Geumhwan Cho
Title
Cited by
Cited by
Year
On the effectiveness of pattern lock strength meters: Measuring the strength of real world pattern locks
Y Song, G Cho, S Oh, H Kim, JH Huh
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
612015
A framework for security services based on software-defined networking
J Jeong, J Seo, G Cho, H Kim, JS Park
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
292015
Syspal: System-guided pattern locks for android
G Cho, JH Huh, J Cho, S Oh, Y Song, H Kim
2017 IEEE Symposium on Security and Privacy (SP), 338-356, 2017
282017
An empirical study of click fraud in mobile advertising networks
G Cho, J Cho, Y Song, H Kim
2015 10th International Conference on Availability, Reliability and Security …, 2015
272015
Combating online fraud attacks in mobile-based advertising
G Cho, J Cho, Y Song, D Choi, H Kim
EURASIP Journal on Information Security 2016 (1), 1-9, 2016
232016
Preventing DNS amplification attacks using the history of DNS queries with SDN
S Kim, S Lee, G Cho, ME Ahmed, JP Jeong, H Kim
European Symposium on Research in Computer Security, 135-152, 2017
162017
Keyboard or keylogger?: A security analysis of third-party keyboards on Android
J Cho, G Cho, H Kim
2015 13th Annual Conference on Privacy, Security and Trust (PST), 173-176, 2015
162015
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks
DH Nyang, H Kim, W Lee, S Kang, G Cho, MK Lee, A Mohaisen
computers & security 78, 1-15, 2018
122018
The personal identification chord: A four buttonauthentication system for smartwatches
I Oakley, JH Huh, J Cho, G Cho, R Islam, H Kim
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
92018
SENTINEL: A Secure and Efficient Authentication Framework for Unmanned Aerial Vehicles
G Cho, J Cho, S Hyun, H Kim
Applied Sciences 10 (9), 3149, 2020
42020
Data-driven selection of security application frameworks during architectural design
H Cervantes, R Kazman, J Ryoo, J Cho, G Cho, H Kim, J Kang
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
42019
Design and Analysis of Push Notification-Based Malware on Android
S Hyun, J Cho, G Cho, H Kim
Security and Communication Networks 2018, 2018
42018
Threat modeling and analysis of voice assistant applications
G Cho, J Choi, H Kim, S Hyun, J Ryoo
International Workshop on Information Security Applications, 197-209, 2018
32018
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices
J Cho, G Cho, S Hyun, H Kim
Journal of Internet Services and Information Security 7 (4), 35-44, 2017
32017
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better?
G Cho, JH Huh, S Kim, J Cho, H Park, Y Lee, K Beznosov, H Kim
ACM Transactions on Privacy and Security (TOPS) 23 (4), 1-32, 2020
2020
스마트폰 기반 Continuous Authentication 기술 동향
G Cho, H Kim
Review of KIISC 30 (5), 61-69, 2020
2020
Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services
Y Son, G Cho, H Kim, S Woo
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
2019
A Methodology to Support the Selection of Security Frameworks
J Ryoo, J Cho, H Cervantes, R Kazman, G Cho, J Kang, H Kim
CARNEGIE-MELLON UNIV PITTSBURGH PA PITTSBURGH, 2019
2019
Smart Lock 인증 기법에 대한 연구동향 분석
G Cho, S Lee, H Kim
Review of KIISC 28 (1), 8-15, 2018
2018
POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack
S Cha, J Park, G Cho, JH Huh, H Kim
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20