Jun Ho Huh

According to our database1, Jun Ho Huh authored at least 38 papers between 2009 and 2018.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Adaptive thermal property control technique for holistic thermal management of mobile devices.
IEICE Electronic Express, 2018

I'm Listening to your Location! Inferring User Location with Acoustic Side Channels.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

The Personal Identification Chord: A Four ButtonAuthentication System for Smartwatches.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

SysPal: System-Guided Pattern Locks for Android.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

I'm too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Next-Generation Access Control for Distributed Control Systems.
IEEE Internet Computing, 2016

Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense.
IEEE Communications Magazine, 2016

POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

On the Guessability of Resident Registration Numbers in South Korea.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Stopping Amplified DNS DDoS Attacks through Distributed Query Rate Sharing.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

On the Memorability of System-generated PINs: Can Chunking Help?
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Visualizing Privacy Risks of Mobile Applications through a Privacy Meter.
Proceedings of the Information Security Practice and Experience, 2015

DIAMoND: Distributed Intrusion/Anomaly Monitoring for Nonparametric Detection.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

On the Effectiveness of Pattern Lock Strength Meters: Measuring the Strength of Real World Pattern Locks.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

Surpass: System-initiated User-replaceable Passwords.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures.
IEEE Trans. Smart Grid, 2014

Replacing Cryptographic Keys in AMI Mesh Networks with Small Latency.
MONET, 2014

Analyzing Unnecessary Permissions Requested by Android Apps Based on Users' Opinions.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

On the practicality of detecting anomalies with encrypted traffic in AMI.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Limiting Data Exposure in Monitoring Multi-domain Policy Conformance.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Assessing software integrity of virtual appliances through software whitelists.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Towards SDN enabled network control delegation in clouds.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

A distributed monitoring architecture for AMIs: minimizing the number of monitoring nodes and enabling collided packet recovery.
Proceedings of the SEGS'13, 2013

An empirical study on the software integrity of virtual appliances: are you really getting what you paid for?
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

PIN selection policies: Are they really effective?
Computers & Security, 2012

AMI threats, intrusion detection requirements and deployment recommendations.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

A framework integrating attribute-based policies into role-based access control.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Evidence of log integrity in policy-based security monitoring.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

Trustworthy Distributed Systems Through Integrity-Reporting.
Proceedings of the Guide to e-Science, Next Generation Scientific Research and Discovery, 2011

Managing application whitelists in trusted distributed systems.
Future Generation Comp. Syst., 2011

Verifying Trustworthiness of Virtual Appliances in Collaborative Environments.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Phishing Detection with Popular Search Engines: Simple and Effective.
Proceedings of the Foundations and Practice of Security, 2011

Achieving attestation with less effort: an indirect and configurable approach to integrity reporting.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

Hybrid spam filtering for mobile communication.
Computers & Security, 2010

Trustworthy Log Reconciliation for Distributed Virtual Organisations.
Proceedings of the Trusted Computing, 2009

Towards a Trustable Virtual Organisation.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009