default search action
Hyungjoon Koo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Hohyeon Jang, Nozima Murodova, Hyungjoon Koo:
ToolPhet: Inference of Compiler Provenance From Stripped Binaries With Emerging Compilation Toolchains. IEEE Access 12: 12667-12682 (2024) - [j3]Haeun Eom, Dohee Kim, Sori Lim, Hyungjoon Koo, Sungjae Hwang:
R2I: A Relative Readability Metric for Decompiled Code. Proc. ACM Softw. Eng. 1(FSE): 383-405 (2024) - [c18]Nozima Murodova, Hyungjoon Koo:
BinAdapter: Leveraging Continual Learning for Inferring Function Symbol Names in a Binary. AsiaCCS 2024 - [c17]Younggi Park, Hwiwon Lee, Jinho Jung, Hyungjoon Koo, Huy Kang Kim:
Benzene: A Practical Root Cause Analysis System with an Under-Constrained State Mutation. SP 2024: 1865-1883 - [i5]Fujiao Ji, Kiho Lee, Hyungjoon Koo, Wenhao You, Euijin Choo, Hyoungshick Kim, Doowon Kim:
Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models. CoRR abs/2405.19598 (2024) - 2023
- [j2]Hyungjoon Koo, Soyeon Park, Daejin Choi, Taesoo Kim:
Binary Code Representation With Well-Balanced Instruction Normalization. IEEE Access 11: 29183-29198 (2023) - [j1]Hyunjun Park, Kyungchan Lim, Doowon Kim, Donghyun Yu, Hyungjoon Koo:
Demystifying the Regional Phishing Landscape in South Korea. IEEE Access 11: 130131-130143 (2023) - [c16]Hyunjin Kim, Jinyeong Bak, Kyunghyun Cho, Hyungjoon Koo:
A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing. AsiaCCS 2023: 951-965 - [c15]Taeyoung Kim, Yunhee Jang, Chanjong Lee, Hyungjoon Koo, Hyoungshick Kim:
Smartmark: Software Watermarking Scheme for Smart Contracts. ICSE 2023: 283-294 - [c14]Kyungchan Lim, Joshua H. Kang, Matthew Dixson, Hyungjoon Koo, Doowon Kim:
Evaluating Password Composition Policy and Password Meters of Popular Websites. SP (Workshops) 2023: 12-20 - [i4]Taeyoung Kim, Yunhee Jang, Chanjong Lee, Hyungjoon Koo, Hyoungshick Kim:
SmartMark: Software Watermarking Scheme for Smart Contracts. CoRR abs/2303.13733 (2023) - [i3]Nozima Murodova, Hyungjoon Koo:
A Study of Rarely Appeared Instructions in an Executable Binary. CoRR abs/2310.08011 (2023) - 2022
- [c13]Sunwoo Ahn, Seonggwan Ahn, Hyungjoon Koo, Yunheung Paek:
Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning. ACSAC 2022: 361-374 - [c12]ChangSeok Oh, Sangho Lee, Chenxiong Qian, Hyungjoon Koo, Wenke Lee:
DeView: Confining Progressive Web Applications by Debloating Web APIs. ACSAC 2022: 881-895 - [c11]Hyeonah Jung, Hyungjoon Koo, Jaehoon Paul Jeong:
IoTivity Packet Parser for Encrypted Messages in Internet of Things. ICACT 2022: 53-57 - 2021
- [c10]Hyungjoon Koo, Soyeon Park, Taesoo Kim:
A Look Back on a Function Identification Problem. ACSAC 2021: 158-168 - [c9]Honggoo Kang, Yonghwi Kwon, Sangjin Lee, Hyungjoon Koo:
SoftMark: Software Watermarking via a Binary Function Relocation. ACSAC 2021: 169-181 - [i2]Hyungjoon Koo, Soyeon Park, Daejin Choi, Taesoo Kim:
Semantic-aware Binary Code Representation with BERT. CoRR abs/2106.05478 (2021) - 2020
- [c8]Chenxiong Qian, Hyungjoon Koo, ChangSeok Oh, Taesoo Kim, Wenke Lee:
Slimium: Debloating the Chromium Browser with Feature Subsetting. CCS 2020: 461-476
2010 – 2019
- 2019
- [c7]Hyungjoon Koo, Seyedhamed Ghavamnia, Michalis Polychronakis:
Configuration-Driven Software Debloating. EuroSec@EuroSys 2019: 9:1-9:6 - 2018
- [c6]Hyungjoon Koo, Yaohui Chen, Long Lu, Vasileios P. Kemerlis, Michalis Polychronakis:
Compiler-Assisted Code Randomization. IEEE Symposium on Security and Privacy 2018: 461-477 - 2017
- [c5]Micah Morton, Hyungjoon Koo, Forrest Li, Kevin Z. Snow, Michalis Polychronakis, Fabian Monrose:
Defeating Zombie Gadgets by Re-randomizing Code upon Disclosure. ESSoS 2017: 143-160 - 2016
- [c4]Hyungjoon Koo, Michalis Polychronakis:
Juggling the Gadgets: Binary-level Code Randomization using Instruction Displacement. AsiaCCS 2016: 23-34 - [c3]Kevin Z. Snow, Roman Rogowski, Jan Werner, Hyungjoon Koo, Fabian Monrose, Michalis Polychronakis:
Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks. IEEE Symposium on Security and Privacy 2016: 954-968 - [c2]Rachee Singh, Hyungjoon Koo, Najmehalsadat Miramirkhani, Fahimeh Mirhaj, Phillipa Gill, Leman Akoglu:
The Politics of Routing: Investigating the Relationship between AS Connectivity and Internet Freedom. FOCI 2016 - [i1]Rachee Singh, Hyungjoon Koo, Najmehalsadat Miramirkhani, Fahimeh Mirhaj, Leman Akoglu, Phillipa Gill:
The Politics of Routing: Investigating the Relationship Between AS Connectivity and Internet Freedom. CoRR abs/1606.02230 (2016) - 2015
- [c1]Arash Molavi Kakhki, Abbas Razaghpanah, Anke Li, Hyungjoon Koo, Rajesh Golani, David R. Choffnes, Phillipa Gill, Alan Mislove:
Identifying Traffic Differentiation in Mobile Networks. Internet Measurement Conference 2015: 239-251
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint