| 2025/11/16 | 
                                    IMUFUZZER: Resilience-based Discovery of Signal Injection Attacks on Robotic Vehicles, IEEE/ACM Int'l Conf. on Automated Software Engineering (ASE) | 
                                    Sudharssan Mohan | 
                                
                                
                                    | 2025/09/24 | 
                                    METHOD AND APPARATUS FOR IDENTIFYING VULNERABLE SOFTWARE VERSIONS THROUGH SEMANTIC PAIR MAPPING BASED ON CODE LINE DEPENDENCY USING SECURITY PATCHES | 
                                    Heejo Lee | 
                                
                                
                                    | 2025/08/27 | 
                                    Scaling SCIERA: A Journey Through the Deployment of a Next-generation Network, Int'l Conf. on ACM SIGCOMM | 
                                    Wirz, Gartner, Bommel | 
                                
                                
                                    | 2025/06/23 | 
                                    ZCOVER: Uncovering Z-Wave Controller Vulnerabilities Through Systematic Security Analysis of Application Layer Implementation, IEEE/IFIP Int'l Conf. on Dependable Systems and Networks (DSN) | 
                                    Carlos Nkuba Kayembe | 
                                
                                
                                    | 2025/04/16 | 
                                    METHOD FOR IDENTIFYING OPENSOURCE SOFTWARE COMPONENTS AT THE SOURCECODE LEVEL | 
                                    Heejo Lee | 
                                
                                
                                    | 2025/01/01 | 
                                    A large-scale analysis of the effectiveness of publicly reported security patches, Computers & Security | 
                                    Seunghoon Woo | 
                                
                                
                                    | 2024/09/16 | 
                                    BLOOMFUZZ : Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines, European Symposium on Research in Computer Security (ESORICS) | 
                                    Pyeongju Ahn | 
                                
                                
                                    | 2024/09/16 | 
                                    PRETT2: Discovering HTTP/2 DoS Vulnerabilities via Protocol Reverse Engineering, European Symposium on Research in Computer Security (ESORICS) | 
                                    Choongin Lee | 
                                
                                
                                    | 2024/08/23 | 
                                    METHOD AND APPARATUS FOR DETERMINING DEPENDENCIES BETWEEN COMPONENTS OF REUSED OPEN SOURCE SOFTWARE | 
                                    Heejo Lee | 
                                
                                
                                    | 2024/04/19 | 
                                    CNEPS: A Precise Approach for Examining Dependencies among Third-Party C/C++ Open-Source Components, IEEE/ACM Int'l Conf. on Software Engineering (ICSE) | 
                                    Yoonjong Na | 
                                
                                
                                    | 2024/02/19 | 
                                    METHOD AND APPARATUS FOR DETECTING PROPAGATION OF SECURITY VULNERABILITIES OF OPEN SOURCE SOFTWARE INHERENT IN COMPONENTS OF TARGET SOFTWARE | 
                                    Seunghoon Woo |