Haehyun Cho

Orcid: 0000-0002-5344-5252

According to our database1, Haehyun Cho authored at least 32 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages.
Proceedings of the ICT Systems Security and Privacy Protection, 2024

DryJIN: Detecting Information Leaks in Android Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2024

2023
Augmenting Android Malware Using Conditional Variational Autoencoder for the Malware Family Classification.
Comput. Syst. Sci. Eng., 2023

Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Hiding Data in the Padding Area of Android Applications without Re-Packaging.
IEICE Trans. Inf. Syst., November, 2022

Data Covert Channels between the Secure World and the Normal World in the ARM TrustZone Architecture.
IEICE Trans. Inf. Syst., November, 2022

MAPAS: a practical deep learning-based android malware detection system.
Int. J. Inf. Sec., 2022

CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing.
IEEE Secur. Priv., 2022

Large-Scale Analysis on Anti-Analysis Techniques in Real-World Malware.
IEEE Access, 2022

FAM: Featuring Android Malware for Deep Learning-Based Familial Analysis.
IEEE Access, 2022

Dazzle-attack: Anti-Forensic Server-side Attack via Fail-Free Dynamic State Machine.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability.
Proceedings of the 31st USENIX Security Symposium, 2022

I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

ViK: practical mitigation of temporal memory safety violations through object ID inspection.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022

2021
Automated Multi-Layered Bytecode Generation for Preventing Sensitive Information Leaks From Android Applications.
IEEE Access, 2021

Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

Scam Pandemic: How Attackers Exploit Public Fear through Phishing.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

2019
iCore: continuous and proactive extrospection on multi-core IoT devices.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

2018
DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications.
IEEE Access, 2018

SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Empirical analysis of anti-reversing schemes for protecting mobile codes in the internet-of-things.
Int. J. Serv. Technol. Manag., 2017

2016
Anti-debugging scheme for protecting mobile apps on android platform.
J. Supercomput., 2016

Mobile application tamper detection scheme using dynamic code injection against repackaging attacks.
J. Supercomput., 2016

TripleMon: A multi-layer security framework for mediating inter-process communication on Android.
J. Comput. Secur., 2016

TrustZone Explained: Architectural Features and Use Cases.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

2015
Personal Information Leaks with Automatic Login in Mobile Social Network Services.
Entropy, 2015

Tamper detection scheme using signature segregation on android platform.
Proceedings of the IEEE 5th International Conference on Consumer Electronics - Berlin, 2015


  Loading...