Services

Program Committee

  • IEEE Symposium on Security and Privacy (S&P) 2024
  • Annual Computer Security Applications Conference (ACSAC) 2023
  • International Symposium on Foundations & Practice of Security (FPS) 2023, 2022
  • NYU’s CSAW Program Committee 2023, 2022, 2021, 2020, 2019
  • World Conference on Information Security Applications (WISA) 2021

Organizing Comittee

  • Publication Chair for IEEE Secure Development Conference (SecDev) 2023

Session Chair

  • ACM ASIA Conference on Computer and Communications Security (ASIACCS) 2023
  • Workshop on Privacy in the Electronic Society (WPES), collocated with CCS 2021
  • World Conference on Information Security Applications (WISA) 2021

Journal Reviewer

  • IEEE Transactions on Dependable and Secure Computing (TDSC) 2022
  • Computers and Security (COSE) 2023, 2021
  • IEEE Internet Computing (IC) 2022
  • International Journal of Information Security (IJIS) 2021, 2020
  • Frontiers of Information Technology & Electronic Engineering (FITEE) 2020
  • IEEE Access 2019
  • IEEE/ACM Transactions on Networking (TON) 2019
  • IEEE Security & Privacy Magazine (S&P) 2019

Patents

  • Methods and apparatus for inferring function symbols from assembly code in transformer-based executable binary, and recording medium
    Hyungjoon Koo, Hyunjin Kim, and Jinyeong Bak
    App No. 10-2023-0067351
  • Watermarking method for smart contract
    Hyoungshick Kim, Taeyoung Kim, Yunhee Jang, Chanjong Lee, and Hyungjoon Koo
    App No. 10-2022-0116335
  • Method and device of embedding watermakr in software
    Hyungjoon Koo, Sangjin Lee, and Honggu Kang
    App No. 10-2021-0170916
  • System and method for responding DDoS offensive
    허창열, 구본재, 박봉희, Hyungjoon Koo, 정규태
    Patent No. 10-2010-0065260

Invited Talks

  • Understanding of Advanced Code Reuse Attacks and Defenses, UNIST Security Seminar (Dec 2022)
  • A Practical Binary Similarity Detection Approach, Sejong Cybersecurity Workshop 0x01 (Oct 2022)
  • Binary Code Representation for Deep Learning and its Applications, Software Convergence Symposium (SWCS, Apr 2022)
  • Semantic-aware Binary Code Representation with Deep Learning, Fall KAIST Security Colloquium (Nov 2021)
  • Executable Binary Code Representation with Deep Learning, KOCSEA Technical Symposium Program (Nov 2021)
  • Crash Course on Deep Learning for Security, Soongsil University (Jul 2021)
  • Toward Better Binary Code Representation with Deep Learning, Seoul National University (Jun 2021)
  • Software Protection via Code Randomization, University of Tennessee (Nov 2020)
  • Practical Software Specialization against Code Reuse Attacks, Sungkyunkwan University (Feb 2019)
  • Practical Software Specialization against Code Reuse Attacks, KAIST (Feb 2019)
  • Practical Software Hardening against Code Reuse Attacks, Georgia Tech (Nov 2018)
  • Software Hardening with Code Diversification, CS Colloquium at SUNY Korea (Jun 2018)
  • Software Hardening with Code Diversification, Korea University (May 2018)
  • Software Hardening with Code Diversification, Samsung Research (May 2018)
  • Software Hardening, Cyber Symposium by the Stony Brook Computing Society (Apr 2018)
  • Elaborate Attacks with Existing Tools, National Computing & Information Agency (May 2013)
  • Anonymizing Yourself with Tor, Korea Internet & Security Agency (Apr 2013)