Seunghoon Woo

Orcid: 0000-0002-5455-0804

According to our database1, Seunghoon Woo authored at least 11 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
ZMAD: Lightweight Model-Based Anomaly Detection for the Structured Z-Wave Protocol.
IEEE Access, 2023

V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Circuit: A JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites.
IEEE Access, 2022

xVDB: A High-Coverage Approach for Constructing a Vulnerability Database.
IEEE Access, 2022

MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from Modified Open-Source Software Components.
Proceedings of the 31st USENIX Security Symposium, 2022

L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
V0Finder: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities.
Proceedings of the 30th USENIX Security Symposium, 2021

Centris: A Precise and Scalable Approach for Identifying Modified Open-Source Software Reuse.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User Discussions.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2017
VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017


  Loading...