International Conference

번호 제목 링크
55

A Study on Android Emulator Detection Using Build Properties

Jaedo Lim, Ilkyu Kim, Namsu Kim, Boojoong Kang, Seong-je Cho

(2022.10.) The 8th International Conference on Next Generation Computing 2022 (ICNGC 2022), Oct. 2022

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2021R1A2C2012574), supported by Research Program funded by the Supreme Prosecutors’ Office of the Republic of Korea (SPO). and also supported by the MSIT(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW)(2017-0-00091) supervised by the IITP(Institute of Information & Communications Technology Planning&Evaluation) in 2021.

54

A Study on a Vulnerability Scoring System for Intelligent Buildings

Minsu Park, Haein Kang, Hyoll Han, Kyoungwon Suh

(2022.10.) The 8th International Conference on Next Generation Computing 2022 (ICNGC 2022), Oct. 2022

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2021R1A2C2012574), supported by Research Program funded by the Supreme Prosecutors’ Office of the Republic of Korea (SPO). and also supported by the MSIT(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW)(2017-0-00091) supervised by the IITP(Institute of Information & Communications Technology Planning&Evaluation) in 2021.

53

Analyzing Bluetooth HCI Snoop Log of Android Infocar App for Vehicle Diagnostics

Hojun Seong, Jeeheun Jung, Sangchul Han, Minkyu Park, Seong-je Cho

(2022.10.) The 8th International Conference on Next Generation Computing 2022 (ICNGC 2022), Oct. 2022

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2021R1A2C2012574), supported by Research Program funded by the Supreme Prosecutors’ Office of the Republic of Korea (SPO). and also supported by the MSIT(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW)(2017-0-00091) supervised by the IITP(Institute of Information & Communications Technology Planning&Evaluation) in 2021.

52

Enhancing Sustaninability in Machine Learning-based Android Malware Dectection using API calls

Hojun Lee, Seong-je Cho, Hyoll Han, Kyoungwon Suh, Woosang Cho

(2022.09.) 2022 IEEE Artificial Intelligence & Knowledge Engineering (AIKE 2022), Sep. 2022

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2021R1A2C2012574), supported by Research Program funded by the Supreme Prosecutors’ Office of the Republic of Korea (SPO). and also supported by the MSIT(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW)(2017-0-00091) supervised by the IITP(Institute of Information & Communications Technology Planning&Evaluation) in 2021.

51

Sustainaility of Machine Learning Android Malware Dection Using API calls and Permissions

Woosang Cho, Hojun Lee, Sangchul Han, Youngsup Hwang, Seong-je Cho

(2022.09.) 2022 IEEE Artificial Intelligence & Knowledge Engineering (AIKE 2022), Sep. 2022

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2021R1A2C2012574), supported by Research Program funded by the Supreme Prosecutors’ Office of the Republic of Korea (SPO). and also supported by the MSIT(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW)(2017-0-00091) supervised by the IITP(Institute of Information & Communications Technology Planning&Evaluation) in 2021.

50

A Preliminary Forensics Analysis of Navigation Records on an Android-based Audio-Video Navigation System

Hojun Seong, Keonyong Lee, Seong-je Cho, Sangchul Han, Minkyu Park

(2021.11.) The 7th International Conference on Next Generation Computing 2021 (ICNGC 2021)

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2021R1A2C2012574), supported by Research Program funded by the Supreme Prosecutors’ Office of the Republic of Korea (SPO). and also supported by the MSIT(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW)(2017-0-00091) supervised by the IITP(Institute of Information & Communications Technology Planning&Evaluation) in 2021.

49

A Forensic Data Analysis of a Bluetooth Device paired with an Android-based Audio Video Navigation System

Keonyong Lee, Hojun Seong, Haein Kang, Seong-je Cho, Hyoil Han, Kyoungwon Suh

(2021.11.) The 7th International Conference on Next Generation Computing 2021 (ICNGC 2021)

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2021R1A2C2012574), also supported by Research Program funded by the Supreme Prosecutors’ Office of the Republic of Korea (SPO), and supported by the MSIT(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW)(2017-0-00091) supervised by the IITP(Institute of Information & Communications Technology Planning&Evaluation) in 2021.

48

Forensic Analysis of Apple CarPlay : A case study

Junsu Lee, Juwon Kim, Hojun Seong, Keonyong Lee, Seong-je Cho, Younjai Park, Minkyu Park

(2021.10.) The 5th International Symposium on Mobile Internet Security (MobiSec 2021)

This research was supported by Basic Science Research Program through the National Research Foun- dation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2021R1A2C2012574), and also supported by Research Program funded by the Supreme Prosecutors’ Office of the Republic of Korea (SPO).

47

Charaterizing and Detecting Three Adversarial Techniques in Android

Minsu Park, Haein Kang, Seong-je Cho, Hyoil Han, Kyoungwon Suh

(2021.09.) The 10th International Conference on Smart Media and Applications (SMA 2021)

This work was supported by Institue of Information & Communications Technology Planning and Evaluation (IITP) grant funded by the Korea government(MSIT) (No. 2019-0-01357, Active Analysis Technique Development of Malicious Android Applications in Mobile Computing Environment)

46

Performance Comparison between R8 Compiler and ReDex in Code Optimization of Android Apps

Geunha You, Seong-je Cho, Hyoil Han, Kyoungwon Suh

(2020.12.) The 6th International Conference on Next Generation Computing 2020 (ICNGC 2020)

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2018R1A2B2004830), and the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2020-2015-0-00363) supervised by the IITP(Institute for Information & Communications Technology Planning & Evaluation).

45

De-Obfuscating Android Apps Obfuscated by ProGuard and Obfuscapk

Geunha You, Seong-je Cho, Hyoil Han, Kyoungwon Suh

(2020.12.) The 6th International Conference on Next Generation Computing 2020 (ICNGC 2020)

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2018R1A2B2004830), and the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2020-2015-0-00363) supervised by the IITP(Institute for Information & Communications Technology Planning & Evaluation).

44

Analysis of Permissions Selection Techniques in Machine Learning-based Malicious App Detection

Jihyeon Park, Munyeong Kang, Seong-je Cho, Hyoil Han, and Kyoungwon Suh

(2020.12.) 2020 IEEE Artificial Intelligence & Knowledge Engineering (AIKE 2020), Dec. 2020

The research is supported in part by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (no. 2018R1A2B2004830).

43

Deep Learning Approach for Static Analysis of Sequantial Features for Malware Detection Using ID CNN and Bi-directional LSTM

Seung-Pil Coleman, Young-Sup Hwang

(2020.09.) 11th International Conference on Information Science and Applications 2020 (ICISA 2020.12)

42

Android Malware Family Classification using Images from Dex Files

Munyeong Kang, Jihyeon Park, Seonghyun Park, Seong-je Cho, Minkyu Park

(2020.09.) The 9th International Conference on Smart Media and Applications (SMA 2020)

his research was supported by (1) Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2018R1A2B2004830) and (2) the MSIT(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW supervised by the IITP(Institute for Information & communications Technology Promotion)"(2017-0-00091).

41

Reversing Obfuscated Control Flow Structures in Android Apps using ReDex Optimizer

Geunha You, Gyoosik Kim, Jihyeon Park, Sejong-je Cho, Minkyu Park

(2020.09.) The 9th International Conference on Smart Media and Applications (SMA 2020)

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2018R1A2B2004830) and the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2020-2015-0- 00363) supervised by the IITP(Institute for Information & Communications Technology Planning & Evaluation).

40

Deoptfuscator: Automated Deobfuscation of Android Bytecode using Compilation Optimization

Gyoosik Kim, Geunha You, Seong-je Cho

(2020.08.) Black Hat USA 2020 Arsenal

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT(no. 2018R1A2B2004830)

39

Enhanced Android Malware Detection: An SVM-based Machine Learning Approach

Hyoil Han, SeungJin Lim, Kyoungwon Suh, Seonghyun Park, Seong-je Cho, Minkyu Park

(2020.02.19.~2020.02.22.) 2020 IEEE International Conference on Big Data and Smart Computing (BigComp 2020)

We would like to extend our thanks to Hyunjin Kim, Jaemin Jung, Sangchul Han, and Jehee Cho for their helpful discussion about the experimental data as well as their previous work. The research is supported in part by (1) Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (no. 2018R1A2B2004830) and (2) the MSIT (Ministry of Science and ICT), Korea, under the National Program for Excellence in SW supervised by the IITP (Institute for Information communications Technology Promotion)(2017- 0-00091).

38

A New Anti-Reverse Engineering for Android Apps Using Application-level Virtualization and Code Packing

Kyeonghwan Lim, Seungjae Han, Seong-je Cho, Jongmoo Choi, Hanil Kim, Hyoil Han, Kyoungwon Suh

(2019.12.19.~2019.12.21.) The 5th International Conference on Next Generation Computing 2019 (ICNGC 2019)

This research was supported by (1) the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2019- 2015-0-00363) supervised by the IITP(Institute for Information & communications Technology Planning & Evaluation), and (2) Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the MIST (no. 2018R1A2B2004830)

37

Handling Imbalanced Datasets and Detecting Obfuscated Java Classes Using Machine Learning

Daehan Kim, Minki Kim, Wonwuk Lee, Geunha You, Seong-je Cho, Minkyu Park, Sangchul Han

(2019.12.19.~2019.12.21.) The 5th International Conference on Next Generation Computing 2019 (ICNGC 2019)

This research was supported by (1) Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (no. 2018R1A2B2004830) , and (2) the MSIT(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW supervised by the IITP(Institute for Information & communications Technology Promotion)"(2017-0-00091).

36

Representing multicloud security and privacy policies and detecting potential problems

Anthony Opara, Youngsang Song, Seong-je Cho, Lawrence Chung

(2019.10.28.~2019.10.31.) The 17th International Conference on Service-Oriented Computing (ICSOC 2019)

35

A New Technique for Detecting Android App Clones Using Implicit Intent and MethodInformation

Byoungchul Kim, Soyeon Jeon, Jaemin Jung, Sungje Cho, Sangchul Han, Jongmoo Choi

(2019.07.) The 11th International Conference on Ubiquitous and Future Networks(ICUFN 2019)

This research was supported by (1) the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2019- 2015-0-00363) supervised by the IITP(Institute for Information & communications Technology Planning & Evaluation), and (2) Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the MIST (no. 2018R1A2B2004830).

34

Android Malware Detection using Convolutional Neural Networks and Data Section Images

Jaemin Jung, Jongmoo Choi, Sungje Cho, Sangchul Han, Minkyu Park, Yougsup Hwan

(2018.10.09.~2018.10.12.) 2018 Research in Adaptive and Convergent Systems(ACM RACS 2018)

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (no. 2015R1D1A1A02061946) and the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2018-2015-0-00363) supervised by the IITP(Institute for Information & communications Technology Promotion)

33

Resilience of Features forDetecting Open Source Software in Obfuscated Android Apps

Kyeonghwan Lim, Byoungchul Kim, Minkyu Park, Sungje Cho

(2018.08.) The 4th International Conference on Next Generation Computing 2018

This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. 2018R1A2B2004830). This research was supported by the MIST(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW supervised by the IITP(Institute for Information & communications Technology Promotion)"(2017-0-00091).

32

An Anti-Reverse Engineering Technique using Native code and O-LLVM for Android Application

Kyeonghwan Lim, Jaemin Jung, JongMoo Choi, Sungtae Jang, Minkyu Park, Sangchul Han, Sungje Cho

(2017.09.20.~2017.09.23.) 2017 Research in Adaptive and Convergent Systems(RACS 2017)

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science, ICT and Future Planning (No. 2015R1A2A1A15053738).

31

Student Research Abstract : On Computing Similarity of Android Executables Using Text Mining

Gyoosik Kim

(2017.04.04.~2017.04.06.) Proceedings of the Symposium on Applied Computing. ACM, 2017. p. 1761-1762.

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education(no. RF-2015R1D1A1A02061946)

30

Security Threat on Wearable Services : Empirical Study using a Commercial Smartband

Myunggeon Lee, Kyungmook Lee, Jaewoo Shim

(2016.10.27.) Consumer Electronics-Asia (ICCE-Asia), IEEE International Conference on. IEEE, 2016. p. 1-5.

This research was supported by the MSIP, Korea, under the ITRC support program (IITP-2016-R0992-16-1012) supervised by the IITP

29

Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation

Sangwook Cho, Kyusik Kim, Seongje Cho, Jongmoo Choi, Minkyu Park, Sangchul Han

(2016.10.01.~2016.10.01.) International Conference on Research in Adaptive and Convergent Systems. ACM, 2016. p. 148-152.

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education(no. RF-2015R1D1A1A02061946) / This research was supported by the MSIP, Korea, under the ITRC support program (IITP-2016-H85011610120001002 ) supervised by the IITP

28

Android Application Protection against Static Reverse Engineering based on Multidexing

Nakyoung Kim, Jaewoo Shim, Seongje Cho, Minkyu Park, Sangchul Han

(2016.07.01.~2016.07.01.) J. Internet Serv. Inf. Secur., 2016, 6.4: 54-64.

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science, ICT and Future Planning(No. 2015R1A2A1A15053738)

27

Malicious Behavior Detection by Monitoring Communication Operations based on Android Permissions

Hwantaek Lee, Hyungjoon Shim, Seongje Cho, Minkyu Park, Sangchul Han, Lawrence Chun

(2015.02.04.~2015.02.06.) International Conference on Green and Human Information Technology (ICGHIT) 2015

안드로이드 어플리케이션 소스코드 부정사용 방지 기술 개발

26

Machine Learning-based Software Classification Scheme for Efficient Program Similarity Anlysis

Yesol Kim, Jonghyuk Park, Seongje Cho, Yunmook Nah, Sangchul Han, Minkyu Park

(2015.10.09.~2015.10.12.) 2015 Conference on research in adaptive and convergent systems. ACM, 2015. p. 114-118.

BK 21

25

A Birthmark-based Method for Intellectual Software Asset management

Dongjin Kim, Jeongoh Moon, Seongje Cho, Jongmoo Choi, Minkyu Park, Sangchul Han, Lawrence Chung

(2014.01.09.~2014.01.11.) International Conference on Ubiquitous Information Management and Communication. ACM, 2014. p. 39.

바이너리 코드 동적고유정보 기반 SW유사성 감지 기술 개발 / 스마트폰 소프트웨어를 위한 취약점 관리 및 안전한 SDLC 프로세스

24

A Kernel-based Monitoring Approach for Analyzing Malicious behavior on Android

Younsik Jeong, Hwantaek Lee, Seongje Cho, Sangchul Han, Minkyu Park

(2014.03.24.~2014.03.28.) Annual ACM Symposium on Applied Computing. ACM, 2014. p. 1737-1738.

시스템 소프트웨어 기반 모바일 앱 불법 복제 방지 기술 연구 개발 / 고용계약형 지식정보보안 석사과정 지원사업

23

Detection and Prevention of LeNa Malware on Android

Hwantaek Lee, Minkyu Park, Seongje Cho

(2013.11.15.~2013.11.16.) J. Internet Serv. Inf. Secur., 2013, 3.3/4: 63-71.

시스템 소프트웨어 기반 모바일 앱 불법 복제 방지 기술 연구 개발 / 대학 IT 연구센터 지원사업의 연구결과 (ITRC)

22

Measuring Similarity of Android Applications via Reversing and K-gram Birthmarking

Jeonguk Ko, Hyungjoon Shim, Dongjin Kim, Younsik Jeong, Seongje Cho, Minkyu Park, Sangchul Han, Seongbaeg Kim

(2013.10.01.~2013.10.04.) 2013 Research in Adaptive and Convergent Systems. ACM, 2013. p. 336-341.

시스템 소프트웨어 기반 모바일 앱 불법 복제 방지 기술 연구 개발 / 고용계약형 지식정보보안 석사과정 지원사업

21

Identifying Windows Installer Package Files for Detection of Pirated Software

Dongjin Kim, Yesol Kim, Jeongoh Moon, Jinwoon Woo, Ilsun You, Seongje Cho

(2014.07.02.~2014.07.04 ) Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2014 Eighth International Conference on. IEEE, 2014. p. 287-290.

바이너리 코드 동적고유정보 기반 SW 유사성 감지 기술 개발 / 대학 IT연구센터 지원사업의 연구결과

20

Efficient Identification of Executable Programs to Prevent Software Piracy

Yesol Kim, Jeongoh Moon, Seongje Cho, Minkyu Park, Sangchul Han

(2014.07.02.~2014.07.04.) Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2014 Eighth International Conference on. IEEE, 2014. p. 236-240.

바이너리 코드 동적고유정보 기반 SW 유사성 감지 기술 개발 / 소프트웨어 공학 방법론과 금융 공학 지식 기반 차세대 금융 SW프레임워크

19

RAMC : Runtime Abstract Memory Context Based Plagiarism Detection in Binary Code

Yongsuk Choi, Yeongseong Park, Jongmoo Choi, Seongje Cho, Hwansoo Han

(2013.01.17.~2013.01.19.) International Conference on Ubiquitous Information Management and Communication. ACM, 2013. p. 67.

바이너리 코드 도적고유정보 기반 SW 유사성 감지 기술 개발 / 소프트웨어 공학 방법론과 금융 공학 지식 기반 차세대 금융 SW 프레임워크

18

Measuring Similarity of Windows Applications using Static and Dynamic Birthmarks

Dongjin Kim, Yongman Han, Haeyoung Yoo, Jinwoon Woo, Yunmook Nah, Minkyu Park, Lawrence Chung, Seongje Cho

(2013.03.18.~2013.03.22.) Annual ACM Symposium on Applied Computing. ACM, 2013. p. 1628-1633.

시스템 소프트웨어 기반 모바일 앱 불법 복제 방지 기술 연구 개발 / 스마트폰 소프트웨어를 위한 취약점 관리 및 안전한 SDLC 프로세스

17

An Efficient Protection Scheme of Digital Contents under Mobile Devices

Younsik Jeong, Seongje Cho, Moonju Park, Jeonguk Ko, Hyungjoon Shim, Joonmo Kim, Minkyu Park, Sangchul Han

(2013.10.01.~2013.10.04.) 2013 Research in Adaptive and Convergent Systems. ACM, 2013. p. 306-311.

시스템 소프트웨어 기반 모바일 앱 불법 복제 방지 기술 연구 개발 / 안드로이드 어플리케이션 소스코드의 부정사용 방지 기술 개발

16

A Survey of Feature Extraction Techniques to detect the Theft of Windows applications

Jongcheon Choi, Yongman Han, Seongje Cho, Haeyoung Yoo, Ilsun You, Minkyu Park, Inshik Song, Sangchul Han

(2013.07.03.~2013.07.05.) Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on. IEEE, 2013. p. 723-728.

바이너리 코드 동적고유정보 기반 SW 유사성 감지 기술 개발 / 스마트폰 소프트웨어를 위한 취약점 관리 및 안전한 SDLC 프로세스

15

A Static Birthmark of Windows Binary Executables based on Strings

Yesol Kim, Jeongoh Moon, Dongjin Kim, Younsik Jeong, Seongje Cho, Sangchul Han, Minkyu Park

(2013.07.03.~2013.07.05.) Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on. IEEE, 2013. p. 734-738.

바이너리 코드 동적고유정보 기반 SW 유사성 감지 기술 개발 / 스마트폰 소프트웨어를 위한 취약점 관리 및 안전한 SDLC 프로세스

14

JA Static Birthmark for MS Windows Applications Using Import Address Table

Jongcheon Choi, Yongman Han, Haeyoung Yoo, Jinwoon Woo, Minkyu Park, Youngsang Song, Lawrence Chung, Seongje Cho

(2013.07.03.~2013.07.05.) Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on. IEEE, 2013. p. 129-134.

바이너리 코드 동적고유정보 기반 SW 유사성 감지 기술 개발 / 스마트폰 소프트웨어를 위한 취약점 관리 및 안전한 SDLC 프로세스

13

RGBDroid : A Novel Response-Based Approach to Android privilege Escalation Attacks

Yeongung Park, ChoongHyun Lee, Chanhee Lee, Jihyeong, Sangchul Han, minkyu Park, Seongje Cho

(2012.04.24.~2012.04.24.) LEET, 2012, 12: 9-9.

스마트폰 소프트웨어를 위한 취약점 관리 및 안전한 SDLC 프로세스 / 소프트웨어 공학 방법론과 금융 공학 지식 기반 차세대 금융 SW 프레임워크

12

An Anti-Privacy mechanism based on Class Separation and Dynamic Loading for Android Applications

Younsik Jeong, Jaechan Moon, Dongjin Kim, Yeongung Park, Minkyu Park, Seongje Cho

(2012.10.23.~2012.10.26.) RACS `12 Proceedings of the 2012 ACM Research in Applied Computation Symposium

시스템 소프트웨어 기반 모바일 앱 불법 복제 방지 기술 연구 개발 / 소프트웨어 공학 방법론과 금융 공학 지식 기반 차세대 금융 SW 프레임워크

11

A Fast Mount Mechanism for YAFFS2

Jinman Jung, Joonhyouk Jang, Yookun Cho, Hwansoo Han, Gwangil Jeon, Seongje Cho, Minwoo Jang, Jung Y. Kim

(2012.03.25.~2012.03.29.) Annual ACM Symposium on Applied Computing. ACM, 2012. p. 1791-1795.

10

Malicious Web Page Detection Using malicious Code Spreading pattern

Jinyoung Lee, Jaechan Moon, Yongjoon Lee, Minkyu Park, Woongchul Choi, Seongje Cho

(2011.11.15.~2011.12.19.) International Conference on Internet (ICONI). 2011. p. 195-200.

스마트폰 소프트웨어를 위한 취약점관리및 안전한 SDLC 프로세스 (2011-0026301) / 스마트폰 소프트웨어를 위한 취약점 관리 및 안전한 SDLC 프로세스 (2010-0024495)

9

An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots

Honggeun Kim, Dongjin Kim, Moonju Park, Minkyu Park, Seongje Cho

(2011.11.02.~2011.11.05.) 2011 ACM Symposium on Research in Applied Computation. ACM, 2011. p. 266-271.

시스템 소프트웨어 기반 모바일 앱 불법 복제 방지 기술 연구 개발 / 소프트웨어 공학 방법론과 금융 공학 지식 기반 차세대 금융 SW 프레임워크

8

An Efficient Fuzzing Strategy for Finding Weakness in Web Browsers

Seongje Cho, Youngung Park

(2011.06.15.~2011.06.17.) USENIX Annual Technical Conference

스마트폰 소프트웨어를 위한 취약점 관리 및 안전한 SDLC 프로세스 / 한양대 협동과제

7

Design and Performance Evaluation of Binary Code packing for protecting Embedded Software against Reverse Engineering

Minjae Kim, Jinyoung Lee, Hyeyoung Chang, Seongje Cho, Yongsu Park, Minkyu Park, Philip A. Wilsey

(2010.05.05.~2010.05.06.) Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC), 2010 13th IEEE International Symposium on. IEEE, 2010. p. 80-86.

소프트웨어 공학 방법론과 금융 공학 지식 기반 차세대 금융 SW 프레임워크

6

Energy Consumption Optimziation in Real-Time Embedded Systems

Xuefeng Piao, Heeheon Kim, Yookun Cho, Moonju Park, Minkyu Park, Seongje Cho, Sangchul Han

(2009.05.25.~2009.05.27.) Embedded Software and Systems, 2009. ICESS'09. International Conference on. IEEE, 2009. p. 281-287.

5

A Combined Approach to Improve the Response Time of Soft Aperiodic Tasks

Heeheon Kim, Moonju Park, Seongje Cho, Hongjin Yoo, Jinseok Chae, Yookun Cho

(2009.03.17.~2009.03.17.) Future Dependable Distributed Systems, 2009 Software Technologies for. IEEE, 2009. p. 215-219.

Brain Korea 21

4

A Kernel-based monitoring Approach for Analyzing Malicious behavior on Android

Younsik Jeong, Hwantaek Lee, Seongje Cho, Sangchul han, Minkyu Park

(2014.03.24.~2014.03.28.) Annual ACM Symposium on Applied Computing. ACM, 2014. p. 1737-1738.

시스템 소프트웨어 기반 모바일 앱 불법 복제 방지 기술 연구 개발 / 고용계약형 지식정보보안 석사과정 지원사업

3

Efficient Identification of Executable Programs on Windows

Yesol Kim, Jeongoh Moon, Seongje CHo, Minkyu Park, Sangchul Han

(2014.07.02.~2014.07.04.) 2014 International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing

바이너리 코드 동적고유정보 기반 SW 유사성 감지 기술 개발 / 안드로이드 어플레이션의 소스코드 부정사용 방지 기술 개발

2

Identifying Windows Installer Package Files for Detection of Pirated Software

Dongjin Kim, Yesol Kim, Jeongoh Moon, Seongje Cho, Jinwoon Woo, Ilsun You

(2014.07.02.~2014.07.04.) Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS),2014 Eighth International Conference on. IEEE, 2014. p. 287-290.

바이너리 코드 동적고유정보 기반 SW 유사성 감지 기술 개발 / 대학 IT연구센터 지원사업의 연구결과 (ITRC)

1

A Robust and Efficient Birthmark-based Android Application Filtering System

Seongwook Kang, Hyungjoon Shim, Seongje Cho, Minkyu Park, Sangchul Han

(2014.10.05.~2014. 10.08.) 2014 Conference on Research in Adaptive and Convergent Systems. ACM, 2014. p. 253-257.

바이너리 코드 동적고유정보 기반 SW 유사성 감지 기술 개발 / 안드로이드 어플리케이션의 소스코드 부정사용 방지 기술 개발