Seguir
Junsung Cho
Junsung Cho
Directional Inc.
Dirección de correo verificada de directional.net
Título
Citado por
Citado por
Año
SENTINEL: A secure and efficient authentication framework for unmanned aerial vehicles
G Cho, J Cho, S Hyun, H Kim
Applied Sciences 10 (9), 3149, 2020
762020
Syspal: System-guided pattern locks for android
G Cho, JH Huh, J Cho, S Oh, Y Song, H Kim
2017 IEEE Symposium on security and privacy (SP), 338-356, 2017
522017
Method of sharing key between devices using physical access restriction
SH Jeon, HS Kim, MS Kim, KW Park, JS Cho, JG Yu
US Patent 10,298,557, 2019
472019
An empirical study of click fraud in mobile advertising networks
G Cho, J Cho, Y Song, H Kim
2015 10th International Conference on Availability, Reliability and Security …, 2015
472015
Combating online fraud attacks in mobile-based advertising
G Cho, J Cho, Y Song, D Choi, H Kim
EURASIP Journal on Information Security 2016, 1-9, 2016
332016
Keyboard or keylogger?: a security analysis of third-party keyboards on android
J Cho, G Cho, H Kim
2015 13th Annual Conference on Privacy, Security and Trust (PST), 173-176, 2015
292015
IoE security threats and you
J Ryoo, S Kim, J Cho, H Kim, S Tjoa, C DeRobertis
2017 International Conference on Software Security and Assurance (ICSSA), 13-19, 2017
282017
Wrong siren! a location spoofing attack on indoor positioning systems: The starbucks case study
J Cho, J Yu, S Oh, J Ryoo, JS Song, H Kim
IEEE communications magazine 55 (3), 132-137, 2017
262017
On the security and usability implications of providing multiple authentication choices on smartphones: The more, the better?
G Cho, JH Huh, S Kim, J Cho, H Park, Y Lee, K Beznosov, H Kim
ACM Transactions on Privacy and Security (TOPS) 23 (4), 1-32, 2020
222020
The personal identification chord: A four buttonauthentication system for smartwatches
I Oakley, JH Huh, J Cho, G Cho, R Islam, H Kim
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
222018
Towards secure and usable certificate-based authentication system using a secondary device for an industrial internet of things
J Choi, J Cho, H Kim, S Hyun
Applied Sciences 10 (6), 1962, 2020
112020
Design and Analysis of Push Notification‐Based Malware on Android
S Hyun, J Cho, G Cho, H Kim
Security and Communication Networks 2018 (1), 8510256, 2018
112018
Data-driven selection of security application frameworks during architectural design
H Cervantes, R Kazman, J Ryoo, J Cho, G Cho, H Kim, J Kang
82019
User credential cloning attacks in android applications: exploiting automatic login on android apps and mitigating strategies
J Cho, D Kim, H Kim
IEEE Consumer Electronics Magazine 7 (3), 48-55, 2018
72018
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices.
J Cho, G Cho, S Hyun, H Kim
J. Internet Serv. Inf. Secur. 7 (4), 35-44, 2017
72017
Hello, Facebook! Here is the stalkers’ paradise!: Design and analysis of enumeration attack using phone numbers on Facebook
J Kim, K Kim, J Cho, H Kim, S Schrittwieser
Information Security Practice and Experience: 13th International Conference …, 2017
72017
ACIDroid: a practical app cache integrity protection system on Android Runtime
J Choi, S Kim, J Cho, K Kim, S Hong, H Kim
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 376-383, 2020
2020
A methodology to support the selection of security frameworks
J Ryoo, J Cho, H Cervantes, R Kazman, G Cho, J Kang, H Kim, ...
2019
The trend of Smart home security technology and policy
G Cho, J Kang, JS Cho, Y Song, H Kim
Proceedings of the Korea Information Processing Society Conference, 445-448, 2015
2015
Poster: Design of Backdoor on Android Devices
J Cho, G Cho, S Hyun, H Kim
Ratio 1, 0.008, 0
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20