| 2025/11/16 |
IMUFUZZER: Resilience-based Discovery of Signal Injection Attacks on Robotic Vehicles, IEEE/ACM Int'l Conf. on Automated Software Engineering (ASE) |
Sudharssan Mohan |
| 2025/09/24 |
METHOD AND APPARATUS FOR IDENTIFYING VULNERABLE SOFTWARE VERSIONS THROUGH SEMANTIC PAIR MAPPING BASED ON CODE LINE DEPENDENCY USING SECURITY PATCHES |
Heejo Lee |
| 2025/08/27 |
Scaling SCIERA: A Journey Through the Deployment of a Next-generation Network, Int'l Conf. on ACM SIGCOMM |
Wirz, Gartner, Bommel |
| 2025/06/23 |
ZCOVER: Uncovering Z-Wave Controller Vulnerabilities Through Systematic Security Analysis of Application Layer Implementation, IEEE/IFIP Int'l Conf. on Dependable Systems and Networks (DSN) |
Carlos Nkuba Kayembe |
| 2025/04/16 |
METHOD FOR IDENTIFYING OPENSOURCE SOFTWARE COMPONENTS AT THE SOURCECODE LEVEL |
Heejo Lee |
| 2025/01/01 |
A large-scale analysis of the effectiveness of publicly reported security patches, Computers & Security |
Seunghoon Woo |
| 2024/09/16 |
BLOOMFUZZ : Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines, European Symposium on Research in Computer Security (ESORICS) |
Pyeongju Ahn |
| 2024/09/16 |
PRETT2: Discovering HTTP/2 DoS Vulnerabilities via Protocol Reverse Engineering, European Symposium on Research in Computer Security (ESORICS) |
Choongin Lee |
| 2024/08/23 |
METHOD AND APPARATUS FOR DETERMINING DEPENDENCIES BETWEEN COMPONENTS OF REUSED OPEN SOURCE SOFTWARE |
Heejo Lee |
| 2024/04/19 |
CNEPS: A Precise Approach for Examining Dependencies among Third-Party C/C++ Open-Source Components, IEEE/ACM Int'l Conf. on Software Engineering (ICSE) |
Yoonjong Na |
| 2024/02/19 |
METHOD AND APPARATUS FOR DETECTING PROPAGATION OF SECURITY VULNERABILITIES OF OPEN SOURCE SOFTWARE INHERENT IN COMPONENTS OF TARGET SOFTWARE |
Seunghoon Woo |