Publications
Featured Publications

R2I: A Relative Readability Metric for Decompiled Code
In the ACM International Conference on the Foundations of Software Engineering (FSE 2024)

BinAdapter: Leveraging Continual Learning for Inferring Function Symbol Names in a Binary
In the 19th ACM Asia Conference on Computer and Communications Security, 2024 (ASIACCS ’24)

BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation
In the 45th IEEE Symposium on Security and Privacy, 2024 (S&P ’24)Distinguished Paper Award*

SmartMark: Software Watermarking Scheme for Smart Contracts
In the 45th IEEE/ACM International Conference on Software Engineering, 2023 (ICSE ’23)

A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing
In the 18th ACM Asia Conference on Computer and Communications Security, 2023 (ASIACCS ’23)

Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning
In the 38th Annual Computer Security Applications Conference (ACSAC ’22)
International Conferences and Journals
A Decade-long Landscape of Advanced Persistent Threats: Longitudinal Analysis and Global Trends (To appear)
In the 32nd ACM Conference on Computer and Communications Security (CCS'25)
BOOTKITTY: A Stealthy Bootkit-Rootkit Against Modern Operating Systems
In the 19th USENIX WOOT Conference on Offensive Technologies (WOOT'25)
Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models
In the 34nd USENIX Conference on Security Symposium (USENIX'25)
An Empirical Study of Black-box based Membership Inference Attacks on a Real-World Dataset
International Symposium on Foundations and Practice of Security (FPS 2024)
R2I: A Relative Readability Metric for Decompiled Code
In the ACM International Conference on the Foundations of Software Engineering (FSE 2024)
BinAdapter: Leveraging Continual Learning for Inferring Function Symbol Names in a Binary
In the 19th ACM Asia Conference on Computer and Communications Security, 2024 (ASIACCS ’24)
ToolPhet: Inference of Compiler Provenance from Stripped Binaries with Emerging Compilation Toolchains
IEEE Access (2024)
Demystifying the Regional Phishing Landscape in South Korea
IEEE Access (2023)
BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation
In the 45th IEEE Symposium on Security and Privacy, 2024 (S&P ’24)Distinguished Paper Award*
SmartMark: Software Watermarking Scheme for Smart Contracts
In the 45th IEEE/ACM International Conference on Software Engineering, 2023 (ICSE ’23)
A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing
In the 18th ACM Asia Conference on Computer and Communications Security, 2023 (ASIACCS ’23)
Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning
In the 38th Annual Computer Security Applications Conference (ACSAC ’22)
DeView: Confining Progressive Web Applications by Debloating Web APIs
In the 38th Annual Computer Security Applications Conference (ACSAC ’22)
IoTivity Packet Parser for Encrypted Messages in Internet of Things
In the 24th International Conference on Advanced Communications Technology (ICACT ’22)
Software Watermarking via a Binary Function Relocation
In the 37th Annual Computer Security Applications Conference (ACSAC ’21)
A Look Back on a Function Identification Problem
In the 37th Annual Computer Security Applications Conference (ACSAC ’21)
Slimium: Debloating the Chromium Browser with Feature Subsetting
In the 27th ACM Conference on Computer and Communications Security (CCS ’20)
Compiler-assisted Code Randomization
In the 39th IEEE Symposium on Security & Privacy, 2018 (S&P ’18)
Defeating Zombie Gadgets by Re-randomizing Code Upon Disclosure
In the 9th International Symposium on Engineering Secure Software and Systems, 2017 (ESSoS ’17)
Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code-Inference Attacks
In the 37th IEEE Symposium on Security and Privacy, 2016 (S&P ’16)
Juggling the Gadgets: Binary-level Code Randomization using Instruction Displacement
In the 11th ACM Asia Conference on Computer and Communications Security, 2016 (ASIACCS ’16)
Identifying Traffic Differentiation in Mobile Networks
In the 15th ACM Internet Measurement Conference, 2015 (IMC ’15)
Workshops and Domestic Conferences
On the Learnability, Robustness, and Adaptability of Deep Learning Models for Obfuscation-applied Code
Workshop on Software Understanding and Reverse Engineering (SURE'25)
Trends in Securing Unsafe Regions for Rust
Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’25)
Security Analysis of Agentic Communication Protocols: Model Context Protocol (MCP) and Agent-to-Agent (A2A)
Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’25)
Investigating the Acquisition and Analysis of Digital Artifacts for Messaging Applications
Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’25)
Trends in LLM-assisted Attacks
Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’25)
Advanced Persistent Threats: Addressed and Open Research Questions
Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’24)
Trends in Attacks and Defenses against Retrieval-Augmented Generation (RAG) Systems
Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’24)
Trends in Deep-learning-based Models for Anomaly Detection in Log Records
Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’24)
RoBERTa-based Obfuscated Binary Code Similarity Detection
Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’24)Best Paper Award *
Dynamic Analysis of Obfuscated Code with a 64-bit SGN Packer
Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’24)
ChatPub: Retrieval Augmented Generation-based Service to Aid in Finding Relevant Policies for Korean Youth
Annual Spring Conference of KIPS (ASK’24)
Baseball Simulation Game Service Based on Baseball Metrics
Annual Spring Conference of KIPS (ASK’24)
Trends in Machine Unlearning via Continual Learning to Mitigate Privacy Risks
Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’23)
Trends in Membership Inference Attacks and Defenses
Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’23)
Trends in Explainable Artificial Intelligence for Security
Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’23)
An Unreal Engine Plugin for Text-based Runtime Animation Generation with a Motion Diffusion Model
Annual Fall Conference of KIPS (ASK ’23)
Kingomanager: A Personalized Information-providing Application with a Recommendation System for University Students
Annual Spring Conference of KIPS (ASK’23)
Vulnerability Analysis of CoAP Using a Coverage-based CoAP Fuzzer
Annual Spring Conference of KIPS (ASK’23)
A Recommendation System by Extracting Scholarship Information with a BERT’s Q&A Model
Annual Spring Conference of KIPS (ASK’23)
Evaluating Password Composition Policy and Password Meters of Popular Websites
Workshop on Designing Security for the Web (SecWeb ’23)
A Study of Executable Binaries with Emerging Compilation Tools
Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’22)Best Paper Award *
A Study of Rarely Appeared Instructions in an Executable Binary
Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’22)
Server-client Based Reversing Tools with a Prediction Model for Function Names
Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’22)
Phishing URL Detection with Text-CNN
Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’22)
Inference of Compiler Provenance from Malware
Poster in the 22nd World Conference on Information Security Applications (WISA ’21)
Configuration-Driven Software Debloating
In the 12th European Workshop on Systems Security, 2019 (EuroSec’19)
The Politics of Routing: Investigating the Relationship between AS Connectivity and Internet Freedom
In the 6th USENIX Workshop on Free and Open Communications on the Internet, 2016 (FOCI ’16)