


Остановите войну!
for scientists:
Hyoungshick Kim
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [c126]Simon S. Woo, Shahroz Tariq, Hyoungshick Kim:
WDC'22: 1st Workshop on the Security Implications of Deepfakes and Cheapfakes. AsiaCCS 2022: 1269-1270 - [e2]Simon S. Woo, Shahroz Tariq, Hyoungshick Kim:
WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, Nagasaki, Japan, 30 May 2022. ACM 2022, ISBN 978-1-4503-9178-8 [contents] - [i21]Hua Ma, Yinshan Li, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Anmin Fu, Hyoungshick Kim, Said F. Al-Sarawi, Nepal Surya, Derek Abbott:
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World. CoRR abs/2201.08619 (2022) - [i20]Jusop Choi, Wonseok Choi, William Aiken, Hyoungshick Kim, Jun Ho Huh, Taesoo Kim, Yongdae Kim, Ross J. Anderson:
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild. CoRR abs/2201.08678 (2022) - [i19]Yansong Gao, Jianrong Yao, Lihui Pang, Zhi Zhang, Anmin Fu, Naixue Xiong, Hyoungshick Kim:
Systematically Evaluation of Challenge Obfuscated APUFs. CoRR abs/2203.15316 (2022) - 2021
- [j46]Bong Gon Kim
, Young-Seob Cho
, Seok-Hyun Kim
, Hyoungshick Kim
, Simon S. Woo
:
A Security Analysis of Blockchain-Based Did Services. IEEE Access 9: 22894-22913 (2021) - [j45]Lihui Pang
, Hyoungshick Kim
, Bin Yang
, Xinlin Wang
, Yansong Gao
:
Security Evaluation of n-Choose-k-Sum PUFs Against Modeling Attacks. IEEE Access 9: 168193-168206 (2021) - [j44]William Aiken, Hyoungshick Kim
, Simon S. Woo, Jungwoo Ryoo:
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks. Comput. Secur. 106: 102277 (2021) - [c125]Beom Heyn Kim, Hyoungshick Kim:
Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure. ACSAC 2021: 285-296 - [c124]Larry Huynh, Thai Nguyen, Joshua Goh, Hyoungshick Kim, Jin B. Hong
:
ARGH!: Automated Rumor Generation Hub. CIKM 2021: 3847-3856 - [c123]Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim:
Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN. DSN 2021: 63-74 - [c122]Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, Surya Nepal:
Peeler: Profiling Kernel-Level Events to Detect Ransomware. ESORICS (1) 2021: 240-260 - [c121]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal
, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. ICSE 2021: 1671-1682 - [c120]Alsharif Abuadbba
, Hyoungshick Kim, Surya Nepal
:
DeepiSign: invisible fragile watermark to protect the integrity and authenticity of CNN. SAC 2021: 952-959 - [c119]Beomjin Jin, Jusop Choi, Hyoungshick Kim, Jin B. Hong
:
FUMVar: a practical framework for generating fully-working and unseen malware variants. SAC 2021: 1656-1663 - [c118]Geumhwan Cho, Sungsu Kwag, Jun Ho Huh, Bedeuro Kim, Choong-Hoon Lee, Hyoungshick Kim:
Towards Usable and Secure Location-based Smartphone Authentication. SOUPS @ USENIX Security Symposium 2021: 1-16 - [c117]Jeongseok Choi, Hyoungshick Kim:
On the Robustness of Intrusion Detection Systems for Vehicles Against Adversarial Attacks. WISA 2021: 39-50 - [e1]Hyoungshick Kim
:
Information Security Applications - 22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13009, Springer 2021, ISBN 978-3-030-89431-3 [contents] - [i18]Alsharif Abuadbba, Hyoungshick Kim, Surya Nepal:
DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN. CoRR abs/2101.04319 (2021) - [i17]Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, Surya Nepal:
Peeler: Profiling Kernel-Level Events to Detect Ransomware. CoRR abs/2101.12434 (2021) - [i16]Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit Ahmet Çamtepe, Hyoungshick Kim, Surya Nepal:
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things. CoRR abs/2103.02762 (2021) - [i15]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. CoRR abs/2103.05758 (2021) - [i14]Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Sharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang:
Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things? CoRR abs/2104.03813 (2021) - 2020
- [j43]Younghwan Kim
, Huy Kang Kim
, Hyoungshick Kim
, Jin B. Hong
:
Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection. IEEE Access 8: 150709-150724 (2020) - [j42]Jaegwan Yu, Eunsoo Kim, Hyoungshick Kim, Jun Ho Huh:
Design of a Framework to Detect Device Spoofing Attacks Using Network Characteristics. IEEE Consumer Electron. Mag. 9(2): 34-40 (2020) - [j41]Jinyong Tim Kim, Eunsoo Kim, Jinhyuk Yang, Jaehoon Jeong, Hyoungshick Kim, Sangwon Hyun, Hyunsik Yang, Jaewook Oh, Younghan Kim, Susan Hares, Linda Dunbar:
IBCS: Intent-Based Cloud Services for Security Applications. IEEE Commun. Mag. 58(4): 45-51 (2020) - [j40]Mohsen A. Alawami
, Hyoungshick Kim
:
LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics. Comput. Secur. 89 (2020) - [j39]Eunsoo Kim, Young-Seob Cho, Bedeuro Kim, Woojoong Ji, Seok-Hyun Kim, Simon S. Woo, Hyoungshick Kim:
Can We Create a Cross-Domain Federated Identity for the Industrial Internet of Things without Google? IEEE Internet Things Mag. 3(4): 82-87 (2020) - [j38]Hakjun Lee, Dongwoo Kang, Jihyeon Ryu, Dongho Won, Hyoungshick Kim, Youngsook Lee:
A three-factor anonymous user authentication scheme for Internet of Things environments. J. Inf. Secur. Appl. 52: 102494 (2020) - [j37]Seungjin Lee, Hyoungshick Kim:
On the robustness of Lightning Network in Bitcoin. Pervasive Mob. Comput. 61: 101108 (2020) - [j36]Taeyun Kim, Yongwoo Oh, Hyoungshick Kim
:
Efficient Privacy-Preserving Fingerprint-Based Authentication System Using Fully Homomorphic Encryption. Secur. Commun. Networks 2020: 4195852:1-4195852:11 (2020) - [j35]Mahdi Daghmehchi Firoozjaei, Ali A. Ghorbani, Hyoungshick Kim
, JaeSeung Song
:
Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms. Sensors 20(3): 928 (2020) - [j34]Jihyeon Ryu
, Dongwoo Kang, Hakjun Lee
, Hyoungshick Kim
, Dongho Won:
A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems. Sensors 20(24): 7136 (2020) - [j33]Geumhwan Cho, Jun Ho Huh, Soolin Kim, Junsung Cho, Heesung Park, Yenah Lee, Konstantin Beznosov, Hyoungshick Kim:
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better? ACM Trans. Priv. Secur. 23(4): 22:1-22:32 (2020) - [c116]Bedeuro Kim, Sharif Abuadbba, Hyoungshick Kim:
DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation. ACISP 2020: 461-475 - [c115]Hanbin Jang, Woojoong Ji, Simon S. Woo, Hyoungshick Kim:
Design and Evaluation of Enumeration Attacks on Package Tracking Systems. ACISP 2020: 543-559 - [c114]Joon Kuy Han, Xiaojun Bi, Hyoungshick Kim, Simon S. Woo:
PassTag: A Graphical-Textual Hybrid Fallback Authentication System. AsiaCCS 2020: 60-72 - [c113]Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit Ahmet Çamtepe
, Yansong Gao, Hyoungshick Kim, Surya Nepal:
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training? AsiaCCS 2020: 305-318 - [c112]Jihye Woo, Ji-Won Choi, Soyoon Jeon, Joon Kuy Han, Hyoungshick Kim, Simon S. Woo:
Tale of Two Browsers: Understanding Users' Web Browser Choices in South Korea. Financial Cryptography Workshops 2020: 3-17 - [c111]Jihyeon Ryu, Hyoungshick Kim, Youngsook Lee, Dongho Won:
Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment. IMCOM 2020: 1-4 - [c110]Gilhee Lee, Taegeun Moon, Min Jang, Hyoungshick Kim:
eAPT: enhancing APT with a mirror site resolver. ISSRE Workshops 2020: 117-122 - [c109]Jusop Choi, Soolin Kim, Junsung Cho, Kuyju Kim, Seok Hong, Hyoungshick Kim:
ACIDroid: a practical app cache integrity protection system on Android Runtime. SAC 2020: 376-383 - [c108]Eunyong Cheon, Yonghwan Shin, Jun Ho Huh, Hyoungshick Kim, Ian Oakley:
Gesture Authentication for Smartphones: Evaluation of Gesture Password Selection Policies. IEEE Symposium on Security and Privacy 2020: 249-267 - [c107]Yansong Gao, Minki Kim, Sharif Abuadbba
, Yeonjae Kim, Chandra Thapa, Kyuyeon Kim, Seyit Ahmet Çamtepe
, Hyoungshick Kim, Surya Nepal
:
End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things. SRDS 2020: 91-100 - [c106]Bonha Koo, Taegeun Moon, Hyoungshick Kim
:
MurQRI: Encrypted Multi-layer QR Codes for Electronic Identity Management. SVCC 2020: 98-108 - [c105]Aishwarya Ram Vinay, Mohsen A. Alawami
, Hyoungshick Kim
:
ConTheModel: Can We Modify Tweets to Confuse Classifier Models? SVCC 2020: 205-219 - [c104]Muhammad Ejaz Ahmed, Il-Youp Kwak, Jun Ho Huh, Iljoo Kim, Taekkyung Oh, Hyoungshick Kim:
Void: A fast and light voice liveness detection system. USENIX Security Symposium 2020: 2685-2702 - [c103]Simon S. Woo, Hanbin Jang, Woojung Ji, Hyoungshick Kim:
I've Got Your Packages: Harvesting Customers' Delivery Order Information using Package Tracking Number Enumeration Attacks. WWW 2020: 2948-2954 - [i13]Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit Ahmet Çamtepe, Yansong Gao, Hyoungshick Kim, Surya Nepal:
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training? CoRR abs/2003.12365 (2020) - [i12]Yansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa, Kyuyeon Kim, Seyit Ahmet Çamtepe, Hyoungshick Kim, Surya Nepal:
End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things. CoRR abs/2003.13376 (2020) - [i11]William Aiken, Hyoungshick Kim, Simon S. Woo:
Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks. CoRR abs/2004.11368 (2020) - [i10]Bedeuro Kim, Sharif Abuadbba, Hyoungshick Kim:
DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation. CoRR abs/2006.08885 (2020) - [i9]Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim:
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review. CoRR abs/2007.10760 (2020) - [i8]Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Hyoungshick Kim, Surya Nepal:
Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks. CoRR abs/2010.03735 (2020)
2010 – 2019
- 2019
- [j32]Mahdi Daghmehchi Firoozjaei
, MinChang Kim, JaeSeung Song, Hyoungshick Kim
:
O2TR: Offline OTR messaging system under network disruption. Comput. Secur. 82: 227-240 (2019) - [j31]Jusop Choi, Jaegwan Yu, Sangwon Hyun, Hyoungshick Kim:
Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger. Digit. Investig. 28 Supplement: S50-S59 (2019) - [j30]Keuntae Lee, Seokhwa Kim, Jaehoon (Paul) Jeong, Sejun Lee, Hyoungshick Kim, Jung-Soo Park:
A framework for DNS naming services for Internet-of-Things devices. Future Gener. Comput. Syst. 92: 617-627 (2019) - [j29]Muhammad Ejaz Ahmed, Saeed Ullah
, Hyoungshick Kim
:
Statistical Application Fingerprinting for DDoS Attack Mitigation. IEEE Trans. Inf. Forensics Secur. 14(6): 1471-1484 (2019) - [j28]Jinyong Kim
, Seokhwa Kim
, Jaehoon Jeong
, Hyoungshick Kim
, Jung-Soo Park
, Taeho Kim
:
CBDN: Cloud-Based Drone Navigation for Efficient Battery Charging in Drone Networks. IEEE Trans. Intell. Transp. Syst. 20(11): 4174-4191 (2019) - [c102]Woojoong Ji, Taeyun Kim, Kuyju Kim, Hyoungshick Kim:
Automated Cash Mining Attacks on Mobile Advertising Networks. ACISP 2019: 679-686 - [c101]Yujin Kwon, Hyoungshick Kim, Yung Yi, Yongdae Kim:
An Eye for an Eye: Economics of Retaliation in Mining Pools. AFT 2019: 169-182 - [c100]Yuri Son, Geumhwan Cho, Hyoungshick Kim, Simon S. Woo:
Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services. AsiaCCS 2019: 352-365 - [c99]Daehwa Rayer Lee, Yunhee Jang, Hyoungshick Kim:
Poster: A Proof-of-Stake (PoS) Blockchain Protocol using Fair and Dynamic Sharding Management. CCS 2019: 2553-2555 - [c98]Heejun Jang, Beomjin Jin, Sangwon Hyun, Hyoungshick Kim:
Kerberoid: A Practical Android App Decompilation System with Multiple Decompilers. CCS 2019: 2557-2559 - [c97]Joon Kuy Han, Hyoungshick Kim, Simon S. Woo:
Nickel to Lego: Using Foolgle</> to Create Adversarial Examples to Fool Google Cloud Speech-to-Text API. CCS 2019: 2593-2595 - [c96]Humberto Cervantes, Rick Kazman, Jungwoo Ryoo, Junsung Cho, Geumhwan Cho, Hyoungshick Kim, Jina Kang:
Data-Driven Selection of Security Application Frameworks During Architectural Design. HICSS 2019: 1-10 - [c95]Eunil Seo, Hyoungshick Kim, Tai-Myoung Chung:
Profiling-Based Classification Algorithms for Security Applications in Internet of Things. ICIOT 2019: 138-146 - [c94]Yongwoo Oh, Taeyun Kim, Hyoungshick Kim:
Efficient Software Implementation of Homomorphic Encryption for Addition and Multiplication Operations. IMCOM 2019: 761-768 - [c93]Mohsen A. Alawami, William Aiken, Hyoungshick Kim:
The Light Will Be with You. Always - A Novel Continuous Mobile Authentication with the Light Sensor. MobiSys 2019: 560-561 - [c92]Daehwa Rayer Lee, Yunhee Jang, Hanbin Jang, Hyoungshick Kim:
80% of Block Propagation Rate is Enough - Towards Secure and Efficient PoW-based Blockchain Consensus. MobiSys 2019: 639-640 - [c91]Jusop Choi, Dongsoon Shin, Hyoungshick Kim, Jason Seotis, Jin B. Hong
:
AMVG: Adaptive Malware Variant Generation Framework Using Machine Learning. PRDC 2019: 246-255 - [c90]Mahdi Daghmehchi Firoozjaei, Ali A. Ghorbani, Hyoungshick Kim, Jaeseung Song:
EVChain: A Blockchain-based Credit Sharing in Electric Vehicles Charging. PST 2019: 1-5 - [c89]Yujin Kwon, Hyoungshick Kim, Jinwoo Shin, Yongdae Kim:
Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash? IEEE Symposium on Security and Privacy 2019: 935-951 - [i7]Yujin Kwon, Hyoungshick Kim, Jinwoo Shin, Yongdae Kim:
Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash? CoRR abs/1902.11064 (2019) - [i6]Yujin Kwon, Hyoungshick Kim, Yung Yi, Yongdae Kim:
An Eye for an Eye: Economics of Retaliation in Mining Pools. CoRR abs/1908.10781 (2019) - [i5]Yansong Gao, Yeonjae Kim, Bao Gia Doan, Zhi Zhang, Gongxuan Zhang, Surya Nepal, Damith Chinthana Ranasinghe, Hyoungshick Kim:
Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks. CoRR abs/1911.10312 (2019) - 2018
- [j27]Junsung Cho
, Dayeon Kim, Hyoungshick Kim:
User Credential Cloning Attacks in Android Applications: Exploiting Automatic Login on Android Apps and Mitigating Strategies. IEEE Consumer Electron. Mag. 7(3): 48-55 (2018) - [j26]Sangwon Hyun, Jinyong Kim, Hyoungshick Kim, Jaehoon Jeong, Susan Hares, Linda Dunbar, Adrian Farrel:
Interface to Network Security Functions for Cloud-Based Security Services. IEEE Commun. Mag. 56(1): 171-178 (2018) - [j25]DaeHun Nyang, Hyoungshick Kim
, Woojoo Lee, Sung-bae Kang, Geumhwan Cho
, Mun-Kyu Lee
, Aziz Mohaisen
:
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks. Comput. Secur. 78: 1-15 (2018) - [j24]Sangwon Hyun
, Junsung Cho
, Geumhwan Cho
, Hyoungshick Kim
:
Design and Analysis of Push Notification-Based Malware on Android. Secur. Commun. Networks 2018: 8510256:1-8510256:12 (2018) - [j23]Dongwoo Kang
, Jaewook Jung
, Hyoungshick Kim
, Youngsook Lee
, Dongho Won
:
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity. Secur. Commun. Networks 2018: 9046064:1-9046064:14 (2018) - [j22]Jihyeon Ryu
, Hakjun Lee
, Hyoungshick Kim
, Dongho Won:
Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks. Sensors 18(12): 4481 (2018) - [j21]Sangwon Hyun
, Hyoungshick Kim
:
Secure and DoS-Resilient Fragment Authentication in CCN-Based Vehicular Networks. Wirel. Commun. Mob. Comput. 2018 (2018) - [c88]Julian Rauchberger, Sebastian Schrittwieser, Tobias Dam, Robert Luh, Damjan Buhov, Gerhard Pötzelsberger, Hyoungshick Kim:
The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns. ARES 2018: 18:1-18:10 - [c87]Ian Oakley, Jun Ho Huh, Junsung Cho
, Geumhwan Cho
, Md. Rasel Islam, Hyoungshick Kim:
The Personal Identification Chord: A Four ButtonAuthentication System for Smartwatches. AsiaCCS 2018: 75-87 - [c86]William Aiken, Hyoungshick Kim:
POSTER: DeepCRACk: Using Deep Learning to Automatically CRack Audio CAPTCHAs. AsiaCCS 2018: 797-799 - [c85]Taeyun Kim, Hyoungshick Kim:
POSTER: Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic Encryption. AsiaCCS 2018: 813-815 - [c84]Jusop Choi, Taekkyung Oh, William Aiken, Simon S. Woo, Hyoungshick Kim:
POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System. AsiaCCS 2018: 833-835 - [c83]Eunsoo Kim, Kuyju Kim, Dongsoon Shin, Beomjin Jin, Hyoungshick Kim:
CyTIME: Cyber Threat Intelligence ManagEment framework for automatically generating security rules. CFI 2018: 7:1-7:5 - [c82]Muhammad Ejaz Ahmed, Surya Nepal
, Hyoungshick Kim:
MEDUSA: Malware Detection Using Statistical Analysis of System's Behavior. CIC 2018: 272-278 - [c81]Taeui Song, Dongwoo Kang, Jihyeon Ryu, Hyoungshick Kim, Dongho Won:
Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks. ICCSA (2) 2018: 50-61 - [c80]Sangmin Lee, Kuyju Kim, Jina Kang, Hyoungshick Kim:
Bypassing DRM protection in e-book applications on Android. ICOIN 2018: 194-198 - [c79]Taekkyung Oh, William Aiken, Hyoungshick Kim:
Hey Siri - Are You There?: Jamming of Voice Commands Using the Resonance Effect (Work-in-Progress). ICSSA 2018: 73-76 - [c78]William Aiken, Hyoungshick Kim:
Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning (Lightning Talk). ICSSA 2018: 81 - [c77]Daehwa Rayer Lee, Hyoungshick Kim:
An Analysis of Research Trends in Computer Security over the Last Decade. ICSSA 2018: 86-89 - [c76]Wonseok Choi, Hyoungshick Kim:
How to Measure Similarity between Source Codes of Cryptocurrencies for Detecting Plagiarism (Lightning Talk). ICSSA 2018: 91 - [c75]Eunsoo Kim, Kuyju Kim, Seungjin Lee, Jaehoon Paul Jeong, Hyoungshick Kim:
A Framework for Managing User-defined Security Policies to Support Network Security Functions. IMCOM 2018: 85:1-85:8 - [c74]Kuyju Kim, Taeyun Kim, Seungjin Lee, Soolin Kim, Hyoungshick Kim:
When Harry Met Tinder: Security Analysis of Dating Apps on Android. NordSec 2018: 454-467 - [c73]William Aiken, Hyoungshick Kim, Jungwoo Ryoo, Mary Beth Rosson:
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks. PST 2018: 1-6 - [c72]Geumhwan Cho, Jusop Choi, Hyoungshick Kim, Sangwon Hyun, Jungwoo Ryoo:
Threat Modeling and Analysis of Voice Assistant Applications. WISA 2018: 197-209 - [c71]Youngbae Jeon, Minchul Kim, Hyunsoo Kim, Hyoungshick Kim, Jun Ho Huh, Ji Won Yoon:
I'm Listening to your Location! Inferring User Location with Acoustic Side Channels. WWW 2018: 339-348 - [c70]Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Huy Kang Kim:
No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games. WWW 2018: 1825-1834 - [i4]Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Huy Kang Kim:
No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games. CoRR abs/1801.06368 (2018) - 2017
- [j20]Jong-Hyouk Lee, Hyoungshick Kim:
Security and Privacy Challenges in the Internet of Things [Security and Privacy Matters]. IEEE Consumer Electron. Mag. 6(3): 134-136 (2017) - [j19]Junsung Cho
, Jaegwan Yu, Sanghak Oh, Jungwoo Ryoo, Jaeseung Song, Hyoungshick Kim:
Wrong Siren! A Location Spoofing Attack on Indoor Positioning Systems: The Starbucks Case Study. IEEE Commun. Mag. 55(3): 132-137 (2017) - [j18]Mahdi Daghmehchi Firoozjaei, Jaegwan Yu, Hyoung-Kee Choi, Hyoungshick Kim
:
Privacy-preserving nearest neighbor queries using geographical features of cellular networks. Comput. Commun. 98: 11-19 (2017) - [j17]Mahdi Daghmehchi Firoozjaei, Jaehoon (Paul) Jeong, Hoon Ko, Hyoungshick Kim
:
Security challenges with network functions virtualization. Future Gener. Comput. Syst. 67: 315-324 (2017) - [j16]Joonghwan Lee
, Jae Woo Seo, Hoon Ko, Hyoungshick Kim
:
TARD: Temporary Access Rights Delegation for guest network devices. J. Comput. Syst. Sci. 86: 59-69 (2017) - [j15]Junsung Cho, Geumhwan Cho, Sangwon Hyun, Hyoungshick Kim:
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices. J. Internet Serv. Inf. Secur. 7(4): 35-44 (2017) - [c69]Hyoungshick Kim:
Design of a Secure Digital Recording Protection System with Network Connected Devices. AINA Workshops 2017: 375-378 - [c68]Jusop Choi, Jaewoo Park, Hyoungshick Kim:
Forensic analysis of the backup database file in KakaoTalk messenger. BigComp 2017: 156-161 - [c67]M. Ejaz Ahmed, Hyoungshick Kim:
DDoS Attack Mitigation in Internet of Things Using Software Defined Networking. BigDataService 2017: 271-276 - [c66]Seunghun Cha, Sungsu Kwag, Hyoungshick Kim, Jun Ho Huh:
Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks. AsiaCCS 2017: 313-326 - [c65]Muhammad Ejaz Ahmed, Hyoungshick Kim:
Poster: Adversarial Examples for Classifiers in High-Dimensional Network Data. CCS 2017: 2467-2469 - [c64]Jun Ho Huh, Hyoungshick Kim, Swathi S. V. P. Rayala, Rakesh B. Bobba
, Konstantin Beznosov:
I'm too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails. CHI 2017: 387-391 - [c63]