Geumhwan Cho
Cited by
Cited by
On the effectiveness of pattern lock strength meters: Measuring the strength of real world pattern locks
Y Song, G Cho, S Oh, H Kim, JH Huh
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
SENTINEL: A Secure and Efficient Authentication Framework for Unmanned Aerial Vehicles
G Cho, J Cho, S Hyun, H Kim
Applied Sciences 10 (9), 3149, 2020
Syspal: System-guided pattern locks for android
G Cho, JH Huh, J Cho, S Oh, Y Song, H Kim
2017 IEEE Symposium on security and privacy (SP), 338-356, 2017
An empirical study of click fraud in mobile advertising networks
G Cho, J Cho, Y Song, H Kim
2015 10th International Conference on Availability, Reliability and Security …, 2015
A framework for security services based on software-defined networking
J Jeong, J Seo, G Cho, H Kim, JS Park
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
Preventing DNS amplification attacks using the history of DNS queries with SDN
S Kim, S Lee, G Cho, ME Ahmed, J Jeong, H Kim
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks
DH Nyang, H Kim, W Lee, S Kang, G Cho, MK Lee, A Mohaisen
computers & security 78, 1-15, 2018
Combating online fraud attacks in mobile-based advertising
G Cho, J Cho, Y Song, D Choi, H Kim
EURASIP Journal on Information Security 2016, 1-9, 2016
Keyboard or keylogger?: a security analysis of third-party keyboards on android
J Cho, G Cho, H Kim
2015 13th Annual Conference on Privacy, Security and Trust (PST), 173-176, 2015
Threat modeling and analysis of voice assistant applications
G Cho, J Choi, H Kim, S Hyun, J Ryoo
Information Security Applications: 19th International Conference, WISA 2018 …, 2019
The personal identification chord: A four buttonauthentication system for smartwatches
I Oakley, JH Huh, J Cho, G Cho, R Islam, H Kim
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
On the security and usability implications of providing multiple authentication choices on smartphones: The more, the better?
G Cho, JH Huh, S Kim, J Cho, H Park, Y Lee, K Beznosov, H Kim
ACM Transactions on Privacy and Security (TOPS) 23 (4), 1-32, 2020
Design and analysis of push notification-based malware on android
S Hyun, J Cho, G Cho, H Kim
Security and Communication Networks 2018, 2018
Data-driven selection of security application frameworks during architectural design
H Cervantes, R Kazman, J Ryoo, J Cho, G Cho, H Kim, J Kang
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices
J Cho, G Cho, S Hyun, H Kim
Journal of Internet Services and Information Security 7 (4), 35-44, 2017
Towards usable and secure location-based smartphone authentication
G Cho, S Kwag, JH Huh, B Kim, CH Lee, H Kim
Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 1-16, 2021
On the Long-Term Effects of Continuous Keystroke Authentication: Keeping User Frustration Low through Behavior Adaptation
JH Huh, S Kwag, I Kim, A Popov, Y Park, G Cho, J Lee, H Kim, CH Lee
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2023
Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services
Y Son, G Cho, H Kim, S Woo
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
A Methodology to Support the Selection of Security Frameworks
J Ryoo, J Cho, H Cervantes, R Kazman, G Cho, J Kang, H Kim, ...
POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack
S Cha, J Park, G Cho, JH Huh, H Kim
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20