번호 |
제목 |
링크 |
60 |
Forensic Investigation of An Android Jellybean-based Car Audio Video Navigation System
Yejin Yoon, Jeehun Jung, Seong-Je Cho, Jongmoo Choi, Minkyu Park, Sangchul Han
(2024.7.) The 19th International Conference on Availability, Reliability and Security (ARES 2024), Jul. 2024
This work was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (No. 2021R1A2C2012574); and Institute of Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MIST) (No. 2022-0-01022, Development of Collection and Integrated Analysis Methods of Automotive Inter/Intra System Artifacts through Construction of Eventbased experimental system).
|
|
59 |
A Preliminary Study on an Intrusion Detection Method using Large Language Models in Industrial Control Systems
SeokHyun Ann, Seong-je Cho, Hongeun Kim
(2024.7.) The 15th International Conference on Ubiquitous and Future Networks 2024 (ICUFN 2024), Jul. 2024
This research was partly supported by Basic Science Research Program the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (no. 2021R1A2C2012574) and partly supported by the Korea Institute of Energy Technology Evaluation and Planning (KETEP) and the Ministry of Trade, Industry Energy (MOTIE) of the Republic of Korea (No. 20212020800120).
|
|
58 |
A Filtering Tool for Efficiently Analyzing Log Data of Android-based In-Vehicle Infotainment Systems
Haein Kang, Jeeheun Jung, Seongbin Cho, Minkyu Park, Jongmoo Choi, Seong-je Cho
(2023.12.) The 9th International Conference on Next Generation Computing 2023 (ICNGC 2023), Dec. 2023
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no.2021R1A2C2012574), and by Institute of Information & communications Technology Planning & Evaluation(IITP) grant funded by the Korea government(MIST) (No.2022-0-01022, Development of Collection and Integrated Analysis Methods of Automotive Inter/Intra System Artifacts through Construction of Event-based experimental system).
|
|
57 |
Hybrid ConvLSTM with Attention for Precise Driver Behavior Classification
Ghulam Mustafa, Seong-je Cho, Youngsup Hwang
(2023.09.) 2023 IEEE Artificial Intelligence & Knowledge Engineering (AIKE 2023), Sep. 2023
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2021R1A2C2012574)
|
|
56 |
A Study on Asset Identification in Smart Buildings Automation Systems
Minsu Park, Seong-je Cho, Honggeun Kim
(2023.07.) The 14th International Conference on Ubiquitous and Future Networks(ICUFN 2023)
This research was partly supported by Basic Science Research Program the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (no.2021R1A2C2012574) and partly supported by the Korea Institute of Energy Technology Evaluation and Planning (KETEP) and the Ministry of Trade, Industry & Energy (MOTIE) of the Republic of Korea (No. 20212020800120).
|
|
55 |
A Study on Android Emulator Detection Using Build Properties
Jaedo Lim, Ilkyu Kim, Namsu Kim, Boojoong Kang, Seong-je Cho
(2022.10.) The 8th International Conference on Next Generation Computing 2022 (ICNGC 2022), Oct. 2022
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2021R1A2C2012574), supported by Research Program funded by the Supreme Prosecutors’ Office of the Republic of Korea (SPO). and also supported by the MSIT(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW)(2017-0-00091) supervised by the IITP(Institute of Information & Communications Technology Planning&Evaluation) in 2021.
|
|
54 |
A Study on a Vulnerability Scoring System for Intelligent Buildings
Minsu Park, Haein Kang, Hyoll Han, Kyoungwon Suh
(2022.10.) The 8th International Conference on Next Generation Computing 2022 (ICNGC 2022), Oct. 2022
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2021R1A2C2012574), supported by Research Program funded by the Supreme Prosecutors’ Office of the Republic of Korea (SPO). and also supported by the MSIT(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW)(2017-0-00091) supervised by the IITP(Institute of Information & Communications Technology Planning&Evaluation) in 2021.
|
|
53 |
Analyzing Bluetooth HCI Snoop Log of Android Infocar App for Vehicle Diagnostics
Hojun Seong, Jeeheun Jung, Sangchul Han, Minkyu Park, Seong-je Cho
(2022.10.) The 8th International Conference on Next Generation Computing 2022 (ICNGC 2022), Oct. 2022
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2021R1A2C2012574), supported by Research Program funded by the Supreme Prosecutors’ Office of the Republic of Korea (SPO). and also supported by the MSIT(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW)(2017-0-00091) supervised by the IITP(Institute of Information & Communications Technology Planning&Evaluation) in 2021.
|
|
52 |
Enhancing Sustaninability in Machine Learning-based Android Malware Dectection using API calls
Hojun Lee, Seong-je Cho, Hyoll Han, Kyoungwon Suh, Woosang Cho
(2022.09.) 2022 IEEE Artificial Intelligence & Knowledge Engineering (AIKE 2022), Sep. 2022
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2021R1A2C2012574), supported by Research Program funded by the Supreme Prosecutors’ Office of the Republic of Korea (SPO). and also supported by the MSIT(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW)(2017-0-00091) supervised by the IITP(Institute of Information & Communications Technology Planning&Evaluation) in 2021.
|
|
51 |
Sustainaility of Machine Learning Android Malware Dection Using API calls and Permissions
Woosang Cho, Hojun Lee, Sangchul Han, Youngsup Hwang, Seong-je Cho
(2022.09.) 2022 IEEE Artificial Intelligence & Knowledge Engineering (AIKE 2022), Sep. 2022
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2021R1A2C2012574), supported by Research Program funded by the Supreme Prosecutors’ Office of the Republic of Korea (SPO). and also supported by the MSIT(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW)(2017-0-00091) supervised by the IITP(Institute of Information & Communications Technology Planning&Evaluation) in 2021.
|
|
50 |
A Preliminary Forensics Analysis of Navigation Records on an Android-based Audio-Video Navigation System
Hojun Seong, Keonyong Lee, Seong-je Cho, Sangchul Han, Minkyu Park
(2021.11.) The 7th International Conference on Next Generation Computing 2021 (ICNGC 2021)
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2021R1A2C2012574), supported by Research Program funded by the Supreme Prosecutors’ Office of the Republic of Korea (SPO). and also supported by the MSIT(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW)(2017-0-00091) supervised by the IITP(Institute of Information & Communications Technology Planning&Evaluation) in 2021.
|
|
49 |
A Forensic Data Analysis of a Bluetooth Device paired with an Android-based Audio Video Navigation System
Keonyong Lee, Hojun Seong, Haein Kang, Seong-je Cho, Hyoil Han, Kyoungwon Suh
(2021.11.) The 7th International Conference on Next Generation Computing 2021 (ICNGC 2021)
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2021R1A2C2012574), also supported by Research Program funded by the Supreme Prosecutors’ Office of the Republic of Korea (SPO), and supported by the MSIT(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW)(2017-0-00091) supervised by the IITP(Institute of Information & Communications Technology Planning&Evaluation) in 2021.
|
|
48 |
Forensic Analysis of Apple CarPlay : A case study
Junsu Lee, Juwon Kim, Hojun Seong, Keonyong Lee, Seong-je Cho, Younjai Park, Minkyu Park
(2021.10.) The 5th International Symposium on Mobile Internet Security (MobiSec 2021)
This research was supported by Basic Science Research Program through the National Research Foun- dation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2021R1A2C2012574), and also supported by Research Program funded by the Supreme Prosecutors’ Office of the Republic of Korea (SPO).
|
|
47 |
Charaterizing and Detecting Three Adversarial Techniques in Android
Minsu Park, Haein Kang, Seong-je Cho, Hyoil Han, Kyoungwon Suh
(2021.09.) The 10th International Conference on Smart Media and Applications (SMA 2021)
This work was supported by Institue of Information & Communications Technology Planning and Evaluation (IITP) grant funded by the Korea government(MSIT) (No. 2019-0-01357, Active Analysis Technique Development of Malicious Android Applications in Mobile Computing Environment)
|
|
46 |
Performance Comparison between R8 Compiler and ReDex in Code Optimization of Android Apps
Geunha You, Seong-je Cho, Hyoil Han, Kyoungwon Suh
(2020.12.) The 6th International Conference on Next Generation Computing 2020 (ICNGC 2020)
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2018R1A2B2004830), and the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2020-2015-0-00363) supervised by the IITP(Institute for Information & Communications Technology Planning & Evaluation).
|
|
45 |
De-Obfuscating Android Apps Obfuscated by ProGuard and Obfuscapk
Geunha You, Seong-je Cho, Hyoil Han, Kyoungwon Suh
(2020.12.) The 6th International Conference on Next Generation Computing 2020 (ICNGC 2020)
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2018R1A2B2004830), and the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2020-2015-0-00363) supervised by the IITP(Institute for Information & Communications Technology Planning & Evaluation).
|
|
44 |
Analysis of Permissions Selection Techniques in Machine Learning-based Malicious App Detection
Jihyeon Park, Munyeong Kang, Seong-je Cho, Hyoil Han, and Kyoungwon Suh
(2020.12.) 2020 IEEE Artificial Intelligence & Knowledge Engineering (AIKE 2020), Dec. 2020
The research is supported in part by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (no. 2018R1A2B2004830).
|
|
43 |
Deep Learning Approach for Static Analysis of Sequantial Features for Malware Detection Using ID CNN and Bi-directional LSTM
Seung-Pil Coleman, Young-Sup Hwang
(2020.09.) 11th International Conference on Information Science and Applications 2020 (ICISA 2020.12)
|
|
42 |
Android Malware Family Classification using Images from Dex Files
Munyeong Kang, Jihyeon Park, Seonghyun Park, Seong-je Cho, Minkyu Park
(2020.09.) The 9th International Conference on Smart Media and Applications (SMA 2020)
his research was supported by (1) Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2018R1A2B2004830) and (2) the MSIT(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW supervised by the IITP(Institute for Information & communications Technology Promotion)"(2017-0-00091).
|
|
41 |
Reversing Obfuscated Control Flow Structures in Android Apps using ReDex Optimizer
Geunha You, Gyoosik Kim, Jihyeon Park, Sejong-je Cho, Minkyu Park
(2020.09.) The 9th International Conference on Smart Media and Applications (SMA 2020)
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2018R1A2B2004830) and the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2020-2015-0- 00363) supervised by the IITP(Institute for Information & Communications Technology Planning & Evaluation).
|
|
40 |
Deoptfuscator: Automated Deobfuscation of Android Bytecode using Compilation Optimization
Gyoosik Kim, Geunha You, Seong-je Cho
(2020.08.) Black Hat USA 2020 Arsenal
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT(no. 2018R1A2B2004830)
|
|
39 |
Enhanced Android Malware Detection: An SVM-based Machine Learning Approach
Hyoil Han, SeungJin Lim, Kyoungwon Suh, Seonghyun Park, Seong-je Cho, Minkyu Park
(2020.02.19.~2020.02.22.) 2020 IEEE International Conference on Big Data and Smart Computing (BigComp 2020)
We would like to extend our thanks to Hyunjin Kim, Jaemin Jung, Sangchul Han, and Jehee Cho for their helpful discussion about the experimental data as well as their previous work. The research is supported in part by (1) Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (no. 2018R1A2B2004830) and (2) the MSIT (Ministry of Science and ICT), Korea, under the National Program for Excellence in SW supervised by the IITP (Institute for Information communications Technology Promotion)(2017- 0-00091).
|
|
38 |
A New Anti-Reverse Engineering for Android Apps Using Application-level Virtualization and Code Packing
Kyeonghwan Lim, Seungjae Han, Seong-je Cho, Jongmoo Choi, Hanil Kim, Hyoil Han, Kyoungwon Suh
(2019.12.19.~2019.12.21.) The 5th International Conference on Next Generation Computing 2019 (ICNGC 2019)
This research was supported by (1) the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2019- 2015-0-00363) supervised by the IITP(Institute for Information & communications Technology Planning & Evaluation), and (2) Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the MIST (no. 2018R1A2B2004830)
|
|
37 |
Handling Imbalanced Datasets and Detecting Obfuscated Java Classes Using Machine Learning
Daehan Kim, Minki Kim, Wonwuk Lee, Geunha You, Seong-je Cho, Minkyu Park, Sangchul Han
(2019.12.19.~2019.12.21.) The 5th International Conference on Next Generation Computing 2019 (ICNGC 2019)
This research was supported by (1) Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (no. 2018R1A2B2004830) , and (2) the MSIT(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW supervised by the IITP(Institute for Information & communications Technology Promotion)"(2017-0-00091).
|
|
36 |
Representing multicloud security and privacy policies and detecting potential problems
Anthony Opara, Youngsang Song, Seong-je Cho, Lawrence Chung
(2019.10.28.~2019.10.31.) The 17th International Conference on Service-Oriented Computing (ICSOC 2019)
|
|
35 |
A New Technique for Detecting Android App Clones Using Implicit Intent and MethodInformation
Byoungchul Kim, Soyeon Jeon, Jaemin Jung, Sungje Cho, Sangchul Han, Jongmoo Choi
(2019.07.) The 11th International Conference on Ubiquitous and Future Networks(ICUFN 2019)
This research was supported by (1) the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2019- 2015-0-00363) supervised by the IITP(Institute for Information & communications Technology Planning & Evaluation), and (2) Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the MIST (no. 2018R1A2B2004830).
|
|
34 |
Android Malware Detection using Convolutional Neural Networks and Data Section Images
Jaemin Jung, Jongmoo Choi, Sungje Cho, Sangchul Han, Minkyu Park, Yougsup Hwan
(2018.10.09.~2018.10.12.) 2018 Research in Adaptive and Convergent Systems(ACM RACS 2018)
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2015R1D1A1A02061946) and the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2018-2015-0-00363) supervised by the IITP(Institute for Information & communications Technology Promotion)
|
|
33 |
Resilience of Features forDetecting Open Source Software in Obfuscated Android Apps
Kyeonghwan Lim, Byoungchul Kim, Minkyu Park, Sungje Cho
(2018.08.) The 4th International Conference on Next Generation Computing 2018
This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. 2018R1A2B2004830). This research was supported by the MIST(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW supervised by the IITP(Institute for Information & communications Technology Promotion)"(2017-0-00091).
|
|
32 |
An Anti-Reverse Engineering Technique using Native code and O-LLVM for Android Application
Kyeonghwan Lim, Jaemin Jung, JongMoo Choi, Sungtae Jang, Minkyu Park, Sangchul Han, Sungje Cho
(2017.09.20.~2017.09.23.) 2017 Research in Adaptive and Convergent Systems(RACS 2017)
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science, ICT and Future Planning (No. 2015R1A2A1A15053738).
|
|
31 |
Student Research Abstract : On Computing Similarity of Android Executables Using Text Mining
Gyoosik Kim
(2017.04.04.~2017.04.06.) Proceedings of the Symposium on Applied Computing. ACM, 2017. p. 1761-1762.
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education(no. RF-2015R1D1A1A02061946)
|
|
30 |
Security Threat on Wearable Services : Empirical Study using a Commercial Smartband
Myunggeon Lee, Kyungmook Lee, Jaewoo Shim
(2016.10.27.) Consumer Electronics-Asia (ICCE-Asia), IEEE International Conference on. IEEE, 2016. p. 1-5.
This research was supported by the MSIP, Korea, under the ITRC support program (IITP-2016-R0992-16-1012) supervised by the IITP
|
|
29 |
Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation
Sangwook Cho, Kyusik Kim, Seongje Cho, Jongmoo Choi, Minkyu Park, Sangchul Han
(2016.10.01.~2016.10.01.) International Conference on Research in Adaptive and Convergent Systems. ACM, 2016. p. 148-152.
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education(no. RF-2015R1D1A1A02061946) / This research was supported by the MSIP, Korea, under the ITRC support program (IITP-2016-H85011610120001002 ) supervised by the IITP
|
|
28 |
Android Application Protection against Static Reverse Engineering based on Multidexing
Nakyoung Kim, Jaewoo Shim, Seongje Cho, Minkyu Park, Sangchul Han
(2016.07.01.~2016.07.01.) J. Internet Serv. Inf. Secur., 2016, 6.4: 54-64.
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science, ICT and Future Planning(No. 2015R1A2A1A15053738)
|
|
27 |
Malicious Behavior Detection by Monitoring Communication Operations based on Android Permissions
Hwantaek Lee, Hyungjoon Shim, Seongje Cho, Minkyu Park, Sangchul Han, Lawrence Chun
(2015.02.04.~2015.02.06.) International Conference on Green and Human Information Technology (ICGHIT) 2015
안드로이드 어플리케이션 소스코드 부정사용 방지 기술 개발
|
|
26 |
Machine Learning-based Software Classification Scheme for Efficient Program Similarity Anlysis
Yesol Kim, Jonghyuk Park, Seongje Cho, Yunmook Nah, Sangchul Han, Minkyu Park
(2015.10.09.~2015.10.12.) 2015 Conference on research in adaptive and convergent systems. ACM, 2015. p. 114-118.
BK 21
|
|
25 |
A Birthmark-based Method for Intellectual Software Asset management
Dongjin Kim, Jeongoh Moon, Seongje Cho, Jongmoo Choi, Minkyu Park, Sangchul Han, Lawrence Chung
(2014.01.09.~2014.01.11.) International Conference on Ubiquitous Information Management and Communication. ACM, 2014. p. 39.
바이너리 코드 동적고유정보 기반 SW유사성 감지 기술 개발 / 스마트폰 소프트웨어를 위한 취약점 관리 및 안전한 SDLC 프로세스
|
|
24 |
A Kernel-based Monitoring Approach for Analyzing Malicious behavior on Android
Younsik Jeong, Hwantaek Lee, Seongje Cho, Sangchul Han, Minkyu Park
(2014.03.24.~2014.03.28.) Annual ACM Symposium on Applied Computing. ACM, 2014. p. 1737-1738.
시스템 소프트웨어 기반 모바일 앱 불법 복제 방지 기술 연구 개발 / 고용계약형 지식정보보안 석사과정 지원사업
|
|
23 |
Detection and Prevention of LeNa Malware on Android
Hwantaek Lee, Minkyu Park, Seongje Cho
(2013.11.15.~2013.11.16.) J. Internet Serv. Inf. Secur., 2013, 3.3/4: 63-71.
시스템 소프트웨어 기반 모바일 앱 불법 복제 방지 기술 연구 개발 / 대학 IT 연구센터 지원사업의 연구결과 (ITRC)
|
|
22 |
Measuring Similarity of Android Applications via Reversing and K-gram Birthmarking
Jeonguk Ko, Hyungjoon Shim, Dongjin Kim, Younsik Jeong, Seongje Cho, Minkyu Park, Sangchul Han, Seongbaeg Kim
(2013.10.01.~2013.10.04.) 2013 Research in Adaptive and Convergent Systems. ACM, 2013. p. 336-341.
시스템 소프트웨어 기반 모바일 앱 불법 복제 방지 기술 연구 개발 / 고용계약형 지식정보보안 석사과정 지원사업
|
|
21 |
Identifying Windows Installer Package Files for Detection of Pirated Software
Dongjin Kim, Yesol Kim, Jeongoh Moon, Jinwoon Woo, Ilsun You, Seongje Cho
(2014.07.02.~2014.07.04 ) Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2014 Eighth International Conference on. IEEE, 2014. p. 287-290.
바이너리 코드 동적고유정보 기반 SW 유사성 감지 기술 개발 / 대학 IT연구센터 지원사업의 연구결과
|
|
20 |
Efficient Identification of Executable Programs to Prevent Software Piracy
Yesol Kim, Jeongoh Moon, Seongje Cho, Minkyu Park, Sangchul Han
(2014.07.02.~2014.07.04.) Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2014 Eighth International Conference on. IEEE, 2014. p. 236-240.
바이너리 코드 동적고유정보 기반 SW 유사성 감지 기술 개발 / 소프트웨어 공학 방법론과 금융 공학 지식 기반 차세대 금융 SW프레임워크
|
|
19 |
RAMC : Runtime Abstract Memory Context Based Plagiarism Detection in Binary Code
Yongsuk Choi, Yeongseong Park, Jongmoo Choi, Seongje Cho, Hwansoo Han
(2013.01.17.~2013.01.19.) International Conference on Ubiquitous Information Management and Communication. ACM, 2013. p. 67.
바이너리 코드 도적고유정보 기반 SW 유사성 감지 기술 개발 / 소프트웨어 공학 방법론과 금융 공학 지식 기반 차세대 금융 SW 프레임워크
|
|
18 |
Measuring Similarity of Windows Applications using Static and Dynamic Birthmarks
Dongjin Kim, Yongman Han, Haeyoung Yoo, Jinwoon Woo, Yunmook Nah, Minkyu Park, Lawrence Chung, Seongje Cho
(2013.03.18.~2013.03.22.) Annual ACM Symposium on Applied Computing. ACM, 2013. p. 1628-1633.
시스템 소프트웨어 기반 모바일 앱 불법 복제 방지 기술 연구 개발 / 스마트폰 소프트웨어를 위한 취약점 관리 및 안전한 SDLC 프로세스
|
|
17 |
An Efficient Protection Scheme of Digital Contents under Mobile Devices
Younsik Jeong, Seongje Cho, Moonju Park, Jeonguk Ko, Hyungjoon Shim, Joonmo Kim, Minkyu Park, Sangchul Han
(2013.10.01.~2013.10.04.) 2013 Research in Adaptive and Convergent Systems. ACM, 2013. p. 306-311.
시스템 소프트웨어 기반 모바일 앱 불법 복제 방지 기술 연구 개발 / 안드로이드 어플리케이션 소스코드의 부정사용 방지 기술 개발
|
|
16 |
A Survey of Feature Extraction Techniques to detect the Theft of Windows applications
Jongcheon Choi, Yongman Han, Seongje Cho, Haeyoung Yoo, Ilsun You, Minkyu Park, Inshik Song, Sangchul Han
(2013.07.03.~2013.07.05.) Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on. IEEE, 2013. p. 723-728.
바이너리 코드 동적고유정보 기반 SW 유사성 감지 기술 개발 / 스마트폰 소프트웨어를 위한 취약점 관리 및 안전한 SDLC 프로세스
|
|
15 |
A Static Birthmark of Windows Binary Executables based on Strings
Yesol Kim, Jeongoh Moon, Dongjin Kim, Younsik Jeong, Seongje Cho, Sangchul Han, Minkyu Park
(2013.07.03.~2013.07.05.) Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on. IEEE, 2013. p. 734-738.
바이너리 코드 동적고유정보 기반 SW 유사성 감지 기술 개발 / 스마트폰 소프트웨어를 위한 취약점 관리 및 안전한 SDLC 프로세스
|
|
14 |
JA Static Birthmark for MS Windows Applications Using Import Address Table
Jongcheon Choi, Yongman Han, Haeyoung Yoo, Jinwoon Woo, Minkyu Park, Youngsang Song, Lawrence Chung, Seongje Cho
(2013.07.03.~2013.07.05.) Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on. IEEE, 2013. p. 129-134.
바이너리 코드 동적고유정보 기반 SW 유사성 감지 기술 개발 / 스마트폰 소프트웨어를 위한 취약점 관리 및 안전한 SDLC 프로세스
|
|
13 |
RGBDroid : A Novel Response-Based Approach to Android privilege Escalation Attacks
Yeongung Park, ChoongHyun Lee, Chanhee Lee, Jihyeong, Sangchul Han, minkyu Park, Seongje Cho
(2012.04.24.~2012.04.24.) LEET, 2012, 12: 9-9.
스마트폰 소프트웨어를 위한 취약점 관리 및 안전한 SDLC 프로세스 / 소프트웨어 공학 방법론과 금융 공학 지식 기반 차세대 금융 SW 프레임워크
|
|
12 |
An Anti-Privacy mechanism based on Class Separation and Dynamic Loading for Android Applications
Younsik Jeong, Jaechan Moon, Dongjin Kim, Yeongung Park, Minkyu Park, Seongje Cho
(2012.10.23.~2012.10.26.) RACS `12 Proceedings of the 2012 ACM Research in Applied Computation Symposium
시스템 소프트웨어 기반 모바일 앱 불법 복제 방지 기술 연구 개발 / 소프트웨어 공학 방법론과 금융 공학 지식 기반 차세대 금융 SW 프레임워크
|
|
11 |
A Fast Mount Mechanism for YAFFS2
Jinman Jung, Joonhyouk Jang, Yookun Cho, Hwansoo Han, Gwangil Jeon, Seongje Cho, Minwoo Jang, Jung Y. Kim
(2012.03.25.~2012.03.29.) Annual ACM Symposium on Applied Computing. ACM, 2012. p. 1791-1795.
|
|
10 |
Malicious Web Page Detection Using malicious Code Spreading pattern
Jinyoung Lee, Jaechan Moon, Yongjoon Lee, Minkyu Park, Woongchul Choi, Seongje Cho
(2011.11.15.~2011.12.19.) International Conference on Internet (ICONI). 2011. p. 195-200.
스마트폰 소프트웨어를 위한 취약점관리및 안전한 SDLC 프로세스 (2011-0026301) / 스마트폰 소프트웨어를 위한 취약점 관리 및 안전한 SDLC 프로세스 (2010-0024495)
|
|
9 |
An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots
Honggeun Kim, Dongjin Kim, Moonju Park, Minkyu Park, Seongje Cho
(2011.11.02.~2011.11.05.) 2011 ACM Symposium on Research in Applied Computation. ACM, 2011. p. 266-271.
시스템 소프트웨어 기반 모바일 앱 불법 복제 방지 기술 연구 개발 / 소프트웨어 공학 방법론과 금융 공학 지식 기반 차세대 금융 SW 프레임워크
|
|
8 |
An Efficient Fuzzing Strategy for Finding Weakness in Web Browsers
Seongje Cho, Youngung Park
(2011.06.15.~2011.06.17.) USENIX Annual Technical Conference
스마트폰 소프트웨어를 위한 취약점 관리 및 안전한 SDLC 프로세스 / 한양대 협동과제
|
|
7 |
Design and Performance Evaluation of Binary Code packing for protecting Embedded Software against Reverse Engineering
Minjae Kim, Jinyoung Lee, Hyeyoung Chang, Seongje Cho, Yongsu Park, Minkyu Park, Philip A. Wilsey
(2010.05.05.~2010.05.06.) Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC), 2010 13th IEEE International Symposium on. IEEE, 2010. p. 80-86.
소프트웨어 공학 방법론과 금융 공학 지식 기반 차세대 금융 SW 프레임워크
|
|
6 |
Energy Consumption Optimziation in Real-Time Embedded Systems
Xuefeng Piao, Heeheon Kim, Yookun Cho, Moonju Park, Minkyu Park, Seongje Cho, Sangchul Han
(2009.05.25.~2009.05.27.) Embedded Software and Systems, 2009. ICESS'09. International Conference on. IEEE, 2009. p. 281-287.
|
|
5 |
A Combined Approach to Improve the Response Time of Soft Aperiodic Tasks
Heeheon Kim, Moonju Park, Seongje Cho, Hongjin Yoo, Jinseok Chae, Yookun Cho
(2009.03.17.~2009.03.17.) Future Dependable Distributed Systems, 2009 Software Technologies for. IEEE, 2009. p. 215-219.
Brain Korea 21
|
|
4 |
A Kernel-based monitoring Approach for Analyzing Malicious behavior on Android
Younsik Jeong, Hwantaek Lee, Seongje Cho, Sangchul han, Minkyu Park
(2014.03.24.~2014.03.28.) Annual ACM Symposium on Applied Computing. ACM, 2014. p. 1737-1738.
시스템 소프트웨어 기반 모바일 앱 불법 복제 방지 기술 연구 개발 / 고용계약형 지식정보보안 석사과정 지원사업
|
|
3 |
Efficient Identification of Executable Programs on Windows
Yesol Kim, Jeongoh Moon, Seongje CHo, Minkyu Park, Sangchul Han
(2014.07.02.~2014.07.04.) 2014 International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
바이너리 코드 동적고유정보 기반 SW 유사성 감지 기술 개발 / 안드로이드 어플레이션의 소스코드 부정사용 방지 기술 개발
|
|
2 |
Identifying Windows Installer Package Files for Detection of Pirated Software
Dongjin Kim, Yesol Kim, Jeongoh Moon, Seongje Cho, Jinwoon Woo, Ilsun You
(2014.07.02.~2014.07.04.) Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS),2014 Eighth International Conference on. IEEE, 2014. p. 287-290.
바이너리 코드 동적고유정보 기반 SW 유사성 감지 기술 개발 / 대학 IT연구센터 지원사업의 연구결과 (ITRC)
|
|
1 |
A Robust and Efficient Birthmark-based Android Application Filtering System
Seongwook Kang, Hyungjoon Shim, Seongje Cho, Minkyu Park, Sangchul Han
(2014.10.05.~2014. 10.08.) 2014 Conference on Research in Adaptive and Convergent Systems. ACM, 2014. p. 253-257.
바이너리 코드 동적고유정보 기반 SW 유사성 감지 기술 개발 / 안드로이드 어플리케이션의 소스코드 부정사용 방지 기술 개발
|
|