


default search action
Taegyu Kim
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Dohyun Ryu, Giyeol Kim
, Daeun Lee
, Seongjin Kim
, Seungjin Bae
, Junghwan Rhee
, Taegyu Kim
:
Differential Fuzzing for Data Distribution Service Programs with Dynamic Configuration. ASE 2024: 807-818 - [c14]Changyul Lee
, Deokjin Kim
, Giyeol Kim
, Sangwook Lee
, Taegyu Kim
:
LTA: Control-Driven UAV Testing and Bug Localization with Flight Record Decomposition. SenSys 2024: 450-463 - 2022
- [c13]Sungwoo Kim
, Gisu Yeo, Taegyu Kim, Junghwan John Rhee, Yuseok Jeon, Antonio Bianchi, Dongyan Xu, Dave (Jing) Tian:
ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs. AsiaCCS 2022: 534-545 - [c12]Taegyu Kim, Aolin Ding, Sriharsha Etigowni, Pengfei Sun, Jizhou Chen, Luis Garcia, Saman A. Zonouz, Dongyan Xu, Dave (Jing) Tian:
Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch. MobiSys 2022: 69-83 - [c11]Kyungtae Kim, Taegyu Kim, Ertza Warraich, Byoungyoung Lee, Kevin R. B. Butler, Antonio Bianchi, Dave Jing Tian:
FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks. SP 2022: 2212-2229 - [c10]Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, Antonio Bianchi, Dongyan Xu:
DnD: A Cross-Architecture Deep Neural Network Decompiler. USENIX Security Symposium 2022: 2135-2152 - 2021
- [c9]Taegyu Kim, Vireshwar Kumar, Junghwan Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, Dave (Jing) Tian:
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications. USENIX Security Symposium 2021: 249-266 - 2020
- [c8]Taegyu Kim, Chung Hwan Kim, Altay Ozen, Fan Fei, Zhan Tu, Xiangyu Zhang, Xinyan Deng, Dave (Jing) Tian, Dongyan Xu:
From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY. USENIX Security Symposium 2020: 913-930
2010 – 2019
- 2019
- [c7]Taegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, Dongyan Xu:
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing. USENIX Security Symposium 2019: 425-442 - 2018
- [j2]Taegyu Kim, Jung-Hoon Cha, Jongchul Park:
Association between in-game performance parameters recorded via global positioning system and sports injuries to the lower extremities in elite female field hockey players. Clust. Comput. 21(1): 1069-1078 (2018) - [j1]Christopher N. Gutierrez
, Taegyu Kim, Raffaele Della Corte
, Jeffrey Avery, Dan Goldwasser, Marcello Cinque
, Saurabh Bagchi
:
Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks. IEEE Trans. Dependable Secur. Comput. 15(6): 988-1001 (2018) - [c6]Fan Fei, Zhan Tu
, Ruikun Yu, Taegyu Kim, Xiangyu Zhang, Dongyan Xu, Xinyan Deng:
Cross-Layer Retrofitting of UAVs Against Cyber-Physical Attacks. ICRA 2018: 550-557 - [c5]Chung Hwan Kim, Taegyu Kim, Hongjun Choi, Zhongshu Gu, Byoungyoung Lee, Xiangyu Zhang, Dongyan Xu:
Securing Real-Time Microcontroller Systems through Customized Memory View Switching. NDSS 2018 - 2017
- [c4]Taegyu Kim, Chung Hwan Kim
, Hongjun Choi
, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications. ACSAC 2017: 412-424 - 2015
- [c3]Taegyu Kim, Woomin Hwang, Chulmin Kim, Dong-Jae Shin, Ki-Woong Park, Kyu Ho Park:
Malfinder: Accelerated Malware Classification System through Filtering on Manycore System. ICISSP 2015: 17-26 - [c2]Taegyu Kim, Ki-Woong Park:
MalCore: Toward a Practical Malware Identification System Enhanced with Manycore Technology. ICISSP (Revised Selected Papers) 2015: 31-48 - 2014
- [c1]Taegyu Kim, Woomin Hwang, Ki-Woong Park, Kyu Ho Park:
I-Filter: Identical Structured Control Flow String filter for accelerated malware variant classification. ISBAST 2014: 225-231
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint