Follow
Haehyun Cho
Haehyun Cho
Verified email at ssu.ac.kr - Homepage
Title
Cited by
Cited by
Year
Trustzone explained: Architectural features and use cases
B Ngabonziza, D Martin, A Bailey, H Cho, S Martin
2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016
1932016
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ...
Proceedings of the 42nd IEEE Symposium on Security and Privacy (Oakland), 0
92*
MAPAS: a practical deep learning-based android malware detection system
J Kim, Y Ban, E Ko, H Cho, JH Yi
International Journal of Information Security 21 (4), 725-738, 2022
802022
Prime+Count: Novel cross-world covert channels on arm trustzone
H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
552018
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases
ST Dinh, H Cho, K Martin, A Oest, K Zeng, A Kapravelos, GJ Ahn, T Bao, ...
Proceedings of the 2021 Network and Distributed System Security Symposium (NDSS), 2021
482021
Scam Pandemic: How Attackers Exploit Public Fear through Phishing
M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ...
Proceedings of the 2020 APWG Symposium on Electronic Crime Research (eCrime), 2021
442021
Anti-debugging scheme for protecting mobile apps on android platform
H Cho, J Lim, H Kim, JH Yi
the Journal of Supercomputing 72, 232-246, 2016
302016
Playing for {K (H) eaps}: Understanding and improving linux kernel exploit reliability
K Zeng, Y Chen, H Cho, X Xing, A Doupé, Y Shoshitaishvili, T Bao
31st USENIX Security Symposium (USENIX Security 22), 71-88, 2022
252022
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers
H Cho, J Park, J Kang, T Bao, R Wang, Y Shoshitaishvili, A Doupé, ...
Proceedings of the 14th USENIX Workshop on Offensive Technologies (WOOT), 2020
172020
DexMonitor: dynamically analyzing and monitoring obfuscated Android applications
H Cho, JH Yi, GJ Ahn
IEEE Access 6, 71229-71240, 2018
172018
Sooel Son, Gail-Joon Ahn, and Tudor Dumitras. 2021. Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem
D Kim, H Cho, Y Kwon, A Doupé
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
162021
Security analysis on practices of certificate authorities in the HTTPS phishing ecosystem
D Kim, H Cho, Y Kwon, A Doupé, S Son, GJ Ahn, T Dumitras
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
132021
Fam: Featuring android malware for deep learning-based familial analysis
Y Ban, S Lee, D Song, H Cho, JH Yi
IEEE Access 10, 20008-20018, 2022
122022
SmokeBomb: Effective Mitigation Against Cache Side-channel Attacks on the ARM Architecture
H Cho, J Park, D Kim, Z Zhao, Y Shoshitaishvili, A Doupé, GJ Ahn
The 18th ACM International Conference on Mobile Systems, Applications, and …, 2020
122020
Wi not calling: Practical privacy and availability Attacks in Wi-Fi calling
J Baek, S Kyung, H Cho, Z Zhao, Y Shoshitaishvili, A Doupé, GJ Ahn
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
122018
ViK: practical mitigation of temporal memory safety violations through object ID inspection
H Cho, J Park, A Oest, T Bao, R Wang, Y Shoshitaishvili, A Doupé, ...
Proceedings of the 27th ACM International Conference on Architectural …, 2022
112022
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior
P Zhang, Z Sun, S Kyung, HW Behrens, ZL Basque, H Cho, A Oest, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
102022
Large-scale analysis on anti-analysis techniques in real-world malware
M Kim, H Cho, JH Yi
IEEE access 10, 75802-75815, 2022
102022
Personal information leaks with automatic login in mobile social network services
J Choi, H Cho, JH Yi
Entropy 17 (6), 3947-3962, 2015
102015
Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale
M Bitaab, H Cho, A Oest, Z Lyu, W Wang, J Abraham, R Wang, T Bao, ...
2023 IEEE Symposium on Security and Privacy (SP), 2566-2583, 2023
62023
The system can't perform the operation now. Try again later.
Articles 1–20