Son, Sooel
28  results:
Search for persons X
?
2

Evaluating the Robustness of Trigger Set-Based Watermarks E..:

Lee, Suyoung ; Song, Wonho ; Jana, Suman..
IEEE Transactions on Dependable and Secure Computing.  20 (2023)  4 - p. 3434-3448 , 2023
 
?
3

Revisiting Binary Code Similarity Analysis Using Interpreta..:

Kim, Dongkwan ; Kim, Eunsoo ; Cha, Sang Kil..
IEEE Transactions on Software Engineering.  49 (2023)  4 - p. 1661-1682 , 2023
 
?
4

Scalable and Secure Virtualization of HSM With ScaleTrust:

Han, Juhyeng ; Yun, Insu ; Kim, Seongmin...
IEEE/ACM Transactions on Networking.  31 (2023)  4 - p. 1595-1610 , 2023
 
?
5

AdCPG: Classifying JavaScript Code Property Graphs with Exp..:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
Lee, Changmin ; Son, Sooel - p. 3505-3518 , 2023
 
?
6

RICC: Robust Collective Classification of Sybil Accounts:

, In: Proceedings of the ACM Web Conference 2023,
Shin, Dongwon ; Lee, Suyoung ; Son, Sooel - p. 2329-2339 , 2023
 
?
8

HearMeOut : detecting voice phishing activities in Andro..:

, In: Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services,
Kim, Joongyum ; Kim, Jihwan ; Wi, Seongil.. - p. 422-435 , 2022
 
?
9

Link: Black-Box Detection of Cross-Site Scripting Vulnerabi..:

, In: Proceedings of the ACM Web Conference 2022,
Lee, Soyoung ; Wi, Seongil ; Son, Sooel - p. 743-754 , 2022
 
?
10

HiddenCPG: Large-Scale Vulnerable Clone Detection Using Sub..:

, In: Proceedings of the ACM Web Conference 2022,
Wi, Seongil ; Woo, Sijae ; Whang, Joyce Jiyoung. - p. 755-766 , 2022
 
?
11

Security Analysis on Practices of Certificate Authorities i..:

, In: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security,
Kim, Doowon ; Cho, Haehyun ; Kwon, Yonghwi... - p. 407-420 , 2021
 
?
12

Lumos: Improving Smart Home IoT Visibility and Interoperabi..:

, In: 2020 IEEE 28th International Conference on Network Protocols (ICNP),
Kim, Jeongmin ; Ko, Steven Y. ; Son, Sooel. - p. 1-13 , 2020
 
?
13

FSF: Code Coverage-Driven Fuzzing for Software-Defined Netw..:

, In: Information Security Applications; Lecture Notes in Computer Science,
Kim, Hyuntae ; Wi, Seongil ; Lee, Hyunjoo. - p. 41-54 , 2020
 
?
14

An Empirical Study of Prioritizing JavaScript Engine Crashe..:

, In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security,
Park, Sunnyeo ; Kim, Dohyeok ; Son, Sooel - p. 646-657 , 2019
 
1-15