Junsung Cho

Orcid: 0000-0003-3799-8970

According to our database1, Junsung Cho authored at least 14 papers between 2015 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better?
ACM Trans. Priv. Secur., 2020

ACIDroid: a practical app cache integrity protection system on Android Runtime.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

2019
Data-Driven Selection of Security Application Frameworks During Architectural Design.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Design and Analysis of Push Notification-Based Malware on Android.
Secur. Commun. Networks, 2018

User Credential Cloning Attacks in Android Applications: Exploiting Automatic Login on Android Apps and Mitigating Strategies.
IEEE Consumer Electron. Mag., 2018

The Personal Identification Chord: A Four ButtonAuthentication System for Smartwatches.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices.
J. Internet Serv. Inf. Secur., 2017

Wrong Siren! A Location Spoofing Attack on Indoor Positioning Systems: The Starbucks Case Study.
IEEE Commun. Mag., 2017

SysPal: System-Guided Pattern Locks for Android.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook.
Proceedings of the Information Security Practice and Experience, 2017

IoE Security Threats and You.
Proceedings of the International Conference on Software Security and Assurance, 2017

2016
Combating online fraud attacks in mobile-based advertising.
EURASIP J. Inf. Secur., 2016

2015
Keyboard or keylogger?: A security analysis of third-party keyboards on Android.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

An Empirical Study of Click Fraud in Mobile Advertising Networks.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015


  Loading...