Publications
LINKS (full publication lists)
selected PUBLICATIONS (2024)
Park, Y., Lee, H., Jung, J., Koo, H., & Kim, H. K. (2023, October). BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation. In 2024 IEEE Symposium on Security and Privacy (SP) (pp. 74-74). IEEE Computer Society.
selected PUBLICATIONS (2023)
Jeong, S., Ryu, M., Kang, H., & Kim, H. K. (2023, April). Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux. In Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy (pp. 201-212).
Jeong, S., Kim, H. K., Han, M. L., & Kwak, B. I. (2023). AERO: Automotive Ethernet Real-Time Observer for Anomaly Detection in In-Vehicle Networks. IEEE Transactions on Industrial Informatics.
selected PUBLICATIONS (2022)
Jang, J., Woo, J. Y., & Kim, H. K. (2022). Action2Score: An Embedding Approach to Score Player Action. Proceedings of the ACM on Human-Computer Interaction, 6 (CHI PLAY), 1-23.
Kim, K. H., Kwak, B. I., Han, M. L., & Kim, H. K. (2022). Intrusion Detection and Identification using Tree-Based Machine Learning Algorithms on DCS Network in the Oil Refinery. IEEE Transactions on Power Systems.
Park, K. H., Song, H. M., Do Yoo, J., Hong, S. Y., Cho, B., Kim, K., & Kim, H. K. (2022). Unsupervised malicious domain detection with less labeling effort. Computers & Security, 116, 102662.
Han, M. L., Kwak, B. I., & Kim, H. K. (2022). TOW-IDS: Intrusion Detection System Based on Three Overlapped Wavelets for Automotive Ethernet. IEEE Transactions on Information Forensics and Security, 18, 411-422.
selected PUBLICATIONS (2021)
Jeon, S., & Kim, H. K. (2021). TZMon: Improving mobile game security with ARM trustzone. Computers & Security, 109, 102391.
Park, K. H., Park, E., & Kim, H. K. (2021, September). Stay As You Were!: Unsupervised Driver Behavior Profiling through Discovering Normality on Smartphone Sensor Measurements. In 2021 IEEE International Intelligent Transportation Systems Conference (ITSC) (pp. 278-284). IEEE.
Jeon, S., & Kim, H. K. (2021). AutoVAS: An automated vulnerability analysis system with a deep learning approach. Computers & Security, 106, 102308.
Kim, K., Kim, J. S., Jeong, S., Park, J. H., & Kim, H. K. (2021). Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers & Security, 102150.
Noh, Y., Jeong, S., & Kim, H. K. (2021). Trading Behind-the-Scene: Analysis of Online Gold Farming Network in Auction House System. IEEE Transactions on Games.
Han, M. L., Kwak, B. I., & Kim, H. K. (2021). Event-Triggered Interval-Based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network. IEEE Transactions on Information Forensics and Security, 16, 2941-2956.
Jeong, S., Jeon, B., Chung, B., & Kim, H. K. (2021). Convolutional neural network-based intrusion detection system for AVTP streams in automotive Ethernet-based networks. Vehicular Communications, 29, 100338.
Song, H. M., & Kim, H. K. (2021). Self-Supervised Anomaly Detection for In-Vehicle Network Using Noised Pseudo Normal Data. IEEE Transactions on Vehicular Technology, 70(2), 1098-1108.
Kwak, B. I., Han, M. L., & Kim, H. K. Cosine similarity based anomaly detection methodology for the CAN bus. Expert Systems with Applications, 166, 114066.
selected PUBLICATIONS (2020)
Kwak, B. I., Han, M. L., & Kim, H. K. (2020). Driver Identification Based on Wavelet Transform Using Driving Patterns. IEEE Transactions on Industrial Informatics, 17(4), 2400-2410.
selected PUBLICATIONS (2019)
selected PUBLICATIONS (2018)
selected PUBLICATIONS (2017)
Sang-Wook Seo et al. "C-TAS Ecosystem for Cyber Threat Analysis & Sharing in Korea", OASIS Borderless Cyber and FIRST Technical Symposium 2017
Hyungseok Kim et al. "Firewall Ruleset Visualization Analysis Tool based on Segmentation.", IEEE VizSec (2017)
selected PUBLICATIONS (2016)
selected PUBLICATIONS (2016)
Han, Mee Lan, et al. "WHAP: Web-Hacking Profiling Using Case-Based Reasoning." IEEE CNS 2016 (2016)
Song, H. M, H.R. Kim and H. K. Kim, "Intrusion Detection System Based on the Analysis of Time Intervals of CAN Messages for In-Vehicle Network", International Conference on Information Networking ICOIN (2016)