关注
Jeong Hyun Yi
Jeong Hyun Yi
Soongsil University
在 csec.kr 的电子邮件经过验证 - 首页
标题
引用次数
年份
Pinicorn: Towards Automated Dynamic Analysis for Unpacking 32-Bit PE Malware
G Lee, M Kim, JH Yi, H Cho
Electronics 13 (11), 2081, 2024
2024
Device for automatically identifying anti-analysis techniques by using signature extraction and method therefor
JH Yi, MK Kang
US Patent 11,934,495, 2024
12024
Method for evaluating risk of data leakage in application, recording medium and device for performing the method
JH Yi, C Minseong, S Lee
US Patent 11,928,220, 2024
2024
Hybrid Dynamic Analysis for Android Malware Protected by Anti-Analysis Techniques with DOOLDA
S Lee, Y Shin, M Choi, H Cho, JH Yi
Journal of Internet Technology 25 (2), 195-213, 2024
2024
Process wrapping method for evading anti-analysis of native codes, recording medium and device for performing the method
JH Yi, YG Shin
US Patent 11,886,589, 2024
2024
Mobile malicious code classification method based on feature selection and recording medium and device for performing the same
JH Yi, EB Ko
US Patent 11,809,557, 2023
2023
Mobile application malicious behavior pattern detection method based on API call graph extraction and recording medium and device for performing the same
JH Yi, JS Kim
US Patent 11,768,938, 2023
2023
Augmenting Android Malware Using Conditional Variational Autoencoder for the Malware Family Classification.
Y Ban, JH Yi, H Cho
Computer Systems Science & Engineering 46 (2), 2023
2023
Docurity: A New Cryptographic Primitive for Collaborative Cloud Systems.
B Kim, M Choi, TY Youn, JH Yi, H Cho
Intelligent Automation & Soft Computing 36 (3), 2023
2023
SMINER: Detecting Unrestricted and Misimplemented Behaviors of Software Systems Based on Unit Test Cases.
K Sim, JH Yi, H Cho
Computers, Materials & Continua 75 (2), 2023
2023
Hiding Data in the Padding Area of Android Applications without Re-Packaging
G Jeon, JH Yi, H Cho
IEICE TRANSACTIONS on Information and Systems 105 (11), 1928-1929, 2022
2022
Device and method for bypassing analysis evasion technique, and recording medium for a program for performing the same
JH Yi, S Lee
US Patent 11,403,371, 2022
2022
MAPAS: a practical deep learning-based android malware detection system
J Kim, Y Ban, E Ko, H Cho, JH Yi
International Journal of Information Security 21 (4), 725-738, 2022
792022
Large-scale analysis on anti-analysis techniques in real-world malware
M Kim, H Cho, JH Yi
IEEE access 10, 75802-75815, 2022
102022
Code sequence based intelligent key code identification method and recording medium and device for performing the same
JH Yi, YH Ban
US Patent App. 17/288,969, 2022
2022
Obfuscated identifier detection method based on natural language processing and recording medium and apparatus for performing the same
JH Yi, J Geochang
US Patent App. 17/278,781, 2022
2022
Fam: Featuring android malware for deep learning-based familial analysis
Y Ban, S Lee, D Song, H Cho, JH Yi
IEEE Access 10, 20008-20018, 2022
122022
Automated multi-layered bytecode generation for preventing sensitive information leaks from android applications
G Jeon, M Choi, S Lee, JH Yi, H Cho
IEEE Access 9, 119578-119590, 2021
22021
Method of application malware detection based on dynamic API extraction, and readable medium and apparatus for performing the method
JH Yi, KIM Kichang
US Patent 11,019,099, 2021
2021
ACAMA: Deep Learning‐Based Detection and Classification of Android Malware Using API‐Based Features
E Ko, J Kim, Y Ban, H Cho, JH Yi
Security and Communication Networks 2021 (1), 6330828, 2021
32021
系统目前无法执行此操作,请稍后再试。
文章 1–20