Follow
Hyungjoon Koo
Title
Cited by
Cited by
Year
Compiler-assisted code randomization
H Koo, Y Chen, L Lu, VP Kemerlis, M Polychronakis
2018 IEEE symposium on security and privacy (SP), 461-477, 2018
952018
Identifying traffic differentiation in mobile networks
A Molavi Kakhki, A Razaghpanah, A Li, H Koo, R Golani, D Choffnes, ...
Proceedings of the 2015 Internet Measurement Conference, 239-251, 2015
762015
Configuration-driven software debloating
H Koo, S Ghavamnia, M Polychronakis
Proceedings of the 12th European Workshop on Systems Security, 1-6, 2019
672019
Return to the zombie gadgets: Undermining destructive code reads via code inference attacks
KZ Snow, R Rogowski, J Werner, H Koo, F Monrose, M Polychronakis
2016 IEEE Symposium on Security and Privacy (SP), 954-968, 2016
562016
Juggling the gadgets: Binary-level code randomization using instruction displacement
H Koo, M Polychronakis
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
522016
Slimium: Debloating the chromium browser with feature subsetting
C Qian, H Koo, CS Oh, T Kim, W Lee
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
372020
Practical binary code similarity detection with bert-based transferable similarity learning
S Ahn, S Ahn, H Koo, Y Paek
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
192022
Semantic-aware binary code representation with bert
H Koo, S Park, D Choi, T Kim
arXiv preprint arXiv:2106.05478, 2021
182021
Defeating zombie gadgets by re-randomizing code upon disclosure
M Morton, H Koo, F Li, KZ Snow, M Polychronakis, F Monrose
Engineering Secure Software and Systems: 9th International Symposium, ESSoS …, 2017
92017
The Politics of Routing: Investigating the Relationship between {AS} Connectivity and Internet Freedom
R Singh, H Koo, N Miramirkhani, F Mirhaj, P Gill, L Akoglu
6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 16), 2016
82016
A look back on a function identification problem
H Koo, S Park, T Kim
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
72021
Softmark: software watermarking via a binary function relocation
H Kang, Y Kwon, S Lee, H Koo
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
42021
Revisiting function identification with machine learning
H Koo, S Park, T Kim
Machine Learning for Program Aanalysis (MLPA) Workshop, 2021
32021
Kemerlis Vasileios P., and Polychronakis Michalis. 2018
K Hyungjoon, C Yaohui, L Long
Compiler-assisted code randomization. In Proceedings of the 2018 IEEE …, 0
3
Binary Code Representation With Well-Balanced Instruction Normalization
H Koo, S Park, D Choi, T Kim
IEEE Access 11, 29183-29198, 2023
22023
Keychain Analysis with Mac OS X Memory Forensics
K Lee, H Koo
Korea University, CIST, DCWTC, 16, 2013
22013
Demystifying the Regional Phishing Landscape in South Korea
H Park, K Lim, D Kim, D Yu, H Koo
IEEE Access 11, 130131-130143, 2023
12023
A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing
H Kim, J Bak, K Cho, H Koo
Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023
12023
Evaluating Password Composition Policy and Password Meters of Popular Websites
K Lim, JH Kang, M Dixson, H Koo, D Kim
2023 IEEE Security and Privacy Workshops (SPW), 12-20, 2023
12023
Smartmark: Software watermarking scheme for smart contracts
T Kim, Y Jang, C Lee, H Koo, H Kim
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20