CyTIME: Cyber Threat Intelligence ManagEment framework for automatically generating security rules E Kim, K Kim, D Shin, B Jin, H Kim Proceedings of the 13th International Conference on Future Internet ¡¦, 2018 | 29 | 2018 |
When harry met tinder: Security analysis of dating apps on android K Kim, T Kim, S Lee, S Kim, H Kim Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway ¡¦, 2018 | 18 | 2018 |
Hello, Facebook! Here is the stalkers¡¯ paradise!: Design and analysis of enumeration attack using phone numbers on Facebook J Kim, K Kim, J Cho, H Kim, S Schrittwieser Information Security Practice and Experience: 13th International Conference ¡¦, 2017 | 7 | 2017 |
Bypassing DRM protection in e-book applications on Android S Lee, K Kim, J Kang, H Kim 2018 International Conference on Information Networking (ICOIN), 194-198, 2018 | 4 | 2018 |
A Framework for managing user-defined security policies to support network security functions E Kim, K Kim, S Lee, JP Jeong, H Kim Proceedings of the 12th International Conference on Ubiquitous Information ¡¦, 2018 | 4 | 2018 |
ACIDroid: A practical app cache integrity protection system on Android Runtime J Choi, S Kim, J Cho, K Kim, S Hong, H Kim Proceedings of the 35th Annual ACM Symposium on Applied Computing, 376-383, 2020 | | 2020 |
¾Èµå·ÎÀÌµå ¹®ÀÚ¿ ¾ÏÈ£È Àû¿ë ÇöȲ ºÐ¼® ±è±ÍÁÖ£¬ À̹οí Çѱ¹Á¤º¸°úÇÐȸ Çмú¹ßÇ¥³í¹®Áý, 1150-1152, 2019 | | 2019 |
Automated Cash Mining Attacks on Mobile Advertising Networks W Ji, T Kim, K Kim, H Kim Information Security and Privacy: 24th Australasian Conference, ACISP 2019 ¡¦, 2019 | | 2019 |
ÀÎÁõÄÚµå Àü´Þ °ø°Ý ¹æ¾î ÇÁ·¹ÀÓ¿öÅ© ±è±ÍÁÖ£¬ ±èÇü½Ä Çѱ¹Á¤º¸°úÇÐȸ Çмú¹ßÇ¥³í¹®Áý, 1021-1023, 2017 | | 2017 |