A Design and study on automatic extraction of kernel data structure to improve performance of rootkit detection tool, Gibraltar. W Choi, H Yi, Y Cho, Y Paek Proceedings of the Korea Information Processing Society Conference, 384-387, 2015 | | 2015 |
A Meta-data Generation and Compression Technique for Code Reuse Attack Detection D Hwang, I Heo, J Lee, H Yi, Y Paek Proceedings of the Korea Information Processing Society Conference, 424-427, 2015 | | 2015 |
A Study on Dynamic Mobile Malware Detection Systems DH Kwon, HY Yi, YP Cho, YH Paek Proceedings of the Korea Information Processing Society Conference, 398-400, 2014 | | 2014 |
A Study on effect the performance prediction of mobile application on mobile offloading Y Kwon, S Yang, D Kwon, H Yi, Y Paek Proceedings of the Korea Information Processing Society Conference, 233-236, 2014 | | 2014 |
A Study on Offloading Techniques for 3D Rendering Applications S Yang, Y Kwon, H Yi, D Kwon, Y Paek Proceedings of the Korea Information Processing Society Conference, 246-248, 2014 | | 2014 |
DADE: a fast data anomaly detection engine for kernel integrity monitoring H Yi, Y Cho, Y Paek, K Ko The Journal of Supercomputing 75, 4575-4600, 2019 | 4 | 2019 |
Data embedding scheme for efficient program behavior modeling with neural networks S Ahn, H Yi, H Bae, S Yoon, Y Paek IEEE Transactions on Emerging Topics in Computational Intelligence 6 (4 …, 2022 | 2 | 2022 |
Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM. Y Cho, D Kwon, H Yi, Y Paek NDSS, 2017 | 23 | 2017 |
Exploiting Multi Data Memory Banks in Embedded Systems D Cho, S Yang, Y Kwon, H Yi, D Kwon, Y Paek Proceedings of the Korea Information Processing Society Conference, 46-47, 2013 | | 2013 |
Exploration of machine learning techniques for anomaly detection in computer security 이하윤 서울대학교 대학원, 2019 | | 2019 |
Fast dynamic execution offloading for efficient mobile cloud computing S Yang, Y Kwon, Y Cho, H Yi, D Kwon, J Youn, Y Paek 2013 IEEE International conference on Pervasive computing and communications …, 2013 | 55 | 2013 |
Hawkware: Network intrusion detection based on behavior analysis with ANNs on an IoT device S Ahn, H Yi, Y Lee, WR Ha, G Kim, Y Paek 2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020 | 10 | 2020 |
Hypervisor based Root Exploitation Monitoring in Android Y Cho, H Yi, D Kwon, W Choi, Y Paek Proceedings of the Korea Information Processing Society Conference, 395-397, 2014 | | 2014 |
LSTM-based system-call language modeling and ensemble method for host-based intrusion detection G Kim, H Yi, J Lee, Y Paek, S Yoon | 1 | 2016 |
LSTM-based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems G Kim, H Yi, J Lee, Y Paek, S Yoon arXiv preprint arXiv:1611.01726, 2016 | 143 | 2016 |
LSTM-based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems. arXiv 2016 G Kim, H Yi, J Lee, Y Paek, S Yoon arXiv preprint arXiv:1611.01726, 2016 | 15 | 2016 |
Mantis: Automatic performance prediction for smartphone applications Y Kwon, S Lee, H Yi, D Kwon, S Yang, BG Chun, L Huang, P Maniatis, ... 2013 USENIX Annual Technical Conference (USENIX ATC 13), 297-308, 2013 | 90 | 2013 |
Mantis: Efficient predictions of execution time, energy usage, memory usage and network usage on smart mobile devices Y Kwon, S Lee, H Yi, D Kwon, S Yang, B Chun, L Huang, P Maniatis, ... IEEE Transactions on Mobile Computing 14 (10), 2059-2072, 2014 | 20 | 2014 |
Mimicry resilient program behavior modeling with LSTM based branch models H Yi, G Kim, J Lee, S Ahn, Y Lee, S Yoon, Y Paek arXiv preprint arXiv:1803.09171, 2018 | 8 | 2018 |
Poster: Fast Object Identification for Kernel Data Anomaly Detection H Yi, Y Cho, D Kwon, Y Paek | | 2017 |