Haehyun Cho
Haehyun Cho
Verified email at - Homepage
Cited by
Cited by
Trustzone explained: Architectural features and use cases
B Ngabonziza, D Martin, A Bailey, H Cho, S Martin
2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ...
Proceedings of the 42nd IEEE Symposium on Security and Privacy (Oakland), 0
Prime+Count: Novel cross-world covert channels on arm trustzone
H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
Anti-debugging scheme for protecting mobile apps on android platform
H Cho, J Lim, H Kim, JH Yi
the Journal of Supercomputing 72, 232-246, 2016
Scam Pandemic: How Attackers Exploit Public Fear through Phishing
M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ...
Proceedings of the 2020 APWG Symposium on Electronic Crime Research (eCrime), 2021
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases
ST Dinh, H Cho, K Martin, A Oest, K Zeng, A Kapravelos, GJ Ahn, T Bao, ...
Proceedings of the 2021 Network and Distributed System Security Symposium (NDSS), 2021
MAPAS: a practical deep learning-based android malware detection system
J Kim, Y Ban, E Ko, H Cho, JH Yi
International Journal of Information Security 21 (4), 725-738, 2022
DexMonitor: dynamically analyzing and monitoring obfuscated Android applications
H Cho, JH Yi, GJ Ahn
IEEE Access 6, 71229-71240, 2018
SmokeBomb: Effective Mitigation Against Cache Side-channel Attacks on the ARM Architecture
H Cho, J Park, D Kim, Z Zhao, Y Shoshitaishvili, A Doupé, GJ Ahn
The 18th ACM International Conference on Mobile Systems, Applications, and …, 2020
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers
H Cho, J Park, J Kang, T Bao, R Wang, Y Shoshitaishvili, A Doupé, ...
Proceedings of the 14th USENIX Workshop on Offensive Technologies (WOOT), 2020
Personal information leaks with automatic login in mobile social network services
J Choi, H Cho, JH Yi
Entropy 17 (6), 3947-3962, 2015
Wi not calling: Practical privacy and availability Attacks in Wi-Fi calling
J Baek, S Kyung, H Cho, Z Zhao, Y Shoshitaishvili, A Doupé, GJ Ahn
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability
K Zeng, Y Chen, H Cho, X Xing, A Doupé, Y Shoshitaishvili, T Bao
31st USENIX Security Symposium (USENIX Security 22), 71-88, 2022
Fam: featuring android malware for deep learning-based familial analysis
Y Ban, S Lee, D Song, H Cho, JH Yi
IEEE Access 10, 20008-20018, 2022
Mobile application tamper detection scheme using dynamic code injection against repackaging attacks
H Cho, J Bang, M Ji, JH Yi
The Journal of Supercomputing 72 (9), 3629–3645, 2016
ViK: practical mitigation of temporal memory safety violations through object ID inspection
H Cho, J Park, A Oest, T Bao, R Wang, Y Shoshitaishvili, A Doupé, ...
Proceedings of the 27th ACM International Conference on Architectural …, 2022
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem
D Kim, H Cho, Y Kwon, A Doupé, S Son, GJ Ahn, T Dumitras
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
Tamper detection scheme using signature segregation on android platform
J Bang, H Cho, M Ji, T Cho, JH Yi
2015 IEEE 5th International Conference on Consumer Electronics-Berlin (ICCE …, 2015
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior
P Zhang, Z Sun, S Kyung, HW Behrens, ZL Basque, H Cho, A Oest, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
Large-Scale Analysis on Anti-Analysis Techniques in Real-World Malware
M Kim, H Cho, JH Yi
IEEE Access 10, 75802-75815, 2022
The system can't perform the operation now. Try again later.
Articles 1–20