Æȷοì
Kuyju Kim
Kuyju Kim
Financial Security Institute
fsec.or.krÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
CyTIME: Cyber Threat Intelligence ManagEment framework for automatically generating security rules
E Kim, K Kim, D Shin, B Jin, H Kim
Proceedings of the 13th International Conference on Future Internet ¡¦, 2018
292018
When harry met tinder: Security analysis of dating apps on android
K Kim, T Kim, S Lee, S Kim, H Kim
Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway ¡¦, 2018
182018
Hello, Facebook! Here is the stalkers¡¯ paradise!: Design and analysis of enumeration attack using phone numbers on Facebook
J Kim, K Kim, J Cho, H Kim, S Schrittwieser
Information Security Practice and Experience: 13th International Conference ¡¦, 2017
72017
Bypassing DRM protection in e-book applications on Android
S Lee, K Kim, J Kang, H Kim
2018 International Conference on Information Networking (ICOIN), 194-198, 2018
42018
A Framework for managing user-defined security policies to support network security functions
E Kim, K Kim, S Lee, JP Jeong, H Kim
Proceedings of the 12th International Conference on Ubiquitous Information ¡¦, 2018
42018
ACIDroid: A practical app cache integrity protection system on Android Runtime
J Choi, S Kim, J Cho, K Kim, S Hong, H Kim
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 376-383, 2020
2020
¾Èµå·ÎÀÌµå ¹®ÀÚ¿­ ¾Ïȣȭ Àû¿ë ÇöȲ ºÐ¼®
±è±ÍÁÖ£¬ À̹οí
Çѱ¹Á¤º¸°úÇÐȸ Çмú¹ßÇ¥³í¹®Áý, 1150-1152, 2019
2019
Automated Cash Mining Attacks on Mobile Advertising Networks
W Ji, T Kim, K Kim, H Kim
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 ¡¦, 2019
2019
ÀÎÁõÄÚµå Àü´Þ °ø°Ý ¹æ¾î ÇÁ·¹ÀÓ¿öÅ©
±è±ÍÁÖ£¬ ±èÇü½Ä
Çѱ¹Á¤º¸°úÇÐȸ Çмú¹ßÇ¥³í¹®Áý, 1021-1023, 2017
2017
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–9