A practical wireless attack on the connected car and security protocol for in-vehicle CAN S Woo, HJ Jo, DH Lee IEEE Transactions on intelligent transportation systems 16 (2), 993-1006, 2014 | 618 | 2014 |
Identifying ecus using inimitable characteristics of signals in controller area networks W Choi, HJ Jo, S Woo, JY Chun, J Park, DH Lee IEEE Transactions on Vehicular Technology 67 (6), 4757-4770, 2018 | 238 | 2018 |
A practical security architecture for in-vehicle CAN-FD S Woo, HJ Jo, IS Kim, DH Lee IEEE Transactions on Intelligent Transportation Systems 17 (8), 2248-2261, 2016 | 159 | 2016 |
Can id shuffling technique (cist): Moving target defense strategy for protecting in-vehicle can S Woo, D Moon, TY Youn, Y Lee, Y Kim IEEE Access 7, 15521-15536, 2019 | 67 | 2019 |
Vulnerabilities of android OS-based telematics system HJ Jo, W Choi, SY Na, S Woo, DH Lee Wireless Personal Communications 92, 1511-1530, 2017 | 49 | 2017 |
Secure cyber deception architecture and decoy injection to mitigate the insider threat K Park, S Woo, D Moon, H Choi Symmetry 10 (1), 14, 2018 | 35 | 2018 |
Practical vulnerability-information-sharing architecture for automotive security-risk analysis Y Lee, S Woo, Y Song, J Lee, DH Lee IEEE Access 8, 120009-120018, 2020 | 33 | 2020 |
Apparatus for enhancing network security and method for the same J Lee, DS Moon, KM Park, WOO Samuel, H Hwang, IK Kim, SH Jin US Patent 10,785,252, 2020 | 29 | 2020 |
Method and apparatus for generating semantic attack graph JY Lee, KJ Koo, IK Kim, DS Moon, KM Park, WOO Samuel, H Hwang US Patent App. 16/578,511, 2020 | 25 | 2020 |
BadVoice: Soundless voice-control replay attack on modern smartphones PJ Young, JH Jin, S Woo, DH Lee 2016 Eighth International Conference on Ubiquitous and Future Networks …, 2016 | 25 | 2016 |
Enhanced Android App‐Repackaging Attack on In‐Vehicle Network Y Lee, S Woo, J Lee, Y Song, H Moon, DH Lee Wireless Communications and Mobile Computing 2019 (1), 5650245, 2019 | 24 | 2019 |
Practical sender authentication scheme for in-vehicle CAN with efficient key management TY Youn, Y Lee, S Woo IEEE Access 8, 86836-86849, 2020 | 17 | 2020 |
A message authentication and key distribution mechanism secure against CAN bus attack AR Cho, HJ Jo, S Woo, YD Son, DH Lee Journal of the Korea Institute of Information Security & Cryptology 22 (5 …, 2012 | 12 | 2012 |
CAN Signal Extinction‐based DoS Attack on In‐Vehicle Network Y Lee, S Woo Security and Communication Networks 2022 (1), 9569703, 2022 | 11 | 2022 |
Triple ID flexible MAC for CAN security improvement YJ Kim, S Woo, JG Chung IEEE Access 9, 126388-126399, 2021 | 8 | 2021 |
Practical Methodology for In-Vehicle CAN Security Evaluation. HB Park, Y Kim, J Jeon, H Moon, S Woo J. Internet Serv. Inf. Secur. 9 (2), 42-56, 2019 | 8 | 2019 |
Practical Data Acquisition and Analysis Method for Automobile Event Data Recorders Forensics. Y Lee, S Woo J. Internet Serv. Inf. Secur. 12 (3), 76-86, 2022 | 6 | 2022 |
Security bootstrapping for securing data plane and control plane in named data networking CS Park, WS Park, S Woo IEEE Transactions on Network and Service Management 20 (3), 3765-3781, 2022 | 5 | 2022 |
Vehicular Multilevel Data Arrangement‐Based Intrusion Detection System for In‐Vehicle CAN W Kim, J Lee, Y Lee, Y Kim, J Chung, S Woo Security and Communication Networks 2022 (1), 4322148, 2022 | 4 | 2022 |
Trends in Network Address Moving Technology KM Park, S Woo, DS Moon, IK Kim Electronics and Telecommunications Trends 32 (6), 73-82, 2017 | 3 | 2017 |