Eun-Sun Cho
Eun-Sun Cho
Dept. of Computer Sci. & Eng., Chungnam National University
Verified email at - Homepage
Cited by
Cited by
Poster: Self-Defensible Storage Devices based on Flash memory against Ransomware
JY Paik, K Shin, ES Cho
IEEE conference on Security and Privacy, 2016
A situation-based exception detection mechanism for safety in pervasive systems
ES Cho, S Helal
2011 IEEE/IPSJ International Symposium on Applications and the Internet, 196-201, 2011
A Storage-level Detection Mechanism against Crypto-Ransomware
JY Paik, JH Choi, R Jin, J Wang, ES Cho
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Byte Frequency Based Indicators for Crypto-Ransomware Detection from Empirical Analysis
GY Kim, JY Paik, Y Kim, ES Cho
Journal of Computer Science and Technology 37 (2), 423-442, 2022
ICARS: Integrated control architecture for the robotic mediator in smart environments: A software framework for the robotic mediator collaborating with smart environments
YH Suh, KW Lee, M Lee, H Kim, ES Cho
2012 IEEE 14th International Conference on High Performance Computing and …, 2012
Automated Crash Filtering Using Interprocedural Static Analysis for Binary Codes
HG Jeon, SK Mok, ES Cho
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017
Security Checks in Programming Languages for Ubiquitous Environments
ES Cho, KW Lee
Proceedings of 2004 Workshop on Pervasive, Security, Privacy and Trust, 2004
LOM: Lightweight classifier for obfuscation methods
J Kim, S Kang, ES Cho, JY Paik
Information Security Applications: 22nd International Conference, WISA 2021 …, 2021
Program Slicing for Binary code Deobfuscation
SK Mok, H Jeon, ES Cho
Journal of the Korea Institute of Information Security and Cryptology 27 (1 …, 2017
Automated crash filtering for arm binary programs
KJ Eom, JY Paik, SK Mok, HG Jeon, ES Cho, DW Kim, J Ryu
2015 IEEE 39th Annual Computer Software and Applications Conference 2, 478-483, 2015
Fine-Grained View-Based Access Control for RDF Cloaking
ES Cho, YS Kim, M Hong, WD Cho
2009 Ninth IEEE International Conference on Computer and Information …, 2009
OBFUS: An Obfuscation Tool for Software Copyright and Vulnerability Protection
S Kang, S Lee, Y Kim, SK Mok, ES Cho
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
Toward Machine Learning Based Analyses on Compressed Firmware
S Lee, JY Paik, R Jin, ES Cho
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC …, 2019
Toward Firmware-Type Analysis Using Machine Learning Techniques
S Lee, ES Cho
2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018
An Integrated Formal Model for Context-Aware Systems
ES Cho, TS Yoon, JH Choi, JY Paik, S Helal
2013 IEEE 37th Annual Computer Software and Applications Conference …, 2013
Toward efficient detection of semantic exceptions in context-aware systems
ES Cho, S Helal
2012 9th International Conference on Ubiquitous Intelligence and Computing …, 2012
Performance improvement for flash memories using loop optimization
JY Paik, ES Cho, TS Chung
2009 International Conference on Computational Science and Engineering 2 …, 2009
An ECA rule-based task programming language for ubiquitous environments
KW Lee, ES Cho, H Kim
2006 8th International Conference Advanced Communication Technology 1, 4 pp.-360, 2006
Scenario-based programming for ubiquitous applications
ES Cho, KW Lee, MY Kim, H Kim
Ubiquitous Computing Systems: Third International Symposium, UCS 2006, Seoul …, 2006
Malware classification using a byte‐granularity feature based on structural entropy
JY Paik, R Jin, ES Cho
Computational Intelligence 38 (4), 1536-1558, 2022
The system can't perform the operation now. Try again later.
Articles 1–20