Page 15 - KAIST GSIS 2022 Vol.07
P. 15
KAIST GSIS Newsletter 2022 Summer Vol.07 https: / /gsis.kaist.ac.kr
논문 제목 저자명과 학회지/저널
Revisiting binary code similarity analysis using Dongkwan Kim, Eunsoo Kim, Sang Kil Cha, Sooel Son, Yongdae Kim
interpretable feature engineering and lessons IEEE Transactions on Software Engineering
learned (IEEE TSE 2022)
Sangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee,
Watching the Watchers: Practical Video Identifica- Sooel Son, and Yongdae Kim
tion Attack in LTE Networks USENIX Security Symposium, 2022
(USENIX Security 2022)
CheolJun Park*, Sangwook Bae*, BeomSeok Oh, Jiho Lee, Eunkyu Lee,
Insu Yun, and Yongdae Kim
DoLTEst: In-depth Downlink Negative Testing
Framework for LTE Devices (*: co-first author)
USENIX Security Symposium, 2022
(USENIX Security 2022)
Jincheol Ha, Seongkwang Kim, Byeonghak Lee, Jooyoung Lee, and Min-
Rubato: Noisy Ciphers for Approximate Homomor- cheol Son
phic Encryption
Eurocrypt, 2022 (part 1)
Yeseul Choi, Yunjong Jeong, Daehee Jang, Brent Byunghoon Kang, Ho-
EmuID: Detecting presence of emulation through joon Lee
microarchitectural characteristic on ARM
Computers & Security 2022
3rdParTEE: Securing Third-party IoT Services us- Jinsoo Jang, Brent Byunghoon Kang
ing the Trusted Execution Environment
IEEE Internet of Things Journal
Hojoon Lee, Chihyun Song, Brent Byunghoon Kang
Harnessing the x86 Intermediate Rings for Intra-
Process Isolation IEEE Transactions on Dependable and Secure Computing
(IEEE TDSC 2022)
Daehee Jang, Ammar Askar, Insu Yun, Stephen Tong, Yiqin Cai, Taesoo Kim
Fuzzing@Home: Distributed Fuzzing on Untrusted International Symposium on Research in Attacks, Intrusions and De-
Heterogeneous Clients fenses, 2022
(RAID 2022)
Byunggill Joe, Insik Shin, Jihun Hamm
Online Evasion Attacks on Recurrent Models: The
Power of Hallucinating the Future International Joint Conference on Artificial Intelligence
(IJCAI-ECAI 2022)
Ju Chen, Wookhyun Han, Mingjun Yin, Haochen Zeng, Yuxuan Chen,
SYMSAN: Time and Space Efficient Concolic Execu- Chengyu Song, Byoungyoung Lee, Heng Yin, Insik Shin,
tion via Dynamic Data-flow Analysis USENIX Security Symposium, 2022
(USENIX Security 2022)
Sunjae Lee, Hoyoung Kim, Sijung Kim, Sangwook Lee, Hyosu Kim, Jean
Young Song, Steve Ko, Sangeun Oh, Insik Shin,
A-Mash: Providing Single-App Illusion for Multi-
App Use through User-centric UI Mashup ACM International Conference on Mobile Computing and Networking
2022
(MobiCom 2022)
Seungjin Baek*, Hocheol Nam*, Yongwoo Oh, Muoi Tran, and Min Suk
Kang
Short Paper: On the Claims of Weak Block Syn-
chronization in Bitcoin (*: co-first author)
Financial Cryptography and Data Security2022
(FC’2022)
Nitya Lakshmanan, Abdelhak Bentaleb, Byoungjun Choi, Roger Zimmer-
On Privacy Risks of Watching YouTube over Cel- mann, Jun Han, Min Suk Kang
lular Networks with Carrier Aggregation ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
(IMWUT)
Graduate School Of Information Security 15