2025/01/01 |
A large-scale analysis of the effectiveness of publicly reported security patches, Computers & Security |
Seunghoon Woo |
2024/09/16 |
BLOOMFUZZ : Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines, European Symposium on Research in Computer Security (ESORICS) |
Pyeongju Ahn |
2024/09/16 |
PRETT2: Discovering HTTP/2 DoS Vulnerabilities via Protocol Reverse Engineering, European Symposium on Research in Computer Security (ESORICS) |
Choongin Lee |
2024/08/23 |
METHOD AND APPARATUS FOR DETERMINING DEPENDENCIES BETWEEN COMPONENTS OF REUSED OPEN SOURCE SOFTWARE |
Heejo Lee |
2024/04/19 |
CNEPS: A Precise Approach for Examining Dependencies among Third-Party C/C++ Open-Source Components, IEEE/ACM Int'l Conf. on Software Engineering (ICSE) |
Yoonjong Na |
2024/02/19 |
METHOD AND APPARATUS FOR DETECTING PROPAGATION OF SECURITY VULNERABILITIES OF OPEN SOURCE SOFTWARE INHERENT IN COMPONENTS OF TARGET SOFTWARE |
Seunghoon Woo |
2024/02/05 |
APPARATUS AND METHOD FOR PERFORMING FUZZING |
Heejo Lee |
2023/12/05 |
METHOD FOR IDENTIFYING OPEN-SOURCE SOFTWARE COMPONENTS AT THE SOURCE-CODE LEVEL |
Heejo Lee |
2023/08/09 |
V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques, USENIX Security Symposium |
Seunghoon Woo |
2023/07/03 |
Forensic integrity verification of video recordings based on MTS files, Journal of Forensic Sciences |
Kyusun Shim |
2023/06/12 |
ZMAD: Lightweight Model-Based Anomaly Detection for the Structured Z-Wave Protocol, IEEE Access |
Carlos Kayembe Nkuba |