Seunghoon Woo

Orcid: 0000-0002-5455-0804

According to our database1, Seunghoon Woo authored at least 15 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Novel Lateral Dynamics Control Strategy of In-Wheel Motor Vehicle to Improve Agility and Straight-Line Driving Stability.
IEEE Trans. Veh. Technol., July, 2024

Piecewise Affine Relaxation of Discrete Value Functions in Learning Model Predictive Control With Application to Autonomous Racing.
IEEE Control. Syst. Lett., 2024

CNEPS: A Precise Approach for Examining Dependencies among Third-Party C/C++ Open-Source Components.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

BloomFuzz: Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
ZMAD: Lightweight Model-Based Anomaly Detection for the Structured Z-Wave Protocol.
IEEE Access, 2023

V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Circuit: A JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites.
IEEE Access, 2022

xVDB: A High-Coverage Approach for Constructing a Vulnerability Database.
IEEE Access, 2022

MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from Modified Open-Source Software Components.
Proceedings of the 31st USENIX Security Symposium, 2022

L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
V0Finder: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities.
Proceedings of the 30th USENIX Security Symposium, 2021

Centris: A Precise and Scalable Approach for Identifying Modified Open-Source Software Reuse.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User Discussions.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2017
VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017


  Loading...