungshick Kim and
                  Jin B. Hong},
  editor       = {Chih{-}Cheng Hung and
                  Jiman Hong and
                  Alessio Bechini and
                  Eunjee Song},
  title        = {FUMVar: a practical framework for generating fully-working and unseen
                  malware variants},
  booktitle    = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual
                  Event, Republic of Korea, March 22-26, 2021},
  pages        = {1656--1663},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3412841.3442039},
  doi          = {10.1145/3412841.3442039},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/JinCKH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ChoiKCKHK20,
  author       = {Jusop Choi and
                  Soolin Kim and
                  Junsung Cho and
                  Kuyju Kim and
                  Seok Hong and
                  Hyoungshick Kim},
  editor       = {Chih{-}Cheng Hung and
                  Tom{\'{a}}s Cern{\'{y}} and
                  Dongwan Shin and
                  Alessio Bechini},
  title        = {ACIDroid: a practical app cache integrity protection system on Android
                  Runtime},
  booktitle    = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online
                  event, [Brno, Czech Republic], March 30 - April 3, 2020},
  pages        = {376--383},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3341105.3374037},
  doi          = {10.1145/3341105.3374037},
  timestamp    = {Thu, 02 Apr 2020 17:08:04 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/ChoiKCKHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChoiYHK19,
  author       = {Jusop Choi and
                  Jaegwan Yu and
                  Sangwon Hyun and
                  Hyoungshick Kim},
  title        = {Digital forensic analysis of encrypted database files in instant messaging
                  applications on Windows operating systems: Case study with KakaoTalk,
                  NateOn and {QQ} messenger},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S50--S59},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.011},
  doi          = {10.1016/J.DIIN.2019.01.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ChoiYHK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/ChoiSKSH19,
  author       = {Jusop Choi and
                  Dongsoon Shin and
                  Hyoungshick Kim and
                  Jason Seotis and
                  Jin B. Hong},
  title        = {{AMVG:} Adaptive Malware Variant Generation Framework Using Machine
                  Learning},
  booktitle    = {24th {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2019, Kyoto, Japan, December 1-3, 2019},
  pages        = {246--255},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PRDC47002.2019.00055},
  doi          = {10.1109/PRDC47002.2019.00055},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/prdc/ChoiSKSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChoiOAWK18,
  author       = {Jusop Choi and
                  Taekkyung Oh and
                  William Aiken and
                  Simon S. Woo and
                  Hyoungshick Kim},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{POSTER:} {I} Can't Hear This Because {I} Am Human: {A} Novel Design
                  of Audio {CAPTCHA} System},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {833--835},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3201590},
  doi          = {10.1145/3196494.3201590},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChoiOAWK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoCKHR18,
  author       = {Geumhwan Cho and
                  Jusop Choi and
                  Hyoungshick Kim and
                  Sangwon Hyun and
                  Jungwoo Ryoo},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Threat Modeling and Analysis of Voice Assistant Applications},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {197--209},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_16},
  doi          = {10.1007/978-3-030-17982-3\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoCKHR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigcomp/ChoiPK17,
  author       = {Jusop Choi and
                  Jaewoo Park and
                  Hyoungshick Kim},
  title        = {Forensic analysis of the backup database file in KakaoTalk messenger},
  booktitle    = {2017 {IEEE} International Conference on Big Data and Smart Computing,
                  BigComp 2017, Jeju Island, South Korea, February 13-16, 2017},
  pages        = {156--161},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/BIGCOMP.2017.7881732},
  doi          = {10.1109/BIGCOMP.2017.7881732},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/bigcomp/ChoiPK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/KoCK17,
  author       = {Sangjun Ko and
                  Jusop Choi and
                  Hyoungshick Kim},
  title        = {{COAT:} Code Obfuscation Tool to Evaluate the Performance of Code
                  Plagiarism Detection Tools},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2017, Altoona, PA, USA, July 24-25, 2017},
  pages        = {32--37},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2017.29},
  doi          = {10.1109/ICSSA.2017.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/KoCK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuimc/ChoiARK16,
  author       = {Jusop Choi and
                  William Aiken and
                  Jungwoo Ryoo and
                  Hyoungshick Kim},
  title        = {Bypassing the Integrity Checking of Rights Objects in {OMA} {DRM:}
                  a Case Study with the MelOn Music Service},
  booktitle    = {Proceedings of the 10th International Conference on Ubiquitous Information
                  Management and Communication, {IMCOM} 2016, Danang, Vietnam, January
                  4-6, 2016},
  pages        = {62:1--62:5},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857546.2857609},
  doi          = {10.1145/2857546.2857609},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icuimc/ChoiARK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}