On the effectiveness of pattern lock strength meters: Measuring the strength of real world pattern locks Y Song, G Cho, S Oh, H Kim, JH Huh Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015 | 89 | 2015 |
SENTINEL: A Secure and Efficient Authentication Framework for Unmanned Aerial Vehicles G Cho, J Cho, S Hyun, H Kim Applied Sciences 10 (9), 3149, 2020 | 83 | 2020 |
Syspal: System-guided pattern locks for android G Cho, JH Huh, J Cho, S Oh, Y Song, H Kim 2017 IEEE Symposium on security and privacy (SP), 338-356, 2017 | 49 | 2017 |
An empirical study of click fraud in mobile advertising networks G Cho, J Cho, Y Song, H Kim 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 47 | 2015 |
A framework for security services based on software-defined networking J Jeong, J Seo, G Cho, H Kim, JS Park 2015 IEEE 29th International Conference on Advanced Information Networking …, 2015 | 45 | 2015 |
Preventing DNS amplification attacks using the history of DNS queries with SDN S Kim, S Lee, G Cho, ME Ahmed, J Jeong, H Kim Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 41 | 2017 |
Two-thumbs-up: Physical protection for pin entry secure against recording attacks DH Nyang, H Kim, W Lee, S Kang, G Cho, MK Lee, A Mohaisen computers & security 78, 1-15, 2018 | 37 | 2018 |
Combating online fraud attacks in mobile-based advertising G Cho, J Cho, Y Song, D Choi, H Kim EURASIP Journal on Information Security 2016, 1-9, 2016 | 37 | 2016 |
Keyboard or keylogger?: a security analysis of third-party keyboards on android J Cho, G Cho, H Kim 2015 13th Annual Conference on Privacy, Security and Trust (PST), 173-176, 2015 | 29 | 2015 |
On the security and usability implications of providing multiple authentication choices on smartphones: The more, the better? G Cho, JH Huh, S Kim, J Cho, H Park, Y Lee, K Beznosov, H Kim ACM Transactions on Privacy and Security (TOPS) 23 (4), 1-32, 2020 | 23 | 2020 |
Threat modeling and analysis of voice assistant applications G Cho, J Choi, H Kim, S Hyun, J Ryoo Information Security Applications: 19th International Conference, WISA 2018 …, 2019 | 22 | 2019 |
The personal identification chord: A four buttonauthentication system for smartwatches I Oakley, JH Huh, J Cho, G Cho, R Islam, H Kim Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 22 | 2018 |
Design and Analysis of Push Notification‐Based Malware on Android S Hyun, J Cho, G Cho, H Kim Security and Communication Networks 2018 (1), 8510256, 2018 | 12 | 2018 |
Towards usable and secure location-based smartphone authentication G Cho, S Kwag, JH Huh, B Kim, CH Lee, H Kim Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 1-16, 2021 | 10 | 2021 |
Data-driven selection of security application frameworks during architectural design H Cervantes, R Kazman, J Ryoo, J Cho, G Cho, H Kim, J Kang | 8 | 2019 |
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices J Cho, G Cho, S Hyun, H Kim Journal of Internet Services and Information Security 7 (4), 35-44, 2017 | 7 | 2017 |
On the long-term effects of continuous keystroke authentication: Keeping user frustration low through behavior adaptation JH Huh, S Kwag, I Kim, A Popov, Y Park, G Cho, J Lee, H Kim, CH Lee Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2023 | 4 | 2023 |
Understanding users' risk perceptions about personal health records shared on social networking services Y Son, G Cho, H Kim, S Woo Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 1 | 2019 |
Poster: Wiping: Wi-fi signal-based pin guessing attack S Cha, J Park, G Cho, JH Huh, H Kim Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 1 | 2016 |
Poster: Design of Backdoor on Android Devices J Cho, G Cho, S Hyun, H Kim Ratio 1, 0.008, 0 | | |