Vuddy: A scalable approach for vulnerable code clone discovery S Kim, S Woo, H Lee, H Oh 2017 IEEE symposium on security and privacy (SP), 595-614, 2017 | 353 | 2017 |
CENTRIS: A Precise and Scalable Approach for Identifying Modified Open-Source Software Reuse S Woo, S Park, S Kim, H Lee, H Oh 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 37* | 2021 |
{V0Finder}: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities S Woo, D Lee, S Park, H Lee, S Dietrich 30th USENIX Security Symposium (USENIX Security 21), 3041-3058, 2021 | 17 | 2021 |
{MOVERY}: A Precise Approach for Modified Vulnerable Code Clone Discovery from Modified {Open-Source} Software Components S Woo, H Hong, E Choi, H Lee 31st USENIX Security Symposium (USENIX Security 22), 3037-3053, 2022 | 16 | 2022 |
Poster: Iotcube: an automated analysis platform for finding security vulnerabilities S Kim, S Woo, H Lee, H Oh Proceedings of the 38th IEEE Symposium on Poster presented at Security and …, 2017 | 10 | 2017 |
Dicos: Discovering insecure code snippets from stack overflow posts by leveraging user discussions H Hong, S Woo, H Lee Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 9 | 2021 |
xVDB: A high-coverage approach for constructing a vulnerability database H Hong, S Woo, E Choi, J Choi, H Lee IEEE Access 10, 85050-85063, 2022 | 8 | 2022 |
L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing H Park, CK Nkuba, S Woo, H Lee 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022 | 5 | 2022 |
{V1SCAN}: Discovering 1-day Vulnerabilities in Reused {C/C++} Open-source Software Components Using Code Classification Techniques S Woo, E Choi, H Lee, H Oh 32nd USENIX Security Symposium (USENIX Security 23), 6541-6556, 2023 | 4 | 2023 |
OCTOPOCS: automatic verification of propagated vulnerable code using reformed proofs of concept S Kwon, S Woo, G Seong, H Lee 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021 | 4 | 2021 |
ZMAD: Lightweight Model-Based Anomaly Detection for the Structured Z-Wave Protocol CK Nkuba, S Woo, H Lee, S Dietrich IEEE Access, 2023 | 3 | 2023 |
Circuit: A javascript memory heap-based approach for precisely detecting cryptojacking websites H Hong, S Woo, S Park, J Lee, H Lee IEEE Access 10, 95356-95368, 2022 | 3 | 2022 |
공급망 보안을 위한 오픈소스 소프트웨어 취약점 관리 기술 홍현지, 우승훈, 이희조 정보보호학회지 32 (5), 35-43, 2022 | 1 | 2022 |
CNEPS: A Precise Approach for Examining Dependencies among Third-Party C/C++ Open-Source Components Y Na, S Woo, J Lee, H Lee Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024 | | 2024 |
오픈소스 SW 취약점 분석및 탐지기술 동향 우승훈, 홍현지, 이희조 OSIA Standards & Technology Review Journal 35 (2), 31-39, 2022 | | 2022 |
A Large-Scale Analysis of the Effectiveness of Publicly Reported Security Patches S Woo, E Choi, H Lee Available at SSRN 4630707, 0 | | |