A publication list for the last 5 years.
You can find a full list of publications and links to the papers here.
[2024]
Kyungho Joo, and Wonsuk Choi
IEEE Internet of Things Journal, 2024 (IF 8.2, 상위 5%이내)
Securing Passive Keyless Entry and Start System in Modern Vehicles Based on LF-Band Signal Analysis
Kyungho Joo, Hyo Jin Jo*, and Wonsuk Choi* (*co-corresponding author)
IEEE Internet of Things Journal, 2024 (IF 8.2, 상위 5%이내)
Parallelly Running and Privacy-Preserving Agglomerative Hierarchical Clustering in Outsourced Cloud Computing Environments
Jeongsu Park, and Dong Hoon Lee
IEEE Transactions on Big Data, 2024 (IF 7.5, 상위 5%이내)
ChatDEOB: An Effective Deobfuscation Method based on Large Language Model
Byunggeon Choi, Hongjoo Jin, Dong Hoon Lee, and Wonsuk Choi
WISA 2024
Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages (IFIP SEC Best Paper Award)
Hongjoo Jin, Sumin Yang, Moon Chan Park, Haehyun Cho, and Dong Hoon Lee
IFIP International Conference on ICT Systems Security and Privacy Protection, 2024 (BK21+ 인정 IF 1)
A Framework to Quantify the Quality of Source Code Obfuscation
Hongjoo Jin, Jiwon Lee, Sumin Yang, Kijoong Kim and Dong Hoon Lee
Applied Sciences, 2024 (IF 2.5)
CatchFuzz: Reliable active anti-fuzzing techniques against coverage-guided fuzzer
Hee Yeon Kim, and Dong Hoon Lee
Computers & Security, 2024 (IF 5.6)
DROPSYS: Detection of ROP attacks using system information
Seon Kwon Kim, Hongjoo Jin, Kyungho Joo, Jiwon Lee, and Dong Hoon Lee
Computers & Security, 2024 (IF 5.6)
Securing EV Charging System against Physical-layer Signal Injection Attack (ETAS Best Paper Award)
Soyeon Son, Kyungho Joo, Wonsuk Choi, and Dong Hoon Lee
VehicleSec 2024, co-located with NDSS'24
[2023]
Protecting HRP UWB Ranging System Against Distance Reduction Attacks
Kyungho Joo, Dong Hoon Lee, Yeonseon Jeong, and Wonsuk Choi
ACM CCS 2023 (BK21+ 인정 IF 4)
Poster: Unveiling the Impact of Patch Placement: Adversarial Patch Attacks on Monocular Depth Estimation
Gyungeun Yun, Kyungho Joo, Wonsuk Choi, and Dong Hoon Lee
ACM CCS 2023 (Poster)
In-vehicle Network Intrusion Detection System Using CAN Frame-Aware Features
Yeonseon Jeong, Hyunghoon Kim, Seyoung Lee, Wonsuk Choi, Dong Hoon Lee, and Hyo Jin Jo
IEEE Trans. Intell. Transp. Syst., 2023 (IF 8.5, 상위 10%이내)
SCVMON: Data-oriented attack recovery for RVs based on safety-critical variable monitoring
Sangbin Park, Youngjoon Kim, and Dong Hoon Lee
RAID 2023 (BK21+ 인정 IF 2)
Detecting Risky Authentication Using the OpenID Connect Token Exchange Time
Alex Heunhe Han, and Dong Hoon Lee
MDPI Sensors, 2023 (IF 3.9)
A Comprehensive Analysis of Datasets for Automotive Intrusion Detection Systems
Seyoung Lee, Wonsuk Choi, Insup Kim, Ganggyu Lee, and Dong Hoon Lee
Computers Materials & Continua, 2023 (IF 3.1)
IoT security: On-chip secure deletion scheme using ECC modulation in IoT appliances
Na Young Ahn, and Dong Hoon Lee
Computers & Security, 2023 (IF 5.6)
PE-detector: Intrusion Detection of Periodic and Event Message Attacks on Controller Area Networks
Hyunghoon Kim Wonsuk Choi, and Hyo Jin Jo
IEEE Trans. Veh. Technol., 2023 (IF 6.8)
[Bib] [PDF]
ErrIDS: An Enhanced Cumulative Timing Error-Based Automotive Intrusion Detection System
Seyoung Lee*, Wonsuk Choi*, Hyo Jin Jo, and Dong Hoon Lee (*co-first author)
IEEE Trans. Intell. Transp. Syst., 2023 (IF 8.5, 상위 10%이내)
Protecting some/ip communication via authentication ticket
Seulhui Lee, Wonsuk Choi, and Dong Hoon Lee
MDPI Sensors, 2023 (IF 3.9)
RIDAS: Real-time identification of attack sources on controller area networks
Jiwoo Shin, Hyunghoon Kim, Seyoung Lee, Wonsuk Choi, Dong Hoon Lee, and Hyo Jin Jo
Usenix Security 2023 (BK21+ 인정 IF 3)
NTRU+: Compact Construction of NTRU Using Simple Encoding Method
Jonghyun Kim, and Jong Hwan Park
IEEE Trans. Inf. Forensics Secur., 2023 (IF 6.8, 상위 15%이내)
G-IDCS: Graph-Based Intrusion Detection and Classification System for CAN Protocol
Sung Bum Park, Hyo Jin Jo*, and Dong Hoon Lee* (*co-corresponding)
IEEE Access, 2023 (IF 3.9)
Flooding attack mitigator for in-vehicle CAN using fault confinement in CAN protocol
Sung Bum Park, Hyo Jin Jo*, and Dong Hoon Lee* (*co-corresponding)
Computers & Security, 2023 (IF 5.6)
Privacy-Preserving Identity Management System on Blockchain Using Zk-SNARK
Duc Anh Luong, and Jong Hwan Park
IEEE Access, 2023 (IF 3.9)
The vibration knows who you are! A further analysis on usable authentication for smartwatch users
Sunwoo Lee, Wonsuk Choi, and Dong Hoon Lee
Computers & Security, 2023 (IF 5.6)
BGCFI: Efficient Verification in Fine-Grained Control-Flow Integrity Based on Bipartite Graph
Moon Chan Park, and Dong Hoon Lee
IEEE Access, 2023 (IF 3.9)
Practical dynamic group signatures without knowledge extractors
Hyoseung Kim, Olivier Sanders, Michel Abdalla, and Jong Hwan Park
Des. Codes Cryptogr., 2023 (IF 1.6)
[2022]
TTIDS: Transmission-resuming Time-based Intrusion Detection System for Controller Area Network (CAN)
Se Young Lee, Hyojin Jo, Dong Hoon Lee, and Wonsuk Choi
IEEE Access, 2022 (IF 3.9)
Privacy-Preserving Blockchain-Based Healthcare System for IoT Devices Using zk-SNARK
Duc Anh Luong and Jong Hwan Park
IEEE Access, 2022 (IF 3.9)
An Efficient Open Vote Network for Multiple Candidates
Sangsoo Seol, Hyoseung Kim, and Jong Hwan Park
IEEE Access, 2022 (IF 3.9)
Parallelly Running and Privacy-Preserving k-Nearest Neighbor Classification in Outsourced Cloud Computing Environments
Jeongsu Park, and Dong Hoon Lee
Electronics, 2022 (IF 2.9)
Recovering Yaw Rate from Signal Injection Attack to Protect RV’s Direction
Hyunsu Cho, Sunwoo Lee, Wonsuk Choi, and Dong Hoon Lee
WISA 2022
From Attack to Identification: MEMS Sensor Fingerprinting using Acoustic Signals
Sunwoo Lee, and Dong Hoon Lee
IEEE Internet of Things Journal, 2022 (IF 10.6, 상위 3%이내)
Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory
Nayoung Ahn, and Dong Hoon Lee
IEEE Access, 2022 (IF 3.9)
Cyberattack Models for Ship Equipment Based on the MITRE ATT&CK Framework
Yonghyun Jo, Oongjae Choi, Jiwoon You, Youngkyun Cha, and Dong Hoon Lee
MDPI Sensors, 2022 (IF 3.9)
[2021]
Forensic Issues and Techniques to Improve Security in SSD With Flex Capacity Feature
Nayoung Ahn, and Dong Hoon Lee
IEEE Access, 2021 (IF 3.476)
Improving the security of direct anonymous attestation under host corruptions
Hyoseung Kim, Kwangsu Lee, Jong Hwan Park, and Dong Hoon Lee
International Journal of Information Security, 2021 (IF 2.427)
Anonymous IBE from PEKS: A Generic Construction
Hyun Sook Rhee, and Dong Hoon Lee
International Conference on Information Security Applications 2021
Prof-gen: Practical Study on System Call Whitelist Generation for Container Attack Surface Reduction
Sungjin Kim, Byung Joon Kim, and Dong Hoon Lee
IEEE International Conference on Cloud Computing (CLOUD) 2021 (BK+ 인정 IF 1)
Secure Privacy-Preserving V2V Communication in 5G-V2X Supporting Network Slicing
Hyeran Mun, Minhye Seo, and Dong Hoon Lee
IEEE Trans. Intell. Transp. Syst., 2021 (IF 9.551, 상위 15%이내)
Practical dynamic group signature with efficient concurrent joins and batch verifications
Hyoseung Kim, Youngkyung Lee, Michel Abdalla, and Jong Hwan Park
Journal of Information Security and Applications, 2021 (IF 4.960)
Usable User Authentication on a Smartwatch using Vibration
Sunwoo Lee, Wonsuk Choi, and Dong Hoon Lee
ACM CCS 2021 (BK+ 인정 IF 4)
A Survey of Attacks on Controller Area Networks and Corresponding Countermeasures
Hyo Jin Jo, and Wonsuk Choi
IEEE Trans. Intell. Transp. Syst., 2021 (IF 9.551, 상위 15%이내)
Revisiting NIZK-Based Technique for Chosen-Ciphertext Security: Security Analysis and Corrected Proofs
Youngkyung Lee, Dong Hoon Lee, and Jong Hwan Park
MDPI Applied Sciences, 2021 (IF 2.9)
An Enhanced Method for Reverse Engineering CAN Data Payload
Wonsuk Choi, Seyoung Lee, Kyungho Joo, Hyo Jin Jo, and Dong Hoon Lee
IEEE Trans. Veh. Technol., 2021 (IF 6.239)
Forensics and Anti-Forensics of a NAND Flash Memory: From a Copy-Back Program Perspective
Nayoung Ahn, and Dong Hoon Lee
IEEE Access, 2021 (IF 3.476)
Bypassing Anti-Analysis of Commercial Protector Methods Using DBI Tools
Youngbi Lee, Jaehyuk Suk, and Dong Hoon Lee
IEEE Access, 2021 (IF 3.476)
[2020]
SOTPM: Software One-Time Programmable Memory to Protect Shared Memory on ARM Trustzone
Dongwook Shim, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)
HS-Pilot: Heap Security Evaluation Tool Model Based on Atomic Heap Interaction
Sumin Chae, Hongjoo Jin, Moon Chan Park, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)
Analysis of Threats and Countermeasures for Odometer Protection
Seil Kim, Aram CHo, and Dong Hoon Lee
International Journal of Automotive Technology, 2020 (IF 1.269)
An Improved Fuzzy Vector Signature with Reusability
Ilhwan Lim, Minhye Seo, Dong Hoon Lee, and Jong Hwan Park
MDPI Applied Sciences, 2020 (IF 2.9)
Balancing Personal Privacy and Public Safety During COVID-19: The Case of South Korea
Na Young Ahn, JunEun Park, Dong Hoon Lee, and Paul C. Hong
IEEE Access, 2020 (IF 3.367)
Tight security for the generic construction of identity-based signature (in the multi-instance setting)
Youngkyung Lee, Jong Hwan Park, Kwangsu Lee, and Dong Hoon Lee
Theoretical Computer Science, 2020 (IF 0.827)
Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
Youngkyung Lee, Dong Hoon Lee, and Jong Hwan Park
Des. Codes Cryptogr., 2020 (IF 1.492)
VCF: Virtual Code Folding to Enhance Virtualization Obfuscation
Jae Hyuk Suk, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)
Improved Ring LWR-Based Key Encapsulation Mechanism Using Cyclotomic Trinomials
So Hyun Park, Suhri Kim, Dong Hoon Lee, and Jong Hwan Park
IEEE Access, 2020 (IF 3.367)
SCORE: Source Code Optimization & REconstruction
Jea Hyuk Suk, Young Bi Lee, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)
AI-IDS: Application of Deep Learning to Real-Time Web Intrusion Detection
Ae Chan Kim, Mohyun Park, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)
MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks
Hyo Jin Jo, Jin Hyun Kim, Hyon-Young Choi, Wonsuk Choi, Dong Hoon Lee, and Insup Lee
IEEE Trans. Veh. Technol., 2020 (IF 5.978)
Random CFI (RCFI): Efficient fine-grained Control-Flow Integrity through random verification
Moon Chan Park, and Dong Hoon Lee
IEEE Transactions on Computers, 2020 (IF 2.663)
Fine-Grained Access Control-Enabled Logging Method on ARM TrustZone
Seungho Lee, Hyo Jin Jo, Wonsuk Choi, Hyoseung Kim, Jong Hwan Park, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)
Ensuring Safety and Security in CAN-based Automotive Embedded Systems: A Combination of Design Optimization and Secure Communication
Hyeran Mun, Kyusuk Han, and Dong Hoon Lee
IEEE Trans. Veh. Technol., 2020 (IF 5.978)
Practical Vulnerability-Information-Sharing Architecture for Automotive Security-Risk Analysis
Yousik Lee, Samuel Woo, Yunkeun Song, Jungho Lee, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)
IBV-CFI: Efficient Fine-grained Control-Flow Integrity Preserving CFG Precision
Hyerean Jang, Moon Chan Park, and Dong Hoon Lee
Computers & Security, 2020 (IF 4.438)
Parallelly Running k-Nearest Neighbor Classification over Semantically Secure Encrypted Data in Outsourced Environments
Jeongsu Park, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)
Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft
Kyuong Ho Joo, Wonsuk Choi, and Dong Hoon Lee
NDSS Symposium 2020 (BK+ 인정 IF 2)
[Poster] Secure Logging Infrastructure Employing Heterogeneous Trusted Execution Environments
Seungho Lee, Wonsuk Choi, Hyo Jin Jo, and Dong Hoon Lee
NDSS Symposium 2020 (Poster)
[2019]
Schemes for Privacy Data Destruction in a NAND Flash Memory
Na Young Ahn, and Dong Hoon Lee
IEEE Access, 2019 (IF 3.745)
Securing Ultrasonic Sensors against Signal Injection Attacks based on a Mathematical Model
Sunwoo Lee, Wonsuk Choi, and Dong Hoon Lee
IEEE Access, 2019 (IF 3.745)
Physical layer security of autonomous driving: Secure vehicle-to-vehicle communication in a security cluster
Na Young Ahn, and Dong Hoon Lee
Ad-Hoc and Sensor Wireless Networks, 2019 (IF 0.979)
Catch ID if You CAN: Dynamic ID Virtualization Mechanism for the Controller Area Network
Hyunjin Sun, Se Young Lee, Kyungho Joo, Hongjoo Jin, and Dong Hoon Lee
IEEE Access, 2019 (IF 3.745)
CCA security for self-updatable encryption: Protecting cloud data when clients read/write ciphertexts
Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, Moti Yung, and Yi Mu
The Computer Journal, 2019 (IF 1.077)
Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication
Minhye Seo, Jung Yeon Hwang, Dong Hoon Lee, Soohyung Kim, Seung-Hyun Kim, and Jong Hwan Park
IEEE Access, 2019 (IF 3.745)
[POSTER] How to Securely Record Logs based on ARM TrustZone
Seungho Lee, Wonsuk Choi, Hyo Jin Jo, and Dong Hoon Lee
ACM ASIACCS 2019 (Poster)
T-Box: A forensics-enabled trusted automotive data recording method
Seungho Lee, Wonsuk Choi, Hyo Jin Jo, and Dong Hoon Lee
IEEE Access, 2019 (IF 3.745)
New Technique for Chosen-Ciphertext Security Based on Non-Interactive Zero-Knowledge
Minhye Seo, Michel Abdalla, Dong Hoon Lee, and Jong Hwan Park
Information Sciences, 2019 (IF 5.910, 상위 5%이내)
EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method
Minhye Seo, Suhri Kim, Dong Hoon Lee, and Jong Hwan Park
International Journal of Information Security, 2019 (IF 1.494)
Enhanced Android App-Repackaging Attack on In-Vehicle Network
Yousik Lee, Samuel Woo, Jungho Lee, Yunkeun Song, Heeseok Moon, and Dong Hoon Lee
Wireless Communications and Mobile Computing, 2019 (IF 1.819)