| 2026/03/23 |
Human vs AI: Insecure Use of Security-sensitive Functions in AI-generated Code in Comparison to Human-written Code, ACM/SIGAPP Symposium On Applied Computing (ACM SAC) |
Joonku Lee |
| 2026/03/23 |
CovBooster: Coverage Booster for Binary Code Clone Detection by Reduced Signatures, ACM/SIGAPP Symposium On Applied Computing (ACM SAC) |
Jeongwoo Lee |
| 2025/11/16 |
IMUFUZZER: Resilience-based Discovery of Signal Injection Attacks on Robotic Vehicles, IEEE/ACM Int'l Conf. on Automated Software Engineering (ASE) |
Sudharssan Mohan |
| 2025/09/24 |
METHOD AND APPARATUS FOR IDENTIFYING VULNERABLE SOFTWARE VERSIONS THROUGH SEMANTIC PAIR MAPPING BASED ON CODE LINE DEPENDENCY USING SECURITY PATCHES |
Heejo Lee |
| 2025/08/27 |
Scaling SCIERA: A Journey Through the Deployment of a Next-generation Network, Int'l Conf. on ACM SIGCOMM |
Wirz, Gartner, Bommel |
| 2025/06/23 |
ZCOVER: Uncovering Z-Wave Controller Vulnerabilities Through Systematic Security Analysis of Application Layer Implementation, IEEE/IFIP Int'l Conf. on Dependable Systems and Networks (DSN) |
Carlos Nkuba Kayembe |
| 2025/04/16 |
METHOD FOR IDENTIFYING OPENSOURCE SOFTWARE COMPONENTS AT THE SOURCECODE LEVEL |
Heejo Lee |
| 2025/01/01 |
A large-scale analysis of the effectiveness of publicly reported security patches, Computers & Security |
Seunghoon Woo |
| 2024/09/16 |
BLOOMFUZZ : Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines, European Symposium on Research in Computer Security (ESORICS) |
Pyeongju Ahn |
| 2024/09/16 |
PRETT2: Discovering HTTP/2 DoS Vulnerabilities via Protocol Reverse Engineering, European Symposium on Research in Computer Security (ESORICS) |
Choongin Lee |
| 2024/08/23 |
METHOD AND APPARATUS FOR DETERMINING DEPENDENCIES BETWEEN COMPONENTS OF REUSED OPEN SOURCE SOFTWARE |
Heejo Lee |