Featured Publications

International Conferences and Journals

Rescuing the Unpoisoned: Efficient Defense against Knowledge Corruption Attacks on RAG Systems (To appear)

In the 41th Annual Computer Security Applications Conference (ACSAC'25)

A Decade-long Landscape of Advanced Persistent Threats: Longitudinal Analysis and Global Trends

arXiv Code

In the 32nd ACM Conference on Computer and Communications Security (CCS'25)

BOOTKITTY: A Stealthy Bootkit-Rootkit Against Modern Operating Systems

Paper

In the 19th USENIX WOOT Conference on Offensive Technologies (WOOT'25)

Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models

Paper

In the 34nd USENIX Conference on Security Symposium (USENIX'25)

An Empirical Study of Black-box based Membership Inference Attacks on a Real-World Dataset

Paper

International Symposium on Foundations and Practice of Security (FPS 2024)

R2I: A Relative Readability Metric for Decompiled Code

Paper Code

In the ACM International Conference on the Foundations of Software Engineering (FSE 2024)

BinAdapter: Leveraging Continual Learning for Inferring Function Symbol Names in a Binary

Paper Code

In the 19th ACM Asia Conference on Computer and Communications Security, 2024 (ASIACCS ’24)

ToolPhet: Inference of Compiler Provenance from Stripped Binaries with Emerging Compilation Toolchains

Paper

IEEE Access (2024)

Demystifying the Regional Phishing Landscape in South Korea

IEEE Access (2023)

BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation

Paper Code

In the 45th IEEE Symposium on Security and Privacy, 2024 (S&P ’24)Distinguished Paper Award*

Binary Code Representation with Well-balanced Instruction Normalization

Paper

IEEE Access (2023)

SmartMark: Software Watermarking Scheme for Smart Contracts

Paper

In the 45th IEEE/ACM International Conference on Software Engineering, 2023 (ICSE ’23)

A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing

Paper

In the 18th ACM Asia Conference on Computer and Communications Security, 2023 (ASIACCS ’23)

Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning

Paper Code Slides

In the 38th Annual Computer Security Applications Conference (ACSAC ’22)

DeView: Confining Progressive Web Applications by Debloating Web APIs

Paper Code

In the 38th Annual Computer Security Applications Conference (ACSAC ’22)

IoTivity Packet Parser for Encrypted Messages in Internet of Things

Paper

In the 24th International Conference on Advanced Communications Technology (ICACT ’22)

Software Watermarking via a Binary Function Relocation

Paper

In the 37th Annual Computer Security Applications Conference (ACSAC ’21)

A Look Back on a Function Identification Problem

Paper

In the 37th Annual Computer Security Applications Conference (ACSAC ’21)

Slimium: Debloating the Chromium Browser with Feature Subsetting

Paper

In the 27th ACM Conference on Computer and Communications Security (CCS ’20)

Compiler-assisted Code Randomization

Paper Code

In the 39th IEEE Symposium on Security & Privacy, 2018 (S&P ’18)

Defeating Zombie Gadgets by Re-randomizing Code Upon Disclosure

Paper

In the 9th International Symposium on Engineering Secure Software and Systems, 2017 (ESSoS ’17)

Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code-Inference Attacks

Paper

In the 37th IEEE Symposium on Security and Privacy, 2016 (S&P ’16)

Juggling the Gadgets: Binary-level Code Randomization using Instruction Displacement

Paper Code

In the 11th ACM Asia Conference on Computer and Communications Security, 2016 (ASIACCS ’16)

Identifying Traffic Differentiation in Mobile Networks

Paper

In the 15th ACM Internet Measurement Conference, 2015 (IMC ’15)

Workshops and Domestic Conferences

On the Learnability, Robustness, and Adaptability of Deep Learning Models for Obfuscation-applied Code

Paper

Workshop on Software Understanding and Reverse Engineering (SURE'25)

Trends in Securing Unsafe Regions for Rust

Paper

Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’25)

Security Analysis of Agentic Communication Protocols: Model Context Protocol (MCP) and Agent-to-Agent (A2A)

Paper

Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’25)

Investigating the Acquisition and Analysis of Digital Artifacts for Messaging Applications

Paper

Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’25)

Trends in LLM-assisted Attacks

Paper

Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’25)

Advanced Persistent Threats: Addressed and Open Research Questions

Paper

Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’24)

Trends in Attacks and Defenses against Retrieval-Augmented Generation (RAG) Systems

Paper

Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’24)

Trends in Deep-learning-based Models for Anomaly Detection in Log Records

Paper

Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’24)

RoBERTa-based Obfuscated Binary Code Similarity Detection

Paper

Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’24)Best Paper Award *

Dynamic Analysis of Obfuscated Code with a 64-bit SGN Packer

Paper

Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’24)

ChatPub: Retrieval Augmented Generation-based Service to Aid in Finding Relevant Policies for Korean Youth

Paper

Annual Spring Conference of KIPS (ASK’24)

Baseball Simulation Game Service Based on Baseball Metrics

Paper

Annual Spring Conference of KIPS (ASK’24)

Trends in Machine Unlearning via Continual Learning to Mitigate Privacy Risks

Paper

Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’23)

Trends in Membership Inference Attacks and Defenses

Paper

Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’23)

Trends in Explainable Artificial Intelligence for Security

Paper

Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’23)

An Unreal Engine Plugin for Text-based Runtime Animation Generation with a Motion Diffusion Model

Paper

Annual Fall Conference of KIPS (ASK ’23)

Kingomanager: A Personalized Information-providing Application with a Recommendation System for University Students

Paper

Annual Spring Conference of KIPS (ASK’23)

Vulnerability Analysis of CoAP Using a Coverage-based CoAP Fuzzer

Paper

Annual Spring Conference of KIPS (ASK’23)

A Recommendation System by Extracting Scholarship Information with a BERT’s Q&A Model

Paper

Annual Spring Conference of KIPS (ASK’23)

Evaluating Password Composition Policy and Password Meters of Popular Websites

Paper

Workshop on Designing Security for the Web (SecWeb ’23)

A Study of Executable Binaries with Emerging Compilation Tools

Paper

Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’22)Best Paper Award *

A Study of Rarely Appeared Instructions in an Executable Binary

Paper

Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’22)

Server-client Based Reversing Tools with a Prediction Model for Function Names

Paper

Conference on Information Security and Cryptography-Winter 한국정보보호학회 동계학술대회 (CISC-W ’22)

Phishing URL Detection with Text-CNN

Paper

Conference on Information Security and Cryptography-Summer 한국정보보호학회 하계학술대회 (CISC-S ’22)

Inference of Compiler Provenance from Malware

Paper

Poster in the 22nd World Conference on Information Security Applications (WISA ’21)

Semantic-aware Binary Code Representation with BERT

Paper

ArXiv

Configuration-Driven Software Debloating

Paper

In the 12th European Workshop on Systems Security, 2019 (EuroSec’19)

The Politics of Routing: Investigating the Relationship between AS Connectivity and Internet Freedom

Paper

In the 6th USENIX Workshop on Free and Open Communications on the Internet, 2016 (FOCI ’16)