Jusop Choi

Orcid: 0000-0001-5257-6624

According to our database1, Jusop Choi authored at least 12 papers between 2016 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
On the Effectiveness of Perturbations in Generating Evasive Malware Variants.
IEEE Access, 2023

2022
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild.
CoRR, 2022

VulDeBERT: A Vulnerability Detection System Using BERT.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

2021
FUMVar: a practical framework for generating fully-working and unseen malware variants.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

2020
ACIDroid: a practical app cache integrity protection system on Android Runtime.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

2019
Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger.
Digit. Investig., 2019

AMVG: Adaptive Malware Variant Generation Framework Using Machine Learning.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

2018
Threat Modeling and Analysis of Voice Assistant Applications.
Proceedings of the Information Security Applications - 19th International Conference, 2018

POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
COAT: Code Obfuscation Tool to Evaluate the Performance of Code Plagiarism Detection Tools.
Proceedings of the International Conference on Software Security and Assurance, 2017

Forensic analysis of the backup database file in KakaoTalk messenger.
Proceedings of the 2017 IEEE International Conference on Big Data and Smart Computing, 2017

2016
Bypassing the Integrity Checking of Rights Objects in OMA DRM: a Case Study with the MelOn Music Service.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016


  Loading...