关注
Juhwan Kim
Juhwan Kim
在 sju.ac.kr 的电子邮件经过验证
标题
引用次数
引用次数
年份
Fuzzing of embedded systems: A survey
J Yun, F Rustamov, J Kim, Y Shin
ACM Computing Surveys 55 (7), 1-33, 2022
382022
Poster: Directed hybrid fuzzing on binary code
J Kim, J Yun
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
192019
FIRM-COV: high-coverage greybox fuzzing for IoT firmware via optimized process emulation
J Kim, J Yu, H Kim, F Rustamov, J Yun
IEEE Access 9, 101627-101642, 2021
122021
Exploratory review of hybrid fuzzing for automated vulnerability detection
F Rustamov, J Kim, J Yu, J Yun
IEEE Access 9, 131166-131190, 2021
52021
Classification of DJI Drones Based on Flight Log Decryption Method
Y Lee, J Kim, J Yu, J Yun
Journal of the Korea Institute of Information Security & Cryptology 32 (1 …, 2022
42022
BugMiner: Mining the hard-to-reach software vulnerabilities through the target-oriented hybrid fuzzer
F Rustamov, J Kim, J Yu, H Kim, J Yun
Electronics 10 (1), 62, 2020
42020
DeepDiver: Diving into abysmal depth of the binary for hunting deeply hidden software vulnerabilities
F Rustamov, J Kim, JB Yun
Future Internet 12 (4), 74, 2020
42020
Software Vulnerability Prediction System Using Machine Learning Algorithm
M Choi, J Kim, J Yun
Journal of the Korea Institute of Information Security & Cryptology 28 (3 …, 2018
32018
HD-FUZZ: Hardware dependency-aware firmware fuzzing via hybrid MMIO modeling
J Kim, J Yu, Y Lee, DD Kim, J Yun
Journal of Network and Computer Applications 224, 103835, 2024
12024
Adaptive Emulation Framework for Multi-Architecture IoT Firmware Testing
J Yu, J Kim, Y Lee, F Rustamov, J Yun
CMC-COMPUTERS MATERIALS & CONTINUA 75 (2), 3291-3315, 2023
2023
Ransomware Detection and Recovery System Based on Cloud Storage through File System Monitoring
J Kim, MJ Choi, J Yun
Journal of the Korea Institute of Information Security & Cryptology 28 (2 …, 2018
2018
系统目前无法执行此操作,请稍后再试。
文章 1–11