Poster: Self-Defensible Storage Devices based on Flash memory against Ransomware JY Paik, K Shin, ES Cho IEEE conference on Security and Privacy, 2016 | 24 | 2016 |
A situation-based exception detection mechanism for safety in pervasive systems ES Cho, S Helal 2011 IEEE/IPSJ International Symposium on Applications and the Internet, 196-201, 2011 | 22 | 2011 |
A Storage-level Detection Mechanism against Crypto-Ransomware JY Paik, JH Choi, R Jin, J Wang, ES Cho Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 16 | 2018 |
ICARS: Integrated control architecture for the robotic mediator in smart environments: A software framework for the robotic mediator collaborating with smart environments YH Suh, KW Lee, M Lee, H Kim, ES Cho 2012 IEEE 14th International Conference on High Performance Computing and …, 2012 | 13 | 2012 |
Automated Crash Filtering Using Interprocedural Static Analysis for Binary Codes HG Jeon, SK Mok, ES Cho 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017 | 12 | 2017 |
Byte Frequency Based Indicators for Crypto-Ransomware Detection from Empirical Analysis GY Kim, JY Paik, Y Kim, ES Cho Journal of Computer Science and Technology 37 (2), 423-442, 2022 | 11 | 2022 |
Security Checks in Programming Languages for Ubiquitous Environments ES Cho, KW Lee Proceedings of 2004 Workshop on Pervasive, Security, Privacy and Trust, 2004 | 11 | 2004 |
Program Slicing for Binary code Deobfuscation SK Mok, H Jeon, ES Cho Journal of the Korea Institute of Information Security and Cryptology 27 (1 …, 2017 | 9 | 2017 |
Automated crash filtering for arm binary programs KJ Eom, JY Paik, SK Mok, HG Jeon, ES Cho, DW Kim, J Ryu 2015 IEEE 39th Annual Computer Software and Applications Conference 2, 478-483, 2015 | 9 | 2015 |
Fine-Grained View-Based Access Control for RDF Cloaking ES Cho, YS Kim, M Hong, WD Cho 2009 Ninth IEEE International Conference on Computer and Information …, 2009 | 9 | 2009 |
OBFUS: An Obfuscation Tool for Software Copyright and Vulnerability Protection S Kang, S Lee, Y Kim, SK Mok, ES Cho Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021 | 8 | 2021 |
Toward Machine Learning Based Analyses on Compressed Firmware S Lee, JY Paik, R Jin, ES Cho 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC …, 2019 | 8 | 2019 |
Toward Firmware-Type Analysis Using Machine Learning Techniques S Lee, ES Cho 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018 | 8 | 2018 |
An Integrated Formal Model for Context-Aware Systems ES Cho, TS Yoon, JH Choi, JY Paik, S Helal 2013 IEEE 37th Annual Computer Software and Applications Conference …, 2013 | 8 | 2013 |
Toward efficient detection of semantic exceptions in context-aware systems ES Cho, S Helal 2012 9th International Conference on Ubiquitous Intelligence and Computing …, 2012 | 8 | 2012 |
Performance improvement for flash memories using loop optimization JY Paik, ES Cho, TS Chung 2009 International Conference on Computational Science and Engineering 2 …, 2009 | 8 | 2009 |
An ECA rule-based task programming language for ubiquitous environments KW Lee, ES Cho, H Kim 2006 8th International Conference Advanced Communication Technology 1, 4 pp.-360, 2006 | 8 | 2006 |
Scenario-based programming for ubiquitous applications ES Cho, KW Lee, MY Kim, H Kim Ubiquitous Computing Systems: Third International Symposium, UCS 2006, Seoul …, 2006 | 7 | 2006 |
Malware classification using a byte‐granularity feature based on structural entropy JY Paik, R Jin, ES Cho Computational Intelligence 38 (4), 1536-1558, 2022 | 6 | 2022 |
LOM: Lightweight classifier for obfuscation methods J Kim, S Kang, ES Cho, JY Paik Information Security Applications: 22nd International Conference, WISA 2021 …, 2021 | 6 | 2021 |