Featured Publications

International Conferences and Journals

A Decade-long Landscape of Advanced Persistent Threats: Longitudinal Analysis and Global Trends (To appear)

In the 32nd ACM Conference on Computer and Communications Security (CCS'25)

BOOTKITTY: A Stealthy Bootkit-Rootkit Against Modern Operating Systems

In the 19th USENIX WOOT Conference on Offensive Technologies (WOOT'25)

Paper

Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models

In the 34nd USENIX Conference on Security Symposium (USENIX'25)

Paper

An Empirical Study of Black-box based Membership Inference Attacks on a Real-World Dataset

International Symposium on Foundations and Practice of Security (FPS 2024)

Paper

R2I: A Relative Readability Metric for Decompiled Code

In the ACM International Conference on the Foundations of Software Engineering (FSE 2024)

Paper

BinAdapter: Leveraging Continual Learning for Inferring Function Symbol Names in a Binary

In the 19th ACM Asia Conference on Computer and Communications Security, 2024 (ASIACCS ’24)

Paper

ToolPhet: Inference of Compiler Provenance from Stripped Binaries with Emerging Compilation Toolchains

IEEE Access (2024)

Paper

Demystifying the Regional Phishing Landscape in South Korea

IEEE Access (2023)

BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation

In the 45th IEEE Symposium on Security and Privacy, 2024 (S&P ’24)Distinguished Paper Award*

Paper

Binary Code Representation with Well-balanced Instruction Normalization

IEEE Access (2023)

Paper

SmartMark: Software Watermarking Scheme for Smart Contracts

In the 45th IEEE/ACM International Conference on Software Engineering, 2023 (ICSE ’23)

Paper

A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing

In the 18th ACM Asia Conference on Computer and Communications Security, 2023 (ASIACCS ’23)

Paper

Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning

In the 38th Annual Computer Security Applications Conference (ACSAC ’22)

Paper Code Slides

DeView: Confining Progressive Web Applications by Debloating Web APIs

In the 38th Annual Computer Security Applications Conference (ACSAC ’22)

Paper

IoTivity Packet Parser for Encrypted Messages in Internet of Things

In the 24th International Conference on Advanced Communications Technology (ICACT ’22)

Paper

Software Watermarking via a Binary Function Relocation

In the 37th Annual Computer Security Applications Conference (ACSAC ’21)

Paper

A Look Back on a Function Identification Problem

In the 37th Annual Computer Security Applications Conference (ACSAC ’21)

Paper

Slimium: Debloating the Chromium Browser with Feature Subsetting

In the 27th ACM Conference on Computer and Communications Security (CCS ’20)

Paper

Compiler-assisted Code Randomization

In the 39th IEEE Symposium on Security & Privacy, 2018 (S&P ’18)

Paper

Defeating Zombie Gadgets by Re-randomizing Code Upon Disclosure

In the 9th International Symposium on Engineering Secure Software and Systems, 2017 (ESSoS ’17)

Paper

Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code-Inference Attacks

In the 37th IEEE Symposium on Security and Privacy, 2016 (S&P ’16)

Paper

Juggling the Gadgets: Binary-level Code Randomization using Instruction Displacement

In the 11th ACM Asia Conference on Computer and Communications Security, 2016 (ASIACCS ’16)

Paper

Identifying Traffic Differentiation in Mobile Networks

In the 15th ACM Internet Measurement Conference, 2015 (IMC ’15)

Paper

Workshops and Domestic Conferences

On the Learnability, Robustness, and Adaptability of Deep Learning Models for Obfuscation-applied Code

Workshop on Software Understanding and Reverse Engineering (SURE'25)

Paper

Trends in Securing Unsafe Regions for Rust

Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’25)

Paper

Security Analysis of Agentic Communication Protocols: Model Context Protocol (MCP) and Agent-to-Agent (A2A)

Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’25)

Paper

Investigating the Acquisition and Analysis of Digital Artifacts for Messaging Applications

Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’25)

Paper

Trends in LLM-assisted Attacks

Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’25)

Paper

Advanced Persistent Threats: Addressed and Open Research Questions

Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’24)

Paper

Trends in Attacks and Defenses against Retrieval-Augmented Generation (RAG) Systems

Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’24)

Paper

Trends in Deep-learning-based Models for Anomaly Detection in Log Records

Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’24)

Paper

RoBERTa-based Obfuscated Binary Code Similarity Detection

Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’24)Best Paper Award *

Paper

Dynamic Analysis of Obfuscated Code with a 64-bit SGN Packer

Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’24)

Paper

ChatPub: Retrieval Augmented Generation-based Service to Aid in Finding Relevant Policies for Korean Youth

Annual Spring Conference of KIPS (ASK’24)

Paper

Baseball Simulation Game Service Based on Baseball Metrics

Annual Spring Conference of KIPS (ASK’24)

Paper

Trends in Machine Unlearning via Continual Learning to Mitigate Privacy Risks

Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’23)

Paper

Trends in Membership Inference Attacks and Defenses

Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’23)

Paper

Trends in Explainable Artificial Intelligence for Security

Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’23)

Paper

An Unreal Engine Plugin for Text-based Runtime Animation Generation with a Motion Diffusion Model

Annual Fall Conference of KIPS (ASK ’23)

Paper

Kingomanager: A Personalized Information-providing Application with a Recommendation System for University Students

Annual Spring Conference of KIPS (ASK’23)

Paper

Vulnerability Analysis of CoAP Using a Coverage-based CoAP Fuzzer

Annual Spring Conference of KIPS (ASK’23)

Paper

A Recommendation System by Extracting Scholarship Information with a BERT’s Q&A Model

Annual Spring Conference of KIPS (ASK’23)

Paper

Evaluating Password Composition Policy and Password Meters of Popular Websites

Workshop on Designing Security for the Web (SecWeb ’23)

Paper

A Study of Executable Binaries with Emerging Compilation Tools

Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’22)Best Paper Award *

Paper

A Study of Rarely Appeared Instructions in an Executable Binary

Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’22)

Paper

Server-client Based Reversing Tools with a Prediction Model for Function Names

Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’22)

Paper

Phishing URL Detection with Text-CNN

Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’22)

Paper

Inference of Compiler Provenance from Malware

Poster in the 22nd World Conference on Information Security Applications (WISA ’21)

Paper

Semantic-aware Binary Code Representation with BERT

ArXiv

Paper

Configuration-Driven Software Debloating

In the 12th European Workshop on Systems Security, 2019 (EuroSec’19)

Paper

The Politics of Routing: Investigating the Relationship between AS Connectivity and Internet Freedom

In the 6th USENIX Workshop on Free and Open Communications on the Internet, 2016 (FOCI ’16)

Paper