Graduate School of Information Security

  • Korea, Republic of

Research Output

Filter
Conference contribution
2019

ADSaS: Comprehensive real-time anomaly detection system

Lee, S. & Kim, H. K., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 29-41 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Android Application Risk Indicator Based on Feature Analysis Utilizing Machine Learning

Baek, H., Joo, M., Park, W., You, Y. & Lee, K. H., 2019 Mar 18, 2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8669424. (2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A new bayesian approach to exploring damaged assets by monitoring mission failures caused by undetected attack

Shim, S. & Yoon, J. W., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 185-196 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A Scheduler Considering Characteristics of VM for Mitigation of Unstable Performance

Bak, B., Kang, J., Choi, H., Lee, J., Yu, H. & Chung, K., 2019 Apr 29, Proceedings - 2018 9th International Conference on Parallel Architectures, Algorithms and Programming, PAAP 2018. IEEE Computer Society, p. 49-53 5 p. 8701858. (Proceedings - International Symposium on Parallel Architectures, Algorithms and Programming, PAAP; vol. 2018-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Automated Reverse Engineering and Attack for CAN Using OBD-II

Kang, T. U., Song, H. M., Jeong, S. & Kim, H. K., 2019 Apr 12, 2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8690781. (IEEE Vehicular Technology Conference; vol. 2018-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Detecting In-vehicle CAN Message Attacks Using Heuristics and RNNs

Tariq, S., Lee, S., Kim, H. K. & Woo, S. S., 2019 Jan 1, Information and Operational Technology Security Systems - 1st International Workshop, IOSec 2018, CIPSEC Project, Revised Selected Papers. Marín Tordera, E., Fournaris, A. P. & Lampropoulos, K. (eds.). Springer Verlag, p. 39-45 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

FAIR-Based cyber influence damage assessment for exploit in mobile device

Park, M., Han, J., Seo, J., Oh, H. & Lee, K. H., 2019 Jan 1, Mobile Internet Security - 2nd International Symposium, MobiSec 2017, Revised Selected Papers. Sharma, V., Chen, H-C., You, I. & Kotenko, I. (eds.). Springer Verlag, p. 51-64 14 p. (Communications in Computer and Information Science; vol. 971).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

I would not plant apple trees if the world will be wiped: Analyzing hundreds of millions of behavioral records of players during an MMORPG beta test

Kang, A. R., Blackburn, J., Kwak, H. & Kim, H. K., 2019 Jan 1, 26th International World Wide Web Conference 2017, WWW 2017 Companion. International World Wide Web Conferences Steering Committee, p. 435-444 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Logarithm design on encrypted data with bitwise operation

Yoo, J. S., Song, B. K. & Yoon, J. W., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 105-116 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

VODKA: Virtualization obfuscation using dynamic key approach

Lee, J. Y., Suk, J. H. & Lee, D. H., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 131-145 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

Andro-Simnet: Android Malware Family Classification using Social Network Analysis

Kim, H. M., Song, H. M., Seo, J. W. & Kim, H. K., 2018 Oct 29, 2018 16th Annual Conference on Privacy, Security and Trust, PST 2018. Deng, R. H., Marsh, S., Nurse, J., Lu, R., Sezer, S., Miller, P., Chen, L., McLaughlin, K. & Ghorbani, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 8514216. (2018 16th Annual Conference on Privacy, Security and Trust, PST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

A privacy-preserving data sharing solution for mobile healthcare

Huang, C., Yan, K., Wei, S. & Lee, D. H., 2018 May 15, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 260-265 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

A Review of Cyber Security Controls from An ICS Perspective

You, Y., Lee, J., Oh, J. & Lee, K. H., 2018 Sep 25, 2018 International Conference on Platform Technology and Service, PlatCon 2018. Institute of Electrical and Electronics Engineers Inc., 8472757

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

A study on the priority decision making of processes for IT governance based on the IT-related goals of COBIT 5

Lee, J., Lee, J. & Lee, K. H., 2018 Jan 1, Proceedings of the 31st International Business Information Management Association Conference, IBIMA 2018: Innovation Management and Education Excellence through Vision 2020. Soliman, K. S. (ed.). International Business Information Management Association, IBIMA, p. 5445-5455 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Breaking Text CAPTCHA by Repeated Information

Woo, J. H., Park, M. & Lee, K. H., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Springer Verlag, p. 127-136 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Complex Network of Damage Assessment Using GMM Based FAIR

Park, M., Joo, M., Seo, J., Kim, K., Park, M. & Lee, K. H., 2018 May 25, Proceedings - 2018 IEEE International Conference on Big Data and Smart Computing, BigComp 2018. Institute of Electrical and Electronics Engineers Inc., p. 627-630 4 p. 8367191

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cyber Influence Attack: Changes in Cyber Threats Seen in the Russian Hacking Incident

Park, M., Park, M. & Lee, K. H., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Springer Verlag, p. 224-235 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DDoS Mitigation: Decentralized CDN Using Private Blockchain

Kim, K., You, Y., Park, M. & Lee, K. H., 2018 Aug 14, ICUFN 2018 - 10th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, Vol. 2018-July. p. 693-696 4 p. 8436643

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Efficient anonymous attribute-based encryption with access policy hidden for cloud computing

Huang, C., Yan, K., Wei, S., Zhang, G. & Lee, D. H., 2018 May 15, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 266-270 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Forward secure searchable encryption using key-based blocks chain technique

Lv, S., Huang, Y., Li, B., Wei, Y., Liu, Z., Liu, J. K. & Lee, D. H., 2018 Jan 1, Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Proceedings. Vaidya, J. & Li, J. (eds.). Springer Verlag, p. 85-97 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11337 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

G-code conversion from 3D model data for 3D printers on Hadoop systems

Kim, S., Chung, K., Yu, H. & Yang, S. O., 2018 Mar 20, Proceedings of the 2017 4th International Conference on Computer Applications and Information Processing Technology, CAIPT 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 1-4 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

GIDS: GAN based Intrusion Detection System for In-Vehicle Network

Seo, E., Song, H. M. & Kim, H. K., 2018 Oct 29, 2018 16th Annual Conference on Privacy, Security and Trust, PST 2018. Deng, R. H., Marsh, S., Nurse, J., Lu, R., Sezer, S., Miller, P., Chen, L., McLaughlin, K. & Ghorbani, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 8514157. (2018 16th Annual Conference on Privacy, Security and Trust, PST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Intrusion detection and mitigation system using blockchain analysis for bitcoin exchange

Kim, S., Kim, B. & Kim, H. J., 2018 Oct 29, Proceedings of 2018 International Conference on Cloud Computing and Internet of Things, CCIOT 2018. Association for Computing Machinery, p. 40-44 5 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Money Laundering in the Bitcoin Network: Perspective of Mixing Services

Seo, J., Park, M., Oh, H. & Lee, K. H., 2018 Nov 16, 9th International Conference on Information and Communication Technology Convergence: ICT Convergence Powered by Smart Intelligence, ICTC 2018. Institute of Electrical and Electronics Engineers Inc., p. 1403-1405 3 p. 8539548

Research output: Chapter in Book/Report/Conference proceedingConference contribution

OTIDS: A novel intrusion detection system for in-vehicle network by using remote frame

Lee, H., Jeong, S. H. & Kim, H. K., 2018 Sep 28, Proceedings - 2017 15th Annual Conference on Privacy, Security and Trust, PST 2017. Institute of Electrical and Electronics Engineers Inc., p. 57-66 10 p. 8476919

Research output: Chapter in Book/Report/Conference proceedingConference contribution

31 Citations (Scopus)

Possibility of using cyber-pysop through nuclear weapon: Symbolic meaning and risk measurement of nuclear weapon in social network

Joo, M., Seo, J., Park, M., Oh, H. R. & Lee, K. H., 2018 Jan 1, Proceedings of the 17th European Conference on Cyber Warfare and Security, ECCWS 2018. Curran Associates Inc., Vol. 2018-June. p. 233-239 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recipient revocable broadcast encryption with dealership

Kim, J. S., Lee, Y., Eom, J. & Lee, D. H., 2018 Jan 1, Information Security and Cryptology - ICISC 2017 - 20th International Conference, Revised Selected Papers. Springer Verlag, p. 214-228 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10779 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reminder as 'Watch-Out': The Role of Privacy Salience at the Point of Interaction with Biometric Systems

Oh, J., Lee, U. & Lee, K. H., 2018 Sep 25, 2018 International Conference on Platform Technology and Service, PlatCon 2018. Institute of Electrical and Electronics Engineers Inc., 8472767

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Risk Management to Cryptocurrency Exchange and Investors: Guidelines to Prevent Potential Threats

Kim, C. Y. & Lee, K. H., 2018 Sep 25, 2018 International Conference on Platform Technology and Service, PlatCon 2018. Institute of Electrical and Electronics Engineers Inc., 8472760

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Single Trace Side Channel Analysis on Quantum Key Distribution

Kim, S., Jin, S., Lee, Y., Park, B., Kim, H. & Hong, S., 2018 Nov 16, 9th International Conference on Information and Communication Technology Convergence: ICT Convergence Powered by Smart Intelligence, ICTC 2018. Institute of Electrical and Electronics Engineers Inc., p. 736-739 4 p. 8539703

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Situational awareness for hybrid warfare: Risk measurement between cyber warfare and nuclear warfare

Park, M., Seo, J., Han, J., Oh, H. & Lee, K. H., 2018 Jan 1, Proceedings of the 17th European Conference on Cyber Warfare and Security, ECCWS 2018. Curran Associates Inc., Vol. 2018-June. p. 360-369 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Situational Awareness Framework for Cyber Crime Prevention Model in Cyber Physical System

Joo, M., Seo, J., Oh, J., Park, M. & Lee, K. H., 2018 Aug 14, ICUFN 2018 - 10th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, Vol. 2018-July. p. 837-842 6 p. 8436591

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The Digits Hidden in the Virtual World: Approximate Estimation Applying Capture and Recapture

Hwang, D. M. & Kim, I-S., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Springer Verlag, p. 310-322 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Threat Analysis of Wi-Fi Connected Dashboard Camera

Park, W., Choi, D. & Lee, K. H., 2018 Sep 25, 2018 International Conference on Platform Technology and Service, PlatCon 2018. Institute of Electrical and Electronics Engineers Inc., 8472768

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Update state tampering: A novel adversary post-compromise technique on cyber threats

Kim, S. J., Kim, B. J., Kim, H. C. & Lee, D. H., 2018 Jan 1, Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Proceedings. Springer Verlag, p. 141-161 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10885 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

VcBalancer: Dynamic Volunteer Manager for Self-Adaptive Task Pulling

Song, C., Bak, B., Myung, R., Lee, J., Lee, J. & Yu, H., 2018 Dec 4, Proceedings - 2017 International Conference on Computational Science and Computational Intelligence, CSCI 2017. Tinetti, F. G., Tran, Q-N., Deligiannidis, L., Yang, M. Q., Yang, M. Q. & Arabnia, H. R. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 271-274 4 p. 8560800

Research output: Chapter in Book/Report/Conference proceedingConference contribution

What are the optimum quasi-identifiers to re-identify medical records?

Lee, Y. J. & Lee, K. H., 2018 Mar 23, IEEE 20th International Conference on Advanced Communication Technology: Opening New Era of Intelligent Things, ICACT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-February. p. 1025-1033 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

WheelLogger: Driver Tracing Using Smart Watch

Park, J. Y., Yun, J. P. & Lee, D. H., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Springer Verlag, p. 87-100 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

An analysis of economic impact on IoT under GDPR

Seo, J., Kim, K., Park, M., Park, M. & Lee, K. H., 2017 Dec 12, International Conference on Information and Communication Technology Convergence: ICT Convergence Technologies Leading the Fourth Industrial Revolution, ICTC 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-December. p. 879-881 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers

Kim, H., Kim, H. & Yoon, J. W., 2017 Jan 10, Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015. Institute of Electrical and Electronics Engineers Inc., p. 7-12 6 p. 7812939

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

A practical approach to constructing triple-blind review process with maximal anonymity and fairness

Jung, J., Kim, J. I. & Yoon, J. W., 2017, Information Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers. Springer Verlag, Vol. 10144 LNCS. p. 198-209 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10144 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A study on the priority decision making of IT goals in COBIT 5 goals cascade

Lee, J., You, Y. & Lee, K. H., 2017 Oct 9, 2017 9th International Conference on Information Management and Engineering, ICIME 2017. Association for Computing Machinery, p. 221-225 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Automated vulnerability analysis technique for smart grid infrastructure

Kwon, Y., Kim, H. K., Koumadi, K. M., Lim, Y. H. & Lim, J. I., 2017 Oct 26, 2017 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2017. Institute of Electrical and Electronics Engineers Inc., 8085965

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Classification of home appliance by using Probabilistic KNN with sensor data

Kang, S. & Yoon, J. W., 2017 Jan 17, 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2016. Institute of Electrical and Electronics Engineers Inc., 7820745

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Construction of a national scale ENF map using online multimedia data

Kim, H., Jeon, Y. & Yoon, J. W., 2017 Nov 6, CIKM 2017 - Proceedings of the 2017 ACM Conference on Information and Knowledge Management. Association for Computing Machinery, Vol. Part F131841. p. 19-28 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Crime scene re-investigation: A postmortem analysis of game account stealers' behaviors

Kim, H., Yang, S. & Kim, H. K., 2017 Jul 25, NetGames 2017 - 15th Annual Workshop on Network and Systems Support for Games. IEEE Computer Society, p. 1-6 6 p. 7991540

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Criminal minds: Reasoning prime suspect in Russian hacking scandal by perspective of insiders

Park, M., Seo, J., Kim, K., Park, M. & Lee, K. H., 2017 Oct 30, MIST 2017 - Proceedings of the 2017 International Workshop on Managing Insider Security Threats, co-located with CCS 2017. Association for Computing Machinery, Inc, Vol. 2017-January. p. 97-100 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cyber situational awareness enhancement with regular expressions and an evaluation methodology

Park, H. K., Kim, M. S., Park, M. & Lee, K. H., 2017 Dec 7, MILCOM 2017 - 2017 IEEE Military Communications Conference. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-October. p. 406-411 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Developing Criteria for Invasion of Privacy by Personal Drone

Park, S. H. & Lee, K. H., 2017 Mar 20, 2017 International Conference on Platform Technology and Service, PlatCon 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7883702

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Elaborate synthetic data generation for internet of things services at smart home environment

Myung, R., Choi, S., Choi, W., Yu, H., Lee, D. & Lee, E., 2017 Mar 17, Proceedings - 2016 International Conference on Computational Science and Computational Intelligence, CSCI 2016. Institute of Electrical and Electronics Engineers Inc., p. 226-229 4 p. 7881343

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)