Junsung Cho
Zitiert von
Zitiert von
Syspal: System-guided pattern locks for android
G Cho, JH Huh, J Cho, S Oh, Y Song, H Kim
2017 IEEE Symposium on Security and Privacy (SP), 338-356, 2017
An empirical study of click fraud in mobile advertising networks
G Cho, J Cho, Y Song, H Kim
2015 10th International Conference on Availability, Reliability and Security …, 2015
Combating online fraud attacks in mobile-based advertising
G Cho, J Cho, Y Song, D Choi, H Kim
EURASIP Journal on Information Security 2016 (1), 1-9, 2016
Wrong siren! a location spoofing attack on indoor positioning systems: The starbucks case study
J Cho, J Yu, S Oh, J Ryoo, JS Song, H Kim
IEEE communications magazine 55 (3), 132-137, 2017
Keyboard or keylogger?: A security analysis of third-party keyboards on Android
J Cho, G Cho, H Kim
2015 13th Annual Conference on Privacy, Security and Trust (PST), 173-176, 2015
IoE security threats and you
J Ryoo, S Kim, J Cho, H Kim, S Tjoa, C DeRobertis
2017 International Conference on Software Security and Assurance (ICSSA), 13-19, 2017
The personal identification chord: A four buttonauthentication system for smartwatches
I Oakley, JH Huh, J Cho, G Cho, R Islam, H Kim
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
SENTINEL: A secure and efficient authentication framework for unmanned aerial vehicles
G Cho, J Cho, S Hyun, H Kim
Applied Sciences 10 (9), 3149, 2020
Design and Analysis of Push Notification-Based Malware on Android
S Hyun, J Cho, G Cho, H Kim
Security and Communication Networks 2018, 2018
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better?
G Cho, JH Huh, S Kim, J Cho, H Park, Y Lee, K Beznosov, H Kim
ACM Transactions on Privacy and Security (TOPS) 23 (4), 1-32, 2020
Hello, Facebook! Here is the stalkers’ paradise!: Design and analysis of enumeration attack using phone numbers on Facebook
J Kim, K Kim, J Cho, H Kim, S Schrittwieser
International Conference on Information Security Practice and Experience …, 2017
Data-driven selection of security application frameworks during architectural design
H Cervantes, R Kazman, J Ryoo, J Cho, G Cho, H Kim, J Kang
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
User credential cloning attacks in android applications: exploiting automatic login on android apps and mitigating strategies
J Cho, D Kim, H Kim
IEEE Consumer Electronics Magazine 7 (3), 48-55, 2018
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices.
J Cho, G Cho, S Hyun, H Kim
J. Internet Serv. Inf. Secur. 7 (4), 35-44, 2017
Towards secure and usable certificate-based authentication system using a secondary device for an industrial internet of things
J Choi, J Cho, H Kim, S Hyun
Applied Sciences 10 (6), 1962, 2020
ACIDroid: a practical app cache integrity protection system on Android Runtime
J Choi, S Kim, J Cho, K Kim, S Hong, H Kim
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 376-383, 2020
Method of sharing key between devices using physical access restriction
SH Jeon, HS Kim, MS Kim, KW Park, JS Cho, JG Yu
US Patent 10,298,557, 2019
A Methodology to Support the Selection of Security Frameworks
J Ryoo, J Cho, H Cervantes, R Kazman, G Cho, J Kang, H Kim
The trend of Smart home security technology and policy
G Cho, J Kang, JS Cho, Y Song, H Kim
Proceedings of the Korea Information Processing Society Conference, 445-448, 2015
Poster: Design of Backdoor on Android Devices
J Cho, G Cho, S Hyun, H Kim
Ratio 1, 0.008, 0
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20