Peeking over the Cellular Walled Gardens-A Method for Closed Network Diagnosis B Hong, S Park, H Kim, D Kim, H Hong, H Choi, JP Seifert, SJ Lee, Y Kim IEEE Transactions on Mobile Computing 17 (10), 2366-2380, 2018 | 32 | 2018 |
Enabling Automatic Protocol Behavior Analysis for Android Applications J Kim, H Choi, H Namkung, W Choi, B Choi, H Hong, Y Kim, J Lee, D Han Proceedings of the 12th International on Conference on emerging Networking …, 2016 | 20 | 2016 |
When cellular networks met IPv6: Security problems of middleboxes in IPv6 cellular networks H Hong, H Choi, D Kim, H Kim, B Hong, J Noh, Y Kim 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 595-609, 2017 | 17 | 2017 |
{PIkit}: A New {Kernel-Independent}{Processor-Interconnect} Rootkit W Song, H Choi, J Kim, E Kim, Y Kim, J Kim 25th USENIX Security Symposium (USENIX Security 16), 37-51, 2016 | 15 | 2016 |
Extractocol: Automatic extraction of application-level protocol behaviors for android applications H Choi, J Kim, H Hong, Y Kim, J Lee, D Han Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015 | 15 | 2015 |
Large-Scale Analysis of Remote Code Injection Attacks in Android Apps H Choi, Y Kim Security and Communication Networks 2018, 2018 | 10 | 2018 |
Pay as you want: Bypassing charging system in operational cellular networks H Hong, H Kim, B Hong, D Kim, H Choi, E Lee, Y Kim Information Security Applications: 17th International Workshop, WISA 2016 …, 2017 | 4 | 2017 |
Run away if you can: Persistent jamming attacks against channel hopping Wi-Fi devices in dense networks IG Lee, H Choi, Y Kim, S Shin, M Kim Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014 | 4 | 2014 |
Run Away If You Can: Persistent Jamming Attacks against Channel Hopping IG Lee, H Choi, Y Kim, S Shin, M Kim Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014 | 1 | 2014 |
AVX-TSCHA: Leaking information through AVX extensions in commercial processors S Kim, S Shin, H Choi Computers & Security 134, 103437, 2023 | | 2023 |
AVX Timing Side-Channel Attacks against Address Space Layout Randomization H Choi, S Kim, S Shin 2023 60th ACM/IEEE Design Automation Conference (DAC), 1-6, 2023 | | 2023 |
Apparatus and method for diagnosing anomaly in mobile communication network Y Kim, B Do HONG, SJ Lee, P Shinjo, KIM Hongil, H HyunWook, D Kim, ... US Patent 10,111,120, 2018 | | 2018 |