Suivre
Hyungjoon Koo
Titre
Citée par
Citée par
Année
Compiler-assisted code randomization
H Koo, Y Chen, L Lu, VP Kemerlis, M Polychronakis
2018 IEEE symposium on security and privacy (SP), 461-477, 2018
1062018
Identifying traffic differentiation in mobile networks
A Molavi Kakhki, A Razaghpanah, A Li, H Koo, R Golani, D Choffnes, ...
Proceedings of the 2015 Internet Measurement Conference, 239-251, 2015
852015
Configuration-driven software debloating
H Koo, S Ghavamnia, M Polychronakis
Proceedings of the 12th European Workshop on Systems Security, 1-6, 2019
772019
Juggling the gadgets: Binary-level code randomization using instruction displacement
H Koo, M Polychronakis
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
582016
Return to the zombie gadgets: Undermining destructive code reads via code inference attacks
KZ Snow, R Rogowski, J Werner, H Koo, F Monrose, M Polychronakis
2016 IEEE Symposium on Security and Privacy (SP), 954-968, 2016
582016
Slimium: debloating the chromium browser with feature subsetting
C Qian, H Koo, CS Oh, T Kim, W Lee
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
492020
Practical binary code similarity detection with bert-based transferable similarity learning
S Ahn, S Ahn, H Koo, Y Paek
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
412022
Semantic-aware binary code representation with bert
H Koo, S Park, D Choi, T Kim
arXiv preprint arXiv:2106.05478, 2021
292021
A transformer-based function symbol name inference model from an assembly language for binary reversing
H Kim, J Bak, K Cho, H Koo
Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023
102023
A look back on a function identification problem
H Koo, S Park, T Kim
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
92021
Defeating zombie gadgets by re-randomizing code upon disclosure
M Morton, H Koo, F Li, KZ Snow, M Polychronakis, F Monrose
Engineering Secure Software and Systems: 9th International Symposium, ESSoS …, 2017
92017
The Politics of Routing: Investigating the Relationship between {AS} Connectivity and Internet Freedom
R Singh, H Koo, N Miramirkhani, F Mirhaj, P Gill, L Akoglu
6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 16), 2016
82016
Benzene: A practical root cause analysis system with an under-constrained state mutation
Y Park, H Lee, J Jung, H Koo, HK Kim
2024 IEEE Symposium on Security and Privacy (SP), 1865-1883, 2024
52024
Binary Code Representation With Well-Balanced Instruction Normalization
H Koo, S Park, D Choi, T Kim
IEEE Access 11, 29183-29198, 2023
52023
Softmark: software watermarking via a binary function relocation
H Kang, Y Kwon, S Lee, H Koo
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
52021
Smartmark: Software watermarking scheme for smart contracts
T Kim, Y Jang, C Lee, H Koo, H Kim
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
42023
Deview: Confining progressive web applications by debloating web apis
CS Oh, S Lee, C Qian, H Koo, W Lee
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
42022
Demystifying the Regional Phishing Landscape in South Korea
H Park, K Lim, D Kim, D Yu, H Koo
IEEE Access 11, 130131-130143, 2023
32023
Revisiting function identification with machine learning
H Koo, S Park, T Kim
Machine Learning for Program Aanalysis (MLPA) Workshop, 2021
32021
Keychain Analysis with Mac OS X Memory Forensics
K Lee, H Koo
Korea University, CIST, DCWTC 16, 2013
32013
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20