Graduate School of Information Security

  • Korea, Republic of

Research Output

2019

ADSaS: Comprehensive real-time anomaly detection system

Lee, S. & Kim, H. K., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 29-41 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Android Application Risk Indicator Based on Feature Analysis Utilizing Machine Learning

Baek, H., Joo, M., Park, W., You, Y. & Lee, K. H., 2019 Mar 18, 2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8669424. (2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A new bayesian approach to exploring damaged assets by monitoring mission failures caused by undetected attack

Shim, S. & Yoon, J. W., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 185-196 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure

Lee, S., Cho, S. M., Kim, H. & Hong, S., 2019 Jan 1, In : IEEE Access. 7, p. 47582-47592 11 p., 8681035.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

A Scheduler Considering Characteristics of VM for Mitigation of Unstable Performance

Bak, B., Kang, J., Choi, H., Lee, J., Yu, H. & Chung, K., 2019 Apr 29, Proceedings - 2018 9th International Conference on Parallel Architectures, Algorithms and Programming, PAAP 2018. IEEE Computer Society, p. 49-53 5 p. 8701858. (Proceedings - International Symposium on Parallel Architectures, Algorithms and Programming, PAAP; vol. 2018-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Automated Reverse Engineering and Attack for CAN Using OBD-II

Kang, T. U., Song, H. M., Jeong, S. & Kim, H. K., 2019 Apr 12, 2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8690781. (IEEE Vehicular Technology Conference; vol. 2018-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

CCA security for self-updatable encryption:Protecting cloud data when clients read/write ciphertexts

Lee, K., Lee, D. H., Park, J. H. & Yung, M., 2019 Apr 1, In : Computer Journal. 62, 4, p. 545-562 18 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
1 Citation (Scopus)

Detecting In-vehicle CAN Message Attacks Using Heuristics and RNNs

Tariq, S., Lee, S., Kim, H. K. & Woo, S. S., 2019 Jan 1, Information and Operational Technology Security Systems - 1st International Workshop, IOSec 2018, CIPSEC Project, Revised Selected Papers. Marín Tordera, E., Fournaris, A. P. & Lampropoulos, K. (eds.). Springer Verlag, p. 39-45 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DQN-based OpenCL workload partition for performance optimization

Park, S. & Suh, T., 2019 Jan 1, In : Journal of Supercomputing.

Research output: Contribution to journalArticle

Enhanced android app-repackaging attack on in-vehicle network

Lee, Y., Woo, S., Lee, J., Song, Y., Moon, H., Lee, D. H. & Andersson, K., 2019 Jan 1, In : Wireless Communications and Mobile Computing. 2019, 5650245.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

FAIR-Based cyber influence damage assessment for exploit in mobile device

Park, M., Han, J., Seo, J., Oh, H. & Lee, K. H., 2019 Jan 1, Mobile Internet Security - 2nd International Symposium, MobiSec 2017, Revised Selected Papers. Sharma, V., Chen, H-C., You, I. & Kotenko, I. (eds.). Springer Verlag, p. 51-64 14 p. (Communications in Computer and Information Science; vol. 971).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts

Jeong, D. & Lee, S., 2019 Jun 1, In : Digital Investigation. 29, p. 21-27 7 p.

Research output: Contribution to journalArticle

I would not plant apple trees if the world will be wiped: Analyzing hundreds of millions of behavioral records of players during an MMORPG beta test

Kang, A. R., Blackburn, J., Kwak, H. & Kim, H. K., 2019 Jan 1, 26th International World Wide Web Conference 2017, WWW 2017 Companion. International World Wide Web Conferences Steering Committee, p. 435-444 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lightweight conversion from arithmetic to Boolean masking for embedded IoT processor

Kim, H. B., Hong, S. & Kim, H. S., 2019 Apr 1, In : Applied Sciences (Switzerland). 9, 7, 1438.

Research output: Contribution to journalArticle

Open Access

Logarithm design on encrypted data with bitwise operation

Yoo, J. S., Song, B. K. & Yoon, J. W., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 105-116 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

New technique for chosen-ciphertext security based on non-interactive zero-knowledge

Seo, M., Abdalla, M., Lee, D. H. & Park, J. H., 2019 Jul 1, In : Information Sciences. 490, p. 18-35 18 p.

Research output: Contribution to journalArticle

Preface

Yoo, C. D., Shi, Y. Q., Piva, A., Kim, H. J. & Kim, G., 2019 Jan 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11378 LNCS, p. V-VI

Research output: Contribution to journalEditorial

T-Box: A Forensics-Enabled Trusted Automotive Data Recording Method

Lee, S., Choi, W., Jo, H. J. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 49738-49755 18 p., 8689029.

Research output: Contribution to journalArticle

2 Citations (Scopus)
Open Access
1 Citation (Scopus)

Usability Evaluation Model for Biometric System considering Privacy Concern Based on MCDM Model

Oh, J., Lee, U. & Lee, K. H., 2019 Jan 1, In : Security and Communication Networks. 2019, 8715264.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

VODKA: Virtualization obfuscation using dynamic key approach

Lee, J. Y., Suk, J. H. & Lee, D. H., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 131-145 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

A cyber command and control framework for psychological operation using social media

Kim, K., Seo, J., Park, M., Park, M. & Lee, K. H., 2018 Oct 1, In : Journal of Telecommunication, Electronic and Computer Engineering. 10, 4, p. 101-105 5 p.

Research output: Contribution to journalArticle

A distributed snapshot protocol for efficient artificial intelligence computation in cloud computing environments

Lim, J. B., Gil, J. M. & Yu, H., 2018 Jan 1, In : Symmetry. 10, 1, 30.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Advanced approach to information security management system utilizing maturity models in critical infrastructure

You, Y., Oh, J., Kim, S. & Lee, K. H., 2018 Jan 1, In : KSII Transactions on Internet and Information Systems. 12, 10, p. 4995-5014 20 p.

Research output: Contribution to journalArticle

A Low-Cost Surveillance and Information System for Museum Using Visible Light Communication

Kim, M. & Suh, T., 2018 Jan 1, (Accepted/In press) In : IEEE Sensors Journal.

Research output: Contribution to journalArticle

3 Citations (Scopus)

An analysis of economic impact on IoT industry under GDPR

Seo, J., Kim, K., Park, M., Park, M. & Lee, K. H., 2018 Jan 1, In : Mobile Information Systems. 2018, 6792028.

Research output: Contribution to journalArticle

2 Citations (Scopus)
5 Citations (Scopus)

Andro-Simnet: Android Malware Family Classification using Social Network Analysis

Kim, H. M., Song, H. M., Seo, J. W. & Kim, H. K., 2018 Oct 29, 2018 16th Annual Conference on Privacy, Security and Trust, PST 2018. Deng, R. H., Marsh, S., Nurse, J., Lu, R., Sezer, S., Miller, P., Chen, L., McLaughlin, K. & Ghorbani, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 8514216. (2018 16th Annual Conference on Privacy, Security and Trust, PST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

An intelligent residual resource monitoring scheme in cloud computing environments

Lim, J. B., Yu, H. & Gil, J. M., 2018 Jan 1, In : Journal of Information Processing Systems. 14, 6, p. 1480-1493 14 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Anomaly intrusion detection method for vehicular networks based on survival analysis

Han, M. L., Kwak, B. I. & Kim, H. K., 2018 Oct 1, In : Vehicular Communications. 14, p. 52-63 12 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)

A privacy-preserving data sharing solution for mobile healthcare

Huang, C., Yan, K., Wei, S. & Lee, D. H., 2018 May 15, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 260-265 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment

Xu, L., Lee, J., Kim, S. H., Zheng, Q., Xu, S., Suh, T., Ro, W. W. & Shi, W., 2018 Apr 1, In : IEEE Transactions on Cloud Computing. 6, 2, p. 478-491 14 p.

Research output: Contribution to journalArticle

A Review of Cyber Security Controls from An ICS Perspective

You, Y., Lee, J., Oh, J. & Lee, K. H., 2018 Sep 25, 2018 International Conference on Platform Technology and Service, PlatCon 2018. Institute of Electrical and Electronics Engineers Inc., 8472757

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

A study on the priority decision making of processes for IT governance based on the IT-related goals of COBIT 5

Lee, J., Lee, J. & Lee, K. H., 2018 Jan 1, Proceedings of the 31st International Business Information Management Association Conference, IBIMA 2018: Innovation Management and Education Excellence through Vision 2020. Soliman, K. S. (ed.). International Business Information Management Association, IBIMA, p. 5445-5455 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Breaking Text CAPTCHA by Repeated Information

Woo, J. H., Park, M. & Lee, K. H., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Springer Verlag, p. 127-136 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Complex Network of Damage Assessment Using GMM Based FAIR

Park, M., Joo, M., Seo, J., Kim, K., Park, M. & Lee, K. H., 2018 May 25, Proceedings - 2018 IEEE International Conference on Big Data and Smart Computing, BigComp 2018. Institute of Electrical and Electronics Engineers Inc., p. 627-630 4 p. 8367191

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Construction of a New Biometric-Based Key Derivation Function and Its Application

Seo, M., Park, J. H., Kim, Y., Cho, S., Lee, D. H. & Hwang, J. Y., 2018 Jan 1, In : Security and Communication Networks. 2018, 6107912.

Research output: Contribution to journalArticle

Contagion of Cheating Behaviors in Online Social Networks

Woo, J., Kang, S. W., Kim, H. K. & Park, J., 2018 May 5, (Accepted/In press) In : IEEE Access.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Correction to: An efficient implementation of pairing-based cryptography on MSP430 processor

Kwon, J., Seo, S. C. & Hong, S., 2018 Mar 13, (Accepted/In press) In : Journal of Supercomputing. 1 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Cyber Influence Attack: Changes in Cyber Threats Seen in the Russian Hacking Incident

Park, M., Park, M. & Lee, K. H., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Springer Verlag, p. 224-235 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DDoS Mitigation: Decentralized CDN Using Private Blockchain

Kim, K., You, Y., Park, M. & Lee, K. H., 2018 Aug 14, ICUFN 2018 - 10th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, Vol. 2018-July. p. 693-696 4 p. 8436643

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Detecting Potential Insider Threat: Analyzing Insiders' Sentiment Exposed in Social Media

Park, W., You, Y. & Lee, K. H., 2018 Jan 1, In : Security and Communication Networks. 2018, 7243296.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Efficient anonymous attribute-based encryption with access policy hidden for cloud computing

Huang, C., Yan, K., Wei, S., Zhang, G. & Lee, D. H., 2018 May 15, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 266-270 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Efficient Isogeny Computations on Twisted Edwards Curves

Kim, S., Yoon, K., Kwon, J., Hong, S. & Park, Y. H., 2018 Jan 1, In : Security and Communication Networks. 2018, 5747642.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Energy-aware key exchange for securing implantable medical devices

Choi, W., Lee, Y., Lee, D., Kim, H., Park, J. H., Kim, I-S. & Lee, D. H., 2018 Jan 1, In : Security and Communication Networks. 2018, 1809302.

Research output: Contribution to journalArticle

Open Access

Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers

Yoon, J. W., Hong, T. Y., Choi, J. W., Park, C. Y., Kim, K. B. & Yu, H., 2018 Mar 27, (Accepted/In press) In : Peer-to-Peer Networking and Applications. p. 1-11 11 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Feature selection practice for unsupervised learning of credit card fraud detection

Lee, H., Choi, D., Yim, H., Choi, E., Go, W., Lee, T., Kim, I-S. & Lee, K. H., 2018 Jan 1, In : Journal of Theoretical and Applied Information Technology. 96, 2, p. 408-417 10 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)