Efficient Real-Time Scheduling Algorithms for Multiprocessor Systems CHO Seongje, LEE Suk-Kyoon, AHN Sang, LIN Kwei-Jay IEICE Transactions on Communications 85 (12), 2859-2867, 2002 | 107 | 2002 |
Android malware detection based on useful API calls and machine learning J Jung, H Kim, D Shin, M Lee, H Lee, S Cho, K Suh 2018 IEEE First International Conference on Artificial Intelligence and …, 2018 | 53 | 2018 |
Comparison of deadline-based scheduling algorithms for periodic real-time tasks on multiprocessor PARK Minkyu, HAN Sangchul, KIM Heeheon, CHO Seongje, ... IEICE transactions on information and systems 88 (3), 658-661, 2005 | 45 | 2005 |
Enhanced android malware detection: An svm-based machine learning approach H Han, SJ Lim, K Suh, S Park, S Cho, M Park 2020 IEEE International Conference on Big Data and Smart Computing (BigComp …, 2020 | 44 | 2020 |
Android malware detection using convolutional neural networks and data section images J Jung, J Choi, S Cho, S Han, M Park, Y Hwang Proceedings of the 2018 conference on research in adaptive and convergent …, 2018 | 38 | 2018 |
Security threat on wearable services: Empirical study using a commercial smartband M Lee, K Lee, J Shim, S Cho, J Choi 2016 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), 1-5, 2016 | 38 | 2016 |
Predictability of earliest deadline zero laxity algorithm for multiprocessor real-time systems X Piao, S Han, H Kim, M Park, Y Cho, S Cho Ninth IEEE International Symposium on Object and Component-Oriented Real …, 2006 | 38 | 2006 |
Design and performance evaluation of binary code packing for protecting embedded software against reverse engineering MJ Kim, JY Lee, HY Chang, SJ Cho, Y Park, M Park, PA Wilsey 2010 13th IEEE International Symposium on Object/Component/Service-Oriented …, 2010 | 36 | 2010 |
A kernel-based monitoring approach for analyzing malicious behavior on android Y Jeong, H Lee, S Cho, S Han, M Park Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1737-1738, 2014 | 35 | 2014 |
{RGBDroid}: A Novel {Response-Based} Approach to Android Privilege Escalation Attacks Y Park, CH Lee, C Lee, JH Lim, S Han, M Park, SJ Cho 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12), 2012 | 32 | 2012 |
An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks. K Lim, Y Jeong, S Cho, M Park, S Han J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7 (3), 40-52, 2016 | 30 | 2016 |
Effects of Code Obfuscation on Android App Similarity Analysis. J Park, H Kim, Y Jeong, S Cho, S Han, M Park J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6 (4), 86-98, 2015 | 30 | 2015 |
A static birthmark for MS windows applications using import address table JC Choi, YM Han, S Cho, HY Yoo, J Woo, M Park, Y Song, L Chung 2013 Seventh International Conference on Innovative Mobile and Internet …, 2013 | 29 | 2013 |
Efficient identification of bad signatures in RSA-type batch signature LEE Seungwon, CHO Seongje, CHO Yookun IEICE Transactions on Fundamentals of Electronics, Communications and …, 2006 | 27 | 2006 |
Android Application Protection against Static Reverse Engineering based on Multidexing. NY Kim, J Shim, S Cho, M Park, S Han J. Internet Serv. Inf. Secur. 6 (4), 54-64, 2016 | 26 | 2016 |
Protecting data on android platform against privilege escalation attack HT Lee, D Kim, M Park, S Cho International Journal of Computer Mathematics 93 (2), 401-414, 2016 | 25 | 2016 |
Classifying malicious web pages by using an adaptive support vector machine YS Hwang, JB Kwon, JC Moon, SJ Cho Journal of Information Processing Systems 9 (3), 395-404, 2013 | 22 | 2013 |
An anti-reverse engineering technique using native code and obfuscator-LLVM for Android applications K Lim, J Jeong, S Cho, J Choi, M Park, S Han, S Jhang Proceedings of the International Conference on Research in Adaptive and …, 2017 | 21 | 2017 |
Open Source Software Detection using Function-level Static Software Birthmark. D Kim, S Cho, S Han, M Park, I You J. Internet Serv. Inf. Secur. 4 (4), 25-37, 2014 | 20 | 2014 |
An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices HG Kim, JK Han, S Cho Proceedings of the 2007 ACM symposium on Applied computing, 1171-1175, 2007 | 20 | 2007 |