Geumhwan Cho
Title
Cited by
Cited by
Year
On the effectiveness of pattern lock strength meters: Measuring the strength of real world pattern locks
Y Song, G Cho, S Oh, H Kim, JH Huh
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
632015
Syspal: System-guided pattern locks for android
G Cho, JH Huh, J Cho, S Oh, Y Song, H Kim
2017 IEEE Symposium on Security and Privacy (SP), 338-356, 2017
302017
A framework for security services based on software-defined networking
J Jeong, J Seo, G Cho, H Kim, JS Park
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
292015
An empirical study of click fraud in mobile advertising networks
G Cho, J Cho, Y Song, H Kim
2015 10th International Conference on Availability, Reliability and Security …, 2015
282015
Combating online fraud attacks in mobile-based advertising
G Cho, J Cho, Y Song, D Choi, H Kim
EURASIP Journal on Information Security 2016 (1), 1-9, 2016
232016
Preventing DNS amplification attacks using the history of DNS queries with SDN
S Kim, S Lee, G Cho, ME Ahmed, JP Jeong, H Kim
European Symposium on Research in Computer Security, 135-152, 2017
172017
Keyboard or keylogger?: A security analysis of third-party keyboards on Android
J Cho, G Cho, H Kim
2015 13th Annual Conference on Privacy, Security and Trust (PST), 173-176, 2015
162015
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks
DH Nyang, H Kim, W Lee, S Kang, G Cho, MK Lee, A Mohaisen
computers & security 78, 1-15, 2018
122018
The personal identification chord: A four buttonauthentication system for smartwatches
I Oakley, JH Huh, J Cho, G Cho, R Islam, H Kim
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
102018
SENTINEL: A Secure and Efficient Authentication Framework for Unmanned Aerial Vehicles
G Cho, J Cho, S Hyun, H Kim
Applied Sciences 10 (9), 3149, 2020
62020
Data-driven selection of security application frameworks during architectural design
H Cervantes, R Kazman, J Ryoo, J Cho, G Cho, H Kim, J Kang
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
42019
Threat modeling and analysis of voice assistant applications
G Cho, J Choi, H Kim, S Hyun, J Ryoo
International Workshop on Information Security Applications, 197-209, 2018
42018
Design and Analysis of Push Notification-Based Malware on Android
S Hyun, J Cho, G Cho, H Kim
Security and Communication Networks 2018, 2018
42018
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better?
G Cho, JH Huh, S Kim, J Cho, H Park, Y Lee, K Beznosov, H Kim
ACM Transactions on Privacy and Security (TOPS) 23 (4), 1-32, 2020
32020
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices
J Cho, G Cho, S Hyun, H Kim
Journal of Internet Services and Information Security 7 (4), 35-44, 2017
32017
Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services
Y Son, G Cho, H Kim, S Woo
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
2019
A Methodology to Support the Selection of Security Frameworks
J Ryoo, J Cho, H Cervantes, R Kazman, G Cho, J Kang, H Kim
CARNEGIE-MELLON UNIV PITTSBURGH PA PITTSBURGH, 2019
2019
POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack
S Cha, J Park, G Cho, JH Huh, H Kim
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2016
Poster: Design of Backdoor on Android Devices
J Cho, G Cho, S Hyun, H Kim
Ratio 1, 0.008, 0
ICSSA 2019
J Ryoo, H Kim, S Schrittwieser, S Rizvi, HY Lee, S Tjoa, A Mohaisen, ...
The system can't perform the operation now. Try again later.
Articles 1–20