Hyoungshick Kim

According to our database1, Hyoungshick Kim authored at least 122 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Statistical Application Fingerprinting for DDoS Attack Mitigation.
IEEE Trans. Information Forensics and Security, 2019

A framework for DNS naming services for Internet-of-Things devices.
Future Generation Comp. Syst., 2019

Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger.
Digital Investigation, 2019

An Eye for an Eye: Economics of Retaliation in Mining Pools.
CoRR, 2019

Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
CoRR, 2019

O2TR: Offline OTR messaging system under network disruption.
Computers & Security, 2019

Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

80% of Block Propagation Rate is Enough - Towards Secure and Efficient PoW-based Blockchain Consensus.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

The Light Will Be with You. Always - A Novel Continuous Mobile Authentication with the Light Sensor.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Efficient Software Implementation of Homomorphic Encryption for Addition and Multiplication Operations.
Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication, 2019

Profiling-Based Classification Algorithms for Security Applications in Internet of Things.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

Data-Driven Selection of Security Application Frameworks During Architectural Design.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Automated Cash Mining Attacks on Mobile Advertising Networks.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Secure and DoS-Resilient Fragment Authentication in CCN-Based Vehicular Networks.
Wireless Communications and Mobile Computing, 2018

Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks.
Sensors, 2018

Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity.
Security and Communication Networks, 2018

Design and Analysis of Push Notification-Based Malware on Android.
Security and Communication Networks, 2018

No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games.
CoRR, 2018

Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks.
Computers & Security, 2018

Interface to Network Security Functions for Cloud-Based Security Services.
IEEE Communications Magazine, 2018

User Credential Cloning Attacks in Android Applications: Exploiting Automatic Login on Android Apps and Mitigating Strategies.
IEEE Consumer Electronics Magazine, 2018

No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

I'm Listening to your Location! Inferring User Location with Acoustic Side Channels.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Threat Modeling and Analysis of Voice Assistant Applications.
Proceedings of the Information Security Applications - 19th International Conference, 2018

An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

When Harry Met Tinder: Security Analysis of Dating Apps on Android.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

A Framework for Managing User-defined Security Policies to Support Network Security Functions.
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018

Bypassing DRM protection in e-book applications on Android.
Proceedings of the 2018 International Conference on Information Networking, 2018

Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018

MEDUSA: Malware Detection Using Statistical Analysis of System's Behavior.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

CyTIME: Cyber Threat Intelligence ManagEment framework for automatically generating security rules.
Proceedings of the 13th International Conference on Future Internet Technologies, 2018

The Personal Identification Chord: A Four ButtonAuthentication System for Smartwatches.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

POSTER: Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic Encryption.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

POSTER: DeepCRACk: Using Deep Learning to Automatically CRack Audio CAPTCHAs.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices.
J. Internet Serv. Inf. Secur., 2017

TARD: Temporary Access Rights Delegation for guest network devices.
J. Comput. Syst. Sci., 2017

Visual Honey Encryption: Application to Steganography.
IACR Cryptology ePrint Archive, 2017

Security challenges with network functions virtualization.
Future Generation Comp. Syst., 2017

Privacy-preserving nearest neighbor queries using geographical features of cellular networks.
Computer Communications, 2017

Wrong Siren! A Location Spoofing Attack on Indoor Positioning Systems: The Starbucks Case Study.
IEEE Communications Magazine, 2017

Security and Privacy Challenges in the Internet of Things [Security and Privacy Matters].
IEEE Consumer Electronics Magazine, 2017

O2TR: Offline Off-the-Record (OTR) Messaging.
Proceedings of the Information Security Applications - 18th International Conference, 2017

SysPal: System-Guided Pattern Locks for Android.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Mitigating DNS query-based DDoS attacks with machine learning on software-defined networking.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook.
Proceedings of the Information Security Practice and Experience, 2017

A flexible architecture for orchestrating network security functions to support high-level security policies.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Analysis and comparison of fax spam detection algorithms.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

k-Depth Mimicry Attack to Secretly Embed Shellcode into PDF Files.
Proceedings of the Information Science and Applications 2017, 2017

Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks.
Proceedings of the Twelfth International Conference on Digital Information Management, 2017

Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN.
Proceedings of the Computer Security - ESORICS 2017, 2017

I'm too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Poster: Adversarial Examples for Classifiers in High-Dimensional Network Data.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

DDoS Attack Mitigation in Internet of Things Using Software Defined Networking.
Proceedings of the Third IEEE International Conference on Big Data Computing Service and Applications, 2017

Forensic analysis of the backup database file in KakaoTalk messenger.
Proceedings of the 2017 IEEE International Conference on Big Data and Smart Computing, 2017

Design of a Secure Digital Recording Protection System with Network Connected Devices.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

2016
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords.
IEEE Trans. Human-Machine Systems, 2016

A Healthcare Information System for Secure Delivery and Remote Management of Medical Records.
IEICE Transactions, 2016

Combating online fraud attacks in mobile-based advertising.
EURASIP J. Information Security, 2016

Towards Automated Exploit Generation for Embedded Systems.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Empirical Analysis of SSL/TLS Weaknesses in Real Websites: Who Cares?
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Detecting Encrypted Traffic: A Machine Learning Approach.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Bypassing the Integrity Checking of Rights Objects in OMA DRM: a Case Study with the MelOn Music Service.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

Threat Assessment in the Cloud Environment: A Quantitative Approach for Security Pattern Selection.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

SDN-based network security functions for VoIP and VoLTE services.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

SAN: Self-Adaptive Navigation for Drone Battery Charging in Wireless Drone Networks.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Detecting False Emergency Requests Using Callers' Reporting Behaviors and Locations.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

On the Guessability of Resident Registration Numbers in South Korea.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Enhancing Conformance Testing Using Symbolic Execution for Network Protocols.
IEEE Trans. Reliability, 2015

Design and analysis of enumeration attacks on finding friends with phone numbers: A case study with KakaoTalk.
Computers & Security, 2015

Encryption is Not Enough: Inferring User Activities on KakaoTalk with Traffic Analysis.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

On the Memorability of System-generated PINs: Can Chunking Help?
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Devil in a box: Installing backdoors in electronic door locks.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

Keyboard or keylogger?: A security analysis of third-party keyboards on Android.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

Visualizing Privacy Risks of Mobile Applications through a Privacy Meter.
Proceedings of the Information Security Practice and Experience, 2015

Visual Honey Encryption: Application to Steganography.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

SDN-based security services using interface to network security functions.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

On the Effectiveness of Pattern Lock Strength Meters: Measuring the Strength of Real World Pattern Locks.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

Surpass: System-initiated User-replaceable Passwords.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

SBUS: Smart e-Bus Battery Substitution Scheme in Vehicular Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

A Framework for Security Services Based on Software-Defined Networking.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

A Survey on Interfaces to Network Security Functions in Network Virtualization.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Privacy Preserving Nearest Neighbor Search Based on Topologies in Cellular Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

An Empirical Study of Click Fraud in Mobile Advertising Networks.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Finding influential neighbors to maximize information diffusion in twitter.
Proceedings of the 23rd International World Wide Web Conference, 2014

I've Got Your Number: - Harvesting Users' Personal Data via Contacts Sync for the KakaoTalk Messenger.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Analyzing Unnecessary Permissions Requested by Android Apps Based on Users' Opinions.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

Don't count the number of friends when you are spreading information in social networks.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

2013
What's in Twitter, I know what parties are popular and who you are supporting now!
Social Netw. Analys. Mining, 2013

An Experimental Evaluation of Robustness of Networks.
IEEE Systems Journal, 2013

We Are Still Vulnerable to Clickjacking Attacks: About 99 % of Korean Websites Are Dangerous.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

2012
Complex network analysis for secure and robust communications.
PhD thesis, 2012

Network analysis of temporal trends in scholarly research productivity.
J. Informetrics, 2012

Privacy-Enhancing Queries in Personalized Search with Untrusted Service Providers.
IEICE Transactions, 2012

PIN selection policies: Are they really effective?
Computers & Security, 2012

Centrality prediction in dynamic human contact networks.
Computer Networks, 2012

STOP: Socio-Temporal Opportunistic Patching of short range mobile malware.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Efficient channel selection using hierarchical clustering.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

What's in Your Tweets? I Know Who You Supported in the UK 2010 General Election.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012

Influential Neighbours Selection for Information Diffusion in Online Social Networks.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

Social Authentication: Harder Than It Looks.
Proceedings of the Financial Cryptography and Data Security, 2012

What's in Twitter: I Know What Parties are Popular and Who You are Supporting Now!
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
A Perfect Collision-Free Pseudonym System.
IEEE Communications Letters, 2011

RAD: Recipient-anonymous data delivery based on public routing proxies.
Computer Networks, 2011

Effective measurement selection in truncated kernel density estimator: Voronoi mean shift algorithm for truncated kernels.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

Phishing Detection with Popular Search Engines: Simple and Effective.
Proceedings of the Foundations and Practice of Security, 2011

Achieving attestation with less effort: an indirect and configurable approach to integrity reporting.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

2010
Hybrid spam filtering for mobile communication.
Computers & Security, 2010

2009
How to Compare the Scientific Contributions between Research Groups
CoRR, 2009

Hybrid Spam Filtering for Mobile Communication
CoRR, 2009

A new collision-free pseudonym scheme in mobile ad hoc networks.
Proceedings of the 7th International Symposium on Modeling and Optimization in Mobile, 2009

A Spatial Cloaking Framework Based on Range Search for Nearest Neighbor Search.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

Privacy-enhanced public view for social graphs.
Proceedings of the 2nd ACM Workshop on Social Web Search and Mining, 2009

2007
Self-authorized Public Key Management for Home Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Scalable DRM System for Media Portability.
Proceedings of the Advances in Computer Science, 2007


  Loading...