Trustzone explained: Architectural features and use cases B Ngabonziza, D Martin, A Bailey, H Cho, S Martin 2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016 | 191 | 2016 |
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ... Proceedings of the 42nd IEEE Symposium on Security and Privacy (Oakland), 0 | 89* | |
MAPAS: a practical deep learning-based android malware detection system J Kim, Y Ban, E Ko, H Cho, JH Yi International Journal of Information Security 21 (4), 725-738, 2022 | 79 | 2022 |
Prime+Count: Novel cross-world covert channels on arm trustzone H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 55 | 2018 |
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases ST Dinh, H Cho, K Martin, A Oest, K Zeng, A Kapravelos, GJ Ahn, T Bao, ... Proceedings of the 2021 Network and Distributed System Security Symposium (NDSS), 2021 | 45 | 2021 |
Scam Pandemic: How Attackers Exploit Public Fear through Phishing M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ... Proceedings of the 2020 APWG Symposium on Electronic Crime Research (eCrime), 2021 | 43 | 2021 |
Anti-debugging scheme for protecting mobile apps on android platform H Cho, J Lim, H Kim, JH Yi the Journal of Supercomputing 72, 232-246, 2016 | 30 | 2016 |
Playing for {K (H) eaps}: Understanding and improving linux kernel exploit reliability K Zeng, Y Chen, H Cho, X Xing, A Doupé, Y Shoshitaishvili, T Bao 31st USENIX Security Symposium (USENIX Security 22), 71-88, 2022 | 21 | 2022 |
Sooel Son, Gail-Joon Ahn, and Tudor Dumitras. 2021. Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem D Kim, H Cho, Y Kwon, A Doupé Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 16 | 2021 |
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers H Cho, J Park, J Kang, T Bao, R Wang, Y Shoshitaishvili, A Doupé, ... Proceedings of the 14th USENIX Workshop on Offensive Technologies (WOOT), 2020 | 16 | 2020 |
DexMonitor: dynamically analyzing and monitoring obfuscated Android applications H Cho, JH Yi, GJ Ahn IEEE Access 6, 71229-71240, 2018 | 16 | 2018 |
Fam: Featuring android malware for deep learning-based familial analysis Y Ban, S Lee, D Song, H Cho, JH Yi IEEE Access 10, 20008-20018, 2022 | 12 | 2022 |
Security analysis on practices of certificate authorities in the HTTPS phishing ecosystem D Kim, H Cho, Y Kwon, A Doupé, S Son, GJ Ahn, T Dumitras Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 12 | 2021 |
SmokeBomb: Effective Mitigation Against Cache Side-channel Attacks on the ARM Architecture H Cho, J Park, D Kim, Z Zhao, Y Shoshitaishvili, A Doupé, GJ Ahn The 18th ACM International Conference on Mobile Systems, Applications, and …, 2020 | 12 | 2020 |
Wi not calling: Practical privacy and availability Attacks in Wi-Fi calling J Baek, S Kyung, H Cho, Z Zhao, Y Shoshitaishvili, A Doupé, GJ Ahn Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 12 | 2018 |
Personal information leaks with automatic login in mobile social network services J Choi, H Cho, JH Yi Entropy 17 (6), 3947-3962, 2015 | 10 | 2015 |
Large-scale analysis on anti-analysis techniques in real-world malware M Kim, H Cho, JH Yi IEEE access 10, 75802-75815, 2022 | 9 | 2022 |
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior P Zhang, Z Sun, S Kyung, HW Behrens, ZL Basque, H Cho, A Oest, ... Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 8 | 2022 |
ViK: practical mitigation of temporal memory safety violations through object ID inspection H Cho, J Park, A Oest, T Bao, R Wang, Y Shoshitaishvili, A Doupé, ... Proceedings of the 27th ACM International Conference on Architectural …, 2022 | 8 | 2022 |
Mobile application tamper detection scheme using dynamic code injection against repackaging attacks H Cho, J Bang, M Ji, JH Yi The Journal of Supercomputing 72 (9), 3629–3645, 2016 | 4 | 2016 |