Follow
Hyunwoo Choi
Hyunwoo Choi
Sungshin Women’s University
Verified email at sungshin.ac.kr - Homepage
Title
Cited by
Cited by
Year
Peeking over the cellular walled gardens-a method for closed network diagnosis
B Hong, S Park, H Kim, D Kim, H Hong, H Choi, JP Seifert, SJ Lee, Y Kim
IEEE Transactions on Mobile Computing 17 (10), 2366-2380, 2018
312018
Enabling automatic protocol behavior analysis for android applications
J Kim, H Choi, H Namkung, W Choi, B Choi, H Hong, Y Kim, J Lee, D Han
Proceedings of the 12th International on Conference on emerging Networking …, 2016
212016
When cellular networks met IPv6: Security problems of middleboxes in IPv6 cellular networks
H Hong, H Choi, D Kim, H Kim, B Hong, J Noh, Y Kim
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 595-609, 2017
172017
{PIkit}: A New {Kernel-Independent}{Processor-Interconnect} Rootkit
W Song, H Choi, J Kim, E Kim, Y Kim, J Kim
25th USENIX Security Symposium (USENIX Security 16), 37-51, 2016
152016
Extractocol: Automatic extraction of application-level protocol behaviors for android applications
H Choi, J Kim, H Hong, Y Kim, J Lee, D Han
Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015
152015
Large‐Scale Analysis of Remote Code Injection Attacks in Android Apps
H Choi, Y Kim
Security and Communication Networks 2018 (1), 2489214, 2018
112018
Pay as you want: Bypassing charging system in operational cellular networks
H Hong, H Kim, B Hong, D Kim, H Choi, E Lee, Y Kim
Information Security Applications: 17th International Workshop, WISA 2016 …, 2017
42017
Run away if you can: Persistent jamming attacks against channel hopping Wi-Fi devices in dense networks
IG Lee, H Choi, Y Kim, S Shin, M Kim
Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014
42014
Run Away If You Can: Persistent Jamming Attacks against Channel Hopping
IG Lee, H Choi, Y Kim, S Shin, M Kim
Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014
12014
AVX-TSCHA: Leaking information through AVX extensions in commercial processors
S Kim, S Shin, H Choi
Computers & Security 134, 103437, 2023
2023
AVX Timing Side-Channel Attacks against Address Space Layout Randomization
H Choi, S Kim, S Shin
2023 60th ACM/IEEE Design Automation Conference (DAC), 1-6, 2023
2023
Apparatus and method for diagnosing anomaly in mobile communication network
Y Kim, B Do HONG, SJ Lee, P Shinjo, KIM Hongil, H HyunWook, D Kim, ...
US Patent 10,111,120, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–12