A publication list for the last 5 years.
You can find a full list of publications and links to the papers here.
[2025]
Eyes on Your Typing: Snooping Finger Motions on Virtual Keyboards
Sunwoo Lee and Wonsuk Choi
IEEE Symposium on Security and Privacy 2025 (BK21+ 인정 IF 4)
asmMBA: Robust Virtualization Obfuscation with AssemblyBased Mixed Boolean Arithmetic
Hongjoo Jin, Jiwon Lee, Taehoon Kim, Mu Yeol Sung, and Dong Hoon Lee
ACM/SIGAPP Symposium On Applied Computing (ACM SAC) 2025 (BK21+ 인정 IF 1)
Enhancing Stack Memory Safety with Secure In-Process Isolation
Hongjoo Jin, Sumin Yang, Haehyun Cho, and Dong Hoon Lee
Computers & Security, 2024 (IF 4.8)
[2024]
Leveraging Intensity as a New Feature to Detect Physical Adversarial Attacks Against LiDARs
Yeji Park, Hyunsu Cho, Wonsuk Choi, and Dong Hoon Lee
Annual Computer Security Applications Conference (ACSAC) 2024 (BK21+ 인정 IF 2)
Kyungho Joo, and Wonsuk Choi
IEEE Internet of Things Journal, 2024 (IF 8.2, 상위 5%이내)
Securing Passive Keyless Entry and Start System in Modern Vehicles Based on LF-Band Signal Analysis
Kyungho Joo, Hyo Jin Jo*, and Wonsuk Choi* (*co-corresponding author)
IEEE Internet of Things Journal, 2024 (IF 8.2, 상위 5%이내)
Parallelly Running and Privacy-Preserving Agglomerative Hierarchical Clustering in Outsourced Cloud Computing Environments
Jeongsu Park, and Dong Hoon Lee
IEEE Transactions on Big Data, 2024 (IF 7.5, 상위 5%이내)
ChatDEOB: An Effective Deobfuscation Method based on Large Language Model
Byunggeon Choi, Hongjoo Jin, Dong Hoon Lee, and Wonsuk Choi
WISA 2024
Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages (IFIP SEC Best Paper Award)
Hongjoo Jin, Sumin Yang, Moon Chan Park, Haehyun Cho, and Dong Hoon Lee
IFIP International Conference on ICT Systems Security and Privacy Protection, 2024 (BK21+ 인정 IF 1)
A Framework to Quantify the Quality of Source Code Obfuscation
Hongjoo Jin, Jiwon Lee, Sumin Yang, Kijoong Kim and Dong Hoon Lee
Applied Sciences, 2024 (IF 2.5)
CatchFuzz: Reliable active anti-fuzzing techniques against coverage-guided fuzzer
Hee Yeon Kim, and Dong Hoon Lee
Computers & Security, 2024 (IF 5.6)
DROPSYS: Detection of ROP attacks using system information
Seon Kwon Kim, Hongjoo Jin, Kyungho Joo, Jiwon Lee, and Dong Hoon Lee
Computers & Security, 2024 (IF 5.6)
Securing EV Charging System against Physical-layer Signal Injection Attack (ETAS Best Paper Award)
Soyeon Son, Kyungho Joo, Wonsuk Choi, and Dong Hoon Lee
VehicleSec 2024, co-located with NDSS'24
[2023]
Protecting HRP UWB Ranging System Against Distance Reduction Attacks
Kyungho Joo, Dong Hoon Lee, Yeonseon Jeong, and Wonsuk Choi
ACM CCS 2023 (BK21+ 인정 IF 4)
Poster: Unveiling the Impact of Patch Placement: Adversarial Patch Attacks on Monocular Depth Estimation
Gyungeun Yun, Kyungho Joo, Wonsuk Choi, and Dong Hoon Lee
ACM CCS 2023 (Poster)
In-vehicle Network Intrusion Detection System Using CAN Frame-Aware Features
Yeonseon Jeong, Hyunghoon Kim, Seyoung Lee, Wonsuk Choi, Dong Hoon Lee, and Hyo Jin Jo
IEEE Trans. Intell. Transp. Syst., 2023 (IF 8.5, 상위 10%이내)
SCVMON: Data-oriented attack recovery for RVs based on safety-critical variable monitoring
Sangbin Park, Youngjoon Kim, and Dong Hoon Lee
RAID 2023 (BK21+ 인정 IF 2)
Detecting Risky Authentication Using the OpenID Connect Token Exchange Time
Alex Heunhe Han, and Dong Hoon Lee
MDPI Sensors, 2023 (IF 3.9)
A Comprehensive Analysis of Datasets for Automotive Intrusion Detection Systems
Seyoung Lee, Wonsuk Choi, Insup Kim, Ganggyu Lee, and Dong Hoon Lee
Computers Materials & Continua, 2023 (IF 3.1)
IoT security: On-chip secure deletion scheme using ECC modulation in IoT appliances
Na Young Ahn, and Dong Hoon Lee
Computers & Security, 2023 (IF 5.6)
PE-detector: Intrusion Detection of Periodic and Event Message Attacks on Controller Area Networks
Hyunghoon Kim Wonsuk Choi, and Hyo Jin Jo
IEEE Trans. Veh. Technol., 2023 (IF 6.8)
[Bib] [PDF]
ErrIDS: An Enhanced Cumulative Timing Error-Based Automotive Intrusion Detection System
Seyoung Lee*, Wonsuk Choi*, Hyo Jin Jo, and Dong Hoon Lee (*co-first author)
IEEE Trans. Intell. Transp. Syst., 2023 (IF 8.5, 상위 10%이내)
Protecting some/ip communication via authentication ticket
Seulhui Lee, Wonsuk Choi, and Dong Hoon Lee
MDPI Sensors, 2023 (IF 3.9)
RIDAS: Real-time identification of attack sources on controller area networks
Jiwoo Shin, Hyunghoon Kim, Seyoung Lee, Wonsuk Choi, Dong Hoon Lee, and Hyo Jin Jo
Usenix Security 2023 (BK21+ 인정 IF 3)
NTRU+: Compact Construction of NTRU Using Simple Encoding Method
Jonghyun Kim, and Jong Hwan Park
IEEE Trans. Inf. Forensics Secur., 2023 (IF 6.8, 상위 15%이내)
G-IDCS: Graph-Based Intrusion Detection and Classification System for CAN Protocol
Sung Bum Park, Hyo Jin Jo*, and Dong Hoon Lee* (*co-corresponding)
IEEE Access, 2023 (IF 3.9)
Flooding attack mitigator for in-vehicle CAN using fault confinement in CAN protocol
Sung Bum Park, Hyo Jin Jo*, and Dong Hoon Lee* (*co-corresponding)
Computers & Security, 2023 (IF 5.6)
Privacy-Preserving Identity Management System on Blockchain Using Zk-SNARK
Duc Anh Luong, and Jong Hwan Park
IEEE Access, 2023 (IF 3.9)
The vibration knows who you are! A further analysis on usable authentication for smartwatch users
Sunwoo Lee, Wonsuk Choi, and Dong Hoon Lee
Computers & Security, 2023 (IF 5.6)
BGCFI: Efficient Verification in Fine-Grained Control-Flow Integrity Based on Bipartite Graph
Moon Chan Park, and Dong Hoon Lee
IEEE Access, 2023 (IF 3.9)
Practical dynamic group signatures without knowledge extractors
Hyoseung Kim, Olivier Sanders, Michel Abdalla, and Jong Hwan Park
Des. Codes Cryptogr., 2023 (IF 1.6)
[2022]
TTIDS: Transmission-resuming Time-based Intrusion Detection System for Controller Area Network (CAN)
Se Young Lee, Hyojin Jo, Dong Hoon Lee, and Wonsuk Choi
IEEE Access, 2022 (IF 3.9)
Privacy-Preserving Blockchain-Based Healthcare System for IoT Devices Using zk-SNARK
Duc Anh Luong and Jong Hwan Park
IEEE Access, 2022 (IF 3.9)
An Efficient Open Vote Network for Multiple Candidates
Sangsoo Seol, Hyoseung Kim, and Jong Hwan Park
IEEE Access, 2022 (IF 3.9)
Parallelly Running and Privacy-Preserving k-Nearest Neighbor Classification in Outsourced Cloud Computing Environments
Jeongsu Park, and Dong Hoon Lee
Electronics, 2022 (IF 2.9)
Recovering Yaw Rate from Signal Injection Attack to Protect RV’s Direction
Hyunsu Cho, Sunwoo Lee, Wonsuk Choi, and Dong Hoon Lee
WISA 2022
From Attack to Identification: MEMS Sensor Fingerprinting using Acoustic Signals
Sunwoo Lee, and Dong Hoon Lee
IEEE Internet of Things Journal, 2022 (IF 10.6, 상위 3%이내)
Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory
Nayoung Ahn, and Dong Hoon Lee
IEEE Access, 2022 (IF 3.9)
Cyberattack Models for Ship Equipment Based on the MITRE ATT&CK Framework
Yonghyun Jo, Oongjae Choi, Jiwoon You, Youngkyun Cha, and Dong Hoon Lee
MDPI Sensors, 2022 (IF 3.9)
[2021]
Forensic Issues and Techniques to Improve Security in SSD With Flex Capacity Feature
Nayoung Ahn, and Dong Hoon Lee
IEEE Access, 2021 (IF 3.476)
Improving the security of direct anonymous attestation under host corruptions
Hyoseung Kim, Kwangsu Lee, Jong Hwan Park, and Dong Hoon Lee
International Journal of Information Security, 2021 (IF 2.427)
Anonymous IBE from PEKS: A Generic Construction
Hyun Sook Rhee, and Dong Hoon Lee
International Conference on Information Security Applications 2021
Prof-gen: Practical Study on System Call Whitelist Generation for Container Attack Surface Reduction
Sungjin Kim, Byung Joon Kim, and Dong Hoon Lee
IEEE International Conference on Cloud Computing (CLOUD) 2021 (BK+ 인정 IF 1)
Secure Privacy-Preserving V2V Communication in 5G-V2X Supporting Network Slicing
Hyeran Mun, Minhye Seo, and Dong Hoon Lee
IEEE Trans. Intell. Transp. Syst., 2021 (IF 9.551, 상위 15%이내)
Practical dynamic group signature with efficient concurrent joins and batch verifications
Hyoseung Kim, Youngkyung Lee, Michel Abdalla, and Jong Hwan Park
Journal of Information Security and Applications, 2021 (IF 4.960)
Usable User Authentication on a Smartwatch using Vibration
Sunwoo Lee, Wonsuk Choi, and Dong Hoon Lee
ACM CCS 2021 (BK+ 인정 IF 4)
A Survey of Attacks on Controller Area Networks and Corresponding Countermeasures
Hyo Jin Jo, and Wonsuk Choi
IEEE Trans. Intell. Transp. Syst., 2021 (IF 9.551, 상위 15%이내)
Revisiting NIZK-Based Technique for Chosen-Ciphertext Security: Security Analysis and Corrected Proofs
Youngkyung Lee, Dong Hoon Lee, and Jong Hwan Park
MDPI Applied Sciences, 2021 (IF 2.9)
An Enhanced Method for Reverse Engineering CAN Data Payload
Wonsuk Choi, Seyoung Lee, Kyungho Joo, Hyo Jin Jo, and Dong Hoon Lee
IEEE Trans. Veh. Technol., 2021 (IF 6.239)
Forensics and Anti-Forensics of a NAND Flash Memory: From a Copy-Back Program Perspective
Nayoung Ahn, and Dong Hoon Lee
IEEE Access, 2021 (IF 3.476)
Bypassing Anti-Analysis of Commercial Protector Methods Using DBI Tools
Youngbi Lee, Jaehyuk Suk, and Dong Hoon Lee
IEEE Access, 2021 (IF 3.476)