
Seong-je Cho
Person information
- affiliation: Dankook University, Yongin, Department of Computer Science & Engineering
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c44]Hyoil Han, SeungJin Lim, Kyoungwon Suh, Seonghyun Park, Seong-je Cho, Minkyu Park:
Enhanced Android Malware Detection: An SVM-Based Machine Learning Approach. BigComp 2020: 75-81
2010 – 2019
- 2019
- [j26]Byoung-chir Kim, Kyeonghwan Lim, Seong-je Cho
, Minkyu Park:
RomaDroid: A Robust and Efficient Technique for Detecting Android App Clones Using a Tree Structure and Components of Each App's Manifest File. IEEE Access 7: 72182-72196 (2019) - [j25]Jaemin Jung, Hyun-Jin Kim, Seong-je Cho, Sangchul Han, Kyoungwon Suh:
Efficient Android Malware Detection Using API Rank and Machine Learning. J. Internet Serv. Inf. Secur. 9(1): 48-59 (2019) - [j24]Minjae Park, Geunha You, Seong-je Cho, Minkyu Park, Sangchul Han:
A Framework for Identifying Obfuscation Techniques applied to Android Apps using Machine Learning. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(4): 22-30 (2019) - [j23]Masoud Reyhani Hamedani, Gyoosik Kim, Seong-je Cho
:
SimAndro: an effective method to compute similarity of Android applications. Soft Comput. 23(17): 7569-7590 (2019) - [c43]Jaemin Jung, Kyeonghwan Lim, Byoungchul Kim, Seong-je Cho, Sangchul Han, Kyoungwon Suh:
Detecting Malicious Android Apps using the Popularity and Relations of APIs. AIKE 2019: 309-312 - [c42]Anthony Opara, Youngsang Song, Seong-je Cho, Lawrence Chung:
Representing Multicloud Security and Privacy Policies and Detecting Potential Problems. ICSOC Workshops 2019: 57-68 - [c41]Byoungchul Kim, Jaemin Jung, Sangchul Han, Soyeon Jeon, Seong-je Cho, Jongmoo Choi:
A New Technique for Detecting Android App Clones Using Implicit Intent and Method Information. ICUFN 2019: 478-483 - [c40]Gunhee Choi, Juhyung Son, Jongmoo Choi, Seong-je Cho, Youjip Won:
HPanal: a framework for analyzing tradeoffs of huge pages. SAC 2019: 1438-1443 - 2018
- [j22]ThienLuan Ho, Seong-Je Cho, Seungrohk Oh:
Parallel multiple pattern matching schemes based on cuckoo filter for deep packet inspection on graphics processing units. IET Inf. Secur. 12(4): 381-388 (2018) - [j21]Seong-je Cho, Kyeonghwan Lim, Jungkyu Han, Byoung-chir Kim, Minkyu Park, Sangchul Han:
Open-Source Android App Detection considering the Effects of Code Obfuscation. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(3): 50-61 (2018) - [j20]Jaewoo Shim
, Kyeonghwan Lim
, Seong-je Cho, Sangchul Han, Minkyu Park
:
Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework. Secur. Commun. Networks 2018: 6280768:1-6280768:12 (2018) - [j19]Yesol Kim, Seong-je Cho
, Sangchul Han, Ilsun You:
A software classification scheme using binary-level characteristics for efficient software filtering. Soft Comput. 22(2): 595-606 (2018) - [j18]Masoud Reyhani Hamedani
, Dongjin Shin
, Myeonggeon Lee
, Seong-je Cho
, Changha Hwang
:
AndroClass: An Effective Method to Classify Android Applications by Applying Deep Neural Networks to Comprehensive Features. Wirel. Commun. Mob. Comput. 2018: 1250359:1-1250359:21 (2018) - [c39]Jaemin Jung, Hyun-Jin Kim, Dongjin Shin, Myeonggeon Lee, Hyunjae Lee, Seong-je Cho, Kyoungwon Suh:
Android Malware Detection Based on Useful API Calls and Machine Learning. AIKE 2018: 175-178 - [c38]Myeonggeon Lee, Gwangjun Choi, Junsang Park, Seong-je Cho:
Study of Analyzing and Mitigating Vulnerabilities in uC/OS Real-Time Operating System. ICUFN 2018: 834-836 - [c37]Jaemin Jung, Jongmoo Choi, Seong-je Cho, Sangchul Han, Minkyu Park, Young-Sup Hwang:
Android malware detection using convolutional neural networks and data section images. RACS 2018: 149-153 - [c36]Myonghoon Oh, Jongmoo Choi, Seong-je Cho, Jeesoo Kim, Changhwan Youn, Woosuk Chung:
Analyzing and modeling the impact of memory latency and bandwidth on application performance. SAC 2018: 1095-1101 - 2017
- [c35]Kyeonghwan Lim, Jaemin Jeong, Seong-je Cho, Jongmoo Choi, Minkyu Park, Sangchul Han, Seongtae Jhang:
An Anti-Reverse Engineering Technique using Native code and Obfuscator-LLVM for Android Applications. RACS 2017: 217-221 - [c34]Juhyung Son, Sungmin Koo, Jongmoo Choi, Seong-je Cho, Seungjae Baek, Gwangil Jeon, Jun-Hyeok Park, Hyoung-Chun Kim:
Quantitative analysis of measurement overhead for integrity verification. SAC 2017: 1528-1533 - 2016
- [j17]Hwan-taek Lee, Dongjin Kim, Minkyu Park, Seong-je Cho:
Protecting data on android platform against privilege escalation attack. Int. J. Comput. Math. 93(2): 401-414 (2016) - [j16]Nak Young Kim, Jaewoo Shim, Seong-je Cho, Minkyu Park, Sangchul Han:
Android Application Protection against Static Reverse Engineering based on Multidexing. J. Internet Serv. Inf. Secur. 6(4): 54-64 (2016) - [j15]Kyeonghwan Lim, Younsik Jeong, Seong-je Cho, Minkyu Park, Sangchul Han:
An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7(3): 40-52 (2016) - [j14]Dongjin Kim, Yesol Kim, Seong-je Cho, Minkyu Park, Sangchul Han, Guk-seon Lee, Young-Sup Hwang:
An effective and intelligent Windows application filtering system using software similarity. Soft Comput. 20(5): 1821-1827 (2016) - [c33]Sangwook Cho, Gyoosik Kim, Seong-je Cho, Jongmoo Choi, Minkyu Park, Sangchul Han:
Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation. RACS 2016: 148-152 - [c32]Haecheon Kim, Seungmin Lim, Junkee Yoon, Seungjae Baek, Jongmoo Choi, Seong-je Cho:
Analysis of micro-architecture resources interference on multicore NUMA systems. SAC 2016: 1871-1876 - 2015
- [j13]Jonghwa Park, Hyojung Kim, Younsik Jeong, Seong-je Cho, Sangchul Han, Minkyu Park:
Effects of Code Obfuscation on Android App Similarity Analysis. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(4): 86-98 (2015) - [j12]Dong-Kyu Chae, Sang-Wook Kim, Seong-je Cho, Yesol Kim:
Effective and efficient detection of software theft via dynamic API authority vectors. J. Syst. Softw. 110: 1-9 (2015) - [c31]Dong-Kyu Chae, Sang-Wook Kim, Seong-je Cho, Yesol Kim:
DAAV: Dynamic API Authority Vectors for Detecting Software Theft. CIKM 2015: 1819-1822 - [c30]Yesol Kim, Jonghyuk Park, Seong-je Cho, Yunmook Nah, Sangchul Han, Minkyu Park:
Machine learning-based software classification scheme for efficient program similarity analysis. RACS 2015: 114-118 - 2014
- [j11]Yongman Han, JongCheon Choi, Seong-je Cho, Haeyoung Yoo, Jinwoon Woo, Yunmook Nah, Minkyu Park:
A new detection scheme of software copyright infringement using software birthmark on windows systems. Comput. Sci. Inf. Syst. 11(3): 1055-1069 (2014) - [j10]Dongjin Kim, Seong-je Cho, Sangchul Han, Minkyu Park, Ilsun You:
Open Source Software Detection using Function-level Static Software Birthmark. J. Internet Serv. Inf. Secur. 4(4): 25-37 (2014) - [j9]Chanhee Lee, Jonghwa Kim, Seong-je Cho, Jongmoo Choi, Yeongung Park:
Unified security enhancement framework for the Android operating system. J. Supercomput. 67(3): 738-756 (2014) - [c29]Dongjin Kim, Jeongoh Moon, Seong-je Cho, Jongmoo Choi, Minkyu Park, Sangchul Han, Lawrence Chung:
A birthmark-based method for intellectual software asset management. ICUIMC 2014: 39:1-39:6 - [c28]Yesol Kim, Jeongoh Moon, Seong-je Cho, Minkyu Park, Sangchul Han:
Efficient Identification of Windows Executable Programs to Prevent Software Piracy. IMIS 2014: 236-240 - [c27]Dongjin Kim, Yesol Kim, Jeongoh Moon, Seong-je Cho, Jinwoon Woo, Ilsun You:
Identifying Windows Installer Package Files for Detection of Pirated Software. IMIS 2014: 287-290 - [c26]SeongWook Kang, Hyungjoon Shim, Seong-je Cho, Minkyu Park, Sangchul Han:
A robust and efficient birthmark-based android application filtering system. RACS 2014: 253-257 - [c25]Duck-Ho Bae, Ji-Woong Chang, Se-Mi Park, Byeong-Soo Jeong, Sang-Wook Kim, Seong-je Cho:
An effective data clustering method based on expected update time in flash memory environment. SAC 2014: 1492-1497 - [c24]Younsik Jeong, Hwan-taek Lee, Seong-je Cho, Sangchul Han, Minkyu Park:
A kernel-based monitoring approach for analyzing malicious behavior on Android. SAC 2014: 1737-1738 - 2013
- [j8]Young-Sup Hwang, Jin Baek Kwon, Jae Chan Moon, Seong Je Cho:
Classifying Malicious Web Pages by Using an Adaptive Support Vector Machine. J. Inf. Process. Syst. 9(3): 395-404 (2013) - [j7]Hwan-taek Lee, Minkyu Park, Seong-je Cho:
Detection and prevention of LeNa Malware on Android. J. Internet Serv. Inf. Secur. 3(3/4): 63-71 (2013) - [c23]Yongsuk Choi, Yeongseong Park, Jongmoo Choi, Seong-je Cho, Hwansoo Han:
RAMC: runtime abstract memory context based plagiarism detection in binary code. ICUIMC 2013: 67 - [c22]Seongsoo Park, Seungcheol Ko, Jungsik Choi
, Hwansoo Han, Seong-je Cho, Jongmoo Choi:
Detecting source code similarity using code abstraction. ICUIMC 2013: 74 - [c21]JongCheon Choi, Yongman Han, Seong-je Cho, Haeyoung Yoo, Jinwoon Woo, Minkyu Park, Youngsang Song, Lawrence Chung:
A Static Birthmark for MS Windows Applications Using Import Address Table. IMIS 2013: 129-134 - [c20]JongCheon Choi, Yongman Han, Seong-je Cho, Haeyoung Yoo, Minkyu Park, Sangchul Han, Ilsun You, Inshik Song:
A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications. IMIS 2013: 723-728 - [c19]Yesol Kim, Jeongoh Moon, Dongjin Kim, Younsik Jeong, Seong-je Cho, Minkyu Park, Sangchul Han:
A Static Birthmark of Windows Binary Executables Based on Strings. IMIS 2013: 734-738 - [c18]Younsik Jeong, Seong-je Cho, Moonju Park, Jeonguk Ko, Hyungjoon Shim, Joonmo Kim, Sangchul Han, Minkyu Park:
An efficient protection scheme of digital contents under mobile devices. RACS 2013: 306-311 - [c17]Jeonguk Ko, Hyungjoon Shim, Dongjin Kim, Younsik Jeong, Seong-je Cho, Minkyu Park, Sangchul Han, Seong Baeg Kim:
Measuring similarity of android applications via reversing and K-gram birthmarking. RACS 2013: 336-341 - [c16]Dongjin Kim, Yongman Han, Seong-je Cho, Haeyoung Yoo, Jinwoon Woo, Yunmook Nah, Minkyu Park, Lawrence Chung:
Measuring similarity of windows applications using static and dynamic birthmarks. SAC 2013: 1628-1633 - 2012
- [j6]HongGeun Kim, Dongjin Kim, Seong-je Cho, Moonju Park, Minkyu Park:
Efficient Detection of Malicious Web Pages Using High-Interaction Client Honeypots. J. Inf. Sci. Eng. 28(5): 911-924 (2012) - [j5]Yeongung Park, Chanhee Lee, Jonghwa Kim, Seong-je Cho, Jongmoo Choi:
An Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks. J. Internet Serv. Inf. Secur. 2(3/4): 29-42 (2012) - [c15]Yeongung Park, Choonghyun Lee, Chanhee Lee, JiHyeog Lim, Sangchul Han, Minkyu Park, Seong-je Cho:
RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks. LEET 2012 - [c14]Taeseung Lee, Giyoun Won, Seongje Cho, Namje Park
, Dongho Won:
Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing. NPC 2012: 138-144 - [c13]Younsik Jeong, Yeong-Ung Park, Jae-Chan Moon, Seong-je Cho, Dongjin Kim, Minkyu Park:
An anti-piracy mechanism based on class separation and dynamic loading for Android applications. RACS 2012: 328-332 - [c12]Jinman Jung, Joonhyouk Jang, Yookun Cho, Hwansoo Han, Gwangil Jeon, Seong-je Cho, Minwoo Jang, Jung-Yeop Kim:
A fast mount mechanism for YAFFS2. SAC 2012: 1791-1795 - 2011
- [c11]HongGeun Kim, Dong-Jin Kim, Seong-je Cho, Moonju Park, Minkyu Park:
An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots. RACS 2011: 266-271 - 2010
- [j4]Heeheon Kim, Xuefeng Piao, Sangchul Han, Moonju Park, Minkyu Park, Seongje Cho, Yookun Cho:
Improving responsiveness of soft aperiodic tasks using proportional slack time. Comput. Electr. Eng. 36(5): 913-926 (2010) - [c10]Min-Jae Kim, Jin-Young Lee, Hyeyoung Chang, Seongje Cho, Yongsu Park, Minkyu Park, Philip A. Wilsey:
Design and Performance Evaluation of Binary Code Packing for Protecting Embedded Software against Reverse Engineering. ISORC 2010: 80-86
2000 – 2009
- 2009
- [c9]Xuefeng Piao, Heeheon Kim, Yookun Cho, Moonju Park, Sangchul Han, Minkyu Park, Seongje Cho:
Energy Consumption Optimization of Real-Time Embedded Systems. ICESS 2009: 281-287 - 2008
- [c8]Seongje Cho, Hyeyoung Chang, Yookun Cho:
Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture. SEUS 2008: 406-416 - 2007
- [c7]YongSuk Lee, WoongChul Choi, SukJoong Kang, Seongje Cho:
Multi-channel Enhancements for IEEE 802.11-Based Multi-hop Ad-Hoc Wireless Networks. EUC Workshops 2007: 82-92 - [c6]HongGeun Kim, Jungkyu Han, Seongje Cho:
An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices. SAC 2007: 1171-1175 - 2006
- [j3]Seungwon Lee, Seongje Cho, Jongmoo Choi, Yookun Cho:
Efficient Identification of Bad Signatures in RSA-Type Batch Signature. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 74-80 (2006) - [j2]Sangchul Han, Heeheon Kim, Xuefeng Piao, Minkyu Park, Seongje Cho, Yookun Cho:
Finish Time Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems. IEICE Trans. Inf. Syst. 89-D(12): 2981-2984 (2006) - [c5]Xuefeng Piao, Sangchul Han, Heeheon Kim, Minkyu Park, Yookun Cho, Seongje Cho:
Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems. ISORC 2006: 359-364 - 2005
- [j1]Minkyu Park, Sangchul Han, Heeheon Kim, Seongje Cho, Yookun Cho:
Comparison of Deadline-Based Scheduling Algorithms for Periodic Real-Time Tasks on Multiprocessor. IEICE Trans. Inf. Syst. 88-D(3): 658-661 (2005) - [c4]Seungwon Lee, Seongje Cho, Jongmoo Choi, Yookun Cho:
Batch Verification with DSA-Type Digital Signatures for Ubiquitous Computing. CIS (2) 2005: 125-130 - [c3]Seongje Cho, Hyeyoung Chang, HongGeun Kim, WoongChul Choi:
SoIDPS: Sensor Objects-Based Intrusion Detection and Prevention System and Its Implementation. CIS (2) 2005: 260-266 - 2004
- [c2]Minkyu Park, Sangchul Han, Heeheon Kim, Seongje Cho, Yookun Cho:
Comparison of Tie-Breaking Policies for Real-Time Scheduling on Multiprocessor. EUC 2004: 174-182 - 2003
- [c1]Seongje Cho, Chulyean Chang, Joonmo Kim, Jongmoo Choi:
A Study on Monitoring and Protecting Computer System against Interception Threat. Human.Society@Internet 2003 2003: 96-105
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-11-18 21:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint