Pinicorn: Towards Automated Dynamic Analysis for Unpacking 32-Bit PE Malware G Lee, M Kim, JH Yi, H Cho Electronics 13 (11), 2081, 2024 | | 2024 |
Device for automatically identifying anti-analysis techniques by using signature extraction and method therefor JH Yi, MK Kang US Patent 11,934,495, 2024 | 1 | 2024 |
Method for evaluating risk of data leakage in application, recording medium and device for performing the method JH Yi, C Minseong, S Lee US Patent 11,928,220, 2024 | | 2024 |
Hybrid Dynamic Analysis for Android Malware Protected by Anti-Analysis Techniques with DOOLDA S Lee, Y Shin, M Choi, H Cho, JH Yi Journal of Internet Technology 25 (2), 195-213, 2024 | | 2024 |
Process wrapping method for evading anti-analysis of native codes, recording medium and device for performing the method JH Yi, YG Shin US Patent 11,886,589, 2024 | | 2024 |
Mobile malicious code classification method based on feature selection and recording medium and device for performing the same JH Yi, EB Ko US Patent 11,809,557, 2023 | | 2023 |
Mobile application malicious behavior pattern detection method based on API call graph extraction and recording medium and device for performing the same JH Yi, JS Kim US Patent 11,768,938, 2023 | | 2023 |
Augmenting Android Malware Using Conditional Variational Autoencoder for the Malware Family Classification. Y Ban, JH Yi, H Cho Computer Systems Science & Engineering 46 (2), 2023 | | 2023 |
Docurity: A New Cryptographic Primitive for Collaborative Cloud Systems. B Kim, M Choi, TY Youn, JH Yi, H Cho Intelligent Automation & Soft Computing 36 (3), 2023 | | 2023 |
SMINER: Detecting Unrestricted and Misimplemented Behaviors of Software Systems Based on Unit Test Cases. K Sim, JH Yi, H Cho Computers, Materials & Continua 75 (2), 2023 | | 2023 |
Hiding Data in the Padding Area of Android Applications without Re-Packaging G Jeon, JH Yi, H Cho IEICE TRANSACTIONS on Information and Systems 105 (11), 1928-1929, 2022 | | 2022 |
Device and method for bypassing analysis evasion technique, and recording medium for a program for performing the same JH Yi, S Lee US Patent 11,403,371, 2022 | | 2022 |
MAPAS: a practical deep learning-based android malware detection system J Kim, Y Ban, E Ko, H Cho, JH Yi International Journal of Information Security 21 (4), 725-738, 2022 | 79 | 2022 |
Large-scale analysis on anti-analysis techniques in real-world malware M Kim, H Cho, JH Yi IEEE access 10, 75802-75815, 2022 | 10 | 2022 |
Code sequence based intelligent key code identification method and recording medium and device for performing the same JH Yi, YH Ban US Patent App. 17/288,969, 2022 | | 2022 |
Obfuscated identifier detection method based on natural language processing and recording medium and apparatus for performing the same JH Yi, J Geochang US Patent App. 17/278,781, 2022 | | 2022 |
Fam: Featuring android malware for deep learning-based familial analysis Y Ban, S Lee, D Song, H Cho, JH Yi IEEE Access 10, 20008-20018, 2022 | 12 | 2022 |
Automated multi-layered bytecode generation for preventing sensitive information leaks from android applications G Jeon, M Choi, S Lee, JH Yi, H Cho IEEE Access 9, 119578-119590, 2021 | 2 | 2021 |
Method of application malware detection based on dynamic API extraction, and readable medium and apparatus for performing the method JH Yi, KIM Kichang US Patent 11,019,099, 2021 | | 2021 |
ACAMA: Deep Learning‐Based Detection and Classification of Android Malware Using API‐Based Features E Ko, J Kim, Y Ban, H Cho, JH Yi Security and Communication Networks 2021 (1), 6330828, 2021 | 3 | 2021 |