Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Seong-je Cho
@inproceedings{DBLP:conf/bigcomp/ZhaoSYCC24, author = {Guangxun Zhao and Hojin Shin and Seehwan Yoo and Seong{-}je Cho and Jongmoo Choi}, editor = {Herwig Unger and Jinseok Chae and Young{-}Koo Lee and Christian Wagner and Chaokun Wang and Mehdi Bennis and Mahasak Ketcham and Young{-}Kyoon Suh and Hyuk{-}Yoon Kwon}, title = {ThanosKV: {A} Holistic Approach to Utilize {NVM} for LSM-tree based Key- Value Stores}, booktitle = {{IEEE} International Conference on Big Data and Smart Computing, BigComp 2024, Bangkok, Thailand, February 18-21, 2024}, pages = {143--150}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/BigComp60711.2024.00031}, doi = {10.1109/BIGCOMP60711.2024.00031}, timestamp = {Thu, 18 Apr 2024 16:24:12 +0200}, biburl = {https://dblp.org/rec/conf/bigcomp/ZhaoSYCC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigcomp/JaranillaSYCC24, author = {Charles Jaranilla and Hojin Shin and Seehwan Yoo and Seong{-}je Cho and Jongmoo Choi}, editor = {Herwig Unger and Jinseok Chae and Young{-}Koo Lee and Christian Wagner and Chaokun Wang and Mehdi Bennis and Mahasak Ketcham and Young{-}Kyoon Suh and Hyuk{-}Yoon Kwon}, title = {Tiered Storage in Modern Key-Value Stores: Performance, Storage-Efficiency, and Cost-Efficiency Considerations}, booktitle = {{IEEE} International Conference on Big Data and Smart Computing, BigComp 2024, Bangkok, Thailand, February 18-21, 2024}, pages = {151--158}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/BigComp60711.2024.00032}, doi = {10.1109/BIGCOMP60711.2024.00032}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigcomp/JaranillaSYCC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/MustafaCH23, author = {Ghulam Mustafa and Seong{-}je Cho and Youngsup Hwang}, title = {TrafficNet: {A} Hybrid {CNN-FNN} Model for Analysis of Traffic Accidents in Seoul}, journal = {J. Comput. Sci. Eng.}, volume = {17}, number = {4}, pages = {182--194}, year = {2023}, url = {https://doi.org/10.5626/jcse.2023.17.4.182}, doi = {10.5626/JCSE.2023.17.4.182}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcse/MustafaCH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aike/MustafaCH23, author = {Ghulam Mustafa and Seong{-}Je Cho and Youngsup Hwang}, title = {Hybrid ConvLSTM with Attention for Precise Driver Behavior Classification}, booktitle = {Sixth {IEEE} International Conference on Artificial Intelligence and Knowledge Engineering, {AIKE} 2023, Laguna Hills, CA, USA, September 25-27, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AIKE59827.2023.00008}, doi = {10.1109/AIKE59827.2023.00008}, timestamp = {Sun, 04 Feb 2024 18:12:16 +0100}, biburl = {https://dblp.org/rec/conf/aike/MustafaCH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icufn/ParkCK23, author = {Minsu Park and Seong{-}Je Cho and HongGeun Kim}, title = {A Study on Asset Identification in Smart Buildings Automation Systems}, booktitle = {Fourteenth International Conference on Ubiquitous and Future Networks, {ICUFN} 2023, Paris, France, July 4-7, 2023}, pages = {923--925}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICUFN57995.2023.10200369}, doi = {10.1109/ICUFN57995.2023.10200369}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icufn/ParkCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KimKCC22, author = {Hyun{-}Il Kim and Moonyoung Kang and Seong{-}Je Cho and Sang{-}Il Choi}, title = {Efficient Deep Learning Network With Multi-Streams for Android Malware Family Classification}, journal = {{IEEE} Access}, volume = {10}, pages = {5518--5532}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2021.3139334}, doi = {10.1109/ACCESS.2021.3139334}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KimKCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YouKHPC22, author = {Geunha You and Gyoosik Kim and Sangchul Han and Minkyu Park and Seong{-}Je Cho}, title = {Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime {(ART)}}, journal = {{IEEE} Access}, volume = {10}, pages = {61426--61440}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3181373}, doi = {10.1109/ACCESS.2022.3181373}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YouKHPC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aike/ChoLHHC22, author = {Woosang Cho and Hojun Lee and Sangchul Han and Young{-}Sup Hwang and Seong{-}je Cho}, title = {Sustainability of Machine Learning-based Android Malware Detection Using {API} calls and Permissions}, booktitle = {5th {IEEE} International Conference on Artificial Intelligence and Knowledge Engineering, {AIKE} 2022, Laguna Hills, CA, USA, September 19-21, 2022}, pages = {18--25}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AIKE55402.2022.00009}, doi = {10.1109/AIKE55402.2022.00009}, timestamp = {Tue, 22 Nov 2022 16:09:15 +0100}, biburl = {https://dblp.org/rec/conf/aike/ChoLHHC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aike/LeeCHCS22, author = {Hojun Lee and Seong{-}je Cho and Hyoil Han and Woosang Cho and Kyoungwon Suh}, title = {Enhancing Sustainability in Machine Learning-based Android Malware Detection using {API} calls}, booktitle = {5th {IEEE} International Conference on Artificial Intelligence and Knowledge Engineering, {AIKE} 2022, Laguna Hills, CA, USA, September 19-21, 2022}, pages = {131--134}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AIKE55402.2022.00028}, doi = {10.1109/AIKE55402.2022.00028}, timestamp = {Tue, 22 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aike/LeeCHCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/YouKCH21, author = {Geunha You and Gyoosik Kim and Seong{-}je Cho and Hyoil Han}, title = {A Comparative Study on Optimization, Obfuscation, and Deobfuscation tools in Android}, journal = {J. Internet Serv. Inf. Secur.}, volume = {11}, number = {1}, pages = {2--15}, year = {2021}, url = {https://doi.org/10.22667/JISIS.2021.02.28.002}, doi = {10.22667/JISIS.2021.02.28.002}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/YouKCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec2/LeeKSLCPP21, author = {Junsu Lee and Juwon Kim and Hojun Seong and Keonyong Lee and Seong{-}je Cho and Younjai Park and Minkyu Park}, editor = {Ilsun You and Hwankuk Kim and Taek{-}Young Youn and Francesco Palmieri and Igor V. Kotenko}, title = {Forensic Analysis of Apple CarPlay: {A} Case Study}, booktitle = {Mobile Internet Security - 5th International Symposium, MobiSec 2021, Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1544}, pages = {289--300}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-9576-6\_20}, doi = {10.1007/978-981-16-9576-6\_20}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisec2/LeeKSLCPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aike/ParkKCHS20, author = {Jihyeon Park and Munyeong Kang and Seong{-}je Cho and Hyoil Han and Kyoungwon Suh}, title = {Analysis of Permission Selection Techniques in Machine Learning-based Malicious App Detection}, booktitle = {3rd {IEEE} International Conference on Artificial Intelligence and Knowledge Engineering, {AIKE} 2020, Laguna Hills, CA, USA, December 9-13, 2020}, pages = {92--99}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AIKE48582.2020.00021}, doi = {10.1109/AIKE48582.2020.00021}, timestamp = {Fri, 26 Feb 2021 11:33:29 +0100}, biburl = {https://dblp.org/rec/conf/aike/ParkKCHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigcomp/HanLSPCP20, author = {Hyoil Han and SeungJin Lim and Kyoungwon Suh and Seonghyun Park and Seong{-}je Cho and Minkyu Park}, editor = {Wookey Lee and Luonan Chen and Yang{-}Sae Moon and Julien Bourgeois and Mehdi Bennis and Yu{-}Feng Li and Young{-}Guk Ha and Hyuk{-}Yoon Kwon and Alfredo Cuzzocrea}, title = {Enhanced Android Malware Detection: An SVM-Based Machine Learning Approach}, booktitle = {2020 {IEEE} International Conference on Big Data and Smart Computing, BigComp 2020, Busan, Korea (South), February 19-22, 2020}, pages = {75--81}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigComp48618.2020.00-96}, doi = {10.1109/BIGCOMP48618.2020.00-96}, timestamp = {Thu, 25 Mar 2021 15:26:20 +0100}, biburl = {https://dblp.org/rec/conf/bigcomp/HanLSPCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sma2/KangP0CP20, author = {Munyeong Kang and Jihyeon Park and Seonghyun Park and Seong{-}je Cho and Minkyu Park}, title = {Android Malware Family Classification using Images from Dex Files}, booktitle = {{SMA} 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17 - 19, 2020}, pages = {181--186}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3426020.3426069}, doi = {10.1145/3426020.3426069}, timestamp = {Tue, 09 Nov 2021 11:47:09 +0100}, biburl = {https://dblp.org/rec/conf/sma2/KangP0CP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sma2/YouKPCP20, author = {Geunha You and Gyoosik Kim and Jihyeon Park and Seong{-}Je Cho and Minkyu Park}, title = {Reversing Obfuscated Control Flow Structures in Android Apps using ReDex Optimizer}, booktitle = {{SMA} 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17 - 19, 2020}, pages = {272--276}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3426020.3426089}, doi = {10.1145/3426020.3426089}, timestamp = {Tue, 09 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sma2/YouKPCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KimLCP19, author = {Byoung{-}chir Kim and Kyeonghwan Lim and Seong{-}je Cho and Minkyu Park}, title = {RomaDroid: {A} Robust and Efficient Technique for Detecting Android App Clones Using a Tree Structure and Components of Each App's Manifest File}, journal = {{IEEE} Access}, volume = {7}, pages = {72182--72196}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2920314}, doi = {10.1109/ACCESS.2019.2920314}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KimLCP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/JungKCHS19, author = {Jaemin Jung and Hyun{-}Jin Kim and Seong{-}je Cho and Sangchul Han and Kyoungwon Suh}, title = {Efficient Android Malware Detection Using {API} Rank and Machine Learning}, journal = {J. Internet Serv. Inf. Secur.}, volume = {9}, number = {1}, pages = {48--59}, year = {2019}, url = {https://doi.org/10.22667/JISIS.2019.02.28.048}, doi = {10.22667/JISIS.2019.02.28.048}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/JungKCHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ParkYCPH19, author = {Minjae Park and Geunha You and Seong{-}je Cho and Minkyu Park and Sangchul Han}, title = {A Framework for Identifying Obfuscation Techniques applied to Android Apps using Machine Learning}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {4}, pages = {22--30}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.12.31.022}, doi = {10.22667/JOWUA.2019.12.31.022}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ParkYCPH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/HamedaniKC19, author = {Masoud Reyhani Hamedani and Gyoosik Kim and Seong{-}je Cho}, title = {SimAndro: an effective method to compute similarity of Android applications}, journal = {Soft Comput.}, volume = {23}, number = {17}, pages = {7569--7590}, year = {2019}, url = {https://doi.org/10.1007/s00500-019-03755-4}, doi = {10.1007/S00500-019-03755-4}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/HamedaniKC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aike/JungLKCHS19, author = {Jaemin Jung and Kyeonghwan Lim and Byoungchul Kim and Seong{-}je Cho and Sangchul Han and Kyoungwon Suh}, title = {Detecting Malicious Android Apps using the Popularity and Relations of APIs}, booktitle = {2nd {IEEE} International Conference on Artificial Intelligence and Knowledge Engineering, {AIKE} 2019, Sardinia, Italy, June 3-5, 2019}, pages = {309--312}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AIKE.2019.00062}, doi = {10.1109/AIKE.2019.00062}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/aike/JungLKCHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/OparaSCC19, author = {Anthony Opara and Youngsang Song and Seong{-}je Cho and Lawrence Chung}, editor = {Sami Yangui and Athman Bouguettaya and Xiao Xue and Noura Faci and Walid Gaaloul and Qi Yu and Zhangbing Zhou and Nathalie Hernandez and Elisa Yumi Nakagawa}, title = {Representing Multicloud Security and Privacy Policies and Detecting Potential Problems}, booktitle = {Service-Oriented Computing - {ICSOC} 2019 Workshops - WESOACS, ASOCA, ISYCC, TBCE, and STRAPS, Toulouse, France, October 28-31, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12019}, pages = {57--68}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-45989-5\_5}, doi = {10.1007/978-3-030-45989-5\_5}, timestamp = {Wed, 20 Dec 2023 15:14:26 +0100}, biburl = {https://dblp.org/rec/conf/icsoc/OparaSCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icufn/KimJHJCC19, author = {Byoungchul Kim and Jaemin Jung and Sangchul Han and Soyeon Jeon and Seong{-}je Cho and Jongmoo Choi}, title = {A New Technique for Detecting Android App Clones Using Implicit Intent and Method Information}, booktitle = {Eleventh International Conference on Ubiquitous and Future Networks, {ICUFN} 2019, Zagreb, Croatia, July 2-5, 2019}, pages = {478--483}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICUFN.2019.8806121}, doi = {10.1109/ICUFN.2019.8806121}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/icufn/KimJHJCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ChoiSCCW19, author = {Gunhee Choi and Juhyung Son and Jongmoo Choi and Seong{-}je Cho and Youjip Won}, editor = {Chih{-}Cheng Hung and George A. Papadopoulos}, title = {HPanal: a framework for analyzing tradeoffs of huge pages}, booktitle = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2019, Limassol, Cyprus, April 8-12, 2019}, pages = {1438--1443}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297280.3297425}, doi = {10.1145/3297280.3297425}, timestamp = {Sun, 02 Jun 2019 21:18:38 +0200}, biburl = {https://dblp.org/rec/conf/sac/ChoiSCCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/HoCO18, author = {ThienLuan Ho and Seong{-}Je Cho and Seungrohk Oh}, title = {Parallel multiple pattern matching schemes based on cuckoo filter for deep packet inspection on graphics processing units}, journal = {{IET} Inf. Secur.}, volume = {12}, number = {4}, pages = {381--388}, year = {2018}, url = {https://doi.org/10.1049/iet-ifs.2017.0421}, doi = {10.1049/IET-IFS.2017.0421}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/HoCO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChoLHKPH18, author = {Seong{-}je Cho and Kyeonghwan Lim and Jungkyu Han and Byoung{-}chir Kim and Minkyu Park and Sangchul Han}, title = {Open-Source Android App Detection considering the Effects of Code Obfuscation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {3}, pages = {50--61}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.09.30.050}, doi = {10.22667/JOWUA.2018.09.30.050}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChoLHKPH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShimLCHP18, author = {Jaewoo Shim and Kyeonghwan Lim and Seong{-}je Cho and Sangchul Han and Minkyu Park}, title = {Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {6280768:1--6280768:12}, year = {2018}, url = {https://doi.org/10.1155/2018/6280768}, doi = {10.1155/2018/6280768}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShimLCHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/KimCHY18, author = {Yesol Kim and Seong{-}je Cho and Sangchul Han and Ilsun You}, title = {A software classification scheme using binary-level characteristics for efficient software filtering}, journal = {Soft Comput.}, volume = {22}, number = {2}, pages = {595--606}, year = {2018}, url = {https://doi.org/10.1007/s00500-016-2357-x}, doi = {10.1007/S00500-016-2357-X}, timestamp = {Tue, 13 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/KimCHY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/HamedaniSLCH18, author = {Masoud Reyhani Hamedani and Dongjin Shin and Myeonggeon Lee and Seong{-}je Cho and Changha Hwang}, title = {AndroClass: An Effective Method to Classify Android Applications by Applying Deep Neural Networks to Comprehensive Features}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2018}, pages = {1250359:1--1250359:21}, year = {2018}, url = {https://doi.org/10.1155/2018/1250359}, doi = {10.1155/2018/1250359}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/HamedaniSLCH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aike/JungKSLLCS18, author = {Jaemin Jung and Hyun{-}Jin Kim and Dongjin Shin and Myeonggeon Lee and Hyunjae Lee and Seong{-}je Cho and Kyoungwon Suh}, title = {Android Malware Detection Based on Useful {API} Calls and Machine Learning}, booktitle = {First {IEEE} International Conference on Artificial Intelligence and Knowledge Engineering, {AIKE} 2018, Laguna Hills, CA, USA, September 26-28, 2018}, pages = {175--178}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AIKE.2018.00041}, doi = {10.1109/AIKE.2018.00041}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aike/JungKSLLCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icufn/LeeCPC18, author = {Myeonggeon Lee and Gwangjun Choi and Junsang Park and Seong{-}je Cho}, title = {Study of Analyzing and Mitigating Vulnerabilities in uC/OS Real-Time Operating System}, booktitle = {Tenth International Conference on Ubiquitous and Future Networks, {ICUFN} 2018, Prague, Czech Republic, July 3-6, 2018}, pages = {834--836}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICUFN.2018.8436965}, doi = {10.1109/ICUFN.2018.8436965}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/icufn/LeeCPC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/JungCCHPH18, author = {Jaemin Jung and Jongmoo Choi and Seong{-}je Cho and Sangchul Han and Minkyu Park and Young{-}Sup Hwang}, editor = {Chih{-}Cheng Hung and Lamjed Ben Said}, title = {Android malware detection using convolutional neural networks and data section images}, booktitle = {Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, {RACS} 2018, Honolulu, HI, USA, October 09-12, 2018}, pages = {149--153}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264746.3264780}, doi = {10.1145/3264746.3264780}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/racs/JungCCHPH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/OhCCKYC18, author = {Myonghoon Oh and Jongmoo Choi and Seong{-}je Cho and Jeesoo Kim and Changhwan Youn and Woosuk Chung}, editor = {Hisham M. Haddad and Roger L. Wainwright and Richard Chbeir}, title = {Analyzing and modeling the impact of memory latency and bandwidth on application performance}, booktitle = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing, {SAC} 2018, Pau, France, April 09-13, 2018}, pages = {1095--1101}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3167132.3167249}, doi = {10.1145/3167132.3167249}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/OhCCKYC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/LimJCCPHJ17, author = {Kyeonghwan Lim and Jaemin Jeong and Seong{-}je Cho and Jongmoo Choi and Minkyu Park and Sangchul Han and Seongtae Jhang}, title = {An Anti-Reverse Engineering Technique using Native code and Obfuscator-LLVM for Android Applications}, booktitle = {Proceedings of the International Conference on Research in Adaptive and Convergent Systems, {RACS} 2017, Krakow, Poland, September 20-23, 2017}, pages = {217--221}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3129676.3129708}, doi = {10.1145/3129676.3129708}, timestamp = {Tue, 06 Nov 2018 11:07:49 +0100}, biburl = {https://dblp.org/rec/conf/racs/LimJCCPHJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/SonKCCBJPK17, author = {Juhyung Son and Sungmin Koo and Jongmoo Choi and Seong{-}je Cho and Seungjae Baek and Gwangil Jeon and Jun{-}Hyeok Park and Hyoung{-}Chun Kim}, editor = {Ahmed Seffah and Birgit Penzenstadler and Carina Alves and Xin Peng}, title = {Quantitative analysis of measurement overhead for integrity verification}, booktitle = {Proceedings of the Symposium on Applied Computing, {SAC} 2017, Marrakech, Morocco, April 3-7, 2017}, pages = {1528--1533}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3019612.3019738}, doi = {10.1145/3019612.3019738}, timestamp = {Wed, 01 Feb 2023 17:58:48 +0100}, biburl = {https://dblp.org/rec/conf/sac/SonKCCBJPK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/LeeKPC16, author = {Hwan{-}taek Lee and Dongjin Kim and Minkyu Park and Seong{-}je Cho}, title = {Protecting data on android platform against privilege escalation attack}, journal = {Int. J. Comput. Math.}, volume = {93}, number = {2}, pages = {401--414}, year = {2016}, url = {https://doi.org/10.1080/00207160.2014.986113}, doi = {10.1080/00207160.2014.986113}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/LeeKPC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/KimSCPH16, author = {Nak Young Kim and Jaewoo Shim and Seong{-}je Cho and Minkyu Park and Sangchul Han}, title = {Android Application Protection against Static Reverse Engineering based on Multidexing}, journal = {J. Internet Serv. Inf. Secur.}, volume = {6}, number = {4}, pages = {54--64}, year = {2016}, url = {https://doi.org/10.22667/JISIS.2016.11.31.054}, doi = {10.22667/JISIS.2016.11.31.054}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/KimSCPH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LimJCPH16, author = {Kyeonghwan Lim and Younsik Jeong and Seong{-}je Cho and Minkyu Park and Sangchul Han}, title = {An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {3}, pages = {40--52}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.09.31.040}, doi = {10.22667/JOWUA.2016.09.31.040}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LimJCPH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/KimKCPHLH16, author = {Dongjin Kim and Yesol Kim and Seong{-}je Cho and Minkyu Park and Sangchul Han and Guk{-}seon Lee and Young{-}Sup Hwang}, title = {An effective and intelligent Windows application filtering system using software similarity}, journal = {Soft Comput.}, volume = {20}, number = {5}, pages = {1821--1827}, year = {2016}, url = {https://doi.org/10.1007/s00500-015-1678-5}, doi = {10.1007/S00500-015-1678-5}, timestamp = {Wed, 22 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/KimKCPHLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/ChoKCCPH16, author = {Sangwook Cho and Gyoosik Kim and Seong{-}je Cho and Jongmoo Choi and Minkyu Park and Sangchul Han}, title = {Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation}, booktitle = {Proceedings of the International Conference on Research in Adaptive and Convergent Systems, {RACS} 2016, Odense, Denmark, October 11-14, 2016}, pages = {148--152}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2987386.2987432}, doi = {10.1145/2987386.2987432}, timestamp = {Tue, 06 Nov 2018 11:07:49 +0100}, biburl = {https://dblp.org/rec/conf/racs/ChoKCCPH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/KimLYBCC16, author = {Haecheon Kim and Seungmin Lim and Junkee Yoon and Seungjae Baek and Jongmoo Choi and Seong{-}je Cho}, editor = {Sascha Ossowski}, title = {Analysis of micro-architecture resources interference on multicore {NUMA} systems}, booktitle = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016}, pages = {1871--1876}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2851613.2851742}, doi = {10.1145/2851613.2851742}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/KimLYBCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ParkKJCHP15, author = {Jonghwa Park and Hyojung Kim and Younsik Jeong and Seong{-}je Cho and Sangchul Han and Minkyu Park}, title = {Effects of Code Obfuscation on Android App Similarity Analysis}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {4}, pages = {86--98}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.12.31.086}, doi = {10.22667/JOWUA.2015.12.31.086}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ParkKJCHP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ChaeKCK15, author = {Dong{-}Kyu Chae and Sang{-}Wook Kim and Seong{-}je Cho and Yesol Kim}, title = {Effective and efficient detection of software theft via dynamic {API} authority vectors}, journal = {J. Syst. Softw.}, volume = {110}, pages = {1--9}, year = {2015}, url = {https://doi.org/10.1016/j.jss.2015.08.018}, doi = {10.1016/J.JSS.2015.08.018}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ChaeKCK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/ChaeKCK15, author = {Dong{-}Kyu Chae and Sang{-}Wook Kim and Seong{-}je Cho and Yesol Kim}, editor = {James Bailey and Alistair Moffat and Charu C. Aggarwal and Maarten de Rijke and Ravi Kumar and Vanessa Murdock and Timos K. Sellis and Jeffrey Xu Yu}, title = {{DAAV:} Dynamic {API} Authority Vectors for Detecting Software Theft}, booktitle = {Proceedings of the 24th {ACM} International Conference on Information and Knowledge Management, {CIKM} 2015, Melbourne, VIC, Australia, October 19 - 23, 2015}, pages = {1819--1822}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2806416.2806646}, doi = {10.1145/2806416.2806646}, timestamp = {Mon, 26 Apr 2021 09:27:03 +0200}, biburl = {https://dblp.org/rec/conf/cikm/ChaeKCK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/KimPCNHP15, author = {Yesol Kim and Jonghyuk Park and Seong{-}je Cho and Yunmook Nah and Sangchul Han and Minkyu Park}, editor = {Esmaeil S. Nadimi and Tom{\'{a}}s Cern{\'{y}} and Sung{-}Ryul Kim and Wei Wang}, title = {Machine learning-based software classification scheme for efficient program similarity analysis}, booktitle = {Proceedings of the 2015 Conference on research in adaptive and convergent systems, {RACS} 2015, Prague, Czech Republic, October 9-12, 2015}, pages = {114--118}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2811411.2811549}, doi = {10.1145/2811411.2811549}, timestamp = {Tue, 06 Nov 2018 11:07:49 +0100}, biburl = {https://dblp.org/rec/conf/racs/KimPCNHP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsis/HanCCYWNP14, author = {Yongman Han and JongCheon Choi and Seong{-}je Cho and Haeyoung Yoo and Jinwoon Woo and Yunmook Nah and Minkyu Park}, title = {A new detection scheme of software copyright infringement using software birthmark on windows systems}, journal = {Comput. Sci. Inf. Syst.}, volume = {11}, number = {3}, pages = {1055--1069}, year = {2014}, url = {https://doi.org/10.2298/CSIS130918064H}, doi = {10.2298/CSIS130918064H}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsis/HanCCYWNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/KimCHPY14, author = {Dongjin Kim and Seong{-}je Cho and Sangchul Han and Minkyu Park and Ilsun You}, title = {Open Source Software Detection using Function-level Static Software Birthmark}, journal = {J. Internet Serv. Inf. Secur.}, volume = {4}, number = {4}, pages = {25--37}, year = {2014}, url = {https://doi.org/10.22667/JISIS.2014.11.31.025}, doi = {10.22667/JISIS.2014.11.31.025}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/KimCHPY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/LeeKCCP14, author = {Chanhee Lee and Jonghwa Kim and Seong{-}je Cho and Jongmoo Choi and Yeongung Park}, title = {Unified security enhancement framework for the Android operating system}, journal = {J. Supercomput.}, volume = {67}, number = {3}, pages = {738--756}, year = {2014}, url = {https://doi.org/10.1007/s11227-013-0991-y}, doi = {10.1007/S11227-013-0991-Y}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/LeeKCCP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/KimMCCPHC14, author = {Dongjin Kim and Jeongoh Moon and Seong{-}je Cho and Jongmoo Choi and Minkyu Park and Sangchul Han and Lawrence Chung}, editor = {Suk{-}Han Lee and Sang{-}Wook Kim and Lajos Hanzo and Roslan Ismail}, title = {A birthmark-based method for intellectual software asset management}, booktitle = {The 8th International Conference on Ubiquitous Information Management and Communication, {ICUIMC} '14, Siem Reap, Cambodia - January 09 - 11, 2014}, pages = {39:1--39:6}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2557977.2558062}, doi = {10.1145/2557977.2558062}, timestamp = {Thu, 23 May 2019 16:33:14 +0200}, biburl = {https://dblp.org/rec/conf/icuimc/KimMCCPHC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/KimMCPH14, author = {Yesol Kim and Jeongoh Moon and Seong{-}je Cho and Minkyu Park and Sangchul Han}, title = {Efficient Identification of Windows Executable Programs to Prevent Software Piracy}, booktitle = {Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2014, Birmingham, United Kingdom, 2-4 July, 2014}, pages = {236--240}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IMIS.2014.29}, doi = {10.1109/IMIS.2014.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/KimMCPH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/KimKMCWY14, author = {Dongjin Kim and Yesol Kim and Jeongoh Moon and Seong{-}je Cho and Jinwoon Woo and Ilsun You}, title = {Identifying Windows Installer Package Files for Detection of Pirated Software}, booktitle = {Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2014, Birmingham, United Kingdom, 2-4 July, 2014}, pages = {287--290}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IMIS.2014.36}, doi = {10.1109/IMIS.2014.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/KimKMCWY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/KangSCPH14, author = {SeongWook Kang and Hyungjoon Shim and Seong{-}je Cho and Minkyu Park and Sangchul Han}, editor = {Chao Lu and Esmaeil S. Nadimi and Sung{-}Ryul Kim and Wei Wang}, title = {A robust and efficient birthmark-based android application filtering system}, booktitle = {Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, {RACS} 2014, Towson, Maryland, USA, October 5-8, 2014}, pages = {253--257}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663761.2664231}, doi = {10.1145/2663761.2664231}, timestamp = {Tue, 06 Nov 2018 11:07:49 +0100}, biburl = {https://dblp.org/rec/conf/racs/KangSCPH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BaeCPJKC14, author = {Duck{-}Ho Bae and Ji{-}Woong Chang and Se{-}Mi Park and Byeong{-}Soo Jeong and Sang{-}Wook Kim and Seong{-}je Cho}, editor = {Yookun Cho and Sung Y. Shin and Sang{-}Wook Kim and Chih{-}Cheng Hung and Jiman Hong}, title = {An effective data clustering method based on expected update time in flash memory environment}, booktitle = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014}, pages = {1492--1497}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2554850.2554900}, doi = {10.1145/2554850.2554900}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/BaeCPJKC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/JeongLCHP14, author = {Younsik Jeong and Hwan{-}taek Lee and Seong{-}je Cho and Sangchul Han and Minkyu Park}, editor = {Yookun Cho and Sung Y. Shin and Sang{-}Wook Kim and Chih{-}Cheng Hung and Jiman Hong}, title = {A kernel-based monitoring approach for analyzing malicious behavior on Android}, booktitle = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014}, pages = {1737--1738}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2554850.2559915}, doi = {10.1145/2554850.2559915}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/JeongLCHP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/HwangKMC13, author = {Young{-}Sup Hwang and Jin Baek Kwon and Jae Chan Moon and Seong Je Cho}, title = {Classifying Malicious Web Pages by Using an Adaptive Support Vector Machine}, journal = {J. Inf. Process. Syst.}, volume = {9}, number = {3}, pages = {395--404}, year = {2013}, url = {https://doi.org/10.3745/JIPS.2013.9.3.395}, doi = {10.3745/JIPS.2013.9.3.395}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jips/HwangKMC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/LeePC13, author = {Hwan{-}taek Lee and Minkyu Park and Seong{-}je Cho}, title = {Detection and prevention of LeNa Malware on Android}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {3/4}, pages = {63--71}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.11.31.063}, doi = {10.22667/JISIS.2013.11.31.063}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/LeePC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/ChoiPCCH13, author = {Yongsuk Choi and Yeongseong Park and Jongmoo Choi and Seong{-}je Cho and Hwansoo Han}, title = {{RAMC:} runtime abstract memory context based plagiarism detection in binary code}, booktitle = {The 7th International Conference on Ubiquitous Information Management and Communication, {ICUIMC} '13, Kota Kinabalu, Malaysia - January 17 - 19, 2013}, pages = {67}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2448556.2448623}, doi = {10.1145/2448556.2448623}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icuimc/ChoiPCCH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/ParkKCHCC13, author = {Seongsoo Park and Seungcheol Ko and Jungsik Choi and Hwansoo Han and Seong{-}je Cho and Jongmoo Choi}, title = {Detecting source code similarity using code abstraction}, booktitle = {The 7th International Conference on Ubiquitous Information Management and Communication, {ICUIMC} '13, Kota Kinabalu, Malaysia - January 17 - 19, 2013}, pages = {74}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2448556.2448630}, doi = {10.1145/2448556.2448630}, timestamp = {Fri, 30 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icuimc/ParkKCHCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/ChoiHCYWPSC13, author = {JongCheon Choi and Yongman Han and Seong{-}je Cho and Haeyoung Yoo and Jinwoon Woo and Minkyu Park and Youngsang Song and Lawrence Chung}, editor = {Leonard Barolli and Ilsun You and Fatos Xhafa and Fang{-}Yie Leu and Hsing{-}Chung Chen}, title = {A Static Birthmark for {MS} Windows Applications Using Import Address Table}, booktitle = {Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2013, Taichung, Taiwan, July 3-5, 2013}, pages = {129--134}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/IMIS.2013.159}, doi = {10.1109/IMIS.2013.159}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/ChoiHCYWPSC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/ChoiHCYPHYS13, author = {JongCheon Choi and Yongman Han and Seong{-}je Cho and Haeyoung Yoo and Minkyu Park and Sangchul Han and Ilsun You and Inshik Song}, editor = {Leonard Barolli and Ilsun You and Fatos Xhafa and Fang{-}Yie Leu and Hsing{-}Chung Chen}, title = {A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications}, booktitle = {Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2013, Taichung, Taiwan, July 3-5, 2013}, pages = {723--728}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/IMIS.2013.131}, doi = {10.1109/IMIS.2013.131}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/ChoiHCYPHYS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/KimMKJCPH13, author = {Yesol Kim and Jeongoh Moon and Dongjin Kim and Younsik Jeong and Seong{-}je Cho and Minkyu Park and Sangchul Han}, editor = {Leonard Barolli and Ilsun You and Fatos Xhafa and Fang{-}Yie Leu and Hsing{-}Chung Chen}, title = {A Static Birthmark of Windows Binary Executables Based on Strings}, booktitle = {Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2013, Taichung, Taiwan, July 3-5, 2013}, pages = {734--738}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/IMIS.2013.30}, doi = {10.1109/IMIS.2013.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/KimMKJCPH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/JeongCPKSKHP13, author = {Younsik Jeong and Seong{-}je Cho and Moonju Park and Jeonguk Ko and Hyungjoon Shim and Joonmo Kim and Sangchul Han and Minkyu Park}, editor = {Ching Y. Suen and Amir G. Aghdam and Minyi Guo and Jiman Hong and Esmaeil S. Nadimi}, title = {An efficient protection scheme of digital contents under mobile devices}, booktitle = {Research in Adaptive and Convergent Systems, RACS'13, Montreal, QC, Canada, October 1-4, 2013}, pages = {306--311}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2513228.2513270}, doi = {10.1145/2513228.2513270}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/racs/JeongCPKSKHP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/KoSKJCPHK13, author = {Jeonguk Ko and Hyungjoon Shim and Dongjin Kim and Younsik Jeong and Seong{-}je Cho and Minkyu Park and Sangchul Han and Seong Baeg Kim}, editor = {Ching Y. Suen and Amir G. Aghdam and Minyi Guo and Jiman Hong and Esmaeil S. Nadimi}, title = {Measuring similarity of android applications via reversing and K-gram birthmarking}, booktitle = {Research in Adaptive and Convergent Systems, RACS'13, Montreal, QC, Canada, October 1-4, 2013}, pages = {336--341}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2513228.2513308}, doi = {10.1145/2513228.2513308}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/racs/KoSKJCPHK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/KimHCYWNPC13, author = {Dongjin Kim and Yongman Han and Seong{-}je Cho and Haeyoung Yoo and Jinwoon Woo and Yunmook Nah and Minkyu Park and Lawrence Chung}, editor = {Sung Y. Shin and Jos{\'{e}} Carlos Maldonado}, title = {Measuring similarity of windows applications using static and dynamic birthmarks}, booktitle = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing, {SAC} '13, Coimbra, Portugal, March 18-22, 2013}, pages = {1628--1633}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2480362.2480666}, doi = {10.1145/2480362.2480666}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/KimHCYWNPC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/KimKCPP12, author = {HongGeun Kim and Dongjin Kim and Seong{-}je Cho and Moonju Park and Minkyu Park}, title = {Efficient Detection of Malicious Web Pages Using High-Interaction Client Honeypots}, journal = {J. Inf. Sci. Eng.}, volume = {28}, number = {5}, pages = {911--924}, year = {2012}, url = {http://www.iis.sinica.edu.tw/page/jise/2012/201209\_06.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/KimKCPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ParkLKCC12, author = {Yeongung Park and Chanhee Lee and Jonghwa Kim and Seong{-}je Cho and Jongmoo Choi}, title = {An Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks}, journal = {J. Internet Serv. Inf. Secur.}, volume = {2}, number = {3/4}, pages = {29--42}, year = {2012}, url = {https://doi.org/10.22667/JISIS.2012.11.31.029}, doi = {10.22667/JISIS.2012.11.31.029}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ParkLKCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/ParkLLLHPC12, author = {Yeongung Park and Choonghyun Lee and Chanhee Lee and JiHyeog Lim and Sangchul Han and Minkyu Park and Seong{-}je Cho}, editor = {Engin Kirda}, title = {RGBDroid: {A} Novel Response-Based Approach to Android Privilege Escalation Attacks}, booktitle = {5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '12, San Jose, CA, USA, April 24, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/leet12/workshop-program/presentation/park}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/leet/ParkLLLHPC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/npc/LeeWCPW12, author = {Taeseung Lee and Giyoun Won and Seongje Cho and Namje Park and Dongho Won}, editor = {James J. Park and Albert Y. Zomaya and Sang{-}Soo Yeo and Sartaj Sahni}, title = {Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing}, booktitle = {Network and Parallel Computing, 9th {IFIP} International Conference, {NPC} 2012, Gwangju, Korea, September 6-8, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7513}, pages = {138--144}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35606-3\_16}, doi = {10.1007/978-3-642-35606-3\_16}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/npc/LeeWCPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/JeongPMCKP12, author = {Younsik Jeong and Yeong{-}Ung Park and Jae{-}Chan Moon and Seong{-}je Cho and Dongjin Kim and Minkyu Park}, editor = {Yookun Cho and Rex E. Gantenbein and Tei{-}Wei Kuo and Vahid Tarokh}, title = {An anti-piracy mechanism based on class separation and dynamic loading for Android applications}, booktitle = {Research in Applied Computation Symposium, {RACS} '12, San Antonio, TX, USA, October 23-26, 2012}, pages = {328--332}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2401603.2401674}, doi = {10.1145/2401603.2401674}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/racs/JeongPMCKP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/JungJCHJCJK12, author = {Jinman Jung and Joonhyouk Jang and Yookun Cho and Hwansoo Han and Gwangil Jeon and Seong{-}je Cho and Minwoo Jang and Jung{-}Yeop Kim}, editor = {Sascha Ossowski and Paola Lecca}, title = {A fast mount mechanism for {YAFFS2}}, booktitle = {Proceedings of the {ACM} Symposium on Applied Computing, {SAC} 2012, Riva, Trento, Italy, March 26-30, 2012}, pages = {1791--1795}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2245276.2232067}, doi = {10.1145/2245276.2232067}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/JungJCHJCJK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/KimKCPP11, author = {HongGeun Kim and Dong{-}Jin Kim and Seong{-}je Cho and Moonju Park and Minkyu Park}, editor = {Rex E. Gantenbein and Tei{-}Wei Kuo}, title = {An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots}, booktitle = {Research in Applied Computation Symposium, {RACS} '11, Miami, FL, USA, October 19-22, 2011}, pages = {266--271}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2103380.2103435}, doi = {10.1145/2103380.2103435}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/racs/KimKCPP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/KimPHPPCC10, author = {Heeheon Kim and Xuefeng Piao and Sangchul Han and Moonju Park and Minkyu Park and Seongje Cho and Yookun Cho}, title = {Improving responsiveness of soft aperiodic tasks using proportional slack time}, journal = {Comput. Electr. Eng.}, volume = {36}, number = {5}, pages = {913--926}, year = {2010}, url = {https://doi.org/10.1016/j.compeleceng.2009.12.012}, doi = {10.1016/J.COMPELECENG.2009.12.012}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/KimPHPPCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isorc/KimLCCPPW10, author = {Min{-}Jae Kim and Jin{-}Young Lee and Hyeyoung Chang and Seongje Cho and Yongsu Park and Minkyu Park and Philip A. Wilsey}, title = {Design and Performance Evaluation of Binary Code Packing for Protecting Embedded Software against Reverse Engineering}, booktitle = {13th {IEEE} International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, {ISORC} 2010, Carmona, Sevilla, Spain, 5-6 May 2010}, pages = {80--86}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ISORC.2010.23}, doi = {10.1109/ISORC.2010.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isorc/KimLCCPPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icess/PiaoKCPHPC09, author = {Xuefeng Piao and Heeheon Kim and Yookun Cho and Moonju Park and Sangchul Han and Minkyu Park and Seongje Cho}, editor = {Tianzhou Chen and Dimitrios N. Serpanos and Walid Taha}, title = {Energy Consumption Optimization of Real-Time Embedded Systems}, booktitle = {International Conference on Embedded Software and Systems, {ICESS} '09, Hangzhou, Zhejiang, P. R. China, May 25-27, 2009}, pages = {281--287}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICESS.2009.43}, doi = {10.1109/ICESS.2009.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icess/PiaoKCPHPC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seus/ChoCC08, author = {Seongje Cho and Hyeyoung Chang and Yookun Cho}, editor = {Uwe Brinkschulte and Tony Givargis and Stefano Russo}, title = {Implementation of an Obfuscation Tool for {C/C++} Source Code Protection on the XScale Architecture}, booktitle = {Software Technologies for Embedded and Ubiquitous Systems, 6th {IFIP} {WG} 10.2 International Workshop, {SEUS} 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5287}, pages = {406--416}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87785-1\_36}, doi = {10.1007/978-3-540-87785-1\_36}, timestamp = {Wed, 22 Mar 2023 16:53:33 +0100}, biburl = {https://dblp.org/rec/conf/seus/ChoCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/LeeCKC07, author = {YongSuk Lee and WoongChul Choi and SukJoong Kang and Seongje Cho}, editor = {Mieso K. Denko and Chi{-}Sheng Shih and Kuan{-}Ching Li and Shiao{-}Li Tsao and Qing{-}An Zeng and Soo{-}Hyun Park and Young{-}Bae Ko and Shih{-}Hao Hung and Jong Hyuk Park}, title = {Multi-channel Enhancements for {IEEE} 802.11-Based Multi-hop Ad-Hoc Wireless Networks}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4809}, pages = {82--92}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77090-9\_8}, doi = {10.1007/978-3-540-77090-9\_8}, timestamp = {Wed, 22 Jun 2022 09:02:26 +0200}, biburl = {https://dblp.org/rec/conf/euc/LeeCKC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/KimHC07, author = {HongGeun Kim and Jungkyu Han and Seongje Cho}, editor = {Yookun Cho and Roger L. Wainwright and Hisham Haddad and Sung Y. Shin and Yong Wan Koo}, title = {An efficient implementation of {RC4} cipher for encrypting multimedia files on mobile devices}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007}, pages = {1171--1175}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1244002.1244256}, doi = {10.1145/1244002.1244256}, timestamp = {Sun, 02 Jun 2019 21:18:37 +0200}, biburl = {https://dblp.org/rec/conf/sac/KimHC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LeeCCC06, author = {Seungwon Lee and Seongje Cho and Jongmoo Choi and Yookun Cho}, title = {Efficient Identification of Bad Signatures in RSA-Type Batch Signature}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {1}, pages = {74--80}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.1.74}, doi = {10.1093/IETFEC/E89-A.1.74}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LeeCCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HanKPPCC06, author = {Sangchul Han and Heeheon Kim and Xuefeng Piao and Minkyu Park and Seongje Cho and Yookun Cho}, title = {Finish Time Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {89-D}, number = {12}, pages = {2981--2984}, year = {2006}, url = {https://doi.org/10.1093/ietisy/e89-d.12.2981}, doi = {10.1093/IETISY/E89-D.12.2981}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HanKPPCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isorc/PiaoHKPCC06, author = {Xuefeng Piao and Sangchul Han and Heeheon Kim and Minkyu Park and Yookun Cho and Seongje Cho}, title = {Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems}, booktitle = {Ninth {IEEE} International Symposium on Object-Oriented Real-Time Distributed Computing {(ISORC} 2006), 24-26 April 2006, Gyeongju, Korea}, pages = {359--364}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ISORC.2006.64}, doi = {10.1109/ISORC.2006.64}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isorc/PiaoHKPCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ParkHKCC05, author = {Minkyu Park and Sangchul Han and Heeheon Kim and Seongje Cho and Yookun Cho}, title = {Comparison of Deadline-Based Scheduling Algorithms for Periodic Real-Time Tasks on Multiprocessor}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {88-D}, number = {3}, pages = {658--661}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-d\_3\_658\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ParkHKCC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LeeCCC05, author = {Seungwon Lee and Seongje Cho and Jongmoo Choi and Yookun Cho}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Batch Verification with DSA-Type Digital Signatures for Ubiquitous Computing}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {125--130}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_18}, doi = {10.1007/11596981\_18}, timestamp = {Tue, 23 Feb 2021 17:25:41 +0100}, biburl = {https://dblp.org/rec/conf/cis/LeeCCC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChoCKC05, author = {Seongje Cho and Hyeyoung Chang and HongGeun Kim and WoongChul Choi}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {\emph{SoIDPS}: Sensor Objects-Based Intrusion Detection and Prevention System and Its Implementation}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {260--266}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_38}, doi = {10.1007/11596981\_38}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ChoCKC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/ParkHKCC04, author = {Minkyu Park and Sangchul Han and Heeheon Kim and Seongje Cho and Yookun Cho}, editor = {Laurence Tianruo Yang and Minyi Guo and Guang R. Gao and Niraj K. Jha}, title = {Comparison of Tie-Breaking Policies for Real-Time Scheduling on Multiprocessor}, booktitle = {Embedded and Ubiquitous Computing, International Conference {EUC} 2004, Aizu-Wakamatsu City, Japan, August 25-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3207}, pages = {174--182}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30121-9\_17}, doi = {10.1007/978-3-540-30121-9\_17}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/euc/ParkHKCC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/human/ChoCKC03, author = {Seongje Cho and Chulyean Chang and Joonmo Kim and Jongmoo Choi}, editor = {Chin{-}Wan Chung and Chong{-}kwon Kim and Won Kim and Tok Wang Ling and Kwan Ho Song}, title = {A Study on Monitoring and Protecting Computer System against Interception Threat}, booktitle = {Web Communication Technologies and Internet-Related Social Issues - {HSI} 2003, Second International Conference on Human Society@Internet, Seoul, Korea, June 18-20, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2713}, pages = {96--105}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45036-X\_10}, doi = {10.1007/3-540-45036-X\_10}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/human/ChoCKC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.