BibTeX records: Seong-je Cho

download as .bib file

@inproceedings{DBLP:conf/bigcomp/ZhaoSYCC24,
  author       = {Guangxun Zhao and
                  Hojin Shin and
                  Seehwan Yoo and
                  Seong{-}je Cho and
                  Jongmoo Choi},
  editor       = {Herwig Unger and
                  Jinseok Chae and
                  Young{-}Koo Lee and
                  Christian Wagner and
                  Chaokun Wang and
                  Mehdi Bennis and
                  Mahasak Ketcham and
                  Young{-}Kyoon Suh and
                  Hyuk{-}Yoon Kwon},
  title        = {ThanosKV: {A} Holistic Approach to Utilize {NVM} for LSM-tree based
                  Key- Value Stores},
  booktitle    = {{IEEE} International Conference on Big Data and Smart Computing, BigComp
                  2024, Bangkok, Thailand, February 18-21, 2024},
  pages        = {143--150},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/BigComp60711.2024.00031},
  doi          = {10.1109/BIGCOMP60711.2024.00031},
  timestamp    = {Thu, 18 Apr 2024 16:24:12 +0200},
  biburl       = {https://dblp.org/rec/conf/bigcomp/ZhaoSYCC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigcomp/JaranillaSYCC24,
  author       = {Charles Jaranilla and
                  Hojin Shin and
                  Seehwan Yoo and
                  Seong{-}je Cho and
                  Jongmoo Choi},
  editor       = {Herwig Unger and
                  Jinseok Chae and
                  Young{-}Koo Lee and
                  Christian Wagner and
                  Chaokun Wang and
                  Mehdi Bennis and
                  Mahasak Ketcham and
                  Young{-}Kyoon Suh and
                  Hyuk{-}Yoon Kwon},
  title        = {Tiered Storage in Modern Key-Value Stores: Performance, Storage-Efficiency,
                  and Cost-Efficiency Considerations},
  booktitle    = {{IEEE} International Conference on Big Data and Smart Computing, BigComp
                  2024, Bangkok, Thailand, February 18-21, 2024},
  pages        = {151--158},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/BigComp60711.2024.00032},
  doi          = {10.1109/BIGCOMP60711.2024.00032},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigcomp/JaranillaSYCC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcse/MustafaCH23,
  author       = {Ghulam Mustafa and
                  Seong{-}je Cho and
                  Youngsup Hwang},
  title        = {TrafficNet: {A} Hybrid {CNN-FNN} Model for Analysis of Traffic Accidents
                  in Seoul},
  journal      = {J. Comput. Sci. Eng.},
  volume       = {17},
  number       = {4},
  pages        = {182--194},
  year         = {2023},
  url          = {https://doi.org/10.5626/jcse.2023.17.4.182},
  doi          = {10.5626/JCSE.2023.17.4.182},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcse/MustafaCH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aike/MustafaCH23,
  author       = {Ghulam Mustafa and
                  Seong{-}Je Cho and
                  Youngsup Hwang},
  title        = {Hybrid ConvLSTM with Attention for Precise Driver Behavior Classification},
  booktitle    = {Sixth {IEEE} International Conference on Artificial Intelligence and
                  Knowledge Engineering, {AIKE} 2023, Laguna Hills, CA, USA, September
                  25-27, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AIKE59827.2023.00008},
  doi          = {10.1109/AIKE59827.2023.00008},
  timestamp    = {Sun, 04 Feb 2024 18:12:16 +0100},
  biburl       = {https://dblp.org/rec/conf/aike/MustafaCH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icufn/ParkCK23,
  author       = {Minsu Park and
                  Seong{-}Je Cho and
                  HongGeun Kim},
  title        = {A Study on Asset Identification in Smart Buildings Automation Systems},
  booktitle    = {Fourteenth International Conference on Ubiquitous and Future Networks,
                  {ICUFN} 2023, Paris, France, July 4-7, 2023},
  pages        = {923--925},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICUFN57995.2023.10200369},
  doi          = {10.1109/ICUFN57995.2023.10200369},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icufn/ParkCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KimKCC22,
  author       = {Hyun{-}Il Kim and
                  Moonyoung Kang and
                  Seong{-}Je Cho and
                  Sang{-}Il Choi},
  title        = {Efficient Deep Learning Network With Multi-Streams for Android Malware
                  Family Classification},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {5518--5532},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2021.3139334},
  doi          = {10.1109/ACCESS.2021.3139334},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KimKCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YouKHPC22,
  author       = {Geunha You and
                  Gyoosik Kim and
                  Sangchul Han and
                  Minkyu Park and
                  Seong{-}Je Cho},
  title        = {Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android
                  Runtime {(ART)}},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {61426--61440},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3181373},
  doi          = {10.1109/ACCESS.2022.3181373},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YouKHPC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aike/ChoLHHC22,
  author       = {Woosang Cho and
                  Hojun Lee and
                  Sangchul Han and
                  Young{-}Sup Hwang and
                  Seong{-}je Cho},
  title        = {Sustainability of Machine Learning-based Android Malware Detection
                  Using {API} calls and Permissions},
  booktitle    = {5th {IEEE} International Conference on Artificial Intelligence and
                  Knowledge Engineering, {AIKE} 2022, Laguna Hills, CA, USA, September
                  19-21, 2022},
  pages        = {18--25},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AIKE55402.2022.00009},
  doi          = {10.1109/AIKE55402.2022.00009},
  timestamp    = {Tue, 22 Nov 2022 16:09:15 +0100},
  biburl       = {https://dblp.org/rec/conf/aike/ChoLHHC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aike/LeeCHCS22,
  author       = {Hojun Lee and
                  Seong{-}je Cho and
                  Hyoil Han and
                  Woosang Cho and
                  Kyoungwon Suh},
  title        = {Enhancing Sustainability in Machine Learning-based Android Malware
                  Detection using {API} calls},
  booktitle    = {5th {IEEE} International Conference on Artificial Intelligence and
                  Knowledge Engineering, {AIKE} 2022, Laguna Hills, CA, USA, September
                  19-21, 2022},
  pages        = {131--134},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AIKE55402.2022.00028},
  doi          = {10.1109/AIKE55402.2022.00028},
  timestamp    = {Tue, 22 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aike/LeeCHCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/YouKCH21,
  author       = {Geunha You and
                  Gyoosik Kim and
                  Seong{-}je Cho and
                  Hyoil Han},
  title        = {A Comparative Study on Optimization, Obfuscation, and Deobfuscation
                  tools in Android},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {2--15},
  year         = {2021},
  url          = {https://doi.org/10.22667/JISIS.2021.02.28.002},
  doi          = {10.22667/JISIS.2021.02.28.002},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/YouKCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec2/LeeKSLCPP21,
  author       = {Junsu Lee and
                  Juwon Kim and
                  Hojun Seong and
                  Keonyong Lee and
                  Seong{-}je Cho and
                  Younjai Park and
                  Minkyu Park},
  editor       = {Ilsun You and
                  Hwankuk Kim and
                  Taek{-}Young Youn and
                  Francesco Palmieri and
                  Igor V. Kotenko},
  title        = {Forensic Analysis of Apple CarPlay: {A} Case Study},
  booktitle    = {Mobile Internet Security - 5th International Symposium, MobiSec 2021,
                  Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1544},
  pages        = {289--300},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-9576-6\_20},
  doi          = {10.1007/978-981-16-9576-6\_20},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisec2/LeeKSLCPP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aike/ParkKCHS20,
  author       = {Jihyeon Park and
                  Munyeong Kang and
                  Seong{-}je Cho and
                  Hyoil Han and
                  Kyoungwon Suh},
  title        = {Analysis of Permission Selection Techniques in Machine Learning-based
                  Malicious App Detection},
  booktitle    = {3rd {IEEE} International Conference on Artificial Intelligence and
                  Knowledge Engineering, {AIKE} 2020, Laguna Hills, CA, USA, December
                  9-13, 2020},
  pages        = {92--99},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AIKE48582.2020.00021},
  doi          = {10.1109/AIKE48582.2020.00021},
  timestamp    = {Fri, 26 Feb 2021 11:33:29 +0100},
  biburl       = {https://dblp.org/rec/conf/aike/ParkKCHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigcomp/HanLSPCP20,
  author       = {Hyoil Han and
                  SeungJin Lim and
                  Kyoungwon Suh and
                  Seonghyun Park and
                  Seong{-}je Cho and
                  Minkyu Park},
  editor       = {Wookey Lee and
                  Luonan Chen and
                  Yang{-}Sae Moon and
                  Julien Bourgeois and
                  Mehdi Bennis and
                  Yu{-}Feng Li and
                  Young{-}Guk Ha and
                  Hyuk{-}Yoon Kwon and
                  Alfredo Cuzzocrea},
  title        = {Enhanced Android Malware Detection: An SVM-Based Machine Learning
                  Approach},
  booktitle    = {2020 {IEEE} International Conference on Big Data and Smart Computing,
                  BigComp 2020, Busan, Korea (South), February 19-22, 2020},
  pages        = {75--81},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigComp48618.2020.00-96},
  doi          = {10.1109/BIGCOMP48618.2020.00-96},
  timestamp    = {Thu, 25 Mar 2021 15:26:20 +0100},
  biburl       = {https://dblp.org/rec/conf/bigcomp/HanLSPCP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sma2/KangP0CP20,
  author       = {Munyeong Kang and
                  Jihyeon Park and
                  Seonghyun Park and
                  Seong{-}je Cho and
                  Minkyu Park},
  title        = {Android Malware Family Classification using Images from Dex Files},
  booktitle    = {{SMA} 2020: The 9th International Conference on Smart Media and Applications,
                  Jeju, Republic of Korea, September 17 - 19, 2020},
  pages        = {181--186},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3426020.3426069},
  doi          = {10.1145/3426020.3426069},
  timestamp    = {Tue, 09 Nov 2021 11:47:09 +0100},
  biburl       = {https://dblp.org/rec/conf/sma2/KangP0CP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sma2/YouKPCP20,
  author       = {Geunha You and
                  Gyoosik Kim and
                  Jihyeon Park and
                  Seong{-}Je Cho and
                  Minkyu Park},
  title        = {Reversing Obfuscated Control Flow Structures in Android Apps using
                  ReDex Optimizer},
  booktitle    = {{SMA} 2020: The 9th International Conference on Smart Media and Applications,
                  Jeju, Republic of Korea, September 17 - 19, 2020},
  pages        = {272--276},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3426020.3426089},
  doi          = {10.1145/3426020.3426089},
  timestamp    = {Tue, 09 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sma2/YouKPCP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KimLCP19,
  author       = {Byoung{-}chir Kim and
                  Kyeonghwan Lim and
                  Seong{-}je Cho and
                  Minkyu Park},
  title        = {RomaDroid: {A} Robust and Efficient Technique for Detecting Android
                  App Clones Using a Tree Structure and Components of Each App's Manifest
                  File},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {72182--72196},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2920314},
  doi          = {10.1109/ACCESS.2019.2920314},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KimLCP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/JungKCHS19,
  author       = {Jaemin Jung and
                  Hyun{-}Jin Kim and
                  Seong{-}je Cho and
                  Sangchul Han and
                  Kyoungwon Suh},
  title        = {Efficient Android Malware Detection Using {API} Rank and Machine Learning},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {48--59},
  year         = {2019},
  url          = {https://doi.org/10.22667/JISIS.2019.02.28.048},
  doi          = {10.22667/JISIS.2019.02.28.048},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/JungKCHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ParkYCPH19,
  author       = {Minjae Park and
                  Geunha You and
                  Seong{-}je Cho and
                  Minkyu Park and
                  Sangchul Han},
  title        = {A Framework for Identifying Obfuscation Techniques applied to Android
                  Apps using Machine Learning},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {4},
  pages        = {22--30},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.12.31.022},
  doi          = {10.22667/JOWUA.2019.12.31.022},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ParkYCPH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/HamedaniKC19,
  author       = {Masoud Reyhani Hamedani and
                  Gyoosik Kim and
                  Seong{-}je Cho},
  title        = {SimAndro: an effective method to compute similarity of Android applications},
  journal      = {Soft Comput.},
  volume       = {23},
  number       = {17},
  pages        = {7569--7590},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00500-019-03755-4},
  doi          = {10.1007/S00500-019-03755-4},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/HamedaniKC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aike/JungLKCHS19,
  author       = {Jaemin Jung and
                  Kyeonghwan Lim and
                  Byoungchul Kim and
                  Seong{-}je Cho and
                  Sangchul Han and
                  Kyoungwon Suh},
  title        = {Detecting Malicious Android Apps using the Popularity and Relations
                  of APIs},
  booktitle    = {2nd {IEEE} International Conference on Artificial Intelligence and
                  Knowledge Engineering, {AIKE} 2019, Sardinia, Italy, June 3-5, 2019},
  pages        = {309--312},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AIKE.2019.00062},
  doi          = {10.1109/AIKE.2019.00062},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/aike/JungLKCHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/OparaSCC19,
  author       = {Anthony Opara and
                  Youngsang Song and
                  Seong{-}je Cho and
                  Lawrence Chung},
  editor       = {Sami Yangui and
                  Athman Bouguettaya and
                  Xiao Xue and
                  Noura Faci and
                  Walid Gaaloul and
                  Qi Yu and
                  Zhangbing Zhou and
                  Nathalie Hernandez and
                  Elisa Yumi Nakagawa},
  title        = {Representing Multicloud Security and Privacy Policies and Detecting
                  Potential Problems},
  booktitle    = {Service-Oriented Computing - {ICSOC} 2019 Workshops - WESOACS, ASOCA,
                  ISYCC, TBCE, and STRAPS, Toulouse, France, October 28-31, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12019},
  pages        = {57--68},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-45989-5\_5},
  doi          = {10.1007/978-3-030-45989-5\_5},
  timestamp    = {Wed, 20 Dec 2023 15:14:26 +0100},
  biburl       = {https://dblp.org/rec/conf/icsoc/OparaSCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icufn/KimJHJCC19,
  author       = {Byoungchul Kim and
                  Jaemin Jung and
                  Sangchul Han and
                  Soyeon Jeon and
                  Seong{-}je Cho and
                  Jongmoo Choi},
  title        = {A New Technique for Detecting Android App Clones Using Implicit Intent
                  and Method Information},
  booktitle    = {Eleventh International Conference on Ubiquitous and Future Networks,
                  {ICUFN} 2019, Zagreb, Croatia, July 2-5, 2019},
  pages        = {478--483},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICUFN.2019.8806121},
  doi          = {10.1109/ICUFN.2019.8806121},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icufn/KimJHJCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ChoiSCCW19,
  author       = {Gunhee Choi and
                  Juhyung Son and
                  Jongmoo Choi and
                  Seong{-}je Cho and
                  Youjip Won},
  editor       = {Chih{-}Cheng Hung and
                  George A. Papadopoulos},
  title        = {HPanal: a framework for analyzing tradeoffs of huge pages},
  booktitle    = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing,
                  {SAC} 2019, Limassol, Cyprus, April 8-12, 2019},
  pages        = {1438--1443},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3297280.3297425},
  doi          = {10.1145/3297280.3297425},
  timestamp    = {Sun, 02 Jun 2019 21:18:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/ChoiSCCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/HoCO18,
  author       = {ThienLuan Ho and
                  Seong{-}Je Cho and
                  Seungrohk Oh},
  title        = {Parallel multiple pattern matching schemes based on cuckoo filter
                  for deep packet inspection on graphics processing units},
  journal      = {{IET} Inf. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {381--388},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-ifs.2017.0421},
  doi          = {10.1049/IET-IFS.2017.0421},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/HoCO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChoLHKPH18,
  author       = {Seong{-}je Cho and
                  Kyeonghwan Lim and
                  Jungkyu Han and
                  Byoung{-}chir Kim and
                  Minkyu Park and
                  Sangchul Han},
  title        = {Open-Source Android App Detection considering the Effects of Code
                  Obfuscation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {3},
  pages        = {50--61},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.09.30.050},
  doi          = {10.22667/JOWUA.2018.09.30.050},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChoLHKPH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShimLCHP18,
  author       = {Jaewoo Shim and
                  Kyeonghwan Lim and
                  Seong{-}je Cho and
                  Sangchul Han and
                  Minkyu Park},
  title        = {Static and Dynamic Analysis of Android Malware and Goodware Written
                  with Unity Framework},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {6280768:1--6280768:12},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/6280768},
  doi          = {10.1155/2018/6280768},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShimLCHP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/KimCHY18,
  author       = {Yesol Kim and
                  Seong{-}je Cho and
                  Sangchul Han and
                  Ilsun You},
  title        = {A software classification scheme using binary-level characteristics
                  for efficient software filtering},
  journal      = {Soft Comput.},
  volume       = {22},
  number       = {2},
  pages        = {595--606},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00500-016-2357-x},
  doi          = {10.1007/S00500-016-2357-X},
  timestamp    = {Tue, 13 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/KimCHY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/HamedaniSLCH18,
  author       = {Masoud Reyhani Hamedani and
                  Dongjin Shin and
                  Myeonggeon Lee and
                  Seong{-}je Cho and
                  Changha Hwang},
  title        = {AndroClass: An Effective Method to Classify Android Applications by
                  Applying Deep Neural Networks to Comprehensive Features},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {1250359:1--1250359:21},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/1250359},
  doi          = {10.1155/2018/1250359},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/HamedaniSLCH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aike/JungKSLLCS18,
  author       = {Jaemin Jung and
                  Hyun{-}Jin Kim and
                  Dongjin Shin and
                  Myeonggeon Lee and
                  Hyunjae Lee and
                  Seong{-}je Cho and
                  Kyoungwon Suh},
  title        = {Android Malware Detection Based on Useful {API} Calls and Machine
                  Learning},
  booktitle    = {First {IEEE} International Conference on Artificial Intelligence and
                  Knowledge Engineering, {AIKE} 2018, Laguna Hills, CA, USA, September
                  26-28, 2018},
  pages        = {175--178},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AIKE.2018.00041},
  doi          = {10.1109/AIKE.2018.00041},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aike/JungKSLLCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icufn/LeeCPC18,
  author       = {Myeonggeon Lee and
                  Gwangjun Choi and
                  Junsang Park and
                  Seong{-}je Cho},
  title        = {Study of Analyzing and Mitigating Vulnerabilities in uC/OS Real-Time
                  Operating System},
  booktitle    = {Tenth International Conference on Ubiquitous and Future Networks,
                  {ICUFN} 2018, Prague, Czech Republic, July 3-6, 2018},
  pages        = {834--836},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICUFN.2018.8436965},
  doi          = {10.1109/ICUFN.2018.8436965},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icufn/LeeCPC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/JungCCHPH18,
  author       = {Jaemin Jung and
                  Jongmoo Choi and
                  Seong{-}je Cho and
                  Sangchul Han and
                  Minkyu Park and
                  Young{-}Sup Hwang},
  editor       = {Chih{-}Cheng Hung and
                  Lamjed Ben Said},
  title        = {Android malware detection using convolutional neural networks and
                  data section images},
  booktitle    = {Proceedings of the 2018 Conference on Research in Adaptive and Convergent
                  Systems, {RACS} 2018, Honolulu, HI, USA, October 09-12, 2018},
  pages        = {149--153},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264746.3264780},
  doi          = {10.1145/3264746.3264780},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/JungCCHPH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/OhCCKYC18,
  author       = {Myonghoon Oh and
                  Jongmoo Choi and
                  Seong{-}je Cho and
                  Jeesoo Kim and
                  Changhwan Youn and
                  Woosuk Chung},
  editor       = {Hisham M. Haddad and
                  Roger L. Wainwright and
                  Richard Chbeir},
  title        = {Analyzing and modeling the impact of memory latency and bandwidth
                  on application performance},
  booktitle    = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing,
                  {SAC} 2018, Pau, France, April 09-13, 2018},
  pages        = {1095--1101},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3167132.3167249},
  doi          = {10.1145/3167132.3167249},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/OhCCKYC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/LimJCCPHJ17,
  author       = {Kyeonghwan Lim and
                  Jaemin Jeong and
                  Seong{-}je Cho and
                  Jongmoo Choi and
                  Minkyu Park and
                  Sangchul Han and
                  Seongtae Jhang},
  title        = {An Anti-Reverse Engineering Technique using Native code and Obfuscator-LLVM
                  for Android Applications},
  booktitle    = {Proceedings of the International Conference on Research in Adaptive
                  and Convergent Systems, {RACS} 2017, Krakow, Poland, September 20-23,
                  2017},
  pages        = {217--221},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3129676.3129708},
  doi          = {10.1145/3129676.3129708},
  timestamp    = {Tue, 06 Nov 2018 11:07:49 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/LimJCCPHJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/SonKCCBJPK17,
  author       = {Juhyung Son and
                  Sungmin Koo and
                  Jongmoo Choi and
                  Seong{-}je Cho and
                  Seungjae Baek and
                  Gwangil Jeon and
                  Jun{-}Hyeok Park and
                  Hyoung{-}Chun Kim},
  editor       = {Ahmed Seffah and
                  Birgit Penzenstadler and
                  Carina Alves and
                  Xin Peng},
  title        = {Quantitative analysis of measurement overhead for integrity verification},
  booktitle    = {Proceedings of the Symposium on Applied Computing, {SAC} 2017, Marrakech,
                  Morocco, April 3-7, 2017},
  pages        = {1528--1533},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3019612.3019738},
  doi          = {10.1145/3019612.3019738},
  timestamp    = {Wed, 01 Feb 2023 17:58:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/SonKCCBJPK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/LeeKPC16,
  author       = {Hwan{-}taek Lee and
                  Dongjin Kim and
                  Minkyu Park and
                  Seong{-}je Cho},
  title        = {Protecting data on android platform against privilege escalation attack},
  journal      = {Int. J. Comput. Math.},
  volume       = {93},
  number       = {2},
  pages        = {401--414},
  year         = {2016},
  url          = {https://doi.org/10.1080/00207160.2014.986113},
  doi          = {10.1080/00207160.2014.986113},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/LeeKPC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/KimSCPH16,
  author       = {Nak Young Kim and
                  Jaewoo Shim and
                  Seong{-}je Cho and
                  Minkyu Park and
                  Sangchul Han},
  title        = {Android Application Protection against Static Reverse Engineering
                  based on Multidexing},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {54--64},
  year         = {2016},
  url          = {https://doi.org/10.22667/JISIS.2016.11.31.054},
  doi          = {10.22667/JISIS.2016.11.31.054},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/KimSCPH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LimJCPH16,
  author       = {Kyeonghwan Lim and
                  Younsik Jeong and
                  Seong{-}je Cho and
                  Minkyu Park and
                  Sangchul Han},
  title        = {An Android Application Protection Scheme against Dynamic Reverse Engineering
                  Attacks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {3},
  pages        = {40--52},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.09.31.040},
  doi          = {10.22667/JOWUA.2016.09.31.040},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LimJCPH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/KimKCPHLH16,
  author       = {Dongjin Kim and
                  Yesol Kim and
                  Seong{-}je Cho and
                  Minkyu Park and
                  Sangchul Han and
                  Guk{-}seon Lee and
                  Young{-}Sup Hwang},
  title        = {An effective and intelligent Windows application filtering system
                  using software similarity},
  journal      = {Soft Comput.},
  volume       = {20},
  number       = {5},
  pages        = {1821--1827},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00500-015-1678-5},
  doi          = {10.1007/S00500-015-1678-5},
  timestamp    = {Wed, 22 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/KimKCPHLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/ChoKCCPH16,
  author       = {Sangwook Cho and
                  Gyoosik Kim and
                  Seong{-}je Cho and
                  Jongmoo Choi and
                  Minkyu Park and
                  Sangchul Han},
  title        = {Runtime Input Validation for Java Web Applications using Static Bytecode
                  Instrumentation},
  booktitle    = {Proceedings of the International Conference on Research in Adaptive
                  and Convergent Systems, {RACS} 2016, Odense, Denmark, October 11-14,
                  2016},
  pages        = {148--152},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2987386.2987432},
  doi          = {10.1145/2987386.2987432},
  timestamp    = {Tue, 06 Nov 2018 11:07:49 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/ChoKCCPH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KimLYBCC16,
  author       = {Haecheon Kim and
                  Seungmin Lim and
                  Junkee Yoon and
                  Seungjae Baek and
                  Jongmoo Choi and
                  Seong{-}je Cho},
  editor       = {Sascha Ossowski},
  title        = {Analysis of micro-architecture resources interference on multicore
                  {NUMA} systems},
  booktitle    = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing,
                  Pisa, Italy, April 4-8, 2016},
  pages        = {1871--1876},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2851613.2851742},
  doi          = {10.1145/2851613.2851742},
  timestamp    = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/KimLYBCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ParkKJCHP15,
  author       = {Jonghwa Park and
                  Hyojung Kim and
                  Younsik Jeong and
                  Seong{-}je Cho and
                  Sangchul Han and
                  Minkyu Park},
  title        = {Effects of Code Obfuscation on Android App Similarity Analysis},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {4},
  pages        = {86--98},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.12.31.086},
  doi          = {10.22667/JOWUA.2015.12.31.086},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ParkKJCHP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ChaeKCK15,
  author       = {Dong{-}Kyu Chae and
                  Sang{-}Wook Kim and
                  Seong{-}je Cho and
                  Yesol Kim},
  title        = {Effective and efficient detection of software theft via dynamic {API}
                  authority vectors},
  journal      = {J. Syst. Softw.},
  volume       = {110},
  pages        = {1--9},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jss.2015.08.018},
  doi          = {10.1016/J.JSS.2015.08.018},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/ChaeKCK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/ChaeKCK15,
  author       = {Dong{-}Kyu Chae and
                  Sang{-}Wook Kim and
                  Seong{-}je Cho and
                  Yesol Kim},
  editor       = {James Bailey and
                  Alistair Moffat and
                  Charu C. Aggarwal and
                  Maarten de Rijke and
                  Ravi Kumar and
                  Vanessa Murdock and
                  Timos K. Sellis and
                  Jeffrey Xu Yu},
  title        = {{DAAV:} Dynamic {API} Authority Vectors for Detecting Software Theft},
  booktitle    = {Proceedings of the 24th {ACM} International Conference on Information
                  and Knowledge Management, {CIKM} 2015, Melbourne, VIC, Australia,
                  October 19 - 23, 2015},
  pages        = {1819--1822},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2806416.2806646},
  doi          = {10.1145/2806416.2806646},
  timestamp    = {Mon, 26 Apr 2021 09:27:03 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/ChaeKCK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/KimPCNHP15,
  author       = {Yesol Kim and
                  Jonghyuk Park and
                  Seong{-}je Cho and
                  Yunmook Nah and
                  Sangchul Han and
                  Minkyu Park},
  editor       = {Esmaeil S. Nadimi and
                  Tom{\'{a}}s Cern{\'{y}} and
                  Sung{-}Ryul Kim and
                  Wei Wang},
  title        = {Machine learning-based software classification scheme for efficient
                  program similarity analysis},
  booktitle    = {Proceedings of the 2015 Conference on research in adaptive and convergent
                  systems, {RACS} 2015, Prague, Czech Republic, October 9-12, 2015},
  pages        = {114--118},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2811411.2811549},
  doi          = {10.1145/2811411.2811549},
  timestamp    = {Tue, 06 Nov 2018 11:07:49 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/KimPCNHP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsis/HanCCYWNP14,
  author       = {Yongman Han and
                  JongCheon Choi and
                  Seong{-}je Cho and
                  Haeyoung Yoo and
                  Jinwoon Woo and
                  Yunmook Nah and
                  Minkyu Park},
  title        = {A new detection scheme of software copyright infringement using software
                  birthmark on windows systems},
  journal      = {Comput. Sci. Inf. Syst.},
  volume       = {11},
  number       = {3},
  pages        = {1055--1069},
  year         = {2014},
  url          = {https://doi.org/10.2298/CSIS130918064H},
  doi          = {10.2298/CSIS130918064H},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsis/HanCCYWNP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/KimCHPY14,
  author       = {Dongjin Kim and
                  Seong{-}je Cho and
                  Sangchul Han and
                  Minkyu Park and
                  Ilsun You},
  title        = {Open Source Software Detection using Function-level Static Software
                  Birthmark},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {25--37},
  year         = {2014},
  url          = {https://doi.org/10.22667/JISIS.2014.11.31.025},
  doi          = {10.22667/JISIS.2014.11.31.025},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/KimCHPY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/LeeKCCP14,
  author       = {Chanhee Lee and
                  Jonghwa Kim and
                  Seong{-}je Cho and
                  Jongmoo Choi and
                  Yeongung Park},
  title        = {Unified security enhancement framework for the Android operating system},
  journal      = {J. Supercomput.},
  volume       = {67},
  number       = {3},
  pages        = {738--756},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11227-013-0991-y},
  doi          = {10.1007/S11227-013-0991-Y},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/LeeKCCP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuimc/KimMCCPHC14,
  author       = {Dongjin Kim and
                  Jeongoh Moon and
                  Seong{-}je Cho and
                  Jongmoo Choi and
                  Minkyu Park and
                  Sangchul Han and
                  Lawrence Chung},
  editor       = {Suk{-}Han Lee and
                  Sang{-}Wook Kim and
                  Lajos Hanzo and
                  Roslan Ismail},
  title        = {A birthmark-based method for intellectual software asset management},
  booktitle    = {The 8th International Conference on Ubiquitous Information Management
                  and Communication, {ICUIMC} '14, Siem Reap, Cambodia - January 09
                  - 11, 2014},
  pages        = {39:1--39:6},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2557977.2558062},
  doi          = {10.1145/2557977.2558062},
  timestamp    = {Thu, 23 May 2019 16:33:14 +0200},
  biburl       = {https://dblp.org/rec/conf/icuimc/KimMCCPHC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/KimMCPH14,
  author       = {Yesol Kim and
                  Jeongoh Moon and
                  Seong{-}je Cho and
                  Minkyu Park and
                  Sangchul Han},
  title        = {Efficient Identification of Windows Executable Programs to Prevent
                  Software Piracy},
  booktitle    = {Eighth International Conference on Innovative Mobile and Internet
                  Services in Ubiquitous Computing, {IMIS} 2014, Birmingham, United
                  Kingdom, 2-4 July, 2014},
  pages        = {236--240},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IMIS.2014.29},
  doi          = {10.1109/IMIS.2014.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/KimMCPH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/KimKMCWY14,
  author       = {Dongjin Kim and
                  Yesol Kim and
                  Jeongoh Moon and
                  Seong{-}je Cho and
                  Jinwoon Woo and
                  Ilsun You},
  title        = {Identifying Windows Installer Package Files for Detection of Pirated
                  Software},
  booktitle    = {Eighth International Conference on Innovative Mobile and Internet
                  Services in Ubiquitous Computing, {IMIS} 2014, Birmingham, United
                  Kingdom, 2-4 July, 2014},
  pages        = {287--290},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IMIS.2014.36},
  doi          = {10.1109/IMIS.2014.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/KimKMCWY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/KangSCPH14,
  author       = {SeongWook Kang and
                  Hyungjoon Shim and
                  Seong{-}je Cho and
                  Minkyu Park and
                  Sangchul Han},
  editor       = {Chao Lu and
                  Esmaeil S. Nadimi and
                  Sung{-}Ryul Kim and
                  Wei Wang},
  title        = {A robust and efficient birthmark-based android application filtering
                  system},
  booktitle    = {Proceedings of the 2014 Conference on Research in Adaptive and Convergent
                  Systems, {RACS} 2014, Towson, Maryland, USA, October 5-8, 2014},
  pages        = {253--257},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663761.2664231},
  doi          = {10.1145/2663761.2664231},
  timestamp    = {Tue, 06 Nov 2018 11:07:49 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/KangSCPH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BaeCPJKC14,
  author       = {Duck{-}Ho Bae and
                  Ji{-}Woong Chang and
                  Se{-}Mi Park and
                  Byeong{-}Soo Jeong and
                  Sang{-}Wook Kim and
                  Seong{-}je Cho},
  editor       = {Yookun Cho and
                  Sung Y. Shin and
                  Sang{-}Wook Kim and
                  Chih{-}Cheng Hung and
                  Jiman Hong},
  title        = {An effective data clustering method based on expected update time
                  in flash memory environment},
  booktitle    = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of
                  Korea - March 24 - 28, 2014},
  pages        = {1492--1497},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2554850.2554900},
  doi          = {10.1145/2554850.2554900},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/BaeCPJKC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/JeongLCHP14,
  author       = {Younsik Jeong and
                  Hwan{-}taek Lee and
                  Seong{-}je Cho and
                  Sangchul Han and
                  Minkyu Park},
  editor       = {Yookun Cho and
                  Sung Y. Shin and
                  Sang{-}Wook Kim and
                  Chih{-}Cheng Hung and
                  Jiman Hong},
  title        = {A kernel-based monitoring approach for analyzing malicious behavior
                  on Android},
  booktitle    = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of
                  Korea - March 24 - 28, 2014},
  pages        = {1737--1738},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2554850.2559915},
  doi          = {10.1145/2554850.2559915},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/JeongLCHP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jips/HwangKMC13,
  author       = {Young{-}Sup Hwang and
                  Jin Baek Kwon and
                  Jae Chan Moon and
                  Seong Je Cho},
  title        = {Classifying Malicious Web Pages by Using an Adaptive Support Vector
                  Machine},
  journal      = {J. Inf. Process. Syst.},
  volume       = {9},
  number       = {3},
  pages        = {395--404},
  year         = {2013},
  url          = {https://doi.org/10.3745/JIPS.2013.9.3.395},
  doi          = {10.3745/JIPS.2013.9.3.395},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jips/HwangKMC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/LeePC13,
  author       = {Hwan{-}taek Lee and
                  Minkyu Park and
                  Seong{-}je Cho},
  title        = {Detection and prevention of LeNa Malware on Android},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {63--71},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.11.31.063},
  doi          = {10.22667/JISIS.2013.11.31.063},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/LeePC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuimc/ChoiPCCH13,
  author       = {Yongsuk Choi and
                  Yeongseong Park and
                  Jongmoo Choi and
                  Seong{-}je Cho and
                  Hwansoo Han},
  title        = {{RAMC:} runtime abstract memory context based plagiarism detection
                  in binary code},
  booktitle    = {The 7th International Conference on Ubiquitous Information Management
                  and Communication, {ICUIMC} '13, Kota Kinabalu, Malaysia - January
                  17 - 19, 2013},
  pages        = {67},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2448556.2448623},
  doi          = {10.1145/2448556.2448623},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icuimc/ChoiPCCH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuimc/ParkKCHCC13,
  author       = {Seongsoo Park and
                  Seungcheol Ko and
                  Jungsik Choi and
                  Hwansoo Han and
                  Seong{-}je Cho and
                  Jongmoo Choi},
  title        = {Detecting source code similarity using code abstraction},
  booktitle    = {The 7th International Conference on Ubiquitous Information Management
                  and Communication, {ICUIMC} '13, Kota Kinabalu, Malaysia - January
                  17 - 19, 2013},
  pages        = {74},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2448556.2448630},
  doi          = {10.1145/2448556.2448630},
  timestamp    = {Fri, 30 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icuimc/ParkKCHCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/ChoiHCYWPSC13,
  author       = {JongCheon Choi and
                  Yongman Han and
                  Seong{-}je Cho and
                  Haeyoung Yoo and
                  Jinwoon Woo and
                  Minkyu Park and
                  Youngsang Song and
                  Lawrence Chung},
  editor       = {Leonard Barolli and
                  Ilsun You and
                  Fatos Xhafa and
                  Fang{-}Yie Leu and
                  Hsing{-}Chung Chen},
  title        = {A Static Birthmark for {MS} Windows Applications Using Import Address
                  Table},
  booktitle    = {Seventh International Conference on Innovative Mobile and Internet
                  Services in Ubiquitous Computing, {IMIS} 2013, Taichung, Taiwan, July
                  3-5, 2013},
  pages        = {129--134},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/IMIS.2013.159},
  doi          = {10.1109/IMIS.2013.159},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/ChoiHCYWPSC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/ChoiHCYPHYS13,
  author       = {JongCheon Choi and
                  Yongman Han and
                  Seong{-}je Cho and
                  Haeyoung Yoo and
                  Minkyu Park and
                  Sangchul Han and
                  Ilsun You and
                  Inshik Song},
  editor       = {Leonard Barolli and
                  Ilsun You and
                  Fatos Xhafa and
                  Fang{-}Yie Leu and
                  Hsing{-}Chung Chen},
  title        = {A Survey of Feature Extraction Techniques to Detect the Theft of Windows
                  Applications},
  booktitle    = {Seventh International Conference on Innovative Mobile and Internet
                  Services in Ubiquitous Computing, {IMIS} 2013, Taichung, Taiwan, July
                  3-5, 2013},
  pages        = {723--728},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/IMIS.2013.131},
  doi          = {10.1109/IMIS.2013.131},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/ChoiHCYPHYS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/KimMKJCPH13,
  author       = {Yesol Kim and
                  Jeongoh Moon and
                  Dongjin Kim and
                  Younsik Jeong and
                  Seong{-}je Cho and
                  Minkyu Park and
                  Sangchul Han},
  editor       = {Leonard Barolli and
                  Ilsun You and
                  Fatos Xhafa and
                  Fang{-}Yie Leu and
                  Hsing{-}Chung Chen},
  title        = {A Static Birthmark of Windows Binary Executables Based on Strings},
  booktitle    = {Seventh International Conference on Innovative Mobile and Internet
                  Services in Ubiquitous Computing, {IMIS} 2013, Taichung, Taiwan, July
                  3-5, 2013},
  pages        = {734--738},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/IMIS.2013.30},
  doi          = {10.1109/IMIS.2013.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/KimMKJCPH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/JeongCPKSKHP13,
  author       = {Younsik Jeong and
                  Seong{-}je Cho and
                  Moonju Park and
                  Jeonguk Ko and
                  Hyungjoon Shim and
                  Joonmo Kim and
                  Sangchul Han and
                  Minkyu Park},
  editor       = {Ching Y. Suen and
                  Amir G. Aghdam and
                  Minyi Guo and
                  Jiman Hong and
                  Esmaeil S. Nadimi},
  title        = {An efficient protection scheme of digital contents under mobile devices},
  booktitle    = {Research in Adaptive and Convergent Systems, RACS'13, Montreal, QC,
                  Canada, October 1-4, 2013},
  pages        = {306--311},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2513228.2513270},
  doi          = {10.1145/2513228.2513270},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/JeongCPKSKHP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/KoSKJCPHK13,
  author       = {Jeonguk Ko and
                  Hyungjoon Shim and
                  Dongjin Kim and
                  Younsik Jeong and
                  Seong{-}je Cho and
                  Minkyu Park and
                  Sangchul Han and
                  Seong Baeg Kim},
  editor       = {Ching Y. Suen and
                  Amir G. Aghdam and
                  Minyi Guo and
                  Jiman Hong and
                  Esmaeil S. Nadimi},
  title        = {Measuring similarity of android applications via reversing and K-gram
                  birthmarking},
  booktitle    = {Research in Adaptive and Convergent Systems, RACS'13, Montreal, QC,
                  Canada, October 1-4, 2013},
  pages        = {336--341},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2513228.2513308},
  doi          = {10.1145/2513228.2513308},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/KoSKJCPHK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KimHCYWNPC13,
  author       = {Dongjin Kim and
                  Yongman Han and
                  Seong{-}je Cho and
                  Haeyoung Yoo and
                  Jinwoon Woo and
                  Yunmook Nah and
                  Minkyu Park and
                  Lawrence Chung},
  editor       = {Sung Y. Shin and
                  Jos{\'{e}} Carlos Maldonado},
  title        = {Measuring similarity of windows applications using static and dynamic
                  birthmarks},
  booktitle    = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing,
                  {SAC} '13, Coimbra, Portugal, March 18-22, 2013},
  pages        = {1628--1633},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480362.2480666},
  doi          = {10.1145/2480362.2480666},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/KimHCYWNPC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/KimKCPP12,
  author       = {HongGeun Kim and
                  Dongjin Kim and
                  Seong{-}je Cho and
                  Moonju Park and
                  Minkyu Park},
  title        = {Efficient Detection of Malicious Web Pages Using High-Interaction
                  Client Honeypots},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {28},
  number       = {5},
  pages        = {911--924},
  year         = {2012},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2012/201209\_06.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/KimKCPP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ParkLKCC12,
  author       = {Yeongung Park and
                  Chanhee Lee and
                  Jonghwa Kim and
                  Seong{-}je Cho and
                  Jongmoo Choi},
  title        = {An Android Security Extension to Protect Personal Information against
                  Illegal Accesses and Privilege Escalation Attacks},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {2},
  number       = {3/4},
  pages        = {29--42},
  year         = {2012},
  url          = {https://doi.org/10.22667/JISIS.2012.11.31.029},
  doi          = {10.22667/JISIS.2012.11.31.029},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ParkLKCC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/ParkLLLHPC12,
  author       = {Yeongung Park and
                  Choonghyun Lee and
                  Chanhee Lee and
                  JiHyeog Lim and
                  Sangchul Han and
                  Minkyu Park and
                  Seong{-}je Cho},
  editor       = {Engin Kirda},
  title        = {RGBDroid: {A} Novel Response-Based Approach to Android Privilege Escalation
                  Attacks},
  booktitle    = {5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '12, San Jose, CA, USA, April 24, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/leet12/workshop-program/presentation/park},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/leet/ParkLLLHPC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/npc/LeeWCPW12,
  author       = {Taeseung Lee and
                  Giyoun Won and
                  Seongje Cho and
                  Namje Park and
                  Dongho Won},
  editor       = {James J. Park and
                  Albert Y. Zomaya and
                  Sang{-}Soo Yeo and
                  Sartaj Sahni},
  title        = {Detection and Mitigation of Web Application Vulnerabilities Based
                  on Security Testing},
  booktitle    = {Network and Parallel Computing, 9th {IFIP} International Conference,
                  {NPC} 2012, Gwangju, Korea, September 6-8, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7513},
  pages        = {138--144},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35606-3\_16},
  doi          = {10.1007/978-3-642-35606-3\_16},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/npc/LeeWCPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/JeongPMCKP12,
  author       = {Younsik Jeong and
                  Yeong{-}Ung Park and
                  Jae{-}Chan Moon and
                  Seong{-}je Cho and
                  Dongjin Kim and
                  Minkyu Park},
  editor       = {Yookun Cho and
                  Rex E. Gantenbein and
                  Tei{-}Wei Kuo and
                  Vahid Tarokh},
  title        = {An anti-piracy mechanism based on class separation and dynamic loading
                  for Android applications},
  booktitle    = {Research in Applied Computation Symposium, {RACS} '12, San Antonio,
                  TX, USA, October 23-26, 2012},
  pages        = {328--332},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2401603.2401674},
  doi          = {10.1145/2401603.2401674},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/JeongPMCKP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/JungJCHJCJK12,
  author       = {Jinman Jung and
                  Joonhyouk Jang and
                  Yookun Cho and
                  Hwansoo Han and
                  Gwangil Jeon and
                  Seong{-}je Cho and
                  Minwoo Jang and
                  Jung{-}Yeop Kim},
  editor       = {Sascha Ossowski and
                  Paola Lecca},
  title        = {A fast mount mechanism for {YAFFS2}},
  booktitle    = {Proceedings of the {ACM} Symposium on Applied Computing, {SAC} 2012,
                  Riva, Trento, Italy, March 26-30, 2012},
  pages        = {1791--1795},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2245276.2232067},
  doi          = {10.1145/2245276.2232067},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/JungJCHJCJK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/KimKCPP11,
  author       = {HongGeun Kim and
                  Dong{-}Jin Kim and
                  Seong{-}je Cho and
                  Moonju Park and
                  Minkyu Park},
  editor       = {Rex E. Gantenbein and
                  Tei{-}Wei Kuo},
  title        = {An efficient visitation algorithm to improve the detection speed of
                  high-interaction client honeypots},
  booktitle    = {Research in Applied Computation Symposium, {RACS} '11, Miami, FL,
                  USA, October 19-22, 2011},
  pages        = {266--271},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2103380.2103435},
  doi          = {10.1145/2103380.2103435},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/KimKCPP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/KimPHPPCC10,
  author       = {Heeheon Kim and
                  Xuefeng Piao and
                  Sangchul Han and
                  Moonju Park and
                  Minkyu Park and
                  Seongje Cho and
                  Yookun Cho},
  title        = {Improving responsiveness of soft aperiodic tasks using proportional
                  slack time},
  journal      = {Comput. Electr. Eng.},
  volume       = {36},
  number       = {5},
  pages        = {913--926},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.compeleceng.2009.12.012},
  doi          = {10.1016/J.COMPELECENG.2009.12.012},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/KimPHPPCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isorc/KimLCCPPW10,
  author       = {Min{-}Jae Kim and
                  Jin{-}Young Lee and
                  Hyeyoung Chang and
                  Seongje Cho and
                  Yongsu Park and
                  Minkyu Park and
                  Philip A. Wilsey},
  title        = {Design and Performance Evaluation of Binary Code Packing for Protecting
                  Embedded Software against Reverse Engineering},
  booktitle    = {13th {IEEE} International Symposium on Object/Component/Service-Oriented
                  Real-Time Distributed Computing, {ISORC} 2010, Carmona, Sevilla, Spain,
                  5-6 May 2010},
  pages        = {80--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISORC.2010.23},
  doi          = {10.1109/ISORC.2010.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isorc/KimLCCPPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icess/PiaoKCPHPC09,
  author       = {Xuefeng Piao and
                  Heeheon Kim and
                  Yookun Cho and
                  Moonju Park and
                  Sangchul Han and
                  Minkyu Park and
                  Seongje Cho},
  editor       = {Tianzhou Chen and
                  Dimitrios N. Serpanos and
                  Walid Taha},
  title        = {Energy Consumption Optimization of Real-Time Embedded Systems},
  booktitle    = {International Conference on Embedded Software and Systems, {ICESS}
                  '09, Hangzhou, Zhejiang, P. R. China, May 25-27, 2009},
  pages        = {281--287},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICESS.2009.43},
  doi          = {10.1109/ICESS.2009.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icess/PiaoKCPHPC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seus/ChoCC08,
  author       = {Seongje Cho and
                  Hyeyoung Chang and
                  Yookun Cho},
  editor       = {Uwe Brinkschulte and
                  Tony Givargis and
                  Stefano Russo},
  title        = {Implementation of an Obfuscation Tool for {C/C++} Source Code Protection
                  on the XScale Architecture},
  booktitle    = {Software Technologies for Embedded and Ubiquitous Systems, 6th {IFIP}
                  {WG} 10.2 International Workshop, {SEUS} 2008, Anacarpi, Capri Island,
                  Italy, October 1-3, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5287},
  pages        = {406--416},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87785-1\_36},
  doi          = {10.1007/978-3-540-87785-1\_36},
  timestamp    = {Wed, 22 Mar 2023 16:53:33 +0100},
  biburl       = {https://dblp.org/rec/conf/seus/ChoCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/LeeCKC07,
  author       = {YongSuk Lee and
                  WoongChul Choi and
                  SukJoong Kang and
                  Seongje Cho},
  editor       = {Mieso K. Denko and
                  Chi{-}Sheng Shih and
                  Kuan{-}Ching Li and
                  Shiao{-}Li Tsao and
                  Qing{-}An Zeng and
                  Soo{-}Hyun Park and
                  Young{-}Bae Ko and
                  Shih{-}Hao Hung and
                  Jong Hyuk Park},
  title        = {Multi-channel Enhancements for {IEEE} 802.11-Based Multi-hop Ad-Hoc
                  Wireless Networks},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007
                  Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei,
                  Taiwan, December 17-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4809},
  pages        = {82--92},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77090-9\_8},
  doi          = {10.1007/978-3-540-77090-9\_8},
  timestamp    = {Wed, 22 Jun 2022 09:02:26 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/LeeCKC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KimHC07,
  author       = {HongGeun Kim and
                  Jungkyu Han and
                  Seongje Cho},
  editor       = {Yookun Cho and
                  Roger L. Wainwright and
                  Hisham Haddad and
                  Sung Y. Shin and
                  Yong Wan Koo},
  title        = {An efficient implementation of {RC4} cipher for encrypting multimedia
                  files on mobile devices},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Applied Computing (SAC),
                  Seoul, Korea, March 11-15, 2007},
  pages        = {1171--1175},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1244002.1244256},
  doi          = {10.1145/1244002.1244256},
  timestamp    = {Sun, 02 Jun 2019 21:18:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/KimHC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LeeCCC06,
  author       = {Seungwon Lee and
                  Seongje Cho and
                  Jongmoo Choi and
                  Yookun Cho},
  title        = {Efficient Identification of Bad Signatures in RSA-Type Batch Signature},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {1},
  pages        = {74--80},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.1.74},
  doi          = {10.1093/IETFEC/E89-A.1.74},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LeeCCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HanKPPCC06,
  author       = {Sangchul Han and
                  Heeheon Kim and
                  Xuefeng Piao and
                  Minkyu Park and
                  Seongje Cho and
                  Yookun Cho},
  title        = {Finish Time Predictability of Earliest Deadline Zero Laxity Algorithm
                  for Multiprocessor Real-Time Systems},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {89-D},
  number       = {12},
  pages        = {2981--2984},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietisy/e89-d.12.2981},
  doi          = {10.1093/IETISY/E89-D.12.2981},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HanKPPCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isorc/PiaoHKPCC06,
  author       = {Xuefeng Piao and
                  Sangchul Han and
                  Heeheon Kim and
                  Minkyu Park and
                  Yookun Cho and
                  Seongje Cho},
  title        = {Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor
                  Real-Time Systems},
  booktitle    = {Ninth {IEEE} International Symposium on Object-Oriented Real-Time
                  Distributed Computing {(ISORC} 2006), 24-26 April 2006, Gyeongju,
                  Korea},
  pages        = {359--364},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISORC.2006.64},
  doi          = {10.1109/ISORC.2006.64},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isorc/PiaoHKPCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ParkHKCC05,
  author       = {Minkyu Park and
                  Sangchul Han and
                  Heeheon Kim and
                  Seongje Cho and
                  Yookun Cho},
  title        = {Comparison of Deadline-Based Scheduling Algorithms for Periodic Real-Time
                  Tasks on Multiprocessor},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {88-D},
  number       = {3},
  pages        = {658--661},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-d\_3\_658\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ParkHKCC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LeeCCC05,
  author       = {Seungwon Lee and
                  Seongje Cho and
                  Jongmoo Choi and
                  Yookun Cho},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {Batch Verification with DSA-Type Digital Signatures for Ubiquitous
                  Computing},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {125--130},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_18},
  doi          = {10.1007/11596981\_18},
  timestamp    = {Tue, 23 Feb 2021 17:25:41 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LeeCCC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChoCKC05,
  author       = {Seongje Cho and
                  Hyeyoung Chang and
                  HongGeun Kim and
                  WoongChul Choi},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {\emph{SoIDPS}: Sensor Objects-Based Intrusion Detection and Prevention
                  System and Its Implementation},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {260--266},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_38},
  doi          = {10.1007/11596981\_38},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/ChoCKC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/ParkHKCC04,
  author       = {Minkyu Park and
                  Sangchul Han and
                  Heeheon Kim and
                  Seongje Cho and
                  Yookun Cho},
  editor       = {Laurence Tianruo Yang and
                  Minyi Guo and
                  Guang R. Gao and
                  Niraj K. Jha},
  title        = {Comparison of Tie-Breaking Policies for Real-Time Scheduling on Multiprocessor},
  booktitle    = {Embedded and Ubiquitous Computing, International Conference {EUC}
                  2004, Aizu-Wakamatsu City, Japan, August 25-27, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3207},
  pages        = {174--182},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30121-9\_17},
  doi          = {10.1007/978-3-540-30121-9\_17},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/ParkHKCC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/human/ChoCKC03,
  author       = {Seongje Cho and
                  Chulyean Chang and
                  Joonmo Kim and
                  Jongmoo Choi},
  editor       = {Chin{-}Wan Chung and
                  Chong{-}kwon Kim and
                  Won Kim and
                  Tok Wang Ling and
                  Kwan Ho Song},
  title        = {A Study on Monitoring and Protecting Computer System against Interception
                  Threat},
  booktitle    = {Web Communication Technologies and Internet-Related Social Issues
                  - {HSI} 2003, Second International Conference on Human Society@Internet,
                  Seoul, Korea, June 18-20, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2713},
  pages        = {96--105},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45036-X\_10},
  doi          = {10.1007/3-540-45036-X\_10},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/human/ChoCKC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics