Security engineering
Social network analysis
Human authentication
Usable security
Education
(Ph.D.) in Computer Science, University of Cambridge , UK (2012)
Experience
Professor of School of ICE, Sungkyunkwan University, Korea (2013 - present)
Postdoctoral Fellow, University of British Columbia, Canada (2012-2013)
Senior Engineer, Samsung Electronics (2004-2008)
Journal Articles
(2023)
Design and evaluation of highly accurate smart contract code vulnerability detection framework.
DATA MINING AND KNOWLEDGE DISCOVERY.
1,
1
(2023)
DID We Miss Anything?: Towards Privacy-Preserving Decentralized ID Architecture.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING.
20,
6
(2022)
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things.
IEEE TRANSACTIONS ON COMPUTERS.
71,
10
(2021)
Security Evaluation of n-Choose-k-Sum PUFs against Modeling Attacks.
IEEE ACCESS.
9,
(2021)
A Security Analysis of Blockchain-Based Did Services.
IEEE ACCESS.
9,
1
(2020)
A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems.
SENSORS.
20,
24
(2020)
Can We Create a Cross-Domain Federated Identity for the Industrial Internet of Things without Google?.
IEEE Internet of Things Magazine.
3,
4
(2020)
스마트폰 기반 Continuous Authentication 기술 동향.
정보보호학회지.
30,
5
(2020)
Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection.
IEEE ACCESS.
8,
1
(2020)
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better?.
ACM TRANSACTIONS ON PRIVACY AND SECURITY.
23,
4
(2020)
A three -factor anonymous user authentication scheme for Internet of Things environments.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS.
52,
1
(2020)
SENTINEL: A Secure and Efficient Authentication Framework for Unmanned Aerial Vehicles.
APPLIED SCIENCES-BASEL.
10,
9
(2020)
Towards Secure and Usable Certificate-Based Authentication System Using a Secondary Device for an Industrial Internet of Things.
APPLIED SCIENCES-BASEL.
10,
6
(2020)
Design of a Framework to Detect Device Spoofing Attacks Using Network Characteristics.
IEEE CONSUMER ELECTRONICS MAGAZINE.
9,
2
(2020)
LightLock: User Identification System Using Light Intensity Readings on Smartphones.
IEEE SENSORS JOURNAL.
20,
5
(2020)
Efficient Privacy-Preserving Fingerprint-Based Authentication System Using Fully Homomorphic Encryption.
SECURITY AND COMMUNICATION NETWORKS.
2020,
1
(2020)
Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms.
SENSORS.
20,
3
(2020)
LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics.
COMPUTERS & SECURITY.
89,
1
(2020)
On the robustness of Lightning Network in Bitcoin.
PERVASIVE AND MOBILE COMPUTING.
61,
Special SI
사이버 위협 정보 처리 방법 및 장치(METHOD AND APPARATUS FOR PROCESSING CYBER THREAT INFORMATION).
10-2128-0080000.
20200623.
KOREA, REPUBLIC OF
소리 기반 일회용 비밀번호 2단계/채널 인증.
10-2017-0101632.
20200610.
KOREA, REPUBLIC OF
암호 화폐 지갑 기반의 암호 화폐 거래 시스템 및 방법.
10-2018-0009307.
20191218.
KOREA, REPUBLIC OF
호스트 머신의 동적관리를 위한 자동 규칙 생성기법.
10-2017-0024455.
20181005.
KOREA, REPUBLIC OF
네트워크 가상화 환경에서 보안 관리를 위한 구조.
10-2017-0079120.
20180525.
KOREA, REPUBLIC OF
잠금 해제를 위한 패턴 생성 방법.
10-2016-0114369.
20180222.
KOREA, REPUBLIC OF
스마트 기기에 설치된 애플리케이션의 정보를 이용한 인증 방법, 애플리케이션의 정보에 기반한 인증을 수행하는 스마트 기기 및 인증을 위한 애플리케이션에 대한 정보를 제공하는 서버.
10-2016-0025506.
20171128.
KOREA, REPUBLIC OF
클라우드 서비스를 위한 암호화 방법 및 사용자 장치에 기반한 암호화 방법을 제공하는 클라우드 시스템(ENCRYPTION METHOD FOR CLOUD SERVICE AND CLOUD SYSTEM PROVIDING ENCRYPTION BASED ON USER EQUIPMENT).
10-1657893-0000.
20160908.
KOREA, REPUBLIC OF
Authentication information management method in home network and an apparatus therefor.
EP20090716567.
20160127.
EU
안드로이드 애플리케이션을 제공하는 서버 장치(SERVER APPARATUS FOR PROVIDING ANDROID APPLICATION).
10-1580049-0000.
20151217.
KOREA, REPUBLIC OF
애플리케이션 개발을 위한 퍼미션 입력 방법 및 안드로이드 애플리케이션을 제작하는 방법을 실행시키기 위한 프로그램이 기록한 컴퓨터로 읽을 수 있는 기록 매체(INPUT METHOD OF PERMISSION FOR APPLICATION DEVELOPMENT AND RECORDING MEDIUM STORING PROGRAM FOR EXECUTING METHOD OF DEVELOPING ANDROID APPLICATION).
10-1556831-0000.
20150923.
KOREA, REPUBLIC OF
패턴 잠금에 대한 보안 정도를 표시하는 이동 단말 및 패턴 잠금에 대한 보안 정도를 출력하여 패턴 잠금을 설정하는 방법(MOBILE TERMINAL DISPLAYING SECURITY DEGREE OF PATTERN LOCK AND SETTING METHOD FOR PATTERN LOCK USING DISPLAYED SECURITY DEGREE OF PATTERN LOCK).
10-1532875-0000.
20150624.
KOREA, REPUBLIC OF
팩스 스팸 차단 장치, 방법 및 시스템(FAX SPAM DETECTION APPARATUS, METHOD AND SYSTEM).
10-1508258-0000.
20150327.
KOREA, REPUBLIC OF
홈 네트워크에서 디바이스들이 비밀 정보를 공유하는 방법및 이를 위한 장치(Method and apparatus for sharing secret information between devices in home network).
10-1490687-0000.
20150202.
KOREA, REPUBLIC OF
Digital rights management method and apparatus.
20080222258.
20150106.
UNITED STATES
DRM 에이전트의 공유장치 및 방법(Apparatus and method for Sharing DRM Agents).
10-2007007-8634.
20140926.
KOREA, REPUBLIC OF
홈 네트워크에서 보안 서비스를 제공하는 장치 및 방법(Apparatus and method for providing security service in home network).
10-2008003-0416.
20140820.
KOREA, REPUBLIC OF
Method and apparatus for generating mashup graph, and method and apparatus for recommending mashup service.
12/370,132.
20140819.
UNITED STATES
Method and System for Providing DRM License.
11/546,991.
20140812.
UNITED STATES
A//V 프로파일을 관리하는 방법, 장치 및 시스템.
10-2007005-7602.
20140527.
KOREA, REPUBLIC OF
Honors / Awards
The 2nd place winner of the Facebook Hackathon at UBC, 2012.
Conference Paper
(2023)
On the Long-Term Effects of Continuous Keystroke Authentication: Keeping User Frustration Low through Behavior Adaptation.
ACM International Joint Conference on Pervasive and Ubiquitous Computing.
MEXICO
(2021)
Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure.
ACM Annual Computer Security Applications Conference.
UNITED STATES
(2021)
ARGH!: Automated Rumor Generation Hub.
ACM Conference on Information and Knowledge Management.
AUSTRALIA
(2021)
Peeler: Profiling Kernel-Level Events to Detect Ransomware.
European Symposium on Research in Computer Security.
GREECE
(2021)
SmartConDetect: Highly Accurate Smart Contract Code Vulnerability Detection Mechanism using BERT.
KDD Workshop on Programming Language Processing.
SINGAPORE
(2021)
On the robustness of intrusion detection systems for vehicles against adversarial attacks.
World Conference on Information Security Applications.
KOREA, REPUBLIC OF
(2021)
Towards Usable and Secure Location-based Smartphone Authentication.
Symposium On Usable Privacy and Security.
UNITED STATES
(2020)
ConTheModel: Can we modify tweets to confuse classifier models?.
The Silicon Valley Cybersecurity Conference 2020.
UNITED STATES
(2020)
MurQRI: Encrypted Multi-Layer QR Codes for Electronic Identity Management.
The Silicon Valley Cybersecurity Conference 2020.
UNITED STATES
(2020)
DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation.
The 25th Australasian Conference on Information Security and Privacy.
AUSTRALIA
(2020)
Design and Evaluation of Enumeration Attacks on Package Tracking Systems.
The 25th Australasian Conference on Information Security and Privacy.
AUSTRALIA
(2020)
그래프 보안 모델에 사용되는 보안 지표에 대한 동형암호 라이브러리 성능 평가에 관한 연구.
한국통신학회 학술대회.
KOREA, REPUBLIC OF
(2020)
eATP: enhancing APT with a mirror site resolver.
The 31st International Symposium on Software Reliability Engineering.
COLOMBIA
(2020)
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?.
The 13rd ACM Asia Conference on Computer and Communications Security.
TAIWAN
(2020)
PassTag: A Graphical-Textual Hybrid Fallback Authentication System.
The 13rd ACM Asia Conference on Computer and Communications Security.
TAIWAN
(2020)
Void: A fast and light voice liveness detection system.
USENIX Security Symposium.
UNITED STATES
(2020)
80% of block propagation rate is enough: towards secure and efficient PoW-based blockchain consensus.
The 17th ACM International Conference on Mobile Systems.
KOREA, REPUBLIC OF
(2020)
The Light will be with you. Always: A novel continuous mobile authentication with the light sensor.
The 17th ACM International Conference on Mobile Systems.
KOREA, REPUBLIC OF
(2020)
Gesture Authentication for Smartphones: Evaluation of Gesture Password Selection Policies.
IEEE Symposium on Security and Privacy.
UNITED STATES
(2020)
End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things.
The 39th International Symposium on Reliable Distributed Systems.
CHINA