| 2026/06/09 |
Clovery: Identifying Affected Versions in C/C++ Public Security Vulnerability Reports, IFIP Int'l Conf. on ICT Systems Security and Privacy Protection (IFIP SEC) |
Duyeong Kim |
| 2026/03/23 |
Human vs AI: Insecure Use of Security-Sensitive Functions in AI-generated Code in Comparison to Human-written Code, ACM/SIGAPP Symposium On Applied Computing (ACM SAC) |
Joonku Lee |
| 2026/03/23 |
CovBooster: Coverage Booster for Binary Code Clone Detection by Reduced Signatures, ACM/SIGAPP Symposium On Applied Computing (ACM SAC) |
Jeongwoo Lee |
| 2025/12/31 |
METHOD AND APPARATUS FOR IDENTIFYING VULNERABLE SOFTWARE VERSIONS THROUGH SEMANTIC PAIR MAPPING BASED ON CODE LINE DEPENDENCY USING SECURITY PATCHES |
Heejo Lee |
| 2025/12/09 |
Probing Challenges and Future Research of SBOM Generation for Medical Devices, Workshop at the Annual Computer Security Applications Conference, (ACSAC-HealthSec) |
Hui Zhuang |
| 2025/11/16 |
IMUFUZZER: Resilience-based Discovery of Signal Injection Attacks on Robotic Vehicles, IEEE/ACM Int'l Conf. on Automated Software Engineering (ASE) |
Sudharssan Mohan |
| 2025/09/24 |
METHOD AND APPARATUS FOR IDENTIFYING VULNERABLE SOFTWARE VERSIONS THROUGH SEMANTIC PAIR MAPPING BASED ON CODE LINE DEPENDENCY USING SECURITY PATCHES |
Heejo Lee |
| 2025/08/27 |
Scaling SCIERA: A Journey Through the Deployment of a Next-generation Network, Int'l Conf. on ACM SIGCOMM |
Wirz, Gartner, Bommel |
| 2025/08/21 |
Poster: Enhancing Vulnerability Fix Commit Identification via Data Augmentation with Security Unrelated Commits, THE 26TH WORLD CONFERENCE ON INFORMATION SECURITY APPLICATIONS (WISA) |
YoonJung Cho |
| 2025/08/21 |
Poster: HatBOM, An Automated Analysis Platform for SBOM and VEX Generation, THE 26TH WORLD CONFERENCE ON INFORMATION SECURITY APPLICATIONS (WISA) |
Kyeongseok Yang |
| 2025/08/20 |
APPARATUS FOR TESTING HACKING OF VEHICLE ELECTRONIC DEVICE |
Cheolseung Kim |