Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger J Choi, J Yu, S Hyun, H Kim Digital Investigation 28, S50-S59, 2019 | 48 | 2019 |
Threat modeling and analysis of voice assistant applications G Cho, J Choi, H Kim, S Hyun, J Ryoo Information Security Applications: 19th International Conference, WISA 2018 …, 2019 | 20 | 2019 |
COAT: Code obfuscation tool to evaluate the performance of code plagiarism detection tools S Ko, J Choi, H Kim 2017 International conference on software security and assurance (ICSSA), 32-37, 2017 | 20 | 2017 |
Forensic analysis of the backup database file in KakaoTalk messenger J Choi, J Park, H Kim 2017 IEEE International Conference on Big Data and Smart Computing (BigComp …, 2017 | 18 | 2017 |
AMVG: Adaptive malware variant generation framework using machine learning J Choi, D Shin, H Kim, J Seotis, JB Hong 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing …, 2019 | 13 | 2019 |
Towards secure and usable certificate-based authentication system using a secondary device for an industrial internet of things J Choi, J Cho, H Kim, S Hyun Applied Sciences 10 (6), 1962, 2020 | 11 | 2020 |
POSTER: I can't hear this because i am human: A novel design of audio CAPTCHA system J Choi, T Oh, W Aiken, SS Woo, H Kim Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 11 | 2018 |
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin'Forks' in the Wild J Choi, W Choi, W Aiken, H Kim, JH Huh, T Kim, Y Kim, R Anderson arXiv preprint arXiv:2201.08678, 2022 | 7 | 2022 |
Bypassing the integrity checking of rights objects in OMA DRM: A case study with the MelOn music service J Choi, W Aiken, J Ryoo, H Kim Proceedings of the 10th International Conference on Ubiquitous Information …, 2016 | 7 | 2016 |
FUMVar: a practical framework for generating Fully-working and Unseen Malware Variants B Jin, J Choi, H Kim, JB Hong Proceedings of the 36th Annual ACM Symposium on Applied Computing, 1656-1663, 2021 | 6 | 2021 |