Publications – Int’l Conference

Home/Publications – Int’l Conference
Publications – Int’l Conference 2022-09-20T14:42:38+00:00

2022

  1. Unrestricted Black-box Adversarial Attack Using GAN with Limited Queries
    Dongbin Na, Sangwoo Ji, and Jong Kim
    Proc. the European Conference on Computer Vision (ECCV) 2022 Workshop on Adversarial Robustness in the Real World (AROW), Tel Aviv, Israel, October 23, 2022.
  2. The Ticket Price Matters in Sharding Blockchain
    Geunwoo Kim, Michael Franz, and Jong Kim
    Conference on Blockchain Technology (CBT-2022, ESORICS workshop), Copenhagen, Denmark, Sep. 29, 2022.
  3. Enhancing Scalability With Payment Requests Aggregation in Lightning Network
    Jungbeom Seo and  Jong Kim
    Proc. 5th IEEE International Conference on Blockchain (Blockchain), Espoo, Finland, August 22-25, 2022.

2021

  1. Detecting Audio Adversarial Examples with Logit Noising
    Namgyu Park, Sangwoo Ji, and  Jong Kim
    Proc. 37th Annual Computer Security Applications Conference (ACSAC),  December 6-10, 2021. (80/326=24.5%)
  2. Precise Correlation Extraction for IoT Fault Detection with Concurrent Activities
    Gyeongmin Lee, Bongjun Kim, Seungbin Song, Changsu Kim, Jong Kim, and Hanjun Kim
    Proc. the International Conference on Embedded Software (EMSOFT), October 11-15, 2021.

2020

  1. CAPTCHAs Are Still in Danger: An Efficient Scheme to Bypass Adversarial CAPTCHAs
    Dongbin Na, Namgyu Park, Sangwoo Ji and Jong Kim.
    Proc. 21th World Conference on Information Security Applications (WISA), Jeju Island, Korea, August 26-28, 2020.  (IITP support)

2019

  1. Low-Noise LLC Side-channel Attack with Perf 
    Youngjoo Ko, Sangwoo Ji and Jong Kim
    Proc. 20th World Conference on Information Security Applications (WISA), Jeju Island, Korea, August 21-24, 2019.  (NRF support)
  2. PinpointRowhammer: Suppressing Unwanted Bit Flips on Rowhammer Attacks 
    Sangwoo Ji, Youngjoo Ko, Saeyoung Oh, Jong Kim
    Proc. The 14th ACM ASIA Conference on Computer and Communications Security (AsiaCCS), July 7-12, 2019. (58/258=22.5%) (NRF support)
  3. Spinal Code: Automatic Code Extraction for Near-User Computation in Fogs 
    Bongjun Kim, Seonyeong Heo, Gyeongmin Lee, Seungbin Song, Jong Kim, and Hanjun Kim
    Proc. 28th International Conference on Compiler Construction (CC), February 16-17, 2019

2018

  1. SSDcheck: Timely and Accurate Prediction of Irregular Behaviors in Black-Box SSDs 
    Joonsung Kim, Pyeongsu Park, Jaehyung Ahn, Jihun Kim, Jong Kim, and Jangwoo Kim
    Proc. 51st IEEE/ACM International Symposium on Microarchitecture (Micro), October 20-24, 2018.
  2. Reliable Rowhammer Attack and Mitigation Based on Reverse Engineering Memory Address Mapping Algorithms 
    Saeyoung Oh and Jong Kim
    Proc. 19th World Conference on Information Security Applications (WISA), Jeju Island, Korea, August 23-25, 2018. (NRF support)
  3. Security Analysis of Mobile Web Browser Hardware Accessibility: Study with Ambient Light Sensors 
    Sanghak Lee, Sangwoo Ji, and Jong Kim
    Proc. 19th World Conference on Information Security Applications (WISA), Jeju Island, Korea, August 23-25, 2018. (NRF support)
  4. Detecting and Identifying Faulty IoT Devices in Smart Home with Context Extraction
    Jiwon Choi, Hayoung Jeoung, Jihun Kim, Youngjoo Ko, Wonup Jung, Hanjun Kim, and Jong Kim
    Proc. 48th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 25-28, 2018. (IoT support)

2017

  1. RT-IFTTT: Real-Time IoT Framework with Trigger Condition-aware Flexible Polling Intervals
    Seonyeong Heo, Seungbin Song, Jong Kim, and Hanjun Kim
    Proc. 38th IEEE Real-time Systems Symposium (RTSS), December 5-8, 2017. (IoT support)
  2. Rapid Prototyping of IoT Applications with Esperanto Compiler
    Gyeongmin Lee, Seonyeong Heo, Bongjun Kim, Jong Kim, and Hanjun Kim
    Proc. 28th International Symposium on Rapid System Prototyping (RSP), October 19-20, 2017. (IoT support)
  3. Holistic Tracking of Products on the Blockchain using NFC and Verified Users
    Vanesco A. J. Boehm, Jong Kim, and James Won Ki Hong
    Proc. 18th World Conference on Information Security Applications (WISA), Jeju Island, Korea, August 24-26, 2017.
  4. Integrated IoT Programming with Selective Abstraction
    Gyeongmin Lee, Seonyeong Heo, Bongjun Kim, Jong Kim, and Hanjun Kim
    Proc. 18th ACM SIGPLAN/SIGBAD Conference on Languages, Compilers, Tools, and Theory for Embedded Systems (LCTES), Barcelona, Spain, June 21-22, 2017. (13/51=25.5%) (IoT support)
  5. FACT: Functionality-centric Access Control System for IoT Programming Frameworks
    Sanghak Lee, Jiwon Choi, Jihun Kim, Beumjin Cho, Sangho Lee, Hanjun Kim, and Jong Kim
    Proc. 22nd ACM Symposium on Access Control Models and Technologies (SACMAT), Indianapolis, IN, USA, June 21-23, 2017. (14/48 = 29.2%) (IoT support)

2016

  1. Inferring Browser Activity and Status Through Remote Monitoring of Storage Usage
    Hyungsub Kim, Sangho Lee, and Jong Kim
    Proc. 32nd Annual Computer Security Applications Conference (ACSAC), Los Angeles, CA, USA, December 5-9, 2016. (48/210=22.8%) (IoT support)
  2. SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN
    Xinyu Liu, Beumjin Cho, and Jong Kim
    Proc. 17th International Workshop on Information Security Applications (WISA), Jeju Island, Korea, August 25-27, 2016. (IoT support)
  3. CloudSwap: A Cloud-Assisted Swap Mechanism for Mobile Devices
    Dongju Chae, Joonsung Kim, Youngsok Kim, Kyung-Ah Chang, Sang-Bum Suh, Hyogun Lee, and Jangwoo Kim
    Proc. 16th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing (CCGrid), Cartagena, Colombia, May 16-19, 2016.
  4. DTStorage: Dynamic Tape-based Storage for Cost-effective and Highly-available Streaming Service
    Jaewon Lee, Jaehyung Ahn, Choongul Park, and Jangwoo Kim
    Proc. 16th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing (CCGrid), Cartagena, Colombia, May 16-19, 2016.
  5. Efficient Footprint Caching for Tagless DRAM Caches
    Hakbeom Jang, Yongjun Lee, Jongwon Kim, Youngsok Kim, Jangwoo Kim, Jinkyu Jeong, and Jae W. Lee
    Proc. 22nd IEEE International Symposium on High Performance Computer Architecture (HPCA), Barcelona, Spain, March 12-16, 2016.

2015

  1. DCS: A Fast and Scalable Device-Centric Server Architecture
    Jaehyung Ahn[1], Dongup Kwon[1], Youngsok Kim, Mohammadamin Ajdari, Jaewon Lee, and Jangwoo Kim
    Proc. 48th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), Waikiki, HI, USA, December 5-9, 2015. (61/283=21.6%)
  2. CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks
    Jonghyuk Song, Sangho Lee, and Jong Kim
    Proc. 22nd ACM Conference on Computer and Communications Security (CCS), Denver, CO, USA, October 12-16, 2015. (128/646=19.8%) (CPS support)
  3. Publishing Graph Data with Subgraph Differential Privacy
    Binh Nguyen, Hoa Ngo, Jihun Kim, and Jong Kim
    Proc. 16th International Workshop on Information Security Applications (WISA), LNCS 9503, Jeju Island, Korea, August 20-22, 2015. (MSRA support)
  4. Location Privacy via Differential Private Perturbation of Cloaking Area
    Hoa Ngo and Jong Kim
    Proc. 28th IEEE Computer Security Foundations Symposium (CSF), Verona, Italy, July 13-17, 2015. (35/104=33.7%) (IoT support)
  5. A Fully Associative, Tagless DRAM Cache
    Yongjun Lee, Jongwon Kim, Hakbeom Jang, Hyunggyun Yang, Jangwoo Kim, Jinkyu Jeong, and Jae W. Lee
    Proc. 42nd International Symposium on Computer Architecture (ISCA), Portland, OR, USA, June 13-17, 2015. (58/305=19.0%)
  6. Identifying Cross-origin Resource Status Using Application Cache
    Sangho Lee, Hyungsub Kim, and Jong Kim
    Proc. 22nd Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 8-11, 2015. (50/300=16.7%) (CPS support)

2014

  1. RpStacks: Fast and Accurate Processor Design Space Exploration Using Representative Stall-Event Stacks,
    Jaewon Lee[1], Hanhwi Jang[1], and Jangwoo Kim
    Proc. 47th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), Cambridge, UK, December 13-17, 2014. (53/279=19.0%)
  2. Exploring and Mitigating Privacy Threats of HTML5 Geolocation API,
    Hyungsub Kim, Sangho Lee, and Jong Kim
    Proc. 30th Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, USA, December 8-12, 2014. (47/236=19.9%) (CPS support)
  3. Microbank: Architecting Through-Silicon Interposer-Based Main-Memory Systems,
    Young Hoon Son, Seongil O, Hyunggyun Yang, Daejin Jung, Jung Ho Ahn, Jangwoo Kim, John Kim, and Jae W. Lee
    Proc. 26th International Conference for High Performance Computing, Networking, Storage and Analysis (SC), New Orleans, LA, USA, November 16-21, 2014. (81/394=20.6%)
  4. Detection of Heap-spraying Attacks using String Trace Graph,
    Jaehyeok Song, Jonghyuk Song, and Jong Kim
    Proc. 15th International Workshop on Information Security Applications (WISA), Jeju Island, Korea, August 25-27, 2014. (CPS support)
  5. CMcloud: Cloud Platform for Cost-Effective Offloading of Mobile Applications,
    Dongju Chae, Jihun Kim, Jangwoo Kim, Jong Kim, Seungjun Yang, Yeongpil Cho, Yongin Kwon, and Yunheung Paek
    Proc. 14th IEEE/ACM International Sympsium on Cluster, Cloud and Grid Computing (CCGrid), Chicago, IL, USA, May 26-29, 2014 (54/283=19.1%) (CMEST and CITE support)
  6. Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities,
    Sangho Lee, Youngsok Kim, Jangwoo Kim, and Jong Kim
    Proc. 35th IEEE Symposium on Security and Privacy (Oakland), San Jose, CA, USA, May 18-21, 2014. (44/324=13.6%) (CMEST and NRF support)
  7. GPUdmm: A High-Performance and Memory-Oblivious GPU Architecture Using Dynamic Memory Management,
    Youngsok Kim, Jaewon Lee, Jae-Eon Jo, and Jangwoo Kim
    Proc. 20th IEEE International Symposium on High Performance Computer Architecture (HPCA), Orlando, FL, USA, February 15-19, 2014. (55/215=25.6%)

2013

  1. Building Fast, Dense, Low-Power Caches Using Erasure-Based Inline Multi-Bit ECC,
    Jangwoo Kim, Mark McCartney, Mudit Bhargava, Hyunggyun Yang, Ken Mai, and Babak Falsafi
    Proc. 19th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), Vancouver, British Columbia, Canada, December 2-4, 2013.
  2. Guide-Copy: Fast and Silent Migration of Virtual Machine for Datacenters,
    Jihun Kim, Dongju Chae, Jangwoo Kim, and Jong Kim
    Proc. 25th International Conference for High Performance Computing, Networking, Storage and Analysis (SC), Denver, Colorado, USA, November 17-22, 2013. (92/457=20.1%) (CMEST, CITE, and NRF support)
  3. Distributed Certificate Authority Scheme with Weighted Secret Sharing for Mobile Ad-hoc Networks,
    Young-min Park, Jong Kim, and Yoonho Kim
    Proc. 4th International Conference on Network of the Future (NoF), Pohang, Korea, October 23-25, 2013. (WCU support)
  4. Punobot: Mobile Botnet using Push Notification Service in Android,
    Hayoung Lee, Taeho Kang, Sangho Lee, Jong Kim, and Yoonho Kim
    Proc. 14th International Workshop on Information Security Applications (WISA), Jeju Island, Korea, August 19-21, 2013. (15/39=38.5%) (CMEST and WCU support)
  5. LINQits: Big Data on Little Clients,
    Eric Chung, John Davis, and Jaewon Lee
    Proc. 40th International Symposium on Computer Architecture (ISCA), Tel-Aviv, Israel, June 23-27, 2013. (56/288=19.4%)
  6. I Know the Shortened URLs You Clicked on Twitter: Inference Attack using Public Click Analytics and Twitter Metadata,
    Jonghyuk Song, Sangho Lee, and Jong Kim
    Proc. 22nd International World Wide Web Conference (WWW), Rio de Janeiro, Brazil, May 13-17, 2013. (125/831=15.0%) (CMEST and WCU support)

2012

  1. LT-OLSR: Attack-Tolerant OLSR against Link Spoofing,
    Yuseok Jeon, Tae-Hyung Kim, Yuna Kim, and Jong Kim
    Proc. 37th IEEE Conference on Local Computer Networks (LCN), Clearwater, Florida, USA, October 22-25, 2012. (CMEST and WCU support) (short paper)
  2. WarningBird: Detecting Suspicious URLs in Twitter Stream,
    Sangho Lee and Jong Kim
    Proc. 19th Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, February 5-8, 2012. (46/258=17.8%) (CMEST and WCU support)

2011

  1. Spam Filtering in Twitter using Sender-Receiver Relationship
    Jonghyuk Song, Sangho Lee, and Jong Kim
    RAID 2011, Menlo Park, California, USA, September 20-21, 2011. (20/87=23%) (CMEST and WCU support)
  2. Order-Preserving Encryption for Non-Uniformly Distributed Plaintexts,
    Dae Hyun Yum, Duk Soo Kim, Jin Seok Kim, Pil Joong Lee, and Sung Je Hong
    The 12th International Workshop on Information Security Applications (WISA), LNCS 7115, pp.84-97, Jeju Island, Korea, August 22-24, 2011.
  3. Protecting Location Privacy using Location Semantics,
    Byoungyoung Lee, Jinoh Oh, Hwanjo Yu, and Jong Kim
    Proc. of the 17th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), San Diego, California, USA, August 21-24, 2011. (133/755=17.6%) (WCU support)
  4. Detecting Suspicious URLs in Twitter Stream,
    Sangho Lee and Jong Kim
    20th USENIX Security Symposium, San Francisco, California, USA, August 8-12, 2011. (CMEST and WCU support) (poster)
  5. Self-Detection of Packet Misrouting Nodes for MANET with AODV,
    Hay-Rim Lee, Sangho Lee, Jihun Kim, Sung Je Hong, and Jong Kim
    Proc. of the 6th International Symposium on Embedded Technology (ISET), Jeju, Korea, May 20-21, 2011. (CMEST and WCU support)
  6. A Batch Rekeying Time Decision Algorithm for IPTV Systems,
    Sangho Lee and Jong Kim
    Proc. of the 8th IEEE Consumer Communications and Networking Conference (CCNC), pp. 901-905, Las Vegas, Nevada, USA, January 9-12, 2011. (95/305=31.1%) (CMEST and WCU support)

2010

  1. A Secure and Mutual-Profitable DRM Interoperability Scheme,
    Sangho Lee, Heejin Park, and Jong Kim
    Proc. of the IEEE Symposium on Computers and Communications (ISCC 2010), pp. 75-80, Riccione, Italy, June 22-25, 2010. (130/323=40.2%) (CMEST support)
  2. A Lifetime-Guaranteed Routing Scheme in Wireless Sensor Networks,
    Jae Keun Park, Sung Je Hong, Kyong Hoon Kim, and Wan Yeon Lee
    International Conference on Information and Communication Technologies (ICICT 2010), Tokyo, Japan, May 26-28, 2010.
  3. binOb+: A Framework for Potent and Stealthy Binary Obfuscation,
    Byoungyoung Lee, Yuna Kim, and Jong Kim
    Proc. of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), pp. 271-281, Beijing, China, April 13-16, 2010. (18%) (CMEST and WCU support)

2009

  1. Exclusion of Forged Files from Multi-Source Downloadable P2P Systems,
    Yuna Kim, Jong Kim, Junghei You, and Heejae Park
    Proc. of the IEEE 23rd International Conference on Advanced Information Networking and Applications (AINA’09), pp. 608-615, Bradford, UK, May 26-29, 2009. (BK21-SCIE) (SCOPUS) (33%) (CMEST support)
  2. Energy-efficient Run-time Detection of Malware-infected Executables and Dynamic Libraries on Mobile Devices,
    Jong-seok Lee, Tae-Hyung Kim, and Jong Kim
    Proc. of the 1st International Workshop on Software Technologies for Future Dependable Distributed Systems (STFSSD’09), pp. 143-149, Tokyo, Japan, Mar. 17-18, 2009. (CMEST support)

2008

  1. Reducing IPTV Channel Zapping Time Based on Viewer’s Surfing Behavior and Preference,
    Yuna Kim, Jae Keun Park, Hong Jun Choi, Sangho Lee, Heejin Park, Jong Kim, Zino Lee, and Kwangil Ko
    Proc. of 2008 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB’08), pp.1-6, Las Vegas, USA, Mar. 31-Apr. 2, 2008. (SCOPUS) (52/140=37.1%) (Contron Corp. and 2008-CMEST support)
  2. Annulling SYN Flooding Attacks with WhiteList,
    Tae-Hyung Kim, Young-Sik Choi, Jong Kim, and Sung Je Hong
    Proc. of the IEEE 22nd International Conference on Advanced Information Networking and Applications Workshops (WAINA’08), pp. 371-376, Okinawa, Japan, Mar. 25-28, 2008. (SCOPUS) (2007-CMEST and HNRC support)
  3. Allowing User-Specified Failure Handling in Web Services Composition,
    Yuna Kim and Jong Kim
    Proc. of the ACM Second International Conference on Ubiquitous Information Management and Communication (ICUIMC’08), pp. 452-458, Suwon, Korea, Jan. 31-Feb. 1, 2008. (2008-CMEST support) (invited)

2007

  1. Secure and Efficient Offline RFID Authentication for Anti-counterfeiting,
    Hong Jun Choi, Sung Je Hong, and Jong Kim
    Proc. of the 2nd International Conference on Ubiquitous Information Technologies & Applications (ICUT 2nd), Bali, Indonesia, Dec. 20-22, 2007. (118/394=29.9%) (2007-CMEST and HNRC support)
  2. SpoofSifter: Scheme to Prevent Phishing by Detecting User’s Posting to Spoofed Website,
    Yuna Kim, Hun Seok Choi, and Jong Kim
    Proceedings of the 2nd Joint Workshop on Information Security (JWIS 2007), Tokyo, Japan, August 6-7, 2007. (No ack) (b)Best paper(/b)
  3. Profile-based Web Application Security System with Positive Model Selection,
    Tae Hyung Kim, Kyungtae Kim, Jong Kim, and Sung Je Hong
    Proceedings of the 2nd Joint Workshop on Information Security (JWIS 2007), Tokyo, Japan, August 6-7, 2007. (HNRC support)
  4. An Adaptive DVS Checkpointing Scheme for Fixed-Priority Tasks with Reliability Constraints in Dependable Real-Time Embedded Systems,
    Kyong Hoon Kim and Jong Kim
    Proc. of The 2007 International Conference on Embedded Software and System (ICESS-07), Daegu, Korea, May 14-16, 2007. – LNCS (SCOPUS) (77/387=19.9%)
  5. Power Aware Scheduling of Bag-of-Tasks Applications with Deadline Constraints on DVS-enabled Clusters,
    Kyong Hoon Kim, Rajkumar Buyya, and Jong Kim
    Proceedings of the 7th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), Rio de Janeiro, Brazil, May 14-17, pp. 541-548, 2007. (SCOPUS) (No Ack) (72/218=33%)

2006

  1. Return Address Randomization Scheme for Annulling Data-injection Buffer Overflow Attack,
    Deok Jin Kim, Tae Hyung Kim, Jong Kim, and Sung Je Hong
    Proceedings of 2th SKLOIS Conference on Information Security and Cryptology, Beijing, China, Nov. 29 – Dec. 1, 2006. – LNCS (SCOPUS)
  2. PolyI-D: Polymorphic worm detection based on instruction distribution,
    Ki hun Lee, Yuna Kim, Sung Je Hong, and Jong Kim
    Proceedings of 7th Workshop on Information Security Applications (WISA’06), Jeju Island, August 28-30, 2006. – LNCS (SCOPUS)
  3. Env-RBAC: Dynamic Access Control for Ubiquitous Environment,
    IlShik Shin, Yuna Kim, Sung Je Hong, and Jong Kim
    Pre-proceedings of 7th Workshop on Information Security Applications (WISA’06), Jeju Island, August 28-30, 2006 (short abstract).
  4. An Energy-Efficient FEC Scheme for Weakly Hard Real-Time Communications in Wireless Networks,
    Kyong Hoon Kim and Jong Kim
    Proceedings of 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, Sydney, Australia, August 16-18, 2006. (SCOPUS) (CMEST support)
  5. Dual-mode r-reliable Task Model for Flexible Scheduling in Reliable Real-time Systems,
    Kyong Hoon Kim, Jong Kim, and Sung Je Hong
    Proceedings of the 2006 IFIP International Conference on Embedded and Ubiquitous Computing (EUC ’06), Seoul, Korea, August 1-4, 2006. – LNCS (SCOPUS)
  6. A Quaternary Full Adder Using Multiple Thresholds,
    Sung Hyun Jung and Sung Je Hong
    International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC ’06), July 10-13, 2006.
  7. A New Quaternary Full Adder Using Multiple Thresholds,
    Sung Hyun Jung and Sung Je Hong
    International Conference on Electronics, Information, and Communication (ICEIC ’06), June 27-28, 2006.
  8. Imprecise Computation Grid Application Model for Flexible Market-based Resource Allocation,
    Kyong Hoon Kim, Rajkumar Buyya, and Jong Kim
    Proceedings of the 6th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), Singapore, May 16-19, 2006. (SCOPUS) (No Ack) (59/237=24.9%)
  9. Mitigating the Impact of Liars by Reflecting Peer’s Credibility on P2P File Reputation Systems
    So Young Lee, O-Hoon Kwon, Jong Kim, and Sung Je Hong
    5th International Workshop on Agents and Peer-to-Peer Computing (AP2PC), May 9-12, 2006 – To be published in LNCS (SCOPUS) (CMEST-ITRC)
  10. The Exclusion of Malicious Routing Peers in Structured P2P Systems
    Bong-Soo Roh, O-Hoon Kwon, Sung Je Hong, and Jong Kim
    5th International Workshop on Agents and Peer-to-Peer Computing (AP2PC), May 9-12, 2006 – To be published in LNCS (SCOPUS) (HNRC-ITRC)

2005

  1. A Low Power Quaternary Interconnection with Synchronization,
    Sung Hyun Jung and Sung Je Hong
    International System-On-Chip Conference (ISOCC 05′), Oct, 2005. pp.500~503
  2. Detecting the Delay Faults of I/O Block using the Low- Speed Tester
    Hyun Chul Kang, Joon Young Park, Sung Je Hong, Woo Seop Kim, Sung Bum Cho, and Byung Se So
    International Technical Conference on Circuit/Systems, Computers and Communications(ITC-CSCC), July 2005.
  3. A Trust Management Scheme in Structured P2P Systems
    So Young Lee, O-Hoon Kwon, Jong Kim, and Sung Je Hong
    4th International Workshop on Agents and Peer-to-Peer Computing (AP2PC), July 2005 (HNRC-ITRC)
  4. A Reputation Management System in Structured P2P Networks
    So Young Lee, O-Hoon Kwon, Jong Kim, and Sung Je Hong
    Proceedings of the 1st International Workshop on Collaborative Peer-to-Peer Information Systems, June, 2005. pp.362~367 (Brain Korea 21)
  5. Energy-saving Design Technique Achieved by Latched Pass-transistor Adiabatic Logic,
    Junyoung Park, Sung Je Hong, and Jong Kim
    IEEE International Symposium on Circuits and Systems (ISCAS 05′), Kobe in Japan, May, 2005. (Accepted)
  6. Latched Pass-transistor Adiabatic Logic,
    Junyoung Park and Sung Je Hong
    International System-On-Chip Conference (ISOCC 05′), Oct, 2005. pp.156~159
  7. Parallely Testable Design for Detection of Neighborhood Pattern Sensitive Faults in High Density DRAMs,
    Ju Yeob Kim, Sung Je Hong, and Jong Kim
    IEEE International Symposium on Circuits and Systems (ISCAS’05), Kobe in Japan, May, 2005.
  8. Mobile Multicast Routing Protocol Using Prediction of Dwelling Time of A Mobile Host,
    Jae Keun Park, Sung Je Hong, and Jong Kim
    4-th International Conference on Networking, Reunion Island, April, 2005.
  9. Adaptive Location Management Scheme for Mobile IP
    Ha Won Kim, S. J. Hong, and J. Kim
    IEEE PerCom Workshop on Pervasive Wireless Networking(PWN05), Kauai Island, Hawaii, March 2005.
  10. HackSim : An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities,
    O-Hoon Kwon, Seung Min Lee, Heejo Lee, and Jong Kim
    The International Conference on Information Networking (ICOIN) 2005, Jeju Korea, February, 2005.
  11. Ticket-based Grid Services Architecture for Dynamic Virtual Organizations,
    Byung Joon Kim, Kyong Hoon Kim, Sung Je Hong, and Jong Kim
    European Grid Conference (EGC2005), Amsterdam, The Netherlands, February 2005.

2004

  1. Ticket-Based Fine-Grained Authorization Service in the Dynamic VO Environment,
    Byung Joon Kim, S. J. Hong, J. Kim
    ACM Workshop on Secure Web Services, Fairfax VA, USA, October 2004.
  2. Modifiable Digital Content Protection in P2P
    H. J. Park, J. Kim
    Information Security Conference 2004.
  3. Extending Adaptive ECC Scheme for Window-Constrained Real-Time Communications in Wireless Networks,
    K. H. Kim, J. Kim, and S. J. Hong
    The 4th IASTED Intl. Multi-Conference on Wireless and Optical Communications, Banff, Canada, July 2004.
  4. Best-effort Scheduling (m, k)-firm Real-time Tasks based on the (m, k)-firm Constraint Meeting Probability,
    K. H. Kim, J. Kim, and S. J. Hong
    The 2004 Intl. Conf. on Embedded Systems and Applications, Las Vegas, USA, June 2004.
  5. Detection for Buffer Overflow Software Security Vulnerability using Function Call Sequence Graph Analysis
    Won-ho Kim, J. Kim, and S. J. Hong
    Applied Cryptography and Network Security, June, 2004.
  6. Visualization of Intrusion Detection Alerts with Alert Correlation
    Byung-Gil Min and J. Kim, and S. J. Hong
    Applied Cryptography and Network Security, June, 2004.

2003

  1. PCMHoDC: A Scheme to Protect Copyright and Modification History of Digital Contents
    H. J. Park, J. Kim
    18th IFIP International Information Security Conference 26-28, pp. 85-96, May 2003.
  2. A Tree-based Group Diffie-Hellman Key Agreement Protocol under Heterogeneous Computing Environment
    Joon-Ho Han, S. J. Hong, and J. Kim
    The 4th International Workshop on Information Security Applications (WISA 2003) Vol. 4, pp. 565-574, Aug, 2003.
  3. Web Prefetching Using Displayed-Based Prediction
    Yuna Kim, Jong Kim
    IEEE/WIC International Conference on Web Intelligence (WI’03), pp 486-489 October 2003.
  4. Workflow based Authorization Service in Grid
    Seung-Hyun Kim, Jong Kim, S. J. Hong, and Sangwan Kim
    4th International workshop on Grid Computing (Grid 2003), pp 94-100, Nov 2003.

2002

  1. A Multiple Gateway Mobile IP Hierarchy Supporting Load Sharing and Fault-Tolerance
    G. J. Lee, S. J. Hong, and J. Kim
    IASTED International Conference on Communications and Computer Networks, pp. 480-485, Nov, 2002.

2001

  1. Performance Evaluationof Dependable Real-Time Communication with Elastic QOS
    Jong Kim, and K. G. Shin
    International Conference on Dependable Systems and Networks, pp. 295-303, IEEE Computer Society, July 2001.
  2. A Secure Checkpointing System
    H. C. Nam, J. Kim, S. J. Hong, and S. Lee
    2001 Pacific Rim International Symposium on Dependable Computing (PRDC 2001), pp 49-60, IEEE Computer, Dec 2001.

— 2000

  1. Task Scheduling using a Block Dependency DAG for Block-Oriented Sparse Cholesky Gactorization
    H. Lee, J. Kim, S. J. Hong, and S. Lee
    Proceedings of the 2000 ACM Symposium on Applied Computing, Vol.2, pp.641-648 Mar. 2000.
  2. A Dynamic Load Balancing Algorithm on Switch-Based Networks
    W. Y. Lee, S. J. Hong, J. Kim, and S. Lee
    Proc. of the 13th International Conference on Parallel and Distributed Computing Systems, Vol.1, pp.302-307 Aug 2000.
  3. A Reliable Probabilistic Checkpointing
    H. Nam, J. Kim, S. J. Hong, and S. Lee
    IEEE Pacific-Rim International Symposium on Dependable Computing, , pp.153–160 (1999.12).
  4. A Real-Time Communication Method for Wormhole Switching Networks
    B. J. Kim, J. Kim, S. J. Hong, and S. G. Lee
    International Conference on Parallel Processing (ICPP-27), , pp.527–534 Minneapolis, USA (1998.08).
  5. A New Multicast Tree Rearrangement Algorithm
    Y. H. Lee, J. Kim, and S. J. Hong
    IASTED International Conference on Parallel and Distributed Computer and Networks, , pp.142-145 Brisbane, Australia (1998.12).
  6. Probabilistic Checkpointing
    H. C. Nam, J. Kim, S. J. Hong, S. G. Lee
    Fault-Tolerant Computing Symposium, Vol.FTCS-27, pp.48-57 Seattle, USA (1997.06).
  7. Real-Time Job Scheduling in Hypercube Systems
    O. H. Kwon, J. Kim, S. J. Hong, S. G. Lee
    International Conference on Parallel Processing, Vol.ICPP-26, pp.166-169 Chicago, USA (1997.08).
  8. Evaluation of Matrix Chain Products on Parallel Systems
    H. J. Lee, J. Kim, S. J. Hong, S. G. Lee
    Parallel and Distributed Computer Systems, Vol.PDCS’97, pp.124-129 Washington, USA (1997.10).
  9. Synchronous Load Balancing in Hypercube Multicomputers
    J. W. Seo, S. G. Lee, and J. Kim
    International Conference on Parallel and Distributed Systems, Vol.ICPAD’97, pp.414-421 Seoul, Korea (1997.12).
  10. Fault-Tolerant Real-Time Scheduling using Passive Replicas
    G. D. Ahn, J. Kim, S. J. Hong
    1997 Pacific-Rim Fault-Tolerant Systems, Vol.PRFTS’97, pp.98-103 Taipei, Taiwan (1997.12).
  11. Dynamic Load Distribution on a Mesh with a Single Bus
    W. Y. Lee, S. J. Hong, J. Kim
    International Conference on Parallel and Distributed Systems, Vol.ICPAD’97, pp.368-375 Seoul, Korea (1997.12).
  12. A Performance Modeling Technique for Mesh-Connected Multicomputers
    B.S. Yoo, C.R. Das, J. Kim
    International Conference on Parallel and Distributed Systems, Vol.ICPAD’97, pp.408-413 Seoul, Korea (1997.12).
  13. A Task-based Dependability Model for k-ary n-cubes,
    A. Vaidya, B. S. Yoo, C. R. Das, and J. Kim
    Intl. Conf. on Parallel Processing (ICPP), Vol.I, pp. Chicago, U.S.A (1996.08).
  14. The Witch Hunt
    H. Lee, J. Milburn and J. Kim
    The Unix Network Security Conference, , pp.11.1-11.12 Washington, U.S.A (1996.11).
  15. Process Allocation for Matrix Products
    H. Lee, J. Kim, and S. J. Hong
    Parallel Computing Workshop, , pp.se1-se7 Tokyo, Japan (1996.11).
  16. Processor Allocation for Load Distribution in Fault-Tolerant Multicomputers,
    J. Kim, H. Lee and S. G. Lee,
    Intl. Symp. on Fault-Tolerant Computing (FTCS),, , pp.174-183, Pasadena, U.S.A. (1995.06).
  17. Multi-level Logic Synthesis Based on the Modified Map-Factoring Method,
    S. J. Hong, H. J. Choi, and J. Kim
    Joint Technical Conf. on Circuits, Computers, and Communications,, , pp.471-474, Kawasaki, Japan (1995.07).
  18. DTN: A New Partitionable Torus Topology,
    S.H. Chae, J. Kim, D.S. Kim, S.J. Hong, and S. G. Lee,
    Intl. Conf. on Parallel Processing (ICPP),, Oconomowoc, U.S.A. (1995.08).
  19. Adaptive Virtual Cut-through as an Alternate to Wormhole Routing,
    H. S. Lee, H. W. Kim, J. Kim, and S. G. Lee,
    Intl. Conf. on Parallel Processing (ICPP),, Oconomowoc, U.S.A. (1995.08).
  20. Performance Comparison of Real-Time Architecture using Simulation
    H. Lee, K. Toda, J. Kim, K. Nishida, E. Takahasi, and Y. Yamaguchi
    Intl. Workshop on Real-Time Computing Systems and Applications, Tokyo, Japan (1995.10).
  21. Fault-Tolerant Process Allocation with Load Balancing
    H. Lee, J. Kim, S. J. Hong, and B. Yae
    Pacific Rim Intl. Symp. on Fault-Tolerant Systems, Irvine, U.S.A. (1995.12).
  22. Path Selection for Communicating Tasks in a Wormhole-routed Multicomputer,
    S. G. Lee and J. Kim
    Internatonal Conf. on Parallel Processing,, Vol.III,, pp.172-175, (1994.08).
  23. Fast SIMD algorithms on a Mesh with Wormhole Routing,
    D. S. Kim, S. H. Kim, and J. Kim
    Transputer Applications and Systems ’94,, , pp.247-258, Seoul, Korea (1994.10).
  24. A Hybrid Reconfiguration Scheme for Real-Time Fault-Tolerant Systems,
    J. Kim, H. Lee and K. G. Shin,
    Intl. Workshop on Real-Time Computing Systems and Applications,, , pp.111-115, Seoul, Korea (1994.12).
  25. A 15-Valued Fast Test Generation for Combinational Circuits,
    S. J. Hong
    The 2nd Asian Test Symposium, Beijing, China, pp.113-118, Nov. 1993. (1993)
  26. A Lazy Scheduling for Improving Hypercube Performance,
    J P. Mohapatra, C. Yu, and C. R. Das,
    International Conf. on Parallel Processing,, , pp.I-110-I-1 Chicago, U.S.A. (1993.08).
  27. Algebraic Method for the Minimization of Switching Functions
    S. J. Hong
    ICVC, Seoul, Korea (1989.10).
  28. An Easily Testable Parallel Multiplier
    S. J. Hong
    Proc. 18th Annual Symp. on Fault-Tolerant Computing(FTCS-18), Tokyo, Japan, (1988).
  29. A DFT Technique for an Unsigned Multiplier
    S. J. Hong
    11th Annual IEEE Workshop on Design for testability, Vail, Colorado, (1988).
  30. Computer Aided Design of VLSI
    S. J. Hong
    Autumn Workshop ’86, Seoul, Korea, (1986).
  31. A CMOS PLA Complier
    S. J. Hong
    GOSAM Meeting, Syracuse, NY, (1985).
  32. A Structured Approach to Test Vector Generation
    S. J. Hong
    Proc. IEEE Int. Conf. on Computer Design, , pp.757-762 (1984).

[1] The co-first authorship