Hyungjoon Koo

Orcid: 0000-0003-0799-0230

According to our database1, Hyungjoon Koo authored at least 21 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ToolPhet: Inference of Compiler Provenance From Stripped Binaries With Emerging Compilation Toolchains.
IEEE Access, 2024

2023
A Study of Rarely Appeared Instructions in an Executable Binary.
CoRR, 2023

Demystifying the Regional Phishing Landscape in South Korea.
IEEE Access, 2023

Binary Code Representation With Well-Balanced Instruction Normalization.
IEEE Access, 2023

Evaluating Password Composition Policy and Password Meters of Popular Websites.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Smartmark: Software Watermarking Scheme for Smart Contracts.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
IoTivity Packet Parser for Encrypted Messages in Internet of Things.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

DeView: Confining Progressive Web Applications by Debloating Web APIs.
Proceedings of the Annual Computer Security Applications Conference, 2022

Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Semantic-aware Binary Code Representation with BERT.
CoRR, 2021

A Look Back on a Function Identification Problem.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

SoftMark: Software Watermarking via a Binary Function Relocation.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Slimium: Debloating the Chromium Browser with Feature Subsetting.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Configuration-Driven Software Debloating.
Proceedings of the 12th European Workshop on Systems Security, 2019

2018
Compiler-Assisted Code Randomization.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
Defeating Zombie Gadgets by Re-randomizing Code upon Disclosure.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

2016
The Politics of Routing: Investigating the Relationship between AS Connectivity and Internet Freedom.
Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet, 2016

Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Juggling the Gadgets: Binary-level Code Randomization using Instruction Displacement.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Identifying Traffic Differentiation in Mobile Networks.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015


  Loading...