default search action
Eun-Sun Cho
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c50]Jeongpil Park, Eun-Sun Cho:
WeBMO: WebAssembly Memory Bitwise Operation Obfuscation. COMPSAC 2024: 1436-1439 - [c49]Hyeongchang Jeon, Seoksu Lee, Eun-Sun Cho:
Dynamic Opaque Predicate Detection with a Recursive Matching Method. COMPSAC 2024: 1530-1531 - [i4]Seoksu Lee, Hyeongchang Jeon, Eun-Sun Cho:
Simplifying MBA Expression Using E-Graphs. CoRR abs/2404.05431 (2024) - 2023
- [j13]Jeongwoo Kim, Joon-Young Paik, Eun-Sun Cho:
Attention-Based Cross-Modal CNN Using Non-Disassembled Files for Malware Classification. IEEE Access 11: 22889-22903 (2023) - [c48]Hyeonachang Jeon, Seoyeon Kang, Seoksu Lee, Eun-Sun Cho:
Assessing Opaque Predicates: Unveiling the Efficacy of Popular Obfuscators with a Rapid Deobfuscator. APSEC 2023: 651-652 - [i3]Seong-Kyun Mok, Eun-Sun Cho:
L4 Pointer: An efficient pointer extension for spatial memory safety support without hardware extension. CoRR abs/2302.06819 (2023) - [i2]Jeongwoo Kim, Eun-Sun Cho, Joon-Young Paik:
Feature Engineering Using File Layout for Malware Detection. CoRR abs/2304.02260 (2023) - 2022
- [j12]Joon-Young Paik, Rize Jin, Eun-Sun Cho:
Malware classification using a byte-granularity feature based on structural entropy. Comput. Intell. 38(4): 1536-1558 (2022) - [j11]GeunYong Kim, Joon-Young Paik, Yeong-Cheol Kim, Eun-Sun Cho:
Byte Frequency Based Indicators for Crypto-Ransomware Detection from Empirical Analysis. J. Comput. Sci. Technol. 37(2): 423-442 (2022) - [c47]Seoyeon Kang, Jeongwoo Kim, Eun-Sun Cho, Seokwoo Choi:
Program Synthesis-based Simplification of MBA Obfuscated Malware with Restart Strategies. Checkmate@CCS 2022: 13-18 - [c46]Jihyeon Kim, Dae-hyeon Jeong, Jisoo Kim, Eun-Sun Cho:
Stone: A Privacy Policy Enforcement System for Smart Contracts. SANER 2022: 1203-1206 - [i1]Seong-Kyun Mok, Seoyeon Kang, Jeongwoo Kim, Eun-Sun Cho, Seokwoo Choi:
SSLEM: A Simplifier for MBA Expressions based on Semi-linear MBA Expressions and Program Synthesis. CoRR abs/2208.05612 (2022) - 2021
- [c45]Seoyeon Kang, Sujeong Lee, Yumin Kim, Seong-Kyun Mok, Eun-Sun Cho:
OBFUS: An Obfuscation Tool for Software Copyright and Vulnerability Protection. CODASPY 2021: 309-311 - [c44]Joon-Young Paik, GeunYong Kim, Seoyeon Kang, Rize Jin, Eun-Sun Cho:
Data Protection Based on Hidden Space in Windows Against Ransomware. ICICT (1) 2021: 629-637 - [c43]Jisoo Kim, Eun-Sun Cho:
Support for the safety of EVM bytecode via function-call interceptor. QRS Companion 2021: 676-684 - [c42]Sooyeon Lee, Eun-Sun Cho:
Lightweight extension of an execution environment for safer function calls in Solidity/Ethereum Virtual Machine smart contracts. SANER 2021: 689-695 - [c41]Jeongwoo Kim, Seoyeon Kang, Eun-Sun Cho, Joon-Young Paik:
LOM: Lightweight Classifier for Obfuscation Methods. WISA 2021: 3-15
2010 – 2019
- 2019
- [c40]Seoksu Lee, Joon-Young Paik, Rize Jin, Eun-Sun Cho:
Toward Machine Learning Based Analyses on Compressed Firmware. COMPSAC (2) 2019: 586-591 - [c39]Yeong-Cheol Kim, Joon-Young Paik, Seokwoo Choi, Eun-Sun Cho:
Efficient SVM Based Packer Identification with Binary Diffing Measures. COMPSAC (1) 2019: 795-800 - [c38]Sooyeon Lee, Eun-Sun Cho:
A Modified Smart Contract Execution Enviroment for Safe Function Calls. COMPSAC (1) 2019: 904-907 - [c37]Seong-Kyun Mok, Eun-Sun Cho:
TraceFilter: An Exploitability Analyzer of Vulnerabilities in Binary Code. DASC/PiCom/DataCom/CyberSciTech 2019: 640-645 - [c36]Joon-Young Paik, Joong-Hyun Choi, Rize Jin, Jianming Wang, Eun-Sun Cho:
Buffer Management for Identifying Crypto-Ransomware Attack in Environment with No Semantic Information. ISPA/BDCloud/SocialCom/SustainCom 2019: 443-450 - [c35]Hyungkun Jung, Kang-Woo Lee, Eun-Sun Cho:
Outlier Detection for Ship Trajectory Prediction. MobiSys 2019: 588-589 - 2018
- [j10]Young-Ho Suh, Kang-Woo Lee, Eun-Sun Cho:
A software framework for robotic mediators in smart environments. J. Reliab. Intell. Environ. 4(2): 89-105 (2018) - [j9]Joon-Young Paik, Eun-Sun Cho, Rize Jin, Tae-Sun Chung:
Selective-Delay Garbage Collection Mechanism for Read Operations in Multichannel Flash-Based Storage Devices. IEEE Trans. Consumer Electron. 64(1): 118-126 (2018) - [c34]Joon-Young Paik, Joong-Hyun Choi, Rize Jin, Jianming Wang, Eun-Sun Cho:
A Storage-level Detection Mechanism against Crypto-Ransomware. CCS 2018: 2258-2260 - [c33]Dianxiang Xu, Eun-Sun Cho:
Message from the SEPT Symposium Program Chairs. COMPSAC (1) 2018: 599 - [c32]Seong-Kyun Mok, Eun-Sun Cho:
Building a CFG to Include Exceptions. COMPSAC (1) 2018: 959-961 - [c31]Seoksu Lee, Eun-Sun Cho:
Toward Firmware-Type Analysis Using Machine Learning Techniques. COMPSAC (1) 2018: 977-978 - [c30]Hyungkun Jung, Kang-Woo Lee, Joong-Hyun Choi, Eun-Sun Cho:
Bayesian Estimation of Vessel Destination and Arrival Times. DEBS 2018: 195-197 - 2017
- [j8]Joon-Young Paik, Tae-Sun Chung, Eun-Sun Cho:
Dynamic Allocation Mechanism to Reduce Read Latency in Collaboration With a Device Queue in Multichannel Solid-State Devices. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 36(4): 600-613 (2017) - [c29]Hyeon-Gu Jeon, Seong-Kyun Mok, Eun-Sun Cho:
Automated Crash Filtering Using Interprocedural Static Analysis for Binary Codes. COMPSAC (1) 2017: 614-623 - [c28]Joong-Hyun Choi, Kang-Woo Lee, Hyungkun Jung, Eun-Sun Cho:
Runtime Anomaly Detection Method in Smart Factories using Machine Learning on RDF Event Streams: Grand Challenge. DEBS 2017: 304-309 - [c27]Eun-Sun Cho:
Toward More Reliable Intelligent Environments. Intelligent Environments (Workshops) 2017: 5-7 - 2016
- [c26]Joong-Hyun Choi, Kang-Woo Lee, Eun-Sun Cho:
Experience of event stream processing for top-k queries and dynamic graphs. DEBS 2016: 330-335 - 2015
- [j7]Joon-Young Paik, Tae-Sun Chung, Eun-Sun Cho:
Application-aware deduplication for performance improvement of flash memory. Des. Autom. Embed. Syst. 19(1-2): 161-188 (2015) - [c25]Ki-Jin Eom, Joon-Young Paik, Seong-Kyun Mok, Hyeon-Gu Jeon, Eun-Sun Cho, Dong-Woo Kim, Jaecheol Ryu:
Automated Crash Filtering for ARM Binary Programs. COMPSAC 2015: 478-483 - 2014
- [c24]Tae-Seob Yoon, Joong-Hyun Choi, Eun-Sun Cho, Sumi Helal:
A Formal Modeling for Exceptions in Context-Aware Systems. COMPSAC Workshops 2014: 734-739 - [c23]Ki-Jin Eom, Choong-Hyun Choi, Joon-Young Paik, Eun-Sun Cho:
An Efficient Static Taint-Analysis Detecting Exploitable-Points on ARM Binaries. SRDS 2014: 345-346 - 2013
- [j6]Joon-Young Paik, Tae-Sun Chung, Eun-Sun Cho:
Loop transformations for flash memory: cost models and performance effects. Des. Autom. Embed. Syst. 17(3-4): 627-667 (2013) - [c22]Eun-Sun Cho, Tae-Seob Yoon, Joong-Hyun Choi, Joon-Young Paik, Sumi Helal:
An Integrated Formal Model for Context-Aware Systems. COMPSAC Workshops 2013: 163-168 - [c21]Young-Ho Suh, Kang-Woo Lee, Eun-Sun Cho:
A Device Abstraction Framework for the Robotic Mediator Collaborating with Smart Environments. CSE 2013: 460-467 - [c20]Joon-Young Paik, Tae-Sun Chung, Eun-Sun Cho:
Cost Model Based Analyses on Performance Effects of Loop Transformations in Block Associative Sector Translation. HPCC/EUC 2013: 1998-2005 - [c19]Eun-Sun Cho, Joong-Hyun Choi, Sumi Helal:
Dynamic Parameter Filling for Semantic Exceptions in Context-Aware Systems. UIC/ATC 2013: 293-300 - 2012
- [j5]Yared Hailu Gudeta, Se Jin Kwon, Eun-Sun Cho, Tae-Sun Chung:
Probability-based static wear-leveling algorithm for block and hybrid-mapping NAND flash memory. Des. Autom. Embed. Syst. 16(4): 241-264 (2012) - [j4]Eun-Sun Cho, Sumi Helal:
Expressive Exceptions for Safe Pervasive Spaces. J. Inf. Process. Syst. 8(2): 279-300 (2012) - [c18]Eun-Sun Cho, Sumi Helal:
An Intermediate Language for Semantic Exceptions in Context-Aware Systems. COMPSAC 2012: 364-365 - [c17]Young-Ho Suh, Kang-Woo Lee, Moohun Lee, Hyun Kim, Eun-Sun Cho:
ICARS : Integrated Control Architecture for the Robotic Mediator in Smart Environments: A Software Framework for the Robotic Mediator Collaborating with Smart Environments. HPCC-ICESS 2012: 1541-1548 - [c16]Young-Mok Min, Joon-Young Paik, Eun-Sun Cho:
A Lingustic Approach for Robustness in Context Aware Applications. UIC/ATC 2012: 24-31 - [c15]Eun-Sun Cho, Sumi Helal:
Toward Efficient Detection of Semantic Exceptions in Context-Aware Systems. UIC/ATC 2012: 826-831 - 2011
- [j3]Eun-Sun Cho, Manpyo Hong:
A structural view definition for RDF data. Comput. Syst. Sci. Eng. 26(1) (2011) - [c14]Joon-Young Paik, Tae-Sun Chung, Eun-Sun Cho:
Profiling-Based Log Block Replacement Scheme in FTL for Update-Intensive Executions. EUC 2011: 182-188 - [c13]Young-Ho Suh, Hyun Kim, Joo-Haeng Lee, Joonmyun Cho, Moohun Lee, Jeongnam Yeom, Eun-Sun Cho:
Future robotic computer: a new type of computing device with robotic functions. HRI 2011: 261-262 - [c12]Eun-Sun Cho, Sumi Helal:
A Situation-Based Exception Detection Mechanism for Safety in Pervasive Systems. SAINT 2011: 196-201 - 2010
- [c11]Joon-Young Paik, Eun-Sun Cho, Tae-Sun Chung:
Reorganizing Data Blocks in Flash Memory by Program Translation. CIT 2010: 1948-1953 - [c10]Yun-Sam Kim, Eun-Sun Cho, We-Duke Cho:
Context data abstraction framework using RDF. ICUIMC 2010: 32
2000 – 2009
- 2009
- [c9]Eun-Sun Cho, Yun-Sam Kim, Manpyo Hong, We-Duke Cho:
Fine-Grained View-Based Access Control for RDF Cloaking. CIT (1) 2009: 336-341 - [c8]Joon-Young Paik, Eun-Sun Cho, Tae-Sun Chung:
Performance Improvement for Flash Memories Using Loop Optimization. CSE (2) 2009: 508-513 - [c7]Ik-Hyun Jhin, Nak-Min Choi, Eun-Sun Cho:
Integration of RDF Processing into a Programming Language. NCM 2009: 196-199 - 2006
- [c6]Eun-Sun Cho, Kang-Woo Lee, Min-Young Kim, Hyun Kim:
Scenario-Based Programming for Ubiquitous Applications. UCS 2006: 286-299 - 2005
- [c5]Yun-Sam Kim, Eun-Sun Cho:
Preventing Illegal Usage of Mobile Phone Software. COMPSAC (2) 2005: 25-26 - [c4]Eun-Sun Cho, Kang-Woo Lee, Manpyo Hong:
Abstraction for Privacy in Context-Aware Environments. MATA 2005: 384-393 - 2001
- [c3]Eun-Sun Cho, Sunho Hong, Sechang Oh, Hongjin Yeh, Manpyo Hong, Cheol Won Lee, Hyundong Park, Chun-Sik Park:
SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes. ACISP 2001: 177-189 - 2000
- [j2]Eun-Sun Cho, Hyoung-Joo Kim:
Interface/implementation Separation Mechanism for Integrating Object-oriented Management Systems and General-purpose Programming Languages. Comput. J. 43(6): 512-523 (2000) - [j1]Eun-Sun Cho, Hyoung-Joo Kim:
LOD*: A C++ extension for OODBMSs with orthogonal persistence to class hierarchies. Inf. Softw. Technol. 42(5): 347-356 (2000)
1990 – 1999
- 1997
- [c2]Eun-Sun Cho, Sang-Yong Han, Hyoung-Joo Kim:
A New Data Abstraction Layer Required For OODBMS . IDEAS 1997: 144-150 - 1996
- [c1]Eun-Sun Cho, Sang-Yong Han, Hyoung-Joo Kim:
A Semantics of the Separation of Interface and Implementation in C++. COMPSAC 1996: 83-89
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 00:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint