Suivre
Haehyun Cho
Haehyun Cho
Adresse e-mail validée de ssu.ac.kr - Page d'accueil
Titre
Citée par
Citée par
Année
Trustzone explained: Architectural features and use cases
B Ngabonziza, D Martin, A Bailey, H Cho, S Martin
2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016
1782016
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ...
Proceedings of the 42nd IEEE Symposium on Security and Privacy (Oakland), 0
78*
MAPAS: a practical deep learning-based android malware detection system
J Kim, Y Ban, E Ko, H Cho, JH Yi
International Journal of Information Security 21 (4), 725-738, 2022
652022
Prime+Count: Novel cross-world covert channels on arm trustzone
H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
522018
Scam Pandemic: How Attackers Exploit Public Fear through Phishing
M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ...
Proceedings of the 2020 APWG Symposium on Electronic Crime Research (eCrime), 2021
432021
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases
ST Dinh, H Cho, K Martin, A Oest, K Zeng, A Kapravelos, GJ Ahn, T Bao, ...
Proceedings of the 2021 Network and Distributed System Security Symposium (NDSS), 2021
432021
Anti-debugging scheme for protecting mobile apps on android platform
H Cho, J Lim, H Kim, JH Yi
the Journal of Supercomputing 72, 232-246, 2016
292016
Playing for {K (H) eaps}: Understanding and improving linux kernel exploit reliability
K Zeng, Y Chen, H Cho, X Xing, A Doupé, Y Shoshitaishvili, T Bao
31st USENIX Security Symposium (USENIX Security 22), 71-88, 2022
182022
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers
H Cho, J Park, J Kang, T Bao, R Wang, Y Shoshitaishvili, A Doupé, ...
Proceedings of the 14th USENIX Workshop on Offensive Technologies (WOOT), 2020
162020
DexMonitor: dynamically analyzing and monitoring obfuscated Android applications
H Cho, JH Yi, GJ Ahn
IEEE Access 6, 71229-71240, 2018
162018
Fam: featuring android malware for deep learning-based familial analysis
Y Ban, S Lee, D Song, H Cho, JH Yi
IEEE Access 10, 20008-20018, 2022
142022
Sooel Son, Gail-Joon Ahn, and Tudor Dumitras. 2021. Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem
D Kim, H Cho, Y Kwon, A Doupé
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
132021
SmokeBomb: Effective Mitigation Against Cache Side-channel Attacks on the ARM Architecture
H Cho, J Park, D Kim, Z Zhao, Y Shoshitaishvili, A Doupé, GJ Ahn
The 18th ACM International Conference on Mobile Systems, Applications, and …, 2020
122020
Security analysis on practices of certificate authorities in the HTTPS phishing ecosystem
D Kim, H Cho, Y Kwon, A Doupé, S Son, GJ Ahn, T Dumitras
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
112021
Wi not calling: Practical privacy and availability Attacks in Wi-Fi calling
J Baek, S Kyung, H Cho, Z Zhao, Y Shoshitaishvili, A Doupé, GJ Ahn
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
112018
Personal information leaks with automatic login in mobile social network services
J Choi, H Cho, JH Yi
Entropy 17 (6), 3947-3962, 2015
112015
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior
P Zhang, Z Sun, S Kyung, HW Behrens, ZL Basque, H Cho, A Oest, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
72022
Large-scale analysis on anti-analysis techniques in real-world malware
M Kim, H Cho, JH Yi
IEEE access 10, 75802-75815, 2022
72022
ViK: practical mitigation of temporal memory safety violations through object ID inspection
H Cho, J Park, A Oest, T Bao, R Wang, Y Shoshitaishvili, A Doupé, ...
Proceedings of the 27th ACM International Conference on Architectural …, 2022
62022
Mobile application tamper detection scheme using dynamic code injection against repackaging attacks
H Cho, J Bang, M Ji, JH Yi
The Journal of Supercomputing 72 (9), 3629–3645, 2016
42016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20