Jun Ho Huh
According to our database1, Jun Ho Huh authored at least 38 papers between 2009 and 2018.
Legend:Book In proceedings Article PhD thesis Other
Adaptive thermal property control technique for holistic thermal management of mobile devices.
IEICE Electronic Express, 2018
I'm Listening to your Location! Inferring User Location with Acoustic Side Channels.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
The Personal Identification Chord: A Four ButtonAuthentication System for Smartwatches.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
SysPal: System-Guided Pattern Locks for Android.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
I'm too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Next-Generation Access Control for Distributed Control Systems.
IEEE Internet Computing, 2016
Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense.
IEEE Communications Magazine, 2016
POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
On the Guessability of Resident Registration Numbers in South Korea.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Stopping Amplified DNS DDoS Attacks through Distributed Query Rate Sharing.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
On the Memorability of System-generated PINs: Can Chunking Help?
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Visualizing Privacy Risks of Mobile Applications through a Privacy Meter.
Proceedings of the Information Security Practice and Experience, 2015
DIAMoND: Distributed Intrusion/Anomaly Monitoring for Nonparametric Detection.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015
On the Effectiveness of Pattern Lock Strength Meters: Measuring the Strength of Real World Pattern Locks.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
Surpass: System-initiated User-replaceable Passwords.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures.
IEEE Trans. Smart Grid, 2014
Replacing Cryptographic Keys in AMI Mesh Networks with Small Latency.
Analyzing Unnecessary Permissions Requested by Android Apps Based on Users' Opinions.
Proceedings of the Information Security Applications - 15th International Workshop, 2014
On the practicality of detecting anomalies with encrypted traffic in AMI.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014
Limiting Data Exposure in Monitoring Multi-domain Policy Conformance.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013
Assessing software integrity of virtual appliances through software whitelists.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Towards SDN enabled network control delegation in clouds.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
A distributed monitoring architecture for AMIs: minimizing the number of monitoring nodes and enabling collided packet recovery.
Proceedings of the SEGS'13, 2013
An empirical study on the software integrity of virtual appliances: are you really getting what you paid for?
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
PIN selection policies: Are they really effective?
Computers & Security, 2012
AMI threats, intrusion detection requirements and deployment recommendations.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012
A framework integrating attribute-based policies into role-based access control.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Evidence of log integrity in policy-based security monitoring.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012
Trustworthy Distributed Systems Through Integrity-Reporting.
Proceedings of the Guide to e-Science, Next Generation Scientific Research and Discovery, 2011
Managing application whitelists in trusted distributed systems.
Future Generation Comp. Syst., 2011
Verifying Trustworthiness of Virtual Appliances in Collaborative Environments.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Phishing Detection with Popular Search Engines: Simple and Effective.
Proceedings of the Foundations and Practice of Security, 2011
Achieving attestation with less effort: an indirect and configurable approach to integrity reporting.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011
Hybrid spam filtering for mobile communication.
Computers & Security, 2010
Trustworthy Log Reconciliation for Distributed Virtual Organisations.
Proceedings of the Trusted Computing, 2009
Towards a Trustable Virtual Organisation.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009