| 2026/03/23 |
Human vs AI: Insecure Use of Security-sensitive Functions in AI-generated Code in Comparison to Human-written Code, ACM/SIGAPP Symposium On Applied Computing (ACM SAC) |
Joonku Lee |
| 2026/03/23 |
CovBooster: Coverage Booster for Binary Code Clone Detection by Reduced Signatures, ACM/SIGAPP Symposium On Applied Computing (ACM SAC) |
Jeongwoo Lee |
| 2025/12/31 |
METHOD AND APPARATUS FOR IDENTIFYING VULNERABLE SOFTWARE VERSIONS THROUGH SEMANTIC PAIR MAPPING BASED ON CODE LINE DEPENDENCY USING SECURITY PATCHES |
Heejo Lee |
| 2025/12/09 |
Probing Challenges and Future Research of SBOM Generation for Medical Devices, Workshop at the Annual Computer Security Applications Conference, (ACSAC-HealthSec) |
Hui Zhuang |
| 2025/11/16 |
IMUFUZZER: Resilience-based Discovery of Signal Injection Attacks on Robotic Vehicles, IEEE/ACM Int'l Conf. on Automated Software Engineering (ASE) |
Sudharssan Mohan |
| 2025/09/24 |
METHOD AND APPARATUS FOR IDENTIFYING VULNERABLE SOFTWARE VERSIONS THROUGH SEMANTIC PAIR MAPPING BASED ON CODE LINE DEPENDENCY USING SECURITY PATCHES |
Heejo Lee |
| 2025/08/27 |
Scaling SCIERA: A Journey Through the Deployment of a Next-generation Network, Int'l Conf. on ACM SIGCOMM |
Wirz, Gartner, Bommel |
| 2025/08/20 |
APPARATUS FOR TESTING HACKING OF VEHICLE ELECTRONIC DEVICE |
Cheolseung Kim |
| 2025/06/23 |
ZCOVER: Uncovering Z-Wave Controller Vulnerabilities Through Systematic Security Analysis of Application Layer Implementation, IEEE/IFIP Int'l Conf. on Dependable Systems and Networks (DSN) |
Carlos Nkuba Kayembe |
| 2025/04/16 |
METHOD FOR IDENTIFYING OPENSOURCE SOFTWARE COMPONENTS AT THE SOURCECODE LEVEL |
Heejo Lee |
| 2025/01/01 |
A large-scale analysis of the effectiveness of publicly reported security patches, Computers & Security |
Seunghoon Woo |