• 3090 Citations
  • 23 h-Index
19952019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2019

Extraction of creation-time for recovered files on windows FAT32 file system

Lee, W. Y., Kim, K. H. & Lee, H., 2019 Dec 1, In : Applied Sciences (Switzerland). 9, 24, 5522.

Research output: Contribution to journalArticle

Open Access
2 Citations (Scopus)
2018

Obfuscated VBA macro detection using machine learning

Kim, S., Hong, S., Oh, J. & Lee, H., 2018 Jul 19, Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018. Institute of Electrical and Electronics Engineers Inc., p. 490-501 12 p. 8416509

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Software systems at risk: An empirical study of cloned vulnerabilities in practice

Kim, S. & Lee, H., 2018 Jan 1, (Accepted/In press) In : Computers and Security.

Research output: Contribution to journalArticle

5 Citations (Scopus)
2017

Entropy analysis to classify unknown packing algorithms for malware detection

Bat-Erdene, M., Park, H., Li, H., Lee, H. & Choi, M-S., 2017 Jun 1, In : International Journal of Information Security. 16, 3, p. 227-248 22 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Packer detection for multi-layer executables using entropy analysis

Bat-Erdene, M., Kim, T., Park, H. & Lee, H., 2017 Mar 16, In : Entropy. 19, 3, 125.

Research output: Contribution to journalArticle

10 Citations (Scopus)

Visual analysis of corrupted video data in video event data recorders

Pyo, Y., Lee, C. & Lee, H., 2017 Oct 18, 2017 IEEE Conference on Dependable and Secure Computing. Institute of Electrical and Electronics Engineers Inc., p. 453-458 6 p. 8073828

Research output: Chapter in Book/Report/Conference proceedingConference contribution

VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery

Kim, S., Woo, S., Lee, H. & Oh, H., 2017 Jun 23, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 595-614 20 p. 7958600

Research output: Chapter in Book/Report/Conference proceedingConference contribution

40 Citations (Scopus)
2016

Automated source code instrumentation for verifying potential vulnerabilities

Li, H., Oh, J., Oh, H. & Lee, H., 2016, IFIP Advances in Information and Communication Technology. Springer New York LLC, Vol. 471. p. 211-226 16 p. (IFIP Advances in Information and Communication Technology; vol. 471).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Broken integrity detection of video files in video event data recorders

Lee, C., Lee, J., Pyo, Y. & Lee, H., 2016 Aug 31, In : KSII Transactions on Internet and Information Systems. 10, 8, p. 3943-3957 15 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Coordination of anti-spoofing mechanisms in partial deployments

An, H., Lee, H. & Perrig, A., 2016 Dec 1, In : Journal of Communications and Networks. 18, 6, p. 948-961 14 p., 000129.

Research output: Contribution to journalArticle

Detecting violations of security requirements for vulnerability discovery in source code

Li, H., Oh, J. & Lee, H., 2016 Sep 1, In : IEICE Transactions on Information and Systems. E99D, 9, p. 2385-2389 5 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

FassKey: A secure and convenient authentication system

Milburn, J. & Lee, H., 2016 Jun 30, IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services. Institute of Electrical and Electronics Engineers Inc., p. 489-495 7 p. 7502490. (IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Integrity verification of the ordered data structures in manipulated video content

Song, J., Lee, K., Lee, W. Y. & Lee, H., 2016 Sep 1, In : Digital Investigation. 18, p. 1-7 7 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

PsyBoG: A scalable botnet detection method for large-scale DNS traffic

Kwon, J., Lee, J., Lee, H. & Perrig, A., 2016 Mar 14, In : Computer Networks. 97, p. 48-73 26 p.

Research output: Contribution to journalArticle

50 Citations (Scopus)

Sigmata: Storage integrity guaranteeing mechanism against tampering attempts for video event data recorders

Kwon, H., Kim, S. & Lee, H., 2016 Jan 1, 7th International Multi-Conference on Complexity, Informatics and Cybernetics, IMCIC 2016 and 7th International Conference on Society and Information Technologies, ICSIT 2016 - Proceedings. International Institute of Informatics and Systemics, IIIS, Vol. 1. p. 101-106 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2015

A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control

Kim, Y. S., Tague, P., Lee, H. & Kim, H., 2015 Nov 1, In : Wireless Networks. 21, 8, p. 2631-2647 17 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

An incrementally deployable anti-spoofing mechanism for software-defined networks

Kwon, J., Seo, D., Kwon, M., Lee, H., Perrig, A. & Kim, H., 2015 Jun 15, In : Computer Communications. 64, p. 1-20 20 p.

Research output: Contribution to journalArticle

18 Citations (Scopus)

CLORIFI: Software vulnerability discovery using code clone verification

Li, H., Kwon, H., Kwon, J. & Lee, H., 2015, (Accepted/In press) In : Concurrency Computation Practice and Experience.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Comments on the Linux FAT32 allocator and file creation order reconstruction [Digit Investig 11(4), 224-233]

Lee, W. Y., Kwon, H. & Lee, H., 2015, (Accepted/In press) In : Digital Investigation.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Flooding DDoS mitigation and traffic management with software defined networking

Kalliola, A., Lee, K., Lee, H. & Aura, T., 2015 Nov 20, 2015 IEEE 4th International Conference on Cloud Networking, CloudNet 2015. Institute of Electrical and Electronics Engineers Inc., p. 248-254 7 p. 7335317

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Citations (Scopus)

Integrity verification scheme of video contents in surveillance cameras for digital forensic investigations

Lee, S., Song, J. E., Lee, W. Y., Ko, Y. W. & Lee, H., 2015 Jan 1, In : IEICE Transactions on Information and Systems. E98D, 1, p. 95-97 3 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Introduction to the Issue on Signal and Information Processing for Privacy

Trappe, W., Sankar, L., Poovendran, R., Lee, H. & Capkun, S., 2015 Oct 1, In : IEEE Journal on Selected Topics in Signal Processing. 9, 7, p. 1173-1175 3 p., 7265126.

Research output: Contribution to journalArticle

PA-DHK: Polarity analysis for discovering hidden knowledge

Kim, J. D., Son, J., Peter In, H., Hwang, S. H., Lee, H. & Baik, D. K., 2015, In : Scientia Iranica. 22, 6, p. 2198-2208 11 p.

Research output: Contribution to journalArticle

2014

A scalable approach for vulnerability discovery based on security patches

Li, H., Kwon, H., Kwon, J. & Lee, H., 2014, In : Communications in Computer and Information Science. 490, p. 109-122 14 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Cylindrical Coordinates Security Visualization for multiple domain command and control botnet detection

Seo, I., Lee, H. & Han, S. C., 2014 Jan 1, In : Computers and Security. 46, p. 141-153 13 p.

Research output: Contribution to journalArticle

10 Citations (Scopus)

DroidGraph: Discovering Android malware by analyzing semantic behavior

Kwon, J., Jeong, J., Lee, J. & Lee, H., 2014 Jan 1, 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., p. 498-499 2 p. 6997523

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Dynamic surveillance: A case study with Enron email data set

Do, H., Choi, P. & Lee, H., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8267 LNCS. p. 81-99 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8267 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

GMAD: Graph-based malware activity detection by DNS traffic analysis

Lee, J. & Lee, H., 2014 Aug 1, In : Computer Communications. 49, p. 33-47 15 p.

Research output: Contribution to journalArticle

20 Citations (Scopus)

Lightweight resource management for DDoS traffic isolation in a cloud environment

Mubarok, I., Lee, K., Lee, S. & Lee, H., 2014, IFIP Advances in Information and Communication Technology. Springer New York LLC, Vol. 428. p. 44-51 8 p. (IFIP Advances in Information and Communication Technology; vol. 428).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android

Jeong, J., Seo, D., Lee, C., Kwon, J., Lee, H. & Milburn, J., 2014 Dec 29, Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014. Institute of Electrical and Electronics Engineers Inc., p. 50-57 8 p. 6999415

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Preface

Kim, Y., Lee, H. & Perrig, A., 2014, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8267 LNCS, p. VI

Research output: Contribution to journalEditorial

PsyBoG: Power spectral density analysis for detecting botnet groups

Kwon, J., Kim, J., Lee, J., Lee, H. & Perrig, A., 2014 Dec 29, Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014. Institute of Electrical and Electronics Engineers Inc., p. 85-92 8 p. 6999414

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Screening smartphone applications using malware family signatures

Lee, J., Lee, S. & Lee, H., 2014 Nov 1, (Accepted/In press) In : Computers and Security.

Research output: Contribution to journalArticle

18 Citations (Scopus)
2013

A digital forensic framework for automated user activity reconstruction

Kang, J., Lee, S. & Lee, H., 2013, Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Proceedings. p. 263-277 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7863 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks

Seo, D., Lee, H. & Perrig, A., 2013, In : Computers and Security. 39, PART B, p. 366-385 20 p.

Research output: Contribution to journalArticle

21 Citations (Scopus)

Dynamic classification of packing algorithms for inspecting executables using entropy analysis

Bat-Erdene, M., Kim, T., Li, H. & Lee, H., 2013, Proceedings of the 2013 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013. IEEE Computer Society, p. 19-26 8 p. 6703681. (Proceedings of the 2013 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Screening smartphone applications using behavioral signatures

Lee, S., Lee, J. & Lee, H., 2013, Security and Privacy Protection in Information Processing Systems - 28th IFIP TC 11 International Conference, SEC 2013, Proceedings. Janczewski, L. J., Wolfe, H. B. & Shenoi, S. (eds.). Springer New York LLC, p. 14-27 14 p. (IFIP Advances in Information and Communication Technology; vol. 405).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
6 Citations (Scopus)

SIPAD: SIP-VoIP Anomaly Detection using a Stateful Rule Tree

Seo, D., Lee, H. & Nuwere, E., 2013 Mar 1, In : Computer Communications. 36, 5, p. 562-574 13 p.

Research output: Contribution to journalArticle

20 Citations (Scopus)

Software vulnerability detection using backward trace analysis and symbolic execution

Li, H., Kim, T., Bat-Erdene, M. & Lee, H., 2013, Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013. p. 446-454 9 p. 6657275. (Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

UAS: Universal anti-spoofing by incorporating existing mechanisms

An, H., Lee, H. & Perrig, A., 2013, Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, LCN 2013. IEEE Computer Society, p. 316-319 4 p. 6761258. (Proceedings - Conference on Local Computer Networks, LCN).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

BinGraph: Discovering mutant malware using hierarchical semantic signatures

Kwon, J. & Lee, H., 2012, Proceedings of the 2012 7th International Conference on Malicious and Unwanted Software, Malware 2012. p. 104-111 8 p. 6461015. (Proceedings of the 2012 7th International Conference on Malicious and Unwanted Software, Malware 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

Carving secure Wi-Fi zones with defensive jamming

Kim, Y. S., Tague, P., Lee, H. & Kim, H., 2012, ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. p. 53-54 2 p. (ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Cyber-physical security of a smart grid infrastructure

Mo, Y., Kim, T. H. J., Brancik, K., Dickinson, D., Lee, H., Perrig, A. & Sinopoli, B., 2012 Jan, In : Proceedings of the IEEE. 100, 1, p. 195-209 15 p., 6016202.

Research output: Contribution to journalArticle

597 Citations (Scopus)

Cyber weather forecasting: Forecasting unknown Internet worms using randomness analysis

Park, H., Jung, S. O. D., Lee, H. & In, H. P., 2012, Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Proceedings. p. 376-387 12 p. (IFIP Advances in Information and Communication Technology; vol. 376 AICT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Detection of cache pollution attacks using randomness checks

Park, H., Widjaja, I. & Lee, H., 2012, 2012 IEEE International Conference on Communications, ICC 2012. p. 1096-1100 5 p. 6363885. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Identifying botnets by capturing group activities in DNS traffic

Choi, H. & Lee, H., 2012 Jan 12, In : Computer Networks. 56, 1, p. 20-33 14 p.

Research output: Contribution to journalArticle

81 Citations (Scopus)

Online detection of fake access points using received signal strengths

Kim, T., Park, H., Jung, H. & Lee, H., 2012, IEEE 75th Vehicular Technology Conference, VTC Spring 2012 - Proceedings. 6240312. (IEEE Vehicular Technology Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Citations (Scopus)

SMATT: Smart meter ATTestation using multiple target selection and copy-proof memory

Park, H., Seo, D., Lee, H. & Perrig, A., 2012, Computer Science and Its Applications, CSA 2012. p. 875-887 13 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)
2011

Hidden bot detection by tracing non-human generated traffic at the zombie host

Kwon, J., Lee, J. & Lee, H., 2011, Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings. p. 343-361 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6672 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Minimum-energy semi-static scheduling of a periodic real-time task on DVFS-enabled multi-core processors

Lee, W. Y., Kim, H. & Lee, H., 2011 Dec, In : IEICE Transactions on Information and Systems. E94-D, 12, p. 2389-2392 4 p.

Research output: Contribution to journalArticle