Graduate School of Information Study

  • Korea, Republic of

Research Output

2020

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

Lee, S., Cho, S. M., Kim, H. & Hong, S., 2020 Jan 1, In : IEEE Access. 8, p. 5244-5255 12 p., 8948409.

Research output: Contribution to journalArticle

Open Access

AI-IDS: Application of Deep Learning to Real-Time Web Intrusion Detection

Kim, A., Park, M. & Lee, D. H., 2020 Jan 1, In : IEEE Access. 8, p. 70245-70261 17 p., 9063416.

Research output: Contribution to journalArticle

Open Access

Analysis of job stress's impact on job performance and turnover of cybersecurity professionals

Cho, J., Yoo, J. & Lim, J. I., 2020 Jan 1, In : ICIC Express Letters. 14, 4, p. 409-415 7 p.

Research output: Contribution to journalArticle

Analysis of software weakness detection of CBMC based on CWE

Byun, M., Lee, Y. & Choi, J. Y., 2020 Feb, 22nd International Conference on Advanced Communications Technology: Digital Security Global Agenda for Safe Society, ICACT 2020 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 171-175 5 p. 9061281. (International Conference on Advanced Communication Technology, ICACT; vol. 2020).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An automated end-to-end side channel analysis based on probabilistic model

Hwang, J. & Yoon, J. W., 2020 Apr 1, In : Applied Sciences (Switzerland). 10, 7, 2369.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

Cyber attack and defense emulation agents

Yoo, J. D., Park, E., Lee, G., Ahn, M. K., Kim, D., Seo, S. & Kim, H. K., 2020 Mar 1, In : Applied Sciences (Switzerland). 10, 6, 2140.

Research output: Contribution to journalArticle

Open Access

Detection of frequency-hopping signals with deep learning

Lee, K. G. & Oh, S. J., 2020 May, In : IEEE Communications Letters. 24, 5, p. 1042-1046 5 p., 8979431.

Research output: Contribution to journalArticle

Fine-grained access control-enabled logging method on ARM TrustZone

Lee, S., Jo, H. J., Choi, W., Kim, H., Park, J. H. & Lee, D. H., 2020 Jan 1, In : IEEE Access. 8, p. 81348-81364 17 p., 9082664.

Research output: Contribution to journalArticle

Open Access

Formal modeling and verification of software-defined networking with multiple controllers

Kang, M. & Choi, J. Y., 2020 Jan 1, Testbeds and Research Infrastructures for the Development of Networks and Communications - 14th EAI International Conference, TridentCom 2019, Proceedings. Gao, H., Li, K., Yang, X. & Yin, Y. (eds.). Springer, p. 81-94 14 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 309 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

IBV-CFI: Efficient fine-grained control-flow integrity preserving CFG precision

Jang, H., Park, M. C. & Lee, D. H., 2020 Jul, In : Computers and Security. 94, 101828.

Research output: Contribution to journalArticle

Interceptor complexity analysis for mixed BPSK–QPSK modulated frequency hopping spread spectrum systems

Park, J. W., Yoo, D. S. & Oh, S. J., 2020 Jun, In : Physical Communication. 40, 101063.

Research output: Contribution to journalArticle

In-vehicle network intrusion detection using deep convolutional neural network

Song, H. M., Woo, J. & Kim, H. K., 2020 Jan, In : Vehicular Communications. 21, 100198.

Research output: Contribution to journalArticle

Open Access
4 Citations (Scopus)

Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms

Park, S. & Choi, J. Y., 2020 Jan 1, In : Journal of Advanced Transportation. 2020, 3035741.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks

Jo, H. J., Kim, J. H., Choi, H. Y., Choi, W., Lee, D. H. & Lee, I., 2020 Feb, In : IEEE Transactions on Vehicular Technology. 69, 2, p. 2204-2218 15 p., 8939382.

Research output: Contribution to journalArticle

Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression

Hong, M. Y. & Yoon, J. W., 2020 Jan 1, Information Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers. You, I. (ed.). Springer, p. 155-166 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11897 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

New hybrid method for isogeny-based cryptosystems using edwards curves

Kim, S., Yoon, K., Kwon, J., Park, Y. H. & Hong, S., 2020 Mar, In : IEEE Transactions on Information Theory. 66, 3, p. 1934-1943 10 p., 8822753.

Research output: Contribution to journalArticle

1 Citation (Scopus)

On the Unlinkability of Fingerprint Shell

Lee, S. & Jeong, I. R., 2020 Jan 1, In : Security and Communication Networks. 2020, 8256929.

Research output: Contribution to journalArticle

Open Access

Parallelly Running k-Nearest Neighbor Classification over Semantically Secure Encrypted Data in Outsourced Environments

Park, J. & Lee, D. H., 2020 Jan 1, In : IEEE Access. 8, p. 64617-64633 17 p., 9051788.

Research output: Contribution to journalArticle

Open Access

Phantom Eavesdropping with Whitened RF Leakage

Shao, C., Jang, W., Park, H., Sung, J., Jung, Y. & Lee, W., 2020 Feb, In : IEEE Wireless Communications Letters. 9, 2, p. 232-235 4 p., 8882327.

Research output: Contribution to journalArticle

PhantomFS: File-Based Deception Technology for Thwarting Malicious Users

Lee, J., Choi, J., Lee, G., Shim, S. W. & Kim, T., 2020 Jan 1, In : IEEE Access. 8, p. 32203-32214 12 p., 8998256.

Research output: Contribution to journalArticle

Open Access

Power-balancing software implementation to mitigate side-channel attacks without using look-up tables

Kim, H. B., Kim, H. S. & Hong, S., 2020 Apr 1, In : Applied Sciences (Switzerland). 10, 7, 2454.

Research output: Contribution to journalArticle

Open Access

Reassembling Linux-based Hybrid RAID

Choi, J. H., Park, J. & Lee, S., 2020 May 1, In : Journal of Forensic Sciences. 65, 3, p. 966-973 8 p.

Research output: Contribution to journalArticle

Recent advances in deep learning-based side-channel analysis

Jin, S., Kim, S., Kim, H. S. & Hong, S., 2020 Jan 1, (Accepted/In press) In : ETRI Journal.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach

Lee, J. K., Chang, Y., Kwon, H. Y. & Kim, B., 2020 Jan 1, (Accepted/In press) In : Information Systems Frontiers.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM

Park, K. H., Lee, E. & Kim, H. K., 2020 Jan 1, Information Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers. You, I. (ed.). Springer, p. 3-13 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11897 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Single trace analysis against HyMES by exploitation of joint distributions of leakages

Park, B. G., Kim, S., Hong, S., Kim, H. S. & Seo, S. C., 2020 Mar 1, In : Applied Sciences (Switzerland). 10, 5, 1831.

Research output: Contribution to journalArticle

Open Access

Study on the Smart Speaker Security Evaluations and Countermeasures

Lee, J., Kang, S. & Kim, S-J., 2020 Jan 1, Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2019. Yang, L. T., Hao, F., Jeong, Y-S. & Park, J. J. (eds.). Springer Verlag, p. 50-70 21 p. (Lecture Notes in Electrical Engineering; vol. 590).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tagora: A Collision-Exploitative RFID Authentication Protocol Based on Cross-Layer Approach

Park, H., Roh, H. & Lee, W., 2020 Apr, In : IEEE Internet of Things Journal. 7, 4, p. 3571-3585 15 p., 8993795.

Research output: Contribution to journalArticle

Turn On the Lights: User Behavior in Game Environment Using CPTED

Seo, J., Joo, M. & Lee, K., 2020 Jan 1, Information Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers. You, I. (ed.). Springer, p. 14-24 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11897 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

User-Number Threshold-Based Small-Cell On/Off Control Scheme: Performance Evaluation and Optimization

Park, J. W., Yoo, D. S. & Oh, S. J., 2020 Jan, In : IEEE Transactions on Wireless Communications. 19, 1, p. 367-379 13 p., 8866747.

Research output: Contribution to journalArticle

2019

A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms

Song, B. K., Yoo, J. S., Hong, M. & Yoon, J. W., 2019 Jan 1, In : Security and Communication Networks. 2019, 3648671.

Research output: Contribution to journalArticle

Open Access

A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme

Yoo, J. S., Hwang, J. H., Song, B. K. & Yoon, J. W., 2019 Jan 1, Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Proceedings. Heng, S-H. & Lopez, J. (eds.). Springer, p. 20-40 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11879 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A Cancelable Template for the Low-Quality Fingerprints from Wearable Devices

Lee, S., Jeong, I. R. & Araujo, A., 2019 Jan 1, In : Security and Communication Networks. 2019, 4202671.

Research output: Contribution to journalArticle

Open Access

Advanced insider threat detection model to apply periodic work atmosphere

Oh, J., Kim, T. H. & Lee, K. H., 2019 Mar 31, In : KSII Transactions on Internet and Information Systems. 13, 3, p. 1722-1737 16 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Alert correlation using diamond model for cyber threat intelligence

Shin, Y., Lim, C., Park, M., Cho, S., Han, I., Oh, H. & Lee, K. H., 2019 Jan 1, Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019. Cruz, T. & Simoes, P. (eds.). Curran Associates Inc., p. 444-450 7 p. (European Conference on Information Warfare and Security, ECCWS; vol. 2019-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A Model for Detecting Cryptocurrency Transactions with Discernible Purpose

Baek, H., Oh, J., Kim, C. Y. & Lee, K. H., 2019 Jul 1, ICUFN 2019 - 11th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 713-717 5 p. 8806126. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2019-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

A Study on smart city security policy based on blockchain in 5G Age

Noh, J. H. & Kwon, H-Y., 2019 Mar 18, 2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8669406. (2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

A Study on the Needs for Enhancement of Personal Information Protection in Cloud Computing Security Certification System

Kang, M. & Kwon, H-Y., 2019 Mar 18, 2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8669413. (2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis

Kim, D. & Kim, H. K., 2019 Jan 1, In : Security and Communication Networks. 2019, 6268476.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

Behavior analysis and anomaly detection for a digital substation on cyber-physical system

Kwon, Y., Lee, S., King, R., Lim, J. I. & Kim, H. K., 2019 Mar 1, In : Electronics (Switzerland). 8, 3, 326.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

Catch ID if You CAN: Dynamic ID Virtualization Mechanism for the Controller Area Network

Sun, H., Lee, S. Y., Joo, K., Jin, H. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 158237-158249 13 p., 8886494.

Research output: Contribution to journalArticle

Open Access
Open Access

Channel Independent Wi-Fi Backscatter Networks

Kim, T. & Lee, W., 2019 Apr 1, INFOCOM 2019 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 262-270 9 p. 8737376. (Proceedings - IEEE INFOCOM; vol. 2019-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Data industry and legislations for personal information protection

Kwon, H-Y., Min, K. Y. & Chun, S. A., 2019 Jun 18, Proceedings of the 20th Annual International Conference on Digital Government Research: Governance in the Age of Artificial Intelligence, dg.o 2019. Salem, F., Zuiderwijk, A. & Chen, Y-C. (eds.). Association for Computing Machinery, p. 529-531 3 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Design of Processing-"Inside"-Memory Optimized for DRAM Behaviors

Lee, W. J., Kim, C. H., Paik, Y., Park, J., Park, I. & Kim, S. W., 2019 Jan 1, In : IEEE Access. 7, p. 82633-82648 16 p., 8743357.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

Efficient cancelable iris template generation for wearable sensors

Jeong, J. Y. & Jeong, I. R., 2019 Jan 1, In : Security and Communication Networks. 2019, 7473591.

Research output: Contribution to journalArticle

Open Access

EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method

Seo, M., Kim, S., Lee, D. H. & Park, J. H., 2019 Jan 1, In : International Journal of Information Security.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Enabling Service Queue Isolation in Multi-Tenant Data Centers

Kim, G. & Lee, W., 2019 Nov, In : IEEE Communications Letters. 23, 11, p. 1949-1952 4 p., 8826238.

Research output: Contribution to journalArticle

Forecasting the Electric Network Frequency Signals on Power Grid

Bang, W. & Yoon, J. W., 2019 Oct, ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future. Institute of Electrical and Electronics Engineers Inc., p. 1218-1223 6 p. 8939676. (ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

FuzzBuilder: Automated building greybox fuzzing environment for C/C++ library

Jang, J. & Kim, H. K., 2019 Dec 9, Proceedings - 35th Annual Computer Security Applications Conference, ACSAC 2019. Association for Computing Machinery, p. 627-637 11 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution