Geumhwan Cho

Orcid: 0000-0002-3679-416X

According to our database1, Geumhwan Cho authored at least 18 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
On the Long-Term Effects of Continuous Keystroke Authentication: Keeping User Frustration Low through Behavior Adaptation.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2023

2021
Towards Usable and Secure Location-based Smartphone Authentication.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

2020
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better?
ACM Trans. Priv. Secur., 2020

2019
Data-Driven Selection of Security Application Frameworks During Architectural Design.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Design and Analysis of Push Notification-Based Malware on Android.
Secur. Commun. Networks, 2018

Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks.
Comput. Secur., 2018

Threat Modeling and Analysis of Voice Assistant Applications.
Proceedings of the Information Security Applications - 19th International Conference, 2018

The Personal Identification Chord: A Four ButtonAuthentication System for Smartwatches.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices.
J. Internet Serv. Inf. Secur., 2017

SysPal: System-Guided Pattern Locks for Android.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Combating online fraud attacks in mobile-based advertising.
EURASIP J. Inf. Secur., 2016

POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Keyboard or keylogger?: A security analysis of third-party keyboards on Android.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

On the Effectiveness of Pattern Lock Strength Meters: Measuring the Strength of Real World Pattern Locks.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

A Framework for Security Services Based on Software-Defined Networking.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

An Empirical Study of Click Fraud in Mobile Advertising Networks.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015


  Loading...