Folgen
Yoon-Chan Jhi
Yoon-Chan Jhi
Director of Software Security in Technology Research at Samsung SDS, Seoul, Korea
Bestätigte E-Mail-Adresse bei samsung.com
Titel
Zitiert von
Zitiert von
Jahr
Proactive worm containment (PWC) for enterprise networks
P Liu, YC Jhi, L Li
US Patent 8,904,535, 2014
2832014
Behavior based software theft detection
X Wang, YC Jhi, S Zhu, P Liu
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1432009
Detecting software theft via system call based birthmarks
X Wang, YC Jhi, S Zhu, P Liu
2009 Annual Computer Security Applications Conference, 149-158, 2009
1312009
Value-based program characterization and its application to software plagiarism detection
YC Jhi, X Wang, X Jia, S Zhu, P Liu, D Wu
Proceedings of the 33rd international conference on software engineering …, 2011
1202011
Still: Exploit code detection via static taint and initialization analyses
X Wang, YC Jhi, S Zhu, P Liu
2008 Annual Computer Security Applications Conference (ACSAC), 289-298, 2008
982008
IMPACT: Impersonation attack detection via edge computing using deep autoencoder and feature abstraction
SJ Lee, PD Yoo, AT Asyhari, Y Jhi, L Chermak, CY Yeun, K Taha
IEEE Access 8, 65520-65529, 2020
862020
A first step towards algorithm plagiarism detection
F Zhang, YC Jhi, D Wu, P Liu, S Zhu
Proceedings of the 2012 International Symposium on Software Testing and …, 2012
792012
Program characterization using runtime values and its application to software plagiarism detection
YC Jhi, X Jia, X Wang, S Zhu, P Liu, D Wu
IEEE Transactions on Software Engineering 41 (9), 925-943, 2015
502015
DEMISe: Interpretable deep extraction and mutual information selection techniques for IoT intrusion detection
LR Parker, PD Yoo, TA Asyhari, L Chermak, Y Jhi, K Taha
Proceedings of the 14th international conference on availability …, 2019
282019
Cross-layer damage assessment for cyber situational awareness
P Liu, X Jia, S Zhang, X Xiong, YC Jhi, K Bai, J Li
Cyber Situational Awareness: Issues and Research, 155-176, 2010
212010
SAS: semantics aware signature generation for polymorphic worm detection
D Kong, YC Jhi, T Gong, S Zhu, P Liu, H Xi
International Journal of Information Security 10, 269-283, 2011
152011
Evaluation of Collaborative Worm Containments on DETER Testbed.
L Li, P Liu, Y Jhi, G Kesidis
DETER, 2007
122007
PWC: A proactive worm containment solution for enterprise networks
YC Jhi, P Liu, L Li, Q Gu, J Jing, G Kesidis
Security and Communication Networks 3 (4), 334-354, 2010
112010
Sas: Semantics aware signature generation for polymorphic worm detection
D Kong, YC Jhi, T Gong, S Zhu, P Liu, H Xi
Security and Privacy in Communication Networks: 6th Iternational ICST …, 2010
102010
Protecting web services from remote exploit code: a static analysis approach
X Wang, YC Jhi, S Zhu, P Liu
Proceedings of the 17th international conference on World Wide Web, 1139-1140, 2008
92008
Method and apparatus for detecting nop sled
YC Jhi, YJ Kum, JH Kim, IS Jeong
US Patent App. 15/933,522, 2018
42018
Apparatus and method for detecting malicious code
YC Jhi, S Hwang
US Patent App. 15/333,849, 2017
42017
Code inspection interface providing method and apparatus for implementing the method
HS Moon, HC Park, YC Jhi, JH Lee
US Patent App. 17/853,821, 2023
2023
Method and apparatus for detecting vulnerability of multi-language program
YJ Kum, YC Jhi, HC Park
US Patent App. 17/081,594, 2021
2021
A study of selected security measures against non-legitimate use of code
YC Jhi
The Pennsylvania State University, 2010
2010
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20