CyTIME: Cyber Threat Intelligence ManagEment framework for automatically generating security rules E Kim, K Kim, D Shin, B Jin, H Kim Proceedings of the 13th International Conference on Future Internet …, 2018 | 24 | 2018 |
Kerberoid: A practical android app decompilation system with multiple decompilers H Jang, B Jin, S Hyun, H Kim Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 8 | 2019 |
On the effectiveness of perturbations in generating evasive malware variants B Jin, J Choi, JB Hong, H Kim IEEE Access 11, 31062-31074, 2023 | 6 | 2023 |
FUMVar: a practical framework for generating Fully-working and Unseen Malware Variants B Jin, J Choi, H Kim, JB Hong Proceedings of the 36th Annual ACM Symposium on Applied Computing, 1656-1663, 2021 | 6 | 2021 |
AdFlush: A Real-World Deployable Machine Learning Solution for Effective Advertisement and Web Tracker Prevention K Lee, C Lim, B Jin, T Kim, H Kim Proceedings of the ACM on Web Conference 2024, 1902-1913, 2024 | | 2024 |
Sharing cyber threat intelligence: Does it really help? B Jin, E Kim, H Lee, E Bertino, D Kim, H Kim Proceedings of the 30th Network and Distributed System Security (NDSS) Symposium, 2024 | | 2024 |
크립토재킹 탐지 브라우저 확장프로그램 분석: NoCoin 을 이용한 사례연구: NoCoin 을 이용한 사례연구 진범진, 신동순, 김형식 한국정보과학회 학술발표논문집, 1967-1969, 2018 | | 2018 |