Παρακολούθηση
Hyungjoon Koo
Hyungjoon Koo
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα g.skku.edu - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Compiler-assisted code randomization
H Koo, Y Chen, L Lu, VP Kemerlis, M Polychronakis
2018 IEEE symposium on security and privacy (SP), 461-477, 2018
902018
Identifying traffic differentiation in mobile networks
A Molavi Kakhki, A Razaghpanah, A Li, H Koo, R Golani, D Choffnes, ...
Proceedings of the 2015 Internet Measurement Conference, 239-251, 2015
772015
Configuration-driven software debloating
H Koo, S Ghavamnia, M Polychronakis
Proceedings of the 12th European Workshop on Systems Security, 1-6, 2019
682019
Return to the zombie gadgets: Undermining destructive code reads via code inference attacks
KZ Snow, R Rogowski, J Werner, H Koo, F Monrose, M Polychronakis
2016 IEEE Symposium on Security and Privacy (SP), 954-968, 2016
562016
Juggling the gadgets: Binary-level code randomization using instruction displacement
H Koo, M Polychronakis
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
512016
Slimium: debloating the chromium browser with feature subsetting
C Qian, H Koo, CS Oh, T Kim, W Lee
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
352020
Semantic-aware binary code representation with bert
H Koo, S Park, D Choi, T Kim
arXiv preprint arXiv:2106.05478, 2021
172021
Practical binary code similarity detection with bert-based transferable similarity learning
S Ahn, S Ahn, H Koo, Y Paek
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
152022
Defeating zombie gadgets by re-randomizing code upon disclosure
M Morton, H Koo, F Li, KZ Snow, M Polychronakis, F Monrose
Engineering Secure Software and Systems: 9th International Symposium, ESSoS …, 2017
92017
A look back on a function identification problem
H Koo, S Park, T Kim
Annual Computer Security Applications Conference, 158-168, 2021
72021
The Politics of Routing: Investigating the Relationship between {AS} Connectivity and Internet Freedom
R Singh, H Koo, N Miramirkhani, F Mirhaj, P Gill, L Akoglu
6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 16), 2016
72016
SoftMark: Software Watermarking via a Binary Function Relocation
H Kang, Y Kwon, S Lee, H Koo
Annual Computer Security Applications Conference, 169-181, 2021
42021
Revisiting function identification with machine learning
H Koo, S Park, T Kim
Machine Learning for Program Aanalysis (MLPA) Workshop, 2021
32021
Kemerlis Vasileios P., and Polychronakis Michalis. 2018
K Hyungjoon, C Yaohui, L Long
Compiler-assisted code randomization. In Proceedings of the 2018 IEEE …, 0
3
Keychain Analysis with Mac OS X Memory Forensics
K Lee, H Koo
Korea University, CIST, DCWTC, 16, 2013
22013
A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing
H Kim, J Bak, K Cho, H Koo
Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023
12023
SmartMark: Software Watermarking Scheme for Smart Contracts
T Kim, Y Jang, C Lee, H Koo, H Kim
arXiv preprint arXiv:2303.13733, 2023
12023
Binary Code Representation With Well-Balanced Instruction Normalization
H Koo, S Park, D Choi, T Kim
IEEE Access 11, 29183-29198, 2023
12023
Deview: Confining progressive web applications by debloating web apis
CS Oh, S Lee, C Qian, H Koo, W Lee
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
12022
ToolPhet: Inference of Compiler Provenance from Stripped Binaries with Emerging Compilation Toolchains
H Jang, N Murodova, H Koo
IEEE Access, 2024
2024
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20