Hyung Chan Kim

According to our database1, Hyung Chan Kim authored at least 18 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Applying Reinforcement Learning for Enhanced Cybersecurity against Adversarial Simulation.
Sensors, March, 2023

2018
Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2016
Hooking Graceful Moments: A Security Analysis of Sudo Session Handling.
Proceedings of the Advances in Information and Computer Security, 2016

Anti-forensic deletion scheme for flash storage systems.
Proceedings of the IEEE International Conference on Network Infrastructure and Digital Content, 2016

2011
O-means: An Optimized Clustering Method for Analyzing Spam Based Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation.
IEICE Trans. Inf. Syst., 2011

2010
An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

How to Locate a Target Binary Process and Its Derivatives in System Emulator.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

A Heuristic-Based Feature Selection Method for Clustering Spam Emails.
Proceedings of the Neural Information Processing. Theory and Algorithms, 2010

Working Towards a Primary Binary Analysis System.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
On the Deployment of Dynamic Taint Analysis for Application Communities.
IEICE Trans. Inf. Syst., 2009

Capturing Information Flow with Concatenated Dynamic Taint Analysis.
Proceedings of the The Forth International Conference on Availability, 2009

2008
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over G<i>F</i>(2<sup><i>m</i></sup>) on 8-Bit Micaz Mote.
IEICE Trans. Inf. Syst., 2008

2007
Enforcement of Integrated Security Policy in Trusted Operating Systems.
Proceedings of the Advances in Information and Computer Security, 2007

A Policy Language for the Extended Reference Monitor in Trusted Operating Systems.
Proceedings of the The Second International Conference on Availability, 2007

2006
Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems.
Proceedings of the Information Security Practice and Experience, 2006

A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005


  Loading...