Graduate School of Information Security

  • Korea, Republic of

Research Output 1995 2019

2019

ADSaS: Comprehensive real-time anomaly detection system

Lee, S. & Kim, H. K., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 29-41 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Anomaly Detection
Real-time
Anomaly
Time series
Moving Average Model

Android Application Risk Indicator Based on Feature Analysis Utilizing Machine Learning

Baek, H., Joo, M., Park, W., You, Y. & Lee, K. H., 2019 Mar 18, 2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8669424. (2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Learning systems
Mobile devices
Decision making
Android (operating system)

A new bayesian approach to exploring damaged assets by monitoring mission failures caused by undetected attack

Shim, S. & Yoon, J. W., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 185-196 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bayesian networks
Bayesian Approach
Computer systems
Attack
Monitoring
1 Citation (Scopus)

A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure

Lee, S., Cho, S. M., Kim, H. & Hong, S., 2019 Jan 1, In : IEEE Access. 7, p. 47582-47592 11 p., 8681035.

Research output: Contribution to journalArticle

Open Access
Microcontrollers
Recovery
Side channel attack

A Scheduler Considering Characteristics of VM for Mitigation of Unstable Performance

Bak, B., Kang, J., Choi, H., Lee, J., Yu, H. & Chung, K., 2019 Apr 29, Proceedings - 2018 9th International Conference on Parallel Architectures, Algorithms and Programming, PAAP 2018. IEEE Computer Society, p. 49-53 5 p. 8701858. (Proceedings - International Symposium on Parallel Architectures, Algorithms and Programming, PAAP; vol. 2018-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network performance
Virtual reality
Program processors
Deterioration
Virtualization

Automated Reverse Engineering and Attack for CAN Using OBD-II

Kang, T. U., Song, H. M., Jeong, S. & Kim, H. K., 2019 Apr 12, 2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8690781. (IEEE Vehicular Technology Conference; vol. 2018-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
Reverse Engineering
Diagnostics
Attack
Controller
1 Citation (Scopus)

CCA security for self-updatable encryption:Protecting cloud data when clients read/write ciphertexts

Lee, K., Lee, D. H., Park, J. H. & Yung, M., 2019 Apr 1, In : Computer Journal. 62, 4, p. 545-562 18 p.

Research output: Contribution to journalArticle

Cryptography
Servers
Cloud computing
Access control
1 Citation (Scopus)
Authentication
Network protocols
Glossaries
Telecommunication networks
Hardware

Detecting In-vehicle CAN Message Attacks Using Heuristics and RNNs

Tariq, S., Lee, S., Kim, H. K. & Woo, S. S., 2019 Jan 1, Information and Operational Technology Security Systems - 1st International Workshop, IOSec 2018, CIPSEC Project, Revised Selected Papers. Marín Tordera, E., Fournaris, A. P. & Lampropoulos, K. (eds.). Springer Verlag, p. 39-45 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recurrent neural networks
Recurrent Neural Networks
Attack
Heuristics
Controller

DQN-based OpenCL workload partition for performance optimization

Park, S. & Suh, T., 2019 Jan 1, In : Journal of Supercomputing.

Research output: Contribution to journalArticle

Performance Optimization
Reinforcement learning
Learning algorithms
Workload
Decoding

Enhanced android app-repackaging attack on in-vehicle network

Lee, Y., Woo, S., Lee, J., Song, Y., Moon, H., Lee, D. H. & Andersson, K., 2019 Jan 1, In : Wireless Communications and Mobile Computing. 2019, 5650245.

Research output: Contribution to journalArticle

Open Access
Application programs
Railroad cars
Automobiles
Communication
Android (operating system)

FAIR-Based cyber influence damage assessment for exploit in mobile device

Park, M., Han, J., Seo, J., Oh, H. & Lee, K. H., 2019 Jan 1, Mobile Internet Security - 2nd International Symposium, MobiSec 2017, Revised Selected Papers. Sharma, V., Chen, H-C., You, I. & Kotenko, I. (eds.). Springer Verlag, p. 51-64 14 p. (Communications in Computer and Information Science; vol. 971).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Damage Assessment
Factor analysis
Factor Analysis
Mobile devices
Mobile Devices

Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts

Jeong, D. & Lee, S., 2019 Jun 1, In : Digital Investigation. 29, p. 21-27 7 p.

Research output: Contribution to journalArticle

Firmware
Copying
Computer operating systems
Artifacts
artifact

I would not plant apple trees if the world will be wiped: Analyzing hundreds of millions of behavioral records of players during an MMORPG beta test

Kang, A. R., Blackburn, J., Kwak, H. & Kim, H. K., 2019 Jan 1, 26th International World Wide Web Conference 2017, WWW 2017 Companion. International World Wide Web Conferences Steering Committee, p. 435-444 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lightweight conversion from arithmetic to Boolean masking for embedded IoT processor

Kim, H. B., Hong, S. & Kim, H. S., 2019 Apr 1, In : Applied Sciences (Switzerland). 9, 7, 1438.

Research output: Contribution to journalArticle

Open Access
masking
central processing units
Data storage equipment
attack
Internet of things
1 Citation (Scopus)

Logarithm design on encrypted data with bitwise operation

Yoo, J. S., Song, B. K. & Yoon, J. W., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 105-116 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Logarithm
Cryptography
Homomorphic Encryption
Privacy Preserving
Taylor Expansion

New technique for chosen-ciphertext security based on non-interactive zero-knowledge

Seo, M., Abdalla, M., Lee, D. H. & Park, J. H., 2019 Jul 1, In : Information Sciences. 490, p. 18-35 18 p.

Research output: Contribution to journalArticle

Chosen-ciphertext Security
Zero-knowledge
Encapsulation
Zero-knowledge Proof
Discrete Logarithm

Preface

Yoo, C. D., Shi, Y. Q., Piva, A., Kim, H. J. & Kim, G., 2019 Jan 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11378 LNCS, p. V-VI

Research output: Contribution to journalEditorial

1 Citation (Scopus)

T-Box: A Forensics-Enabled Trusted Automotive Data Recording Method

Lee, S., Choi, W., Jo, H. J. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 49738-49755 18 p., 8689029.

Research output: Contribution to journalArticle

Data recording
Accidents
Insurance
Authentication
Automobiles
1 Citation (Scopus)
Open Access
Smartphones
Mobile devices
Learning algorithms
Learning systems
Internet of things
1 Citation (Scopus)

Usability Evaluation Model for Biometric System considering Privacy Concern Based on MCDM Model

Oh, J., Lee, U. & Lee, K. H., 2019 Jan 1, In : Security and Communication Networks. 2019, 8715264.

Research output: Contribution to journalArticle

Open Access
Biometrics
Decision making
Students

VODKA: Virtualization obfuscation using dynamic key approach

Lee, J. Y., Suk, J. H. & Lee, D. H., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 131-145 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Obfuscation
Virtualization
Software Security
Debugging
Instrumentation
2018
Servers
Intrusion detection
Experiments
Botnet

A cyber command and control framework for psychological operation using social media

Kim, K., Seo, J., Park, M., Park, M. & Lee, K. H., 2018 Oct 1, In : Journal of Telecommunication, Electronic and Computer Engineering. 10, 4, p. 101-105 5 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

A distributed snapshot protocol for efficient artificial intelligence computation in cloud computing environments

Lim, J. B., Gil, J. M. & Yu, H., 2018 Jan 1, In : Symmetry. 10, 1, 30.

Research output: Contribution to journalArticle

artificial intelligence
Snapshot
Cloud computing
Cloud Computing
Artificial intelligence

Advanced approach to information security management system utilizing maturity models in critical infrastructure

You, Y., Oh, J., Kim, S. & Lee, K. H., 2018 Jan 1, In : KSII Transactions on Internet and Information Systems. 12, 10, p. 4995-5014 20 p.

Research output: Contribution to journalArticle

Critical infrastructures
Security of data
2 Citations (Scopus)

A Low-Cost Surveillance and Information System for Museum Using Visible Light Communication

Kim, M. & Suh, T., 2018 Jan 1, (Accepted/In press) In : IEEE Sensors Journal.

Research output: Contribution to journalArticle

Flashlights
museums
information systems
Museums
surveillance
1 Citation (Scopus)

An analysis of economic impact on IoT industry under GDPR

Seo, J., Kim, K., Park, M., Park, M. & Lee, K. H., 2018 Jan 1, In : Mobile Information Systems. 2018, 6792028.

Research output: Contribution to journalArticle

Economics
Costs
Industry
Internet of things
3 Citations (Scopus)
Artificial intelligence
Learning systems
Smartphones
Feature extraction
Sampling
1 Citation (Scopus)

Andro-Simnet: Android Malware Family Classification using Social Network Analysis

Kim, H. M., Song, H. M., Seo, J. W. & Kim, H. K., 2018 Oct 29, 2018 16th Annual Conference on Privacy, Security and Trust, PST 2018. Deng, R. H., Marsh, S., Nurse, J., Lu, R., Sezer, S., Miller, P., Chen, L., McLaughlin, K. & Ghorbani, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 8514216. (2018 16th Annual Conference on Privacy, Security and Trust, PST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electric network analysis
Malware
Social network analysis
Mobile devices
Computer systems
5 Citations (Scopus)

An intelligent residual resource monitoring scheme in cloud computing environments

Lim, J. B., Yu, H. & Gil, J. M., 2018 Jan 1, In : Journal of Information Processing Systems. 14, 6, p. 1480-1493 14 p.

Research output: Contribution to journalArticle

Cloud computing
Artificial intelligence
Monitoring
Quality of service
Computer science
7 Citations (Scopus)

Anomaly intrusion detection method for vehicular networks based on survival analysis

Han, M. L., Kwak, B. I. & Kim, H. K., 2018 Oct 1, In : Vehicular Communications. 14, p. 52-63 12 p.

Research output: Contribution to journalArticle

Intrusion detection
Communication
Network security
Semantics
1 Citation (Scopus)

A privacy-preserving data sharing solution for mobile healthcare

Huang, C., Yan, K., Wei, S. & Lee, D. H., 2018 May 15, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 260-265 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Health
mHealth
Biometrics
Access control

Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment

Xu, L., Lee, J., Kim, S. H., Zheng, Q., Xu, S., Suh, T., Ro, W. W. & Shi, W., 2018 Apr 1, In : IEEE Transactions on Cloud Computing. 6, 2, p. 478-491 14 p.

Research output: Contribution to journalArticle

Computer monitors
Data privacy
Computer operating systems
Cloud computing
Computer hardware
1 Citation (Scopus)

A Review of Cyber Security Controls from An ICS Perspective

You, Y., Lee, J., Oh, J. & Lee, K. H., 2018 Sep 25, 2018 International Conference on Platform Technology and Service, PlatCon 2018. Institute of Electrical and Electronics Engineers Inc., 8472757

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Control systems
Security of data
Critical infrastructures

A study on the priority decision making of processes for IT governance based on the IT-related goals of COBIT 5

Lee, J., Lee, J. & Lee, K. H., 2018 Jan 1, Proceedings of the 31st International Business Information Management Association Conference, IBIMA 2018: Innovation Management and Education Excellence through Vision 2020. Soliman, K. S. (ed.). International Business Information Management Association, IBIMA, p. 5445-5455 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decision making
Industry
Planning
IT governance
Methodology

Breaking Text CAPTCHA by Repeated Information

Woo, J. H., Park, M. & Lee, K. H., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Springer Verlag, p. 127-136 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Joining
Web Portal
High Accuracy
Choose
Calculate

Complex Network of Damage Assessment Using GMM Based FAIR

Park, M., Joo, M., Seo, J., Kim, K., Park, M. & Lee, K. H., 2018 May 25, Proceedings - 2018 IEEE International Conference on Big Data and Smart Computing, BigComp 2018. Institute of Electrical and Electronics Engineers Inc., p. 627-630 4 p. 8367191

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Complex networks
Factor analysis
Routers
Macros
Switches

Construction of a New Biometric-Based Key Derivation Function and Its Application

Seo, M., Park, J. H., Kim, Y., Cho, S., Lee, D. H. & Hwang, J. Y., 2018 Jan 1, In : Security and Communication Networks. 2018, 6107912.

Research output: Contribution to journalArticle

Biometrics
Authentication
Cryptography
Servers
2 Citations (Scopus)

Contagion of Cheating Behaviors in Online Social Networks

Woo, J., Kang, S. W., Kim, H. K. & Park, J., 2018 May 5, (Accepted/In press) In : IEEE Access.

Research output: Contribution to journalArticle

Reinforcement
1 Citation (Scopus)

Correction to: An efficient implementation of pairing-based cryptography on MSP430 processor

Kwon, J., Seo, S. C. & Hong, S., 2018 Mar 13, (Accepted/In press) In : Journal of Supercomputing. 1 p.

Research output: Contribution to journalArticle

Pairing-based Cryptography
Efficient Implementation
Cryptography

Cyber Influence Attack: Changes in Cyber Threats Seen in the Russian Hacking Incident

Park, M., Park, M. & Lee, K. H., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Springer Verlag, p. 224-235 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Attack
Elections
Deception
Influence
Classify

DDoS Mitigation: Decentralized CDN Using Private Blockchain

Kim, K., You, Y., Park, M. & Lee, K. H., 2018 Aug 14, ICUFN 2018 - 10th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, Vol. 2018-July. p. 693-696 4 p. 8436643

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Denial-of-service attack
3 Citations (Scopus)

Detecting Potential Insider Threat: Analyzing Insiders' Sentiment Exposed in Social Media

Park, W., You, Y. & Lee, K. H., 2018 Jan 1, In : Security and Communication Networks. 2018, 7243296.

Research output: Contribution to journalArticle

Learning algorithms
Learning systems
Unsupervised learning
Supervised learning
Security of data
3 Citations (Scopus)

Efficient anonymous attribute-based encryption with access policy hidden for cloud computing

Huang, C., Yan, K., Wei, S., Zhang, G. & Lee, D. H., 2018 May 15, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 266-270 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Cryptography
Access control
Security of data
Information technology
Microcontrollers
multiplication
scalars
central processing units
ARM processors
4 Citations (Scopus)

Efficient Isogeny Computations on Twisted Edwards Curves

Kim, S., Yoon, K., Kwon, J., Hong, S. & Park, Y. H., 2018 Jan 1, In : Security and Communication Networks. 2018, 5747642.

Research output: Contribution to journalArticle

Cryptography
Costs

Energy-aware key exchange for securing implantable medical devices

Choi, W., Lee, Y., Lee, D., Kim, H., Park, J. H., Kim, I-S. & Lee, D. H., 2018 Jan 1, In : Security and Communication Networks. 2018, 1809302.

Research output: Contribution to journalArticle

Open Access
Medical problems
Communication
3 Citations (Scopus)

Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers

Yoon, J. W., Hong, T. Y., Choi, J. W., Park, C. Y., Kim, K. B. & Yu, H., 2018 Mar 27, (Accepted/In press) In : Peer-to-Peer Networking and Applications. p. 1-11 11 p.

Research output: Contribution to journalArticle

Cloud computing
Parallel processing systems
Cryptography
Distributed computer systems
Scalability
3 Citations (Scopus)

Feature selection practice for unsupervised learning of credit card fraud detection

Lee, H., Choi, D., Yim, H., Choi, E., Go, W., Lee, T., Kim, I-S. & Lee, K. H., 2018 Jan 1, In : Journal of Theoretical and Applied Information Technology. 96, 2, p. 408-417 10 p.

Research output: Contribution to journalArticle

Fraud Detection
Unsupervised learning
Unsupervised Learning
Feature Selection
Feature extraction