Challenges and research directions for heterogeneous cyber–physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture H Yoo, T Shon Future generation computer systems 61, 128-136, 2016 | 97 | 2016 |
CLIK on PLCs! Attacking control logic with decompilation and virtual PLC S Kalle, N Ameen, H Yoo, I Ahmed Binary Analysis Research (BAR) Workshop, Network and Distributed System …, 2019 | 88 | 2019 |
IEEE 1815.1-based power system security with bidirectional RNN-based network anomalous attack detection for cyber-physical system S Kwon, H Yoo, T Shon IEEE Access 8, 77572-77586, 2020 | 85 | 2020 |
Control logic injection attacks on industrial control systems H Yoo, I Ahmed ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019 | 83 | 2019 |
Novel approach for detecting network anomalies for substation automation based on IEC 61850 H Yoo, T Shon Multimedia Tools and Applications 74, 303-318, 2015 | 81 | 2015 |
Design and implementation of cybersecurity testbed for industrial IoT systems S Lee, S Lee, H Yoo, S Kwon, T Shon The Journal of Supercomputing 74, 4506-4520, 2018 | 65 | 2018 |
Denial of engineering operations attacks in industrial control systems S Senthivel, S Dhungana, H Yoo, I Ahmed, V Roussev Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 64 | 2018 |
Empirical study of PLC authentication protocols in industrial control systems A Ayub, H Yoo, I Ahmed 2021 IEEE Security and Privacy Workshops (SPW), 383-397, 2021 | 51 | 2021 |
Overshadow plc to detect remote control-logic injection attacks H Yoo, S Kalle, J Smith, I Ahmed Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019 | 46 | 2019 |
Grammar-based adaptive fuzzing: Evaluation on SCADA modbus protocol H Yoo, T Shon 2016 IEEE International conference on smart grid communications …, 2016 | 36 | 2016 |
PEM: Remote forensic acquisition of PLC memory in industrial control systems N Zubair, A Ayub, H Yoo, I Ahmed Forensic Science International: Digital Investigation 40, 301336, 2022 | 34 | 2022 |
Whitelist-based anomaly detection for industrial control system security H Yoo, JH Yun, T Shon The Journal of Korean Institute of Communications and Information Sciences …, 2013 | 27 | 2013 |
Secure and reliable electronic record management system using digital forensic technologies SA Majore, H Yoo, T Shon The Journal of Supercomputing 70, 149-165, 2014 | 21 | 2014 |
Control logic obfuscation attack in industrial control systems N Zubair, A Ayub, H Yoo, I Ahmed 2022 IEEE International Conference on Cyber Security and Resilience (CSR …, 2022 | 19 | 2022 |
RNN-based anomaly detection in DNP3 transport layer S Kwon, H Yoo, T Shon 2019 IEEE international conference on communications, control, and computing …, 2019 | 16 | 2019 |
Gadgets of gadgets in industrial control systems: Return oriented programming attacks on PLCs A Ayub, N Zubair, H Yoo, W Jo, I Ahmed 2023 IEEE International Symposium on Hardware Oriented Security and Trust …, 2023 | 14 | 2023 |
Packet diversity-based anomaly detection system with OCSVM and representative model S Lee, H Yoo, J Seo, T Shon 2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016 | 11 | 2016 |
Next Generation Electronic Record Management System based on Digital Forensics SA Majore, H Yoo, T Shon International Journal of Security and Its Applications 7 (1), 189-194, 2013 | 5 | 2013 |
Anomaly detection for IEC 61850 substation network Y Lim, H Yoo, T Shon Journal of The Korea Institute of Information Security & Cryptology 23 (5 …, 2013 | 5 | 2013 |
Recovery measure against disabling reassembly attack to DNP3 communication S Kwon, H Yoo, T Shon IEICE TRANSACTIONS on Information and Systems 100 (8), 1790-1797, 2017 | 4 | 2017 |