Publications
International
- Inwoo Ro, Boojoong Kang, Choonghyun Seo, Eul Gyu Im, “Detection Method for Randomly Generated User IDs: Lift the Curse of Dimensionality”, IEEE Access, 10., 86020-86028, 2022
- Seong Il Bae, Gyu Bin Lee, Eul Gyu Im, “Ransomware detection using machine learning algorithms”, Concurrency and Computation: Practice and Experience, 32.18, e5422, 2020
- ByeongHo Jung, Seong Il Bae, Chang Choi, Eul Gyu Im, “Packer identification method based on byte sequences”, Concurrency and Computation: Practice and Experience, 32.8, e5082, 2020
- Soo Han Kim, Jong Hyun Kim, Eul Gyu Im, “Malware Family Classification Model using Xception Network”, 2020
- Jun Young Chang, Eul Gyu Im, “Data Poisoning Attack on Random Forest Classification Model”, 2020
- Seong Il Bae, Soo Han Kim, Eul Gyu Im, “Automatic hybrid analysis technique to improve botnet code coverage using fake server”, Proceedings of the Conference on Research in Adaptive and Convergent Systems, ., 276-282, 2019
- Jong Youn Lee, Jun Young Chang, Eul Gyu Im, “DGA-based malware detection using DNS traffic analysis”, Proceedings of the Conference on Research in Adaptive and Convergent Systems, ., 283-288, 2019
- TaeGuen Kim, Yeo Reum Lee, BooJoong Kang, Eul Gyu Im, “Binary executable file similarity calculation using function matching”, The Journal of Supercomputing, 75.2, 607-622, 2019
- Inwoo Ro, Joong Soo Han, Eul Gyu Im, “Detection Method for Distributed Web-Crawlers: A Long-Tail Threshold Model”, Security and Communication Networks, 2018., , 2018
- Byungho Jung, Taeguen Kim, Eul Gyu Im, “Malware classification using byte sequence information”, Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, ., 143-148, 2018
- TaeGuen Kim, BooJoong Kang, Mina Rho, Sakir Sezer, Eul Gyu Im, “A multimodal deep learning method for android malware detection using various features”, IEEE Transactions on Information Forensics and Security, 14.3, 773-788, 2018
- TaeGuen Kim, BooJoong Kang, Eul Gyu Im, “Runtime detection framework for android malware”, Mobile Information Systems, 2018., , 2018
- Iltaek Kwon, Eul Gyu Im, “Extracting the representative API call patterns of malware families using recurrent neural network”, Proceedings of the International Conference on Research in Adaptive and Convergent Systems, ., 202-207, 2017
- Byeongho Kang, TaeGuen Kim, Junhyoung Kim, Eul Gyu Im, “A Dynamic Taint Analysis Method of Control-Dependent Data 1”, International Information Institute (Tokyo). Information, 19.11A, 5245, 2016
- Tae Kyong Lee, Tae Guen Kim, Eul Gyu Im, “User authentication method using shaking actions in mobile devices”, Proceedings of the International Conference on Research in Adaptive and Convergent Systems, ., 142-147, 2016
- JunGyu Park, TaeGuen Kim, Eul Gyu Im, “Touch gesture data based authentication method for smartphone users”, Proceedings of the International Conference on Research in Adaptive and Convergent Systems, ., 136-141, 2016
- Qing Li, Le Wang, TaeGuen Kim, Eul Gyu Im, “Mobile-based continuous user authentication system for cloud security”,2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC) , ., 176-179, 2016
- In Kyeom Cho, Tae Guen Kim, Yu Jin Shim, Minsoo Ryu, Eul Gyu Im, “Malware analysis and classification using sequence alignments”, Intelligent Automation & Soft Computing, 22.3, 371-377, 2016
- Dong-Kyu Chae, Jiwoon Ha, Sang-Wook Kim, BooJoong Kang, Eul Gyu Im, SunJu Park, “Credible, resilient, and scalable detection of software plagiarism using authority histograms”, Knowledge-Based Systems, 95., 114-124, 2016
- Yu Jin Shim, TaeGuen Kim, Eul Gyu Im, “A Study on Similarity Calculation Method for API Invocation Sequences”,International Conference on Rough Sets and Knowledge Technology. Springer , ., 492-501, 2015
- In Kyeom Cho, Eul Gyu Im, “Extracting representative API patterns of malware families using multiple sequence alignments”, Proceedings of the 2015 Conference on research in adaptive and convergent systems, ., 308-313, 2015
- Junhyoung Kim, Tae Guen Kim, Eul Gyu Im, “Structural information based malicious app similarity calculation and clustering”, Proceedings of the 2015 Conference on research in adaptive and convergent systems, ., 314-318, 2015
- Kyoung Soo Han, Jae Hyun Lim, Boojoong Kang, Eul Gyu Im, “Malware analysis using visualized images and entropy graphs”, International Journal of Information Security, 14.1, 1-14, 2015
- BooJoong Kang, Kyoung Soo Han, Byeongho Kang, Eul Gyu Im, “Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering”, Digital Investigation, 11.4, 323-335, 2014
- In Kyeom Cho, TaeGuen Kim, Yu Jin Shim, Haeryong Park, Bomin Choi, Eul Gyu Im, “Malware Similarity Analysis using API Sequence Alignments.”, J. Internet Serv. Inf. Secur., 4.4, 103-114, 2014
- Byeongho Kang, TaeGuen Kim, BooJoong Kang, Eul Gyu Im, Minsoo Ryu, “TASEL: Dynamic taint analysis with selective control dependency”, Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, ., 272-277, 2014
- TaeGuen Kim, Jung Bin Park, In Gyeom Cho, Boojoong Kang, Eul Gyu Im, SooYong Kang, “Similarity calculation method for user-define functions to detect malware variants”, Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, ., 236-241, 2014
- Junhyoung Kim, TaeGuen Kim, Eul Gyu Im, “Survey of dynamic taint analysis”,2014 4th IEEE International Conference on Network Infrastructure and Digital Content , ., 269-272, 2014
- KyoungSoo Han, BooJoong Kang, Eul Gyu Im, “Malware analysis using visualized image matrices”, The Scientific World Journal, 2014., , 2014
- Colin Burgess, Sakir Sezer, Kieran McLaughlin, Eul Gyu Im, “Feature set reduction for the detection of packed executables”,25th IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014) , ., 263-268, 2014
- Byeongho Kang, Eul Gyu Im, “Analysis of binary code topology for dynamic analysis”, Proceedings of the 29th Annual ACM Symposium on Applied Computing, ., 1731-1732, 2014
- Yi Yang, Kieran McLaughlin, Sakir Sezer, Tim Littler, Eul Gyu Im, Bernardi Pranggono, HF Wang, “Multiattribute SCADA-specific intrusion detection system for power networks”, IEEE Transactions on Power Delivery, 29.3, 1092-1102, 2014
- Philip Okane, Sakir Sezer, Kieran McLaughlin, Eul Gyu Im, “Malware detection: program run length against detection rate”, IET software, 8.1, 42-51, 2014
- Dong-Kyu Chae, Jiwoon Ha, Sang-Wook Kim, BooJoong Kang, Eul Gyu Im, “Software plagiarism detection: a graph-based approach”, Proceedings of the 22nd ACM international conference on Information & Knowledge Management, 1577-1580, 2013
- KyoungSoo Han, Jae Hyun Lim, Eul Gyu Im, “Malware analysis method using visualization of binary files”, Proceedings of the 2013 Research in Adaptive and Convergent Systems, 317-321, 2013
- SunWoo Kim, TaeGuen Kim, Eul Gyu Im, “Real-time malware detection framework in intrusion detection systems”, Proceedings of the 2013 Research in Adaptive and Convergent Systems, 351-352, 2013
- Byeongho Kang, BooJoong Kang, Jungtae Kim, Eul Gyu Im, “Android malware classification method: Dalvik bytecode frequency analysis”, Proceedings of the 2013 research in adaptive and convergent systems, 349-350, 2013
- Yeo Reum Lee, BooJoong Kang, Eul Gyu Im, “Function matching-based binary-level software similarity calculation”, Proceedings of the 2013 Research in Adaptive and Convergent Systems, 322-327, 2013
- JaeKeun Lee, BooJoong Kang, Eul Gyu Im, “Rule-based anti-anti-debugging system”, Proceedings of the 2013 Research in Adaptive and Convergent Systems, 353-354, 2013
- TaeGuen Kim, Boojoong Kang, Eul Gyu Im, “Malware Classification Method via Binary Content Comparison”, International Information Institute (Tokyo). Information, 16.8, 5773, 2013
- Kyoung Soo Han, Eul Gyu Im, “Import API sequences Analysis for Malware Classification”, International Information Institute (Tokyo). Information, 16.8, 5613, 2013
- Jungtae Kim, Eul-Gyu Im, “Malicious Family Detection Based on Android Using Similar Class Information”, Journal of Security Engineering, 10.4, 441-453, 2013
- Kyoung Soo Han, Yeoreum Lee, Biao Jiang, Eul Gyu Im, “How to Violate Android’s Permission System without Violating It”, Proceedings of the Third International Conference on Digital Information Processing and Communications (ICDIPC2013), the Society of Digital Information Wireless Communication, Dubai, UAE, 18-25, 2013
- Philip O’Kane, Sakir Sezer, Kieran McLaughlin, Eul Gyu Im, “SVM training phase reduction using dataset feature filtering for malware detection”, IEEE transactions on information forensics and security, 8.3, 500-509, 2013
- Kyoung Soo Han, Yeoreum Lee, Biao Jiang, Eul Gyu Im, “Android permission system violation: case study and refinement”, International Journal of E-Entrepreneurship and Innovation (IJEEI), 4.1, 16-27, 2013
- Philip Okane, Sakir Sezer, Kieran McLaughlin, Eul Gyu Im, “SVM Training Phase Reduction using Dataset Feature Filtering”, IEEE Transactions on Information Forensics and Security, 8(3), 500-509 2013
- BooJoong Kang, Hye Seon Kim, Ji Su Yang, Eul Gyu Im, “Balanced indexing method for efficient intrusion detection systems”, International Conference on Information Security and Cryptology. Springer, Berlin, Heidelberg, 37-48, 2012
- Joonmo Hong, BooJoong Kang, Hye Seon Kim, Peter Chang, Eul Gyu Im, “Secure Data Transmission Protocol based on Quantum Cryptography”, International Information Institute (Tokyo). Information, 15.11 (B), 4989, 2012
- Boojoong Kang, Taekeun Kim, Heejun Kwon, Yangseo Choi, Eul Gyu Im, “Malware classification method via binary content comparison”, Proceedings of the 2012 ACM Research in Applied Computation Symposium, 316-321, 2012
- Kyoung Soo Han, Sung-Ryul Kim, Eul Gyu Im, “Instruction frequency-based malware classification method1”, International Information Institute (Tokyo). Information, 15.7, 2973, 2012
- BooJoong Kang, Hye Seon Kim, Taeguen Kim, Heejun Kwon, Eul Gyu Im, “Fast Malware Classification using Counting Bloom Filter1”, International Information Institute (Tokyo). Information, 15.7, 2879, 2012
- Biao Jiang, Eul Gyu Im, Yunmo Koo, “SaaS-driven botnets”, Pacific-Asia Workshop on Intelligence and Security Informatics. Springer, Berlin, Heidelberg, 198-206, 2012
- Dongseok Han, Kyoung Soo Han, Boojoong Kang, Hwansoo Han, Eul Gyu Im, “Peer-to-Peer botnet traffic analysis and detection”, International Information Institute (Tokyo). Information, 15.4, 1605, 2012
- Kyoung-Soo Han, Eul Gyu Im, “A survey on P2P Botnet detection”, Proceedings of the International Conference on IT Convergence and Security 2011, 589-593, 2012
- Kyoung-Soo Han, In-Kyoung Kim, Eul Gyu Im, “Malware classification methods using API sequence characteristics”, Proceedings of the International Conference on IT Convergence and Security 2011, 613-626, 2012
- Yi Yang, Kieran McLaughlin, Timothy Littler, Sakir Sezer, Eul Gyu Im, ZQ Yao, B Pranggono, HF Wang, “Man-in-the-middle attack test-bed investigating cyber-security vulnerabilities in smart grid SCADA systems”, 138-138, 2012
- Kyoung-Soo Han, Kyoung-Yong Chung, Eul Gyu Im, “A Study on Instruction Substitution Analysis of Metamorphic Malware”, Proceedings of the International Conference on IT Convergence and Security 2011, 595-599, 2012
- Eul Gyu Im, Kyoung-Soo Han, “An Analysis of Malware Attached in Spam”, Proceedings of the International Conference on IT Convergence and Security 2011, 601-605, 2012
- Kyoung-Soo Han, In-Kyoung Kim, Eul Gyu Im, “Detection methods for malware variant using api call related graphs”, Proceedings of the International Conference on IT Convergence and Security 2011, 607-611, 2012
- Boojoong Kang, Hye Seon Kim, Taeguen Kim, Heejun Kwon, Eul Gyu Im, “Fast malware family detection method using control flow graphs”, Proceedings of the 2011 ACM Symposium on Research in Applied Computation, 287-292, 2011
- Kyoung Soo Han, Boojoong Kang, Eul Gyu Im, “Malware classification using instruction frequencies”, Proceedings of the 2011 ACM Symposium on Research in Applied Computation, ., 298-300, 2011
- Sung-Hyun Shin, Sang-Chul Lee, Sang-Wook Kim, Eul Gyu Im, Junghoon Lee, “Efficient Shortest Path Search in Large Road Network Environment: A Heuristic Approach”, IETE Journal of Research, 57.6, 530-540, 2011
- JW Park, ST Moon, Gi-Wook Son, IK Kim, KS Han, EG Im, IG Kim, “An Automatic Malware Classification System using String List and APIs”, Journal of Security Engineering, 8.5, 611-626, 2011
- Boojoong Kang, Hye Seon Kim, Ji Su Yang, Eul Gyu Im, “Rule indexing for efficient intrusion detection systems”, International Workshop on Information Security Applications. Springer, Berlin, Heidelberg, 136-141, 2011
- Byung-Kwon Moon, Daeok Youn, Rokjin J Park, Sang-Wook Yeh, Won-Mo Kim, Young-Ho Kim, Jaein I Jeong, Jung-Hun Woo, Eul Gyu Im, Chang-Keun Song, “Meteorological responses to Mt. Baekdu volcanic eruption over east asia in an offline global climate-chemistry model: A pilot study”, Asia-Pacific Journal of Atmospheric Sciences, 47.4, 345-351, 2011
- BooJoong Kang, Hye Seon Kim, Eui-Hyung Kim, Hyong-Shik Kim, Eul Gyu Im, “RFID authentication protocol for low-cost RFID tags”, Information-an International Interdisciplinary Journal, 14.6, 2041-2060, 2011
- Bo Li, Eul Gyu Im, “A signature matching optimization policy for anti-virus programs”, 3rd International Conference on Computer Research and Development, 1, 1-3, 2011
Domestic
- Su Min Lim, Eul Gyu Im, “Proposal of Process Hollowing Attack Detection Using Process Virtual Memory Data Similarity”, Journal of the Korea Institute of Information Security & Cryptology, 29.2, 431-438, 2019
- Seong Il Bae, Eul Gyu Im, “Unpacking Technique for In-memory malware injection technique”, Smart Media Journal, 8.1, 19-26, 2019
- Byeong Ho Jung, Eul Gyu Im, “Traffic context based hybrid DDoS detection”, 한국콘텐츠학회 ICCC 논문집, ., 57-58, 2018
- Gyu Bin Lee, Jeong Yun Oak, Eul Gyu Im, “Method of Signature Extraction and Selection for Ransomware Dynamic Analysis”, KIISE Transactions on Computing Practices, 24.2, 99-104, 2018
- Gyu Bin Lee, Junhyoung Kim, Joong Soo Han, Eul Gyu Im, “Malware detection method based on the Static analysis using Frequent API set”, 한국콘텐츠학회 ICCC 논문집, ., 215-216, 2017
- Jun-Hyeong Kim, Yong-Hyeok Kim, Hwan-Tae Ji, Eul-Gyu Im, “악성코드 탐지를 위한 바이너리 실행 파일 분석 기법”, Communications of the Korean Institute of Information Scientists and Engineers, 35.2, 48-54, 2017
- Tae Kyong Lee, Yong Hyuk Kim, Eul Gyu Im, “Biometric User Authentication Method of Mobile Application in Trustable Space”, Journal of the Korea Institute of Information Security & Cryptology, 27.2, 201-212, 2017
- In Kyeom Cho, Eul Gyu Im, “Malware Family Recommendation Using Multiple Sequence Alignment”, Journal of KIISE, 43.3, 289-295, 2016
- In Kyeom Cho, Eul Gyu Im, “Improvement of Performance of Malware Similarity Analysis by the Sequence Alignment Technique”, KIISE Transactions on Computing Practices, 21.3, 263-268, 2015
- 강병호, 임을규, “동적 기호 실행을 이용한 그래프 기반 바이너리 코드 실행 경로 탐색 플랫폼”, 정보보호학회논문지, 24.3, 437-444, 2014
- Byeongho Kang, Eul Gyu Im, “Graph based Binary Code Execution Path Exploration Platform for Dynamic Symbolic Execution”, Journal of the Korea Institute of Information Security & Cryptology, 24.3, 437-444, 2014
- In-Gyeom Cho, Eul-Gyu Im, “Malware Similarity Calculation using Improved Smith-Waterman Algorithm”, Proceedings of the Korea Contents Association Conference, ., 471-472, 2014
- HyunSoo Lee, Eul Gyu Im, “Comparative Analysis of Android Applications in Unofficial and Official Markets”, Proceedings of the Korea Contents Association Conference, ., 473-474, 2014
- 성명재, 박해룡, 최보민, 임을규, “TCP-Flow 시퀀스를 이용한 네트워크 행위 기반 안드로이드 악성코드 탐지”, 보안공학연구논문지, 11.6, 551-566, 2014
- JaeKeun Lee, BooJoong Kang, Eul Gyu Im, “Evading anti-debugging techniques with binary substitution”, International Journal of Security and Its Applications, 8.1, 183-192, 2014
- 강부중, 이여름, 임을규, “명령어 출현 시퀀스를 사용한 악성코드 패밀리 탐지 방법”, 보안공학연구논문지, 10.1, 77-92, 2013
- Boo-Joong Kong, Kyoung-Soo Han, Eul-Gyu Im, “Malicious code trends and detection technologies”, Communications of the Korean Institute of Information Scientists and Engineers, 30.1, 44-53, 2012
- 권희준, 김선우, 임을규, “Multi N-gram 을 이용한 악성코드 분류 시스템”, 보안공학연구논문지, 9.6, 531-542, 2012
- 양지수, 강부중, 김혜선, 임을규, “An Efficient Signature Detection Method using N-Gram Indexing for Intrusion Detection Systems”, 보안공학연구논문지, 9.1, 1-14, 2012
- Biao Jiang, Eul Gyu Im, “Cloud Computing Security: The Conventional and Unconventional Aspects”, 한국통신학회 학술대회논문집, 168-169, 2011
- Peter Chang, Eul Gyu Im, “FREENET AS A MALWARE UPDATE SERVER”, 한국통신학회 학술대회논문집, 661-662, 2011
- Peter Chang, Eul Gyu Im, “EXTENDING NBAD SYSTEMS: DUAL PHASE DETECTION APPROACH”, 한국통신학회 학술대회논문집, 186-188, 2011
- Biao Jiang, Eul Gyu Im, “A Survey of Anomaly-based Botnet Detection”, 한국통신학회 학술대회논문집, 242-246, 2011
- Hwan-il You, Dong Kyu Chae, Eul-Gyu Im, “A Mobile Spam SMS Filtering System using Machine learning about syllable and the features of caller ID”, Proceedings of the Korea Information Processing Society Conference, 219-222, 2011
- Bo Li, “Smartphone, promising battlefield for hackers”, 보안공학연구논문지, 8.1, 89-110, 2011
- Peter Chang, Eul Gyu Im, “Survey of Emerging Trends in Botnet Detection”, 한국통신학회 학술대회논문집, 1176-1177, 2010
- Bo Li, Eul Gyu Im, “A survey of virus obfuscation techniques”, 한국통신학회 학술대회논문집, 1169-1171, 2010