Publications
Publication list
J Journal C Conference / Workshop INT International DOM Domestic
2026
-
[2] J DOM"스트립 바이너리에서 보안 취약점 탐지를 위한 LLM 기반 프레임워크", 최영호, 조금환, 최두호, Journal of The Korea Institute of Information Security & Cryptology(한국정보보호학회논문지), vol.36, no.1, pp. 127-138, February 2026. link
-
[1] J INT"An Automated Synthesis Framework for Benchmarking Quantum Resource Costs of Symmetric-Key Cryptography", Chanho Choi, Jinseob Oh, SangMan Lee, Geumhwan Cho, Dooho Choi, Mathematics, Volume 14, Issue 4, Pages 719, February 2026 (SCIE; Top 8.3% in Mathematics). link
2025
-
[2] C INT"LLM-based Detection Framework of Memory Vulnerabilities in Stripped Binaries", Youngho Choi, Geumhwan Cho, and Dooho Choi, Mobisec: The 9th International Conference on Mobile Internet Security (Poster), 2026.
-
[1] J DOM"다크웹 CAPTCHA에 대한 CNN 기반 문자 인식 연구", 장예진, 전주혁, 한지훈, 김다슬, 박영진, 류성욱, 조금환, 한미란, Journal of The Korea Institute of Information Security & Cryptology(한국정보보호학회논문지), vol.35, no.6, pp. 1469-1480, December 2025. link
2024
-
[1] J DOM"생성형 AI 기반 난독화 기법 적용 자동화 프레임워크 설계", 한지훈, 박승아, 하준서, 이창민, 정경미, 한미란, 김준섭, 조금환, Journal of The Korea Society of Computer and Information (한국컴퓨터정보학회논문지), Vol. 30 No. 1, pp. 73-85, January 2025. link
2023
-
[1] J INT"On the Long-Term Effects of Continuous Keystroke Authentication: Keeping User Frustration Low through Behavior Adaptation", Jun Ho Huh, Sungsu Kwag, Iljoo Kim, Alexandr Popov, Younghan Park, Geumhwan Cho, Juwon Lee, Hyoungshick Kim, and Choong-Hoon Lee, UbiComp: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Cancun, Mexico, 2023 (CS Top conference, acceptance rate: 28%). link
2021
-
[1] C INT"Towards Usable and Secure Location-based Smartphone Authentication", Geumhwan Cho, Sungsu Kwag, Jun Ho Huh, Bedeuro Kim, Choong-Hoon Lee, and Hyoungshick Kim, SOUPS: The 17th Symposium On Usable Privacy and Security, Virtual, 2021 (CS Top conference, acceptance rate: 36/136 = 26%). link
2020
-
[2] J INT"On the Security and Usability Implications of Multiple Authentication Choices on Smartphones: The More, the Better?", Geumhwan Cho, Jun Ho Huh, Soolin Kim, Junsung Cho, Heesung Park, Yenah Lee, Konstantin Beznosov, and Hyoungshick Kim, ACM Transactions on Privacy and Security, Volume 23, Issue 4, Pages 1-32, August 2020 (SCIE; Q3). link
-
[1] J INT"SENTINEL: A Secure and Efficient Authentication Framework for Unmanned Aerial Vehicles", Geumhwan Cho, Junsung Cho, Sangwon Hyun, and Hyoungshick Kim, Applied Sciences, Volume 10, Issue 9, Pages 3149, April 2020 (SCIE; Q2). link
2019
-
[2] C INT"Understanding Users Risk Perceptions about Personal Health Records Shared on Social Networking Services", Yuri Son, Geumhwan Cho, Hyoungshick Kim, and Simon S. Woo, ASIACCS: The 12th ACM Asia Conference on Computer and Communications Security, Auckland, New Zealand, 2019 (CS Top conference, acceptance rate: 22.5%). link
-
[1] C INT"Data-driven Selection of Security Application Frameworks During Architectural Design", Humberto Cervantes, Rick Kazman, Jungwoo Ryoo, Junsung Cho, Geumhwan Cho, Hyoungshick Kim, and Jina Kang, HICSS: The 52nd Hawaii International Conference on System Sciences, 2019. link
2018
-
[4] J INT"Two-Thumbs-Up: Physical Protection for PIN Entry Secure against Recording Attacks", DaeHun Nyang, Hyoungshick Kim, Woojoo Lee, Sung-bae Kang, Geumhwan Cho, Mun-Kyu Lee, and Aziz Mohaisen, Computers & Security, Volume 78, Pages 1-15, September 2018 (SCIE; Q2). link
-
[3] C INT"Threat modeling and analysis of voice assistant applications", Geumhwan Cho, Jusop Choi, Hyoungshick Kim, Sangwon Hyun, and Jungwoo Ryoo, WISA: The 19th World Conference on Information Security Applications, Jeju Island, Korea, 2018 (acceptance rate: 11/44 = 25%). link
-
[2] C INT"The Personal Identification Chord: A Four Button Authentication System for Smartwatches", Ian Oakley, Jun Ho Huh, Junsung Cho, Geumhwan Cho, MD. Rasel Islam, and Hyoungshick Kim, ASIACCS: The 11th ACM Asia Conference on Computer and Communications Security, Incheon, Korea, 2018 (CS Top conference, acceptance rate: 52/310 = 17%). link
-
[1] J INT"Design and Analysis of Push Notification-Based Malware on Android", Sangwon Hyun, Junsung Cho, Geumhwan Cho, and Hyoungshick Kim, Security and Communication Networks, Volume 2018, Article ID 8510256, 12 pages, July 2018 (SCIE; Q3). link
2017
-
[1] C INT"Preventing DNS amplification attacks using the history of DNS queries with SDN", Soyoung Kim, Sora Lee, Geumhwan Cho, Muhammad Ejaz Ahmed, Jaehoon Paul Jeong, and Hyoungshick Kim, ESORICS: The 22nd European Symposium on Research in Computer Security, Oslo, Norway, 2017 (CS Top conference, acceptance rate: 54/339 = 16%). link
-
[1] C INT"SysPal: System-guided Pattern Locks on Android", Geumhwan Cho, Jun Ho Huh, Junsung Cho, Seongyeol Oh, Youngbae Song, and Hyoungshick Kim, S&P: The 38th IEEE Symposium on Security and Privacy, San Jose, USA, 2017 (CS Top conferencestrong>, acceptance rate: 60/419 = 14.3%). link
2016
-
[2] C INT"WiPING: Wi-Fi signal-based PIN Guessing attack", Seunghun Cha, Jaewoo Park, Geumhwan Cho, Jun Ho Huh, and Hyoungshick Kim, CCS: The 23rd ACM Conference on Computer and Communications Security (Poster), Vienna, Austria, 2016. link
-
[1] J INT"Combating online fraud attacks in mobile-based advertising", Geumhwan Cho, Junsung Cho, Youngbae Song, Donghyun Choi, and Hyoungshick Kim, EURASIP Journal on Information Security, Vol. 2016(1), 2016. link
2015
-
[4] C INT"An empirical study of click fraud in mobile advertising networks", Geumhwan Cho, Junsung Cho, Youngbae Song, and Hyoungshick Kim, IWCC: The 4th Workshop on Cyber Crime held in conjunction with ARES, Toulouse, France, 2015. link
-
[3] C INT"Keyboard or Keylogger?: A security analysis of third-party keyboards on Android", Junsung Cho, Geumhwan Cho, and Hyoungshick Kim, PST: The 13rd International Conference on Privacy, Security and Trust, Izmir, Turkey, 2015. link
-
[2] C INT"On the Effectiveness of Pattern Lock Strength Meters – Measuring the Strength of Real World Pattern Locks", Youngbae Song, Geumhwan Cho, Seongyeol Oh, Hyoungshick Kim, and Jun Ho Huh, CHI: The 33rd ACM SIGCHI Conference on Human Factors in Computing Systems, Seoul, Korea, 2015 (CS Top conference, acceptance rate: 565/2435 = 23%). link
-
[1] C INT"A Framework for Security Services Based on Software-Defined Networking", Jaehon Jeong, Jihyeok Seo, Geumhwan Cho, Hyoungshick Kim and Jung-Soo Park, DC2: The 2nd Workshop on Device Centric Cloud, 2015. link