Heejo Lee

Orcid: 0000-0002-5831-0787

According to our database1, Heejo Lee authored at least 158 papers between 1995 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CNEPS: A Precise Approach for Examining Dependencies among Third-Party C/C++ Open-Source Components.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

PRETT2: Discovering HTTP/2 DoS Vulnerabilities via Protocol Reverse Engineering.
Proceedings of the Computer Security - ESORICS 2024, 2024

BloomFuzz: Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
ZMAD: Lightweight Model-Based Anomaly Detection for the Structured Z-Wave Protocol.
IEEE Access, 2023

V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques.
Proceedings of the 32nd USENIX Security Symposium, 2023

AutoMetric: Towards Measuring Open-Source Software Quality Metrics Automatically.
Proceedings of the IEEE/ACM International Conference on Automation of Software Test, 2023

2022
An SSH predictive model using machine learning with web proxy session logs.
Int. J. Inf. Sec., 2022

Improving SSH detection model using IPA time and WGAN-GP.
Comput. Secur., 2022

Riding the IoT Wave With VFuzz: Discovering Security Flaws in Smart Homes.
IEEE Access, 2022

Circuit: A JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites.
IEEE Access, 2022

xVDB: A High-Coverage Approach for Constructing a Vulnerability Database.
IEEE Access, 2022

MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from Modified Open-Source Software Components.
Proceedings of the 31st USENIX Security Symposium, 2022

How to divide a permission token in the delegation process of blockchain-based access control for IoT.
Proceedings of the IEEE International Systems Conference, 2022

L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Poster: Automated Discovery of Sensor Spoofing Attacks on Robotic Vehicles.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
UDP-Based Active Scan for IoT Security (UAIS).
KSII Trans. Internet Inf. Syst., 2021

Vehicle Speed Measurement Methodology Robust to Playback Speed-Manipulated Video File.
IEEE Access, 2021

V0Finder: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities.
Proceedings of the 30th USENIX Security Symposium, 2021

Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC Security.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

Centris: A Precise and Scalable Approach for Identifying Modified Open-Source Software Reuse.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User Discussions.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
VERISMART: A Highly Precise Safety Verifier for Ethereum Smart Contracts.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Design and Performance Evaluation of Crime Type and Crime Risk Score Estimation Technique for Fast and Efficient Response of Severe Crimes.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Enhancing the Reliability of IoT Data Marketplaces through Security Validation of IoT Devices.
Proceedings of the 16th International Conference on Distributed Computing in Sensor Systems, 2020

2018
Software systems at risk: An empirical study of cloned vulnerabilities in practice.
Comput. Secur., 2018

PRETT: Protocol Reverse Engineering Using Binary Tokens and Network Traces.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Obfuscated VBA Macro Detection Using Machine Learning.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
Entropy analysis to classify unknown packing algorithms for malware detection.
Int. J. Inf. Sec., 2017

Packer Detection for Multi-Layer Executables Using Entropy Analysis.
Entropy, 2017

VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Visual analysis of corrupted video data in video event data recorders.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2016
Coordination of anti-spoofing mechanisms in partial deployments.
J. Commun. Networks, 2016

Broken Integrity Detection of Video Files in Video Event Data Recorders.
KSII Trans. Internet Inf. Syst., 2016

Detecting Violations of Security Requirements for Vulnerability Discovery in Source Code.
IEICE Trans. Inf. Syst., 2016

Integrity verification of the ordered data structures in manipulated video content.
Digit. Investig., 2016

CLORIFI: software vulnerability discovery using code clone verification.
Concurr. Comput. Pract. Exp., 2016

PsyBoG: A scalable botnet detection method for large-scale DNS traffic.
Comput. Networks, 2016

Automated Source Code Instrumentation for Verifying Potential Vulnerabilities.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

FassKey: A secure and convenient authentication system.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

2015
A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control.
Wirel. Networks, 2015

Introduction to the Issue on Signal and Information Processing for Privacy.
IEEE J. Sel. Top. Signal Process., 2015

Integrity Verification Scheme of Video Contents in Surveillance Cameras for Digital Forensic Investigations.
IEICE Trans. Inf. Syst., 2015

Comments on the Linux FAT32 allocator and file creation order reconstruction [Digit Investig 11(4), 224-233].
Digit. Investig., 2015

Bootstrapping Real-world Deployment of Future Internet Architectures.
CoRR, 2015

Screening smartphone applications using malware family signatures.
Comput. Secur., 2015

An incrementally deployable anti-spoofing mechanism for software-defined networks.
Comput. Commun., 2015

Flooding DDoS mitigation and traffic management with software defined networking.
Proceedings of the 4th IEEE International Conference on Cloud Networking, 2015

2014
Cylindrical Coordinates Security Visualization for multiple domain command and control botnet detection.
Comput. Secur., 2014

GMAD: Graph-based Malware Activity Detection by DNS traffic analysis.
Comput. Commun., 2014

Lightweight Resource Management for DDoS Traffic Isolation in a Cloud Environment.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

PsyBoG: Power spectral density analysis for detecting botnet groups.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

DroidGraph: discovering Android malware by analyzing semantic behavior.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks.
Comput. Secur., 2013

SIPAD: SIP-VoIP Anomaly Detection using a Stateful Rule Tree.
Comput. Commun., 2013

Dynamic Surveillance: A Case Study with Enron Email Data Set.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

Screening Smartphone Applications Using Behavioral Signatures.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Dynamic classification of packing algorithms for inspecting executables using entropy analysis.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013

UAS: Universal anti-spoofing by incorporating existing mechanisms.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

A Digital Forensic Framework for Automated User Activity Reconstruction.
Proceedings of the Information Security Practice and Experience, 2013

Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Cyber-Physical Security of a Smart Grid Infrastructure.
Proc. IEEE, 2012

Identifying botnets by capturing group activities in DNS traffic.
Comput. Networks, 2012

Online Detection of Fake Access Points Using Received Signal Strengths.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis.
Proceedings of the Information Security and Privacy Research, 2012

BinGraph: Discovering mutant malware using hierarchical semantic signatures.
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012

Detection of cache pollution attacks using randomness checks.
Proceedings of IEEE International Conference on Communications, 2012

Carving secure wi-fi zones with defensive jamming.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Minimum-Energy Semi-Static Scheduling of a Periodic Real-Time Task on DVFS-Enabled Multi-Core Processors.
IEICE Trans. Inf. Syst., 2011

Detecting Malicious Web Links and Identifying Their Attack Types.
Proceedings of the 2nd USENIX Conference on Web Application Development, 2011

PFS: Probabilistic filter scheduling against distributed denial-of-service attacks.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host.
Proceedings of the Information Security Practice and Experience, 2011

2010
Achieving Network Level Privacy in Wireless Sensor Networks.
Sensors, 2010

BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks.
Sensors, 2010

Classifying Rules by In-out Traffic Direction to Avoid Security Policy Anomaly.
KSII Trans. Internet Inf. Syst., 2010

Activity-oriented access control to ubiquitous hospital information and services.
Inf. Sci., 2010

Enhancing Resiliency of Networks: Evolving Strategy vs. Multihoming.
IEICE Trans. Commun., 2010

Abnormal Policy Detection and Correction Using Overlapping Transition.
IEICE Trans. Inf. Syst., 2010

MUQAMI+: a scalable and locally distributed key management scheme for clustered sensor networks.
Ann. des Télécommunications, 2010

State of the Art of Network Security Perspectives in Cloud Computing.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Detecting metamorphic malwares using code graphs.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Generic unpacking using entropy analysis.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

2009
Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2009

Maximum-Utility Scheduling of Operation Modes With Probabilistic Task Execution Times Under Energy Constraints.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2009

Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks.
Sensors, 2009

Is early warning of an imminent worm epidemic possible?
IEEE Netw., 2009

Secure wireless networking.
J. Commun. Networks, 2009

An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography.
J. Commun. Networks, 2009

Reducing Payload Inspection Cost Using Rule Classification for Fast Attack Signature Matching.
IEICE Trans. Inf. Syst., 2009

SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks.
IEICE Trans. Commun., 2009

Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks
CoRR, 2009

Fast detection and visualization of network attacks on parallel coordinates.
Comput. Secur., 2009

Scalable attack graph for risk assessment.
Proceedings of the 2009 International Conference on Information Networking, 2009

Dynamic multimedia scheduling against Motion based DoS attacks.
Proceedings of the 2009 International Conference on Information Networking, 2009

Energy-efficient scheduling of a real-time task on DVFS-enabled multi-cores.
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009

BotGAD: detecting botnets by capturing group activities in network traffic.
Proceedings of the 4th International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2009), 2009

BARI: A Distributed Key Management Approach for Wireless Body Area Networks.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Activity-Oriented Access Control for Ubiquitous Environments.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
A connection management protocol for stateful inspection firewalls in multi-homed networks.
J. Commun. Networks, 2008

Image-Feature Based Human Identification Protocols on Limited Display Devices.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

HoneyID : Unveiling Hidden Spywares by Generating Bogus Events.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Distinguishing between FE and DDoS Using Randomness Check.
Proceedings of the Information Security, 11th International Conference, 2008

Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks.
Proceedings of the Information Security Practice and Experience, 2008

PROBE: A Process Behavior-Based Host Intrusion Prevention System.
Proceedings of the Information Security Practice and Experience, 2008

Activity-based Security Scheme for Ubiquitous Environments.
Proceedings of the 2008 IEEE International Performance, 2008

Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Code Graph for Malware Detection.
Proceedings of the 2008 International Conference on Information Networking, 2008

Reducing Payload Scans for Attack Signature Matching Using Rule Classification.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

Network Level Privacy for Wireless Sensor Networks.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
100+ VoIP Calls on 802.11b: The Power of Combining Voice Frame Aggregation and Uplink-Downlink Bandwidth Control in Wireless LANs.
IEEE J. Sel. Areas Commun., 2007

Evaluation of authentication interworking methods among multiple WLAN service providers.
Int. J. Commun. Syst., 2007

Detecting Unknown Worms Using Randomness Check.
IEICE Trans. Commun., 2007

Error Bound of Collision Probability Estimation in Non-saturated IEEE 802.11 WLANs.
IEICE Trans. Commun., 2007

Boosting VoIP Capacity of Wireless Mesh Networks through Lazy Frame Aggregation.
IEICE Trans. Commun., 2007

On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics.
IEICE Trans. Commun., 2007

Using Image Attributes for Human Identification Protocols
CoRR, 2007

A password stretching method using user specific salts.
Proceedings of the 16th International Conference on World Wide Web, 2007

Activity-based Access Control Model to Hospital Information.
Proceedings of the 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), 2007

A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments.
Proceedings of the 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), 2007

A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Bayesian memory-based reputation system.
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007

A Trust-Based Approach to Control Privacy Exposure in Ubiquitous Computing Environments.
Proceedings of the IEEE International Conference on Pervasive Services, 2007

A Location-aware Key Predistribution Scheme for Distributed Wireless Sensor Networks.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Energy-Efficient and Fault-Tolerant Positioning of Multiple Base Stations.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

Energy-Aware QoS Adjustment of Multimedia Tasks with Uncertain Execution Time.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Enforcing Access Control Using Risk Assessment.
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007

Human Identification Through Image Evaluation Using Secret Predicates.
Proceedings of the Topics in Cryptology, 2007

Contextual Risk-Based Access Control.
Proceedings of the 2007 International Conference on Security & Management, 2007

BASE: an incrementally deployable mechanism for viable IP spoofing prevention.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

Transmission Time-Based Mechanism to Detect Wormhole Attacks.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007

Cyber Threat Trend Analysis Model Using HMM.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Botnet Detection by Monitoring Group Activities in DNS Traffic.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
Optimal Scheduling for Real-Time Parallel Tasks.
IEICE Trans. Inf. Syst., 2006

Resiliency of Network Topologies under Path-Based Attacks.
IEICE Trans. Commun., 2006

Cascade Damage Estimation Model for Internet Attacks.
Proceedings of the Intelligence and Security Informatics, International Workshop, 2006

Improving VoIP Call Capacity of Multi-Hop Wireless Networks through Self-Controlled Frame Aggregation.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006

On the Cross-Layer Impact of TCP ACK Thinning on IEEE 802.11 Wireless MAC Dynamics.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006

Detecting Unknown Worms Using Randomness Check.
Proceedings of the Information Networking, 2006

Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments.
Proceedings of the Information Systems Security, Second International Conference, 2006

A Simple Congestion-Resilient Link Adaptation Algorithm for IEEE 802.11 WLANs.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

One Touch Logon: Replacing Multiple Passwords with Single Fingerprint Recognition.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

Improving Resiliency of Network Topology with Enhanced Evolving Strategies.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2005
Defending a Web Browser Against Spying with Browser Helper Objects.
Proceedings of the Intelligence and Security Informatics, 2005

HackSim: An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities.
Proceedings of the Information Networking, 2005

PCAV: Internet Attack Visualization on Parallel Coordinates.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

2004
Attack Resiliency of Network Topologies.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

2003
Processor Allocation and Task Scheduling of Matrix Chain Products on Parallel Systems.
IEEE Trans. Parallel Distributed Syst., 2003

Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization.
Parallel Comput., 2003

2001
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets.
Proceedings of the ACM SIGCOMM 2001 Conference on Applications, 2001

On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

1997
Replicated Process Allocation for Load Distribution in Fault-Tolerant Multicomputers.
IEEE Trans. Computers, 1997

1995
Performance comparison of real-time architectures using simulation.
Proceedings of the 2nd International Workshop on Real-Time Computing Systems and Applications, October 25, 1995

Process Allocation for Load Distribution in Fault-Tolerant Multicomputers.
Proceedings of the Digest of Papers: FTCS-25, 1995


  Loading...