CyTIME: Cyber Threat Intelligence ManagEment framework for automatically generating security rules E Kim, K Kim, D Shin, B Jin, H Kim Proceedings of the 13th International Conference on Future Internet …, 2018 | 31 | 2018 |
When harry met tinder: Security analysis of dating apps on android K Kim, T Kim, S Lee, S Kim, H Kim Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway …, 2018 | 18 | 2018 |
Hello, Facebook! Here is the stalkers’ paradise!: Design and analysis of enumeration attack using phone numbers on Facebook J Kim, K Kim, J Cho, H Kim, S Schrittwieser Information Security Practice and Experience: 13th International Conference …, 2017 | 7 | 2017 |
Bypassing DRM protection in e-book applications on Android S Lee, K Kim, J Kang, H Kim 2018 International Conference on Information Networking (ICOIN), 194-198, 2018 | 4 | 2018 |
A Framework for managing user-defined security policies to support network security functions E Kim, K Kim, S Lee, JP Jeong, H Kim Proceedings of the 12th International Conference on Ubiquitous Information …, 2018 | 4 | 2018 |
ACIDroid: a practical app cache integrity protection system on Android Runtime J Choi, S Kim, J Cho, K Kim, S Hong, H Kim Proceedings of the 35th Annual ACM Symposium on Applied Computing, 376-383, 2020 | | 2020 |
안드로이드 문자열 암호화 적용 현황 분석 김귀주, 이민욱 한국정보과학회 학술발표논문집, 1150-1152, 2019 | | 2019 |
Automated Cash Mining Attacks on Mobile Advertising Networks W Ji, T Kim, K Kim, H Kim Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019 | | 2019 |
인증코드 전달 공격 방어 프레임워크 김귀주, 김형식 한국정보과학회 학술발표논문집, 1021-1023, 2017 | | 2017 |