Services
Program Committee
- IEEE Symposium on Security and Privacy (S&P) 2024
- Annual Computer Security Applications Conference (ACSAC) 2023
- International Symposium on Foundations & Practice of Security (FPS) 2023, 2022
- NYU’s CSAW Program Committee 2023, 2022, 2021, 2020, 2019
- World Conference on Information Security Applications (WISA) 2021
Organizing Comittee
- Publication Chair for IEEE Secure Development Conference (SecDev) 2023
Session Chair
- ACM ASIA Conference on Computer and Communications Security (ASIACCS) 2023
- Workshop on Privacy in the Electronic Society (WPES), collocated with CCS 2021
- World Conference on Information Security Applications (WISA) 2021
Journal Reviewer
- IEEE Transactions on Dependable and Secure Computing (TDSC) 2022
- Computers and Security (COSE) 2023, 2021
- IEEE Internet Computing (IC) 2022
- International Journal of Information Security (IJIS) 2021, 2020
- Frontiers of Information Technology & Electronic Engineering (FITEE) 2020
- IEEE Access 2019
- IEEE/ACM Transactions on Networking (TON) 2019
- IEEE Security & Privacy Magazine (S&P) 2019
Patents
- Methods and apparatus for inferring function symbols
from assembly code in transformer-based executable
binary, and recording medium
Hyungjoon Koo, Hyunjin Kim, and Jinyeong Bak
App No. 10-2023-0067351
- Watermarking method for smart contract
Hyoungshick Kim, Taeyoung Kim, Yunhee Jang, Chanjong Lee, and Hyungjoon Koo
App No. 10-2022-0116335
- Method and device of embedding watermakr in software
Hyungjoon Koo, Sangjin Lee, and Honggu Kang
App No. 10-2021-0170916
- System and method for responding DDoS offensive
허창열, 구본재, 박봉희, Hyungjoon Koo, 정규태
Patent No. 10-2010-0065260
Invited Talks
- Understanding of Advanced Code Reuse Attacks and Defenses, UNIST Security Seminar (Dec 2022)
- A Practical Binary Similarity Detection Approach, Sejong Cybersecurity Workshop 0x01 (Oct 2022)
- Binary Code Representation for Deep Learning and its Applications, Software Convergence Symposium (SWCS, Apr 2022)
- Semantic-aware Binary Code Representation with Deep Learning, Fall KAIST Security Colloquium (Nov 2021)
- Executable Binary Code Representation with Deep Learning, KOCSEA Technical Symposium Program (Nov 2021)
- Crash Course on Deep Learning for Security, Soongsil University (Jul 2021)
- Toward Better Binary Code Representation with Deep Learning, Seoul National University (Jun 2021)
- Software Protection via Code Randomization, University of Tennessee (Nov 2020)
- Practical Software Specialization against Code Reuse Attacks, Sungkyunkwan University (Feb 2019)
- Practical Software Specialization against Code Reuse Attacks, KAIST (Feb 2019)
- Practical Software Hardening against Code Reuse Attacks, Georgia Tech (Nov 2018)
- Software Hardening with Code Diversification, CS Colloquium at SUNY Korea (Jun 2018)
- Software Hardening with Code Diversification, Korea University (May 2018)
- Software Hardening with Code Diversification, Samsung Research (May 2018)
- Software Hardening, Cyber Symposium by the Stony Brook Computing Society (Apr 2018)
- Elaborate Attacks with Existing Tools, National Computing & Information Agency (May 2013)
- Anonymizing Yourself with Tor, Korea Internet & Security Agency (Apr 2013)