Enhanced android malware detection: An svm-based machine learning approach H Han, SJ Lim, K Suh, S Park, S Cho, M Park 2020 IEEE International Conference on Big Data and Smart Computing (BigComp …, 2020 | 51 | 2020 |
Comparison of deadline-based scheduling algorithms for periodic real-time tasks on multiprocessor M Park, S Han, H Kim, S Cho, Y Cho IEICE transactions on information and systems 88 (3), 658-661, 2005 | 45 | 2005 |
Android malware detection using convolutional neural networks and data section images J Jung, J Choi, S Cho, S Han, M Park, Y Hwang Proceedings of the 2018 conference on research in adaptive and convergent …, 2018 | 42 | 2018 |
Design and performance evaluation of binary code packing for protecting embedded software against reverse engineering MJ Kim, JY Lee, HY Chang, SJ Cho, Y Park, M Park, PA Wilsey 2010 13th IEEE International Symposium on Object/Component/Service-Oriented …, 2010 | 39 | 2010 |
Predictability of earliest deadline zero laxity algorithm for multiprocessor real-time systems X Piao, S Han, H Kim, M Park, Y Cho, S Cho Ninth IEEE International Symposium on Object and Component-Oriented Real …, 2006 | 38 | 2006 |
A kernel-based monitoring approach for analyzing malicious behavior on android Y Jeong, H Lee, S Cho, S Han, M Park Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1737-1738, 2014 | 35 | 2014 |
{RGBDroid}: A Novel {Response-Based} Approach to Android Privilege Escalation Attacks Y Park, CH Lee, C Lee, JH Lim, S Han, M Park, SJ Cho 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12), 2012 | 33 | 2012 |
An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks. K Lim, Y Jeong, S Cho, M Park, S Han J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7 (3), 40-52, 2016 | 32 | 2016 |
Effects of Code Obfuscation on Android App Similarity Analysis. J Park, H Kim, Y Jeong, S Cho, S Han, M Park J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6 (4), 86-98, 2015 | 30 | 2015 |
A static birthmark for MS windows applications using import address table JC Choi, YM Han, S Cho, HY Yoo, J Woo, M Park, Y Song, L Chung 2013 Seventh International Conference on Innovative Mobile and Internet …, 2013 | 29 | 2013 |
Predictability of least laxity first scheduling algorithm on multiprocessor real-time systems S Han, M Park International Conference on Embedded and Ubiquitous Computing, 755-764, 2006 | 29 | 2006 |
Android Application Protection against Static Reverse Engineering based on Multidexing. NY Kim, J Shim, S Cho, M Park, S Han J. Internet Serv. Inf. Secur. 6 (4), 54-64, 2016 | 26 | 2016 |
Protecting data on android platform against privilege escalation attack HT Lee, D Kim, M Park, S Cho International Journal of Computer Mathematics 93 (2), 401-414, 2016 | 25 | 2016 |
A framework for identifying obfuscation techniques applied to android apps using machine learning. M Park, G You, S Cho, M Park, S Han J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10 (4), 22-30, 2019 | 23 | 2019 |
An anti-reverse engineering technique using native code and obfuscator-LLVM for android applications K Lim, J Jeong, S Cho, J Choi, M Park, S Han, S Jhang Proceedings of the International Conference on Research in Adaptive and …, 2017 | 23 | 2017 |
Measuring similarity of android applications via reversing and k-gram birthmarking J Ko, H Shim, D Kim, YS Jeong, S Cho, M Park, S Han, SB Kim Proceedings of the 2013 Research in Adaptive and Convergent Systems, 336-341, 2013 | 22 | 2013 |
Open Source Software Detection using Function-level Static Software Birthmark. D Kim, S Cho, S Han, M Park, I You J. Internet Serv. Inf. Secur. 4 (4), 25-37, 2014 | 20 | 2014 |
An anti-piracy mechanism based on class separation and dynamic loading for android applications YS Jeong, YU Park, JC Moon, SJ Cho, D Kim, M Park Proceedings of the 2012 ACM Research in Applied Computation Symposium, 328-332, 2012 | 19 | 2012 |
Static and dynamic analysis of Android malware and goodware written with unity framework J Shim, K Lim, S Cho, S Han, M Park Security and Communication Networks 2018 (1), 6280768, 2018 | 17 | 2018 |
Romadroid: A robust and efficient technique for detecting android app clones using a tree structure and components of each app’s manifest file B Kim, K Lim, SJ Cho, M Park IEEE Access 7, 72182-72196, 2019 | 16 | 2019 |