What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Heejo Lee
Google Scholar
38
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
A large-scale analysis of the effectiveness of publicly reported security patches.
Seunghoon Woo
Eunjin Choi
Heejo Lee
2025
conf/dsn
ZCover: Uncovering Z-Wave Controller Vulnerabilities Through Systematic Security Analysis of Application Layer Implementation.
Carlos Nkuba Kayembe
Jimin Kang
Seunghoon Woo
Heejo Lee
2024
conf/esorics
PRETT2: Discovering HTTP/2 DoS Vulnerabilities via Protocol Reverse Engineering.
Choongin Lee
Isa Jafarov
Sven Dietrich
Heejo Lee
2024
conf/esorics
BloomFuzz: Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines.
Pyeongju Ahn
Yeonseok Jang
Seunghoon Woo
Heejo Lee
2023
conf/uss
V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques.
Seunghoon Woo
Eunjin Choi
Heejo Lee
Hakjoo Oh
2022
journals/compsec
Improving SSH detection model using IPA time and WGAN-GP.
Junwon Lee
Heejo Lee
2022
conf/ccs
Poster: Automated Discovery of Sensor Spoofing Attacks on Robotic Vehicles.
Kyeongseok Yang
Sudharssan Mohan
Yonghwi Kwon
Heejo Lee
Chung Hwan Kim
2022
conf/uss
MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from Modified Open-Source Software Components.
Seunghoon Woo
Hyunji Hong
Eunjin Choi
Heejo Lee
2022
conf/dsn
L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing.
Haram Park
Carlos Nkuba Kayembe
Seunghoon Woo
Heejo Lee
2021
conf/uss
V0Finder: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities.
Seunghoon Woo
Dongwook Lee
Sunghan Park
Heejo Lee
Sven Dietrich
2021
conf/sec
QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection.
Hajin Jang
Kyeongseok Yang
Geonwoo Lee
Yoonjong Na
Jeremy D. Seideman
Shoufu Luo
Heejo Lee
Sven Dietrich
2021
conf/sec
Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC Security.
Junwon Lee
Heejo Lee
2021
conf/dsn
OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept.
Seongkyeong Kwon
Seunghoon Woo
Gangmo Seong
Heejo Lee
2021
conf/acsac
Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User Discussions.
Hyunji Hong
Seunghoon Woo
Heejo Lee
2020
conf/sp
VERISMART: A Highly Precise Safety Verifier for Ethereum Smart Contracts.
Sunbeom So
Myungho Lee
Jisu Park
Heejo Lee
Hakjoo Oh
2018
journals/compsec
Software systems at risk: An empirical study of cloned vulnerabilities in practice.
Seulbae Kim
Heejo Lee
2018
conf/sec
PRETT: Protocol Reverse Engineering Using Binary Tokens and Network Traces.
Choong In Lee
Jeonghan Bae
Heejo Lee
2018
conf/dsn
Obfuscated VBA Macro Detection Using Machine Learning.
Sangwoo Kim
Seokmyung Hong
Jaesang Oh
Heejo Lee
2017
conf/sp
VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery.
Seulbae Kim
Seunghoon Woo
Heejo Lee
Hakjoo Oh
2016
conf/sec
Automated Source Code Instrumentation for Verifying Potential Vulnerabilities.
Hongzhe Li
Jaesang Oh
Hakjoo Oh
Heejo Lee
2015
journals/compsec
Screening smartphone applications using malware family signatures.
Jehyun Lee
Suyeon Lee
Heejo Lee
2014
journals/compsec
Cylindrical Coordinates Security Visualization for multiple domain command and control botnet detection.
Ilju Seo
Heejo Lee
Seung Chul Han
2014
conf/sec
Lightweight Resource Management for DDoS Traffic Isolation in a Cloud Environment.
Ibnu Mubarok
Kiryong Lee
Sihyung Lee
Heejo Lee
2014
conf/cns
DroidGraph: discovering Android malware by analyzing semantic behavior.
Jonghoon Kwon
Jihwan Jeong
Jehyun Lee
Heejo Lee
2013
journals/compsec
APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks.
Dongwon Seo
Heejo Lee
Adrian Perrig
2013
conf/sec
Screening Smartphone Applications Using Behavioral Signatures.
Suyeon Lee
Jehyun Lee
Heejo Lee
2013
conf/wisa
Dynamic Surveillance: A Case Study with Enron Email Data Set.
Heesung Do
Peter Choi
Heejo Lee
2012
conf/ccs
Carving secure wi-fi zones with defensive jamming.
Yu Seung Kim
Patrick Tague
Heejo Lee
Hyogon Kim
2012
conf/sec
Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis.
Hyundo Park
Sung-Oh David Jung
Heejo Lee
Hoh Peter In
2009
journals/compsec
Fast detection and visualization of network attacks on parallel coordinates.
Hyunsang Choi
Heejo Lee
Hyogon Kim
2008
conf/sec
Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models.
Dongwon Seo
Heejo Lee
Ejovi Nuwere
2008
conf/sec
HoneyID : Unveiling Hidden Spywares by Generating Bogus Events.
Jeheon Han
Jonghoon Kwon
Heejo Lee
2008
conf/acisp
Reducing Payload Scans for Attack Signature Matching Using Rule Classification.
Sunghyun Kim
Heejo Lee
2008
conf/wisa
Image-Feature Based Human Identification Protocols on Limited Display Devices.
Hassan Jameel
Riaz Ahmed Shaikh
Le Xuan Hung
Weiwei Yuan
Syed Muhammad Khaliq-ur-Rahman Raazi
Ngo Trong Canh
Sungyoung Lee
Heejo Lee
Yuseung Son
Miguel Fernandes
2007
conf/ccs
BASE: an incrementally deployable mechanism for viable IP spoofing prevention.
Heejo Lee
Minjin Kwon
Geoffrey Hasker
Adrian Perrig
2007
conf/ctrsa
Human Identification Through Image Evaluation Using Secret Predicates.
Hassan Jameel
Riaz Ahmed Shaikh
Heejo Lee
Sungyoung Lee
2006
conf/iciss
Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments.
Weiwei Yuan
Donghai Guan
Sungyoung Lee
Young-Koo Lee
Heejo Lee
2005
conf/icics
PCAV: Internet Attack Visualization on Parallel Coordinates.
Hyunsang Choi
Heejo Lee
Coauthors
Adrian Perrig
(2)
Carlos Nkuba Kayembe
(2)
Choong In Lee
(1)
Choongin Lee
(1)
Chung Hwan Kim
(1)
Donghai Guan
(1)
Dongwon Seo
(2)
Dongwook Lee
(1)
Ejovi Nuwere
(1)
Eunjin Choi
(3)
Gangmo Seong
(1)
Geoffrey Hasker
(1)
Geonwoo Lee
(1)
Hajin Jang
(1)
Hakjoo Oh
(4)
Haram Park
(1)
Hassan Jameel
(2)
Heejo Lee
(38)
Heesung Do
(1)
Hoh Peter In
(1)
Hongzhe Li
(1)
Hyogon Kim
(2)
Hyundo Park
(1)
Hyunji Hong
(2)
Hyunsang Choi
(2)
Ibnu Mubarok
(1)
Ilju Seo
(1)
Isa Jafarov
(1)
Jaesang Oh
(2)
Jeheon Han
(1)
Jehyun Lee
(3)
Jeonghan Bae
(1)
Jeremy D. Seideman
(1)
Jihwan Jeong
(1)
Jimin Kang
(1)
Jisu Park
(1)
Jonghoon Kwon
(2)
Junwon Lee
(2)
Kiryong Lee
(1)
Kyeongseok Yang
(2)
Le Xuan Hung
(1)
Miguel Fernandes
(1)
Minjin Kwon
(1)
Myungho Lee
(1)
Ngo Trong Canh
(1)
Patrick Tague
(1)
Peter Choi
(1)
Pyeongju Ahn
(1)
Riaz Ahmed Shaikh
(2)
Sangwoo Kim
(1)
Seokmyung Hong
(1)
Seongkyeong Kwon
(1)
Seulbae Kim
(2)
Seung Chul Han
(1)
Seunghoon Woo
(10)
Shoufu Luo
(1)
Sihyung Lee
(1)
Sudharssan Mohan
(1)
Sunbeom So
(1)
Sung-Oh David Jung
(1)
Sunghan Park
(1)
Sunghyun Kim
(1)
Sungyoung Lee
(3)
Suyeon Lee
(2)
Sven Dietrich
(3)
Syed Muhammad Khaliq-ur-Rahman Raazi
(1)
Weiwei Yuan
(2)
Yeonseok Jang
(1)
Yonghwi Kwon
(1)
Yoonjong Na
(1)
Young-Koo Lee
(1)
Yu Seung Kim
(1)
Yuseung Son
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to