Eunsoo Kim

Orcid: 0009-0006-7077-7474

According to our database1, Eunsoo Kim authored at least 19 papers between 2016 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Dual-Band CMOS Down-Conversion Mixer Adopting Band-Switchable Transformer.
IEEE Trans. Circuits Syst. II Express Briefs, October, 2023

Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned.
IEEE Trans. Software Eng., April, 2023

A Comparative Study of Time Series Anomaly Detection Models for Industrial Control Systems.
Sensors, February, 2023

CMOS Variable-Gain Low-Noise Amplifier Adopting Transformer-Based Noise Cancelling Technique for 5G NR FR2 Applications.
IEEE Access, 2023

BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software.
Proceedings of the 32nd USENIX Security Symposium, 2023

Dog Bowel Pad Training IoT by Automatic Snack Feeder and Owner's Voice Compliment Speaker for Human Convenience.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

Movie Box Office Prediction With Self-Supervised and Visually Grounded Pretraining.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

2021
Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds.
IEEE Secur. Priv., 2021

BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Can We Create a Cross-Domain Federated Identity for the Industrial Internet of Things without Google?
IEEE Internet Things Mag., 2020

IBCS: Intent-Based Cloud Services for Security Applications.
IEEE Commun. Mag., 2020

Design of a Framework to Detect Device Spoofing Attacks Using Network Characteristics.
IEEE Consumer Electron. Mag., 2020

FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2018
A Framework for Managing User-defined Security Policies to Support Network Security Functions.
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018

CyTIME: Cyber Threat Intelligence ManagEment framework for automatically generating security rules.
Proceedings of the 13th International Conference on Future Internet Technologies, 2018

2017
A flexible architecture for orchestrating network security functions to support high-level security policies.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

2016
Empirical Analysis of SSL/TLS Weaknesses in Real Websites: Who Cares?
Proceedings of the Information Security Applications - 17th International Workshop, 2016

PIkit: A New Kernel-Independent Processor-Interconnect Rootkit.
Proceedings of the 25th USENIX Security Symposium, 2016

A Framework for Detecting MAC and IP Spoofing Attacks with Network Characteristics.
Proceedings of the International Conference on Software Security and Assurance, 2016


  Loading...