On the effectiveness of pattern lock strength meters: Measuring the strength of real world pattern locks Y Song, G Cho, S Oh, H Kim, JH Huh Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015 | 61 | 2015 |
A framework for security services based on software-defined networking J Jeong, J Seo, G Cho, H Kim, JS Park 2015 IEEE 29th International Conference on Advanced Information Networking …, 2015 | 29 | 2015 |
Syspal: System-guided pattern locks for android G Cho, JH Huh, J Cho, S Oh, Y Song, H Kim 2017 IEEE Symposium on Security and Privacy (SP), 338-356, 2017 | 28 | 2017 |
An empirical study of click fraud in mobile advertising networks G Cho, J Cho, Y Song, H Kim 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 27 | 2015 |
Combating online fraud attacks in mobile-based advertising G Cho, J Cho, Y Song, D Choi, H Kim EURASIP Journal on Information Security 2016 (1), 1-9, 2016 | 23 | 2016 |
Preventing DNS amplification attacks using the history of DNS queries with SDN S Kim, S Lee, G Cho, ME Ahmed, JP Jeong, H Kim European Symposium on Research in Computer Security, 135-152, 2017 | 16 | 2017 |
Keyboard or keylogger?: A security analysis of third-party keyboards on Android J Cho, G Cho, H Kim 2015 13th Annual Conference on Privacy, Security and Trust (PST), 173-176, 2015 | 16 | 2015 |
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks DH Nyang, H Kim, W Lee, S Kang, G Cho, MK Lee, A Mohaisen computers & security 78, 1-15, 2018 | 12 | 2018 |
The personal identification chord: A four buttonauthentication system for smartwatches I Oakley, JH Huh, J Cho, G Cho, R Islam, H Kim Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 9 | 2018 |
SENTINEL: A Secure and Efficient Authentication Framework for Unmanned Aerial Vehicles G Cho, J Cho, S Hyun, H Kim Applied Sciences 10 (9), 3149, 2020 | 4 | 2020 |
Data-driven selection of security application frameworks during architectural design H Cervantes, R Kazman, J Ryoo, J Cho, G Cho, H Kim, J Kang Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019 | 4 | 2019 |
Design and Analysis of Push Notification-Based Malware on Android S Hyun, J Cho, G Cho, H Kim Security and Communication Networks 2018, 2018 | 4 | 2018 |
Threat modeling and analysis of voice assistant applications G Cho, J Choi, H Kim, S Hyun, J Ryoo International Workshop on Information Security Applications, 197-209, 2018 | 3 | 2018 |
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices J Cho, G Cho, S Hyun, H Kim Journal of Internet Services and Information Security 7 (4), 35-44, 2017 | 3 | 2017 |
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better? G Cho, JH Huh, S Kim, J Cho, H Park, Y Lee, K Beznosov, H Kim ACM Transactions on Privacy and Security (TOPS) 23 (4), 1-32, 2020 | | 2020 |
스마트폰 기반 Continuous Authentication 기술 동향 G Cho, H Kim Review of KIISC 30 (5), 61-69, 2020 | | 2020 |
Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services Y Son, G Cho, H Kim, S Woo Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | | 2019 |
A Methodology to Support the Selection of Security Frameworks J Ryoo, J Cho, H Cervantes, R Kazman, G Cho, J Kang, H Kim CARNEGIE-MELLON UNIV PITTSBURGH PA PITTSBURGH, 2019 | | 2019 |
Smart Lock 인증 기법에 대한 연구동향 분석 G Cho, S Lee, H Kim Review of KIISC 28 (1), 8-15, 2018 | | 2018 |
POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack S Cha, J Park, G Cho, JH Huh, H Kim Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | | 2016 |