Heimdallr: Fingerprinting SD-WAN Control-Plane Architecture via Encrypted Control Traffic M Seo, J Kim, E Marin, M You, T Park, S Lee, S Shin, J Kim Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 4 | 2022 |
FuzzDocs: an automated security evaluation framework for IoT M You, Y Kim, J Kim, M Seo, S Son, S Shin, S Lee IEEE Access 10, 102406-102420, 2022 | 3 | 2022 |
A large-scale bitcoin abuse measurement and clustering analysis utilizing public reports J Choi, J Kim, M Song, H Kim, N Park, M Seo, Y Jin, S Shin IEICE TRANSACTIONS on Information and Systems 105 (7), 1296-1307, 2022 | 2 | 2022 |
PassREfinder: Credential Stuffing Risk Prediction by Representing Password Reuse between Websites on a Graph J Kim, M Song, M Seo, Y Jin, S Shin 2024 IEEE Symposium on Security and Privacy (SP), 20-20, 2024 | | 2024 |
컨테이너 이미지 보안성 분석에 관한 연구: Docker Hub 이미지를 중심으로 유명성, 김재한, 신승원 한국통신학회논문지 47 (8), 1231-1243, 2022 | | 2022 |