Hyo Jin Jo

Orcid: 0000-0002-3496-7899

According to our database1, Hyo Jin Jo authored at least 24 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
ErrIDS: An Enhanced Cumulative Timing Error-Based Automotive Intrusion Detection System.
IEEE Trans. Intell. Transp. Syst., November, 2023

Flooding attack mitigator for in-vehicle CAN using fault confinement in CAN protocol.
Comput. Secur., March, 2023

G-IDCS: Graph-Based Intrusion Detection and Classification System for CAN Protocol.
IEEE Access, 2023

TB-Logger: Secure Vehicle Data Logging Method Using Trusted Execution Environment and Blockchain.
IEEE Access, 2023

RIDAS: Real-time identification of attack sources on controller area networks.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Adversarial Example Detection Based on Improved GhostBusters.
IEICE Trans. Inf. Syst., November, 2022

SOME/IP Intrusion Detection System Using Machine Learning.
IEICE Trans. Inf. Syst., November, 2022

A Survey of Attacks on Controller Area Networks and Corresponding Countermeasures.
IEEE Trans. Intell. Transp. Syst., 2022

TTIDS: Transmission-Resuming Time-Based Intrusion Detection System for Controller Area Network (CAN).
IEEE Access, 2022

Efficient ECU Analysis Technology Through Structure-Aware CAN Fuzzing.
IEEE Access, 2022

2021
An Enhanced Method for Reverse Engineering CAN Data Payload.
IEEE Trans. Veh. Technol., 2021

2020
MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks.
IEEE Trans. Veh. Technol., 2020

Fine-Grained Access Control-Enabled Logging Method on ARM TrustZone.
IEEE Access, 2020

2019
T-Box: A Forensics-Enabled Trusted Automotive Data Recording Method.
IEEE Access, 2019

How to Securely Record Logs based on ARM TrustZone.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks.
IEEE Trans. Veh. Technol., 2018

Reliable Cooperative Authentication for Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2018

VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System.
IEEE Trans. Inf. Forensics Secur., 2018

2017
Vulnerabilities of Android OS-Based Telematics System.
Wirel. Pers. Commun., 2017

2016
Efficient and Privacy-Preserving Metering Protocols for Smart Grid Systems.
IEEE Trans. Smart Grid, 2016

A Practical Security Architecture for In-Vehicle CAN-FD.
IEEE Trans. Intell. Transp. Syst., 2016

BadVoice: Soundless voice-control replay attack on modern smartphones.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016

2015
A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN.
IEEE Trans. Intell. Transp. Syst., 2015

2014
Efficient Privacy-Preserving Authentication in Wireless Mobile Networks.
IEEE Trans. Mob. Comput., 2014


  Loading...