Eun-Sun Cho

Orcid: 0000-0002-9406-3314

According to our database1, Eun-Sun Cho authored at least 64 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Feature Engineering Using File Layout for Malware Detection.
CoRR, 2023

L4 Pointer: An efficient pointer extension for spatial memory safety support without hardware extension.
CoRR, 2023

Attention-Based Cross-Modal CNN Using Non-Disassembled Files for Malware Classification.
IEEE Access, 2023

Assessing Opaque Predicates: Unveiling the Efficacy of Popular Obfuscators with a Rapid Deobfuscator.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

2022
Byte Frequency Based Indicators for Crypto-Ransomware Detection from Empirical Analysis.
J. Comput. Sci. Technol., 2022

SSLEM: A Simplifier for MBA Expressions based on Semi-linear MBA Expressions and Program Synthesis.
CoRR, 2022

Malware classification using a byte-granularity feature based on structural entropy.
Comput. Intell., 2022

Stone: A Privacy Policy Enforcement System for Smart Contracts.
Proceedings of the IEEE International Conference on Software Analysis, 2022

Program Synthesis-based Simplification of MBA Obfuscated Malware with Restart Strategies.
Proceedings of the 2022 ACM Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks, 2022

2021
LOM: Lightweight Classifier for Obfuscation Methods.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

Lightweight extension of an execution environment for safer function calls in Solidity/Ethereum Virtual Machine smart contracts.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021

Support for the safety of EVM bytecode via function-call interceptor.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Data Protection Based on Hidden Space in Windows Against Ransomware.
Proceedings of Sixth International Congress on Information and Communication Technology, 2021

OBFUS: An Obfuscation Tool for Software Copyright and Vulnerability Protection.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2019
Outlier Detection for Ship Trajectory Prediction.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Buffer Management for Identifying Crypto-Ransomware Attack in Environment with No Semantic Information.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

TraceFilter: An Exploitability Analyzer of Vulnerabilities in Binary Code.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

Toward Machine Learning Based Analyses on Compressed Firmware.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

A Modified Smart Contract Execution Enviroment for Safe Function Calls.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Efficient SVM Based Packer Identification with Binary Diffing Measures.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Selective-Delay Garbage Collection Mechanism for Read Operations in Multichannel Flash-Based Storage Devices.
IEEE Trans. Consumer Electron., 2018

A software framework for robotic mediators in smart environments.
J. Reliab. Intell. Environ., 2018

Bayesian Estimation of Vessel Destination and Arrival Times.
Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems, 2018

Message from the SEPT Symposium Program Chairs.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Building a CFG to Include Exceptions.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Toward Firmware-Type Analysis Using Machine Learning Techniques.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

A Storage-level Detection Mechanism against Crypto-Ransomware.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Dynamic Allocation Mechanism to Reduce Read Latency in Collaboration With a Device Queue in Multichannel Solid-State Devices.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2017

Toward More Reliable Intelligent Environments.
Proceedings of the Intelligent Environments 2017, 2017

Runtime Anomaly Detection Method in Smart Factories using Machine Learning on RDF Event Streams: Grand Challenge.
Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems, 2017

Automated Crash Filtering Using Interprocedural Static Analysis for Binary Codes.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Experience of event stream processing for top-<i>k</i> queries and dynamic graphs.
Proceedings of the 10th ACM International Conference on Distributed and Event-based Systems, 2016

2015
Application-aware deduplication for performance improvement of flash memory.
Des. Autom. Embed. Syst., 2015

Automated Crash Filtering for ARM Binary Programs.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
An Efficient Static Taint-Analysis Detecting Exploitable-Points on ARM Binaries.
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014

A Formal Modeling for Exceptions in Context-Aware Systems.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Loop transformations for flash memory: cost models and performance effects.
Des. Autom. Embed. Syst., 2013

Dynamic Parameter Filling for Semantic Exceptions in Context-Aware Systems.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Cost Model Based Analyses on Performance Effects of Loop Transformations in Block Associative Sector Translation.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

A Device Abstraction Framework for the Robotic Mediator Collaborating with Smart Environments.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

An Integrated Formal Model for Context-Aware Systems.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
Expressive Exceptions for Safe Pervasive Spaces.
J. Inf. Process. Syst., 2012

Probability-based static wear-leveling algorithm for block and hybrid-mapping NAND flash memory.
Des. Autom. Embed. Syst., 2012

A Lingustic Approach for Robustness in Context Aware Applications.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Toward Efficient Detection of Semantic Exceptions in Context-Aware Systems.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

ICARS : Integrated Control Architecture for the Robotic Mediator in Smart Environments: A Software Framework for the Robotic Mediator Collaborating with Smart Environments.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

An Intermediate Language for Semantic Exceptions in Context-Aware Systems.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

2011
A structural view definition for RDF data.
Comput. Syst. Sci. Eng., 2011

A Situation-Based Exception Detection Mechanism for Safety in Pervasive Systems.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Future robotic computer: a new type of computing device with robotic functions.
Proceedings of the 6th International Conference on Human Robot Interaction, 2011

Profiling-Based Log Block Replacement Scheme in FTL for Update-Intensive Executions.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

2010
Context data abstraction framework using RDF.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

Reorganizing Data Blocks in Flash Memory by Program Translation.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Integration of RDF Processing into a Programming Language.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Performance Improvement for Flash Memories Using Loop Optimization.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Fine-Grained View-Based Access Control for RDF Cloaking.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2006
Scenario-Based Programming for Ubiquitous Applications.
Proceedings of the Ubiquitous Computing Systems, Third International Symposium, 2006

2005
Abstraction for Privacy in Context-Aware Environments.
Proceedings of the Mobility Aware Technologies and Applications, 2005

Preventing Illegal Usage of Mobile Phone Software.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2001
SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
LOD*: A C++ extension for OODBMSs with orthogonal persistence to class hierarchies.
Inf. Softw. Technol., 2000

Interface/implementation Separation Mechanism for Integrating Object-oriented Management Systems and General-purpose Programming Languages.
Comput. J., 2000

1997
A New Data Abstraction Layer Required For OODBMS .
Proceedings of the International Database Engineering and Applications Symposium, 1997

1996
A Semantics of the Separation of Interface and Implementation in C++.
Proceedings of the COMPSAC '96, 1996


  Loading...