If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2018

Obfuscated VBA macro detection using machine learning

Kim, S., Hong, S., Oh, J. & Lee, H., 2018 Jul 19, Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018. Institute of Electrical and Electronics Engineers Inc., p. 490-501 12 p. 8416509

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)
2017

Visual analysis of corrupted video data in video event data recorders

Pyo, Y., Lee, C. & Lee, H., 2017 Oct 18, 2017 IEEE Conference on Dependable and Secure Computing. Institute of Electrical and Electronics Engineers Inc., p. 453-458 6 p. 8073828

Research output: Chapter in Book/Report/Conference proceedingConference contribution

VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery

Kim, S., Woo, S., Lee, H. & Oh, H., 2017 Jun 23, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 595-614 20 p. 7958600

Research output: Chapter in Book/Report/Conference proceedingConference contribution

36 Citations (Scopus)
2016

Automated source code instrumentation for verifying potential vulnerabilities

Li, H., Oh, J., Oh, H. & Lee, H., 2016, IFIP Advances in Information and Communication Technology. Springer New York LLC, Vol. 471. p. 211-226 16 p. (IFIP Advances in Information and Communication Technology; vol. 471).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

FassKey: A secure and convenient authentication system

Milburn, J. & Lee, H., 2016 Jun 30, IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services. Institute of Electrical and Electronics Engineers Inc., p. 489-495 7 p. 7502490

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Sigmata: Storage integrity guaranteeing mechanism against tampering attempts for video event data recorders

Kwon, H., Kim, S. & Lee, H., 2016 Jan 1, 7th International Multi-Conference on Complexity, Informatics and Cybernetics, IMCIC 2016 and 7th International Conference on Society and Information Technologies, ICSIT 2016 - Proceedings. International Institute of Informatics and Systemics, IIIS, Vol. 1. p. 101-106 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2015

Flooding DDoS mitigation and traffic management with software defined networking

Kalliola, A., Lee, K., Lee, H. & Aura, T., 2015 Nov 20, 2015 IEEE 4th International Conference on Cloud Networking, CloudNet 2015. Institute of Electrical and Electronics Engineers Inc., p. 248-254 7 p. 7335317

Research output: Chapter in Book/Report/Conference proceedingConference contribution

25 Citations (Scopus)
2014

DroidGraph: Discovering Android malware by analyzing semantic behavior

Kwon, J., Jeong, J., Lee, J. & Lee, H., 2014 Jan 1, 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., p. 498-499 2 p. 6997523

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Dynamic surveillance: A case study with Enron email data set

Do, H., Choi, P. & Lee, H., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8267 LNCS. p. 81-99 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8267 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android

Jeong, J., Seo, D., Lee, C., Kwon, J., Lee, H. & Milburn, J., 2014 Dec 29, Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014. Institute of Electrical and Electronics Engineers Inc., p. 50-57 8 p. 6999415

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

PsyBoG: Power spectral density analysis for detecting botnet groups

Kwon, J., Kim, J., Lee, J., Lee, H. & Perrig, A., 2014 Dec 29, Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014. Institute of Electrical and Electronics Engineers Inc., p. 85-92 8 p. 6999414

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)
2013

A digital forensic framework for automated user activity reconstruction

Kang, J., Lee, S. & Lee, H., 2013, Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Proceedings. p. 263-277 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7863 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Dynamic classification of packing algorithms for inspecting executables using entropy analysis

Bat-Erdene, M., Kim, T., Li, H. & Lee, H., 2013, Proceedings of the 2013 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013. IEEE Computer Society, p. 19-26 8 p. 6703681. (Proceedings of the 2013 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Screening smartphone applications using behavioral signatures

Lee, S., Lee, J. & Lee, H., 2013, Security and Privacy Protection in Information Processing Systems - 28th IFIP TC 11 International Conference, SEC 2013, Proceedings. Janczewski, L. J., Wolfe, H. B. & Shenoi, S. (eds.). Springer New York LLC, p. 14-27 14 p. (IFIP Advances in Information and Communication Technology; vol. 405).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
6 Citations (Scopus)

Software vulnerability detection using backward trace analysis and symbolic execution

Li, H., Kim, T., Bat-Erdene, M. & Lee, H., 2013, Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013. p. 446-454 9 p. 6657275. (Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

UAS: Universal anti-spoofing by incorporating existing mechanisms

An, H., Lee, H. & Perrig, A., 2013, Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, LCN 2013. IEEE Computer Society, p. 316-319 4 p. 6761258. (Proceedings - Conference on Local Computer Networks, LCN).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

BinGraph: Discovering mutant malware using hierarchical semantic signatures

Kwon, J. & Lee, H., 2012, Proceedings of the 2012 7th International Conference on Malicious and Unwanted Software, Malware 2012. p. 104-111 8 p. 6461015. (Proceedings of the 2012 7th International Conference on Malicious and Unwanted Software, Malware 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

Carving secure Wi-Fi zones with defensive jamming

Kim, Y. S., Tague, P., Lee, H. & Kim, H., 2012, ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. p. 53-54 2 p. (ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Cyber weather forecasting: Forecasting unknown Internet worms using randomness analysis

Park, H., Jung, S. O. D., Lee, H. & In, H. P., 2012, Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Proceedings. p. 376-387 12 p. (IFIP Advances in Information and Communication Technology; vol. 376 AICT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Detection of cache pollution attacks using randomness checks

Park, H., Widjaja, I. & Lee, H., 2012, 2012 IEEE International Conference on Communications, ICC 2012. p. 1096-1100 5 p. 6363885. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Online detection of fake access points using received signal strengths

Kim, T., Park, H., Jung, H. & Lee, H., 2012, IEEE 75th Vehicular Technology Conference, VTC Spring 2012 - Proceedings. 6240312. (IEEE Vehicular Technology Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Citations (Scopus)

SMATT: Smart meter ATTestation using multiple target selection and copy-proof memory

Park, H., Seo, D., Lee, H. & Perrig, A., 2012, Computer Science and Its Applications, CSA 2012. p. 875-887 13 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)
2011

Hidden bot detection by tracing non-human generated traffic at the zombie host

Kwon, J., Lee, J. & Lee, H., 2011, Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings. p. 343-361 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6672 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

OMAP: One-way memory attestation protocol for smart meters

Song, K., Seo, D., Park, H., Lee, H. & Perrig, A., 2011, Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011. p. 111-118 8 p. 5951959. (Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Citations (Scopus)

PFS: Probabilistic filter scheduling against distributed denial-of-service attacks

Seo, D., Lee, H. & Perrig, A., 2011, Proceedings of the 36th Annual IEEE Conference on Local Computer Networks, LCN 2011. p. 9-17 9 p. 6114645. (Proceedings - Conference on Local Computer Networks, LCN).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Secure and efficient capability-based power management in the smart grid

Seo, D., Lee, H. & Perrig, A., 2011, Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011. p. 119-126 8 p. 5951960. (Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Citations (Scopus)
2010

Detecting metamorphic malwares using code graphs

Lee, J., Jeong, K. & Lee, H., 2010, APPLIED COMPUTING 2010 - The 25th Annual ACM Symposium on Applied Computing. p. 1970-1977 8 p. (Proceedings of the ACM Symposium on Applied Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

65 Citations (Scopus)

Generic unpacking using entropy analysis

Jeong, G., Choo, E., Lee, J., Bat-Erdene, M. & Lee, H., 2010, Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010. p. 98-105 8 p. 5665789. (Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

23 Citations (Scopus)

State of the art of network security perspectives in cloud computing

Oh, T. H., Lim, S., Choi, Y. B., Park, K. R., Lee, H. & Choi, H., 2010, Security-Enriched Urban Computing and Smart Grid - First International Conference, SUComS 2010, Proceedings. p. 629-637 9 p. (Communications in Computer and Information Science; vol. 78 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Tracking multiple C&C botnets by analyzing DNS traffic

Lee, J., Kwon, J., Shin, H. J. & Lee, H., 2010, 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010. p. 67-72 6 p. 5634445. (2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)
2009

Activity-oriented access control for ubiquitous environments

Hung, L. X., Shaikh, R. A., Jameel, H., Raazi, S. M. K. R., Weiwei, Y., Canh, N. T., Truc, P. T. H., Lee, S., Lee, H., Son, Y. & Fernandes, M., 2009, 2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009. 4784990. (2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

BARI: A distributed key management approach for wireless body area networks

Raazi, S. M. K. U. R., Lee, S., Lee, Y. K. & Lee, H., 2009, CIS 2009 - 2009 International Conference on Computational Intelligence and Security. p. 324-329 6 p. 5376103. (CIS 2009 - 2009 International Conference on Computational Intelligence and Security; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Citations (Scopus)

BotGAD: Detecting botnets by capturing group activities in network traffic

Choi, H., Lee, H. & Kim, H., 2009, Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, COMSWARE '09. 1621893. (Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, COMSWARE '09).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

71 Citations (Scopus)

Dynamic multimedia scheduling against Motion based DoS attacks

Choo, E., Lee, H. & Lee, W. Y., 2009, 2009 International Conference on Information Networking, ICOIN 2009. 4897288. (2009 International Conference on Information Networking, ICOIN 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Energy-efficient scheduling of a real-time task on DVFS-enabled multi-cores

Lee, W. Y., Ko, Y. W., Lee, H. & Kim, H., 2009, ICHIT 2009 - International Conference on Convergence and Hybrid Information Technology 2009. p. 273-277 5 p. (ACM International Conference Proceeding Series; vol. 321).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Flow traffic classification with support vector machine by using payload length

Kohara, M., Hori, Y., Sakurai, K., Lee, H. & Ryou, J. C., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404180. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Image-feature based human identification protocols on limited display devices

Jameel, H., Shaikh, R. A., Hung, L. X., Wei, Y. W., Raazi, S. M. K. U. R., Canh, N. T., Lee, S., Lee, H., Son, Y. & Fernandes, M., 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. p. 211-224 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)
2008

Activity-based security scheme for ubiquitous environments

Hung, L. X., Hassan, J., Riaz, A. S., Raazi, S. M. K., Weiwei, Y., Canh, N. T., Truc, P. T. H., Lee, S., Lee, H., Son, Y., Fernandes, M., Kim, M. & Zhung, Y., 2008, 2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008. p. 475-481 7 p. 4745102. (Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Code graph for malware detection

Kyoochang, J. & Heejo, L., 2008, 2008 International Conference on Information Networking, ICOIN. 4472801. (2008 International Conference on Information Networking, ICOIN).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Detecting more SIP attacks on VoIP services by combining rule matching and state transition models

Seo, D., Lee, H. & Nuwere, E., 2008, Proceedings of The Ifip Tc 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08. Springer New York, p. 397-411 15 p. (IFIP International Federation for Information Processing; vol. 278).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Distinguishing between FE and DDoS using randomness check

Park, H., Li, P., Gao, D., Lee, H. & Deng, R. H., 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 131-145 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

Energy-efficient and fault-tolerant positioning of multiple base stations

Kim, S., Ko, J., Yoon, J. & Lee, H., 2008, Information Networking: Towards Ubiquitous Networking and Services - International Conference, ICOIN 2007, Revised Selected Papers. p. 584-593 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5200 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

HoneyID: Unveiling hidden spywares by generating bogus events

Han, J., Kwon, J. & Lee, H., 2008, Proceedings of The Ifip Tc 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08. Springer New York, p. 669-673 5 p. (IFIP International Federation for Information Processing; vol. 278).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Network level privacy for wireless sensor networks

Shaikh, R. A., Jameel, H., d'Auriol, B., Lee, S., Lee, H. & Song, Y. J., 2008, Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008. IEEE Computer Society, p. 261-266 6 p. 4627096. (Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

PROBE: A process behavior-based host intrusion prevention system

Kwon, M., Jeong, K. & Lee, H., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. p. 203-217 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Reducing payload scans for attack signature matching using rule classification

Kim, S. & Lee, H., 2008, Information Security and Privacy - 13th Australasian Conference, ACISP 2008, Proceedings. p. 350-360 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5107 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks

Shaikh, R. A., Jameel, H., D'Auriol, B. J., Lee, S., Song, Y. J. & Lee, H., 2008, Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. p. 2038-2043 6 p. 4709287. (Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Unified rate limiting in broadband access networks for defeating Internet worms and DDoS attacks

Park, K., Seo, D., Yoo, J., Lee, H. & Kim, H., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. p. 176-187 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2007

Activity-based access control model to hospital information

Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 488-493 6 p. 4296888. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems

Giang, P. D., Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 698-703 6 p. 4197354. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)