Seunghoon Woo

Orcid: 0000-0001-5856-6056

According to our database1, Seunghoon Woo authored at least 21 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A large-scale analysis of the effectiveness of publicly reported security patches.
Comput. Secur., 2025

Reference Torque Tracking Controller for Electric Power Steering Using a Disturbance Observer With System Identification-Based Parameter Selection.
IEEE Access, 2025

Capability Analysis of Fault-Tolerant Control With Differential Braking for Steer-by-Wire Failure.
IEEE Access, 2025

Coordinated Control Approach for Brake Actuator Failures: A Fault-Tolerant Strategy Using Braking Systems and Steering.
IEEE Access, 2025

Tiver: Identifying Adaptive Versions of C/C++ Third-Party Open-Source Components Using a Code Clustering Technique.
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025

ZCover: Uncovering Z-Wave Controller Vulnerabilities Through Systematic Security Analysis of Application Layer Implementation.
Proceedings of the 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2025

2024
A Novel Lateral Dynamics Control Strategy of In-Wheel Motor Vehicle to Improve Agility and Straight-Line Driving Stability.
IEEE Trans. Veh. Technol., July, 2024

Piecewise Affine Relaxation of Discrete Value Functions in Learning Model Predictive Control With Application to Autonomous Racing.
IEEE Control. Syst. Lett., 2024

CNEPS: A Precise Approach for Examining Dependencies among Third-Party C/C++ Open-Source Components.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

BloomFuzz: Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
ZMAD: Lightweight Model-Based Anomaly Detection for the Structured Z-Wave Protocol.
IEEE Access, 2023

V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Circuit: A JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites.
IEEE Access, 2022

xVDB: A High-Coverage Approach for Constructing a Vulnerability Database.
IEEE Access, 2022

MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from Modified Open-Source Software Components.
Proceedings of the 31st USENIX Security Symposium, 2022

L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
V0Finder: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities.
Proceedings of the 30th USENIX Security Symposium, 2021

Centris: A Precise and Scalable Approach for Identifying Modified Open-Source Software Reuse.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User Discussions.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2017
VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017


  Loading...