International Conferences
Jeewoo Jung, Taekyoung Kwon, “Enhancing Differential Fuzzing of Cryptographic Libraries with Sustainable Hybrid Fuzzing and Crypto-Specific Mutation,” in Proc. the Annual International Conference on Information Security and Cryptology (ICISC), Nov. 2024. (Best Paper Award)
Leo Hyun Park, Jaeuk Kim, Myung Gyo Oh, Jaewoo Park, and Taekyoung Kwon, “Adversarial Feature Alignment: Balancing Robustness and Accuracy in Deep Learning via Adversarial Training,” in Proc. the 17th ACM Workshop on Artificial Intelligence and Security (AISec), Oct. 2024.
Jueon Eom, Seyeon Jeong, and Taekyoung Kwon, “Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-based Mutation,” in Proc. the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), Sep. 2024. (BK, 정보과학회 최우수학술대회)
Jung Yup Rhee, Leo Hyun Park and Taekyoung Kwon, “Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training,” in Proc. the 25th World Conference on Information Security Applications (WISA), Aug. 2024.
Hyunjoon Kim, Jaehee Lee, Leo Hyun Park, and Taekyoung Kwon, “On the Correlation Between Deepfake Detection Performance and Image Quality Metrics,” Proceedings of the 3rd Workshop on Security Implications of Deepfakes and Cheapfakes, July. 2024.
Seyeon Jeong, Eunbi Hwang, Yeongpil Cho, and Taekyoung Kwon, “PHI: Pseudo-HAL Identification for Scalable Firmware Fuzzing,” in Proc. the Annual International Conference on Information Security and Cryptology (ICISC 2023), Nov. 2023.
Jaewoo Park, Hong Eun Ahn, Leo Hyun Park, and Taekyoung Kwon, “Robust Training for Deepfake Detection Models Against Disruption-Induced Data Poisoning,” in Proc. the 24th World Conference on Information Security Applications (WISA 2023), Aug. 2023.
Mingi Cho, Dohyeon An, Hoyong Jin, and Taekyoung Kwon, “BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing,” 32nd USENIX Security Symposium (USENIX Security 23), Aug. 2023 (BK, 정보과학회 최우수학술대회)
Hoyong Jin, Dohyeon An and Taekyoung Kwon, “Differential Testing of Cryptographic Libraries with Hybrid Fuzzing,” in Proc. the Annual International Conference on Information Security and Cryptology (ICISC 2022), Nov. 2022. (Best Paper Award)
Leo Hyun Park, Eunbi Hwang, Donggun Lee, and Taekyoung Kwon, “Towards Constructing Consistent Pattern Strength Meters with User’s Visual Perception,” in Proc. the Annual International Conference on Information Security and Cryptology (ICISC 2022), Nov. 2022.
Leo Hyun Park, Jaewoo Park, Soochang Chung, Jaeuk Kim, Myung Gyo Oh, and Taekyoung Kwon, “Poster: Adversarial Defense with Deep Learning Coverage on MagNet’s Purification,” in Proc. the ACM Conference on Computer and Communications Security (CCS 2022), Los Angeles, CA, Nov. 2022.
Myung Gyo Oh, Leo Hyun Park, Jaeuk Kim, Jaewoo Park, and Taekyoung Kwon, “On Membership Inference Attacks to Generative Language Models across Language Domains,” in Proc. the 23rd World Conference on Information Security Applications (WISA 2022), Lecture Notes in Computer Science, Vol. 13720, Springer, Cham, pp. 143-155, 2022.
Mingi Cho, Seoyoung Kim, and Taekyoung Kwon, “Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing,” in Proc. the ACM Conference on Computer and Communications Security (CCS 2019) (BK, 정보과학회 우수학술대회)
Seoyoung Kim, Seyeon Jeong, Mingi Cho, Soochang Chung, and Taekyoung Kwon, “POSTER: Evaluating Code Coverage for System Call Fuzzers,” in Proc. the ACM Conference on Computer and Communications Security (CCS 2019)
Leo Hyun Park , Sangjin Oh, Jaeuk Kim, Soochang Chung, and Taekyoung Kwon, “POSTER: Effective Layers in Coverage Metrics for Deep Neural Networks,” in Proc. the ACM Conference on Computer and Communications Security (CCS 2019)
Junghwan Yoon, Yezee Seo, Jaedong Jang, Mingi Cho, Jingoog Kim, Hyeonsook Kim and Taekyoung Kwon, “POSTER: A Bitstream Reverse Engineering Tool for FPGA Hardware Trojan Detection,” in Proc. the ACM Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, Oct. 2018.
Yeeun Ku, Leo Hyun Park, Sooyeon Shin, and Taekyoung Kwon, “POSTER: A Guided Approach to Behavioral Authentication,” in Proc. the ACM Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, Oct. 2018.
Mingi Cho, Seoyoung Kim, Yoochan Lee and Taekyoung Kwon, “Diving into OS Kernels to Trigger Deeper Bugs,” 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2018), Carlsbad, California, Oct. 2018. (poster)
Jung Yeon Hwang, Stanislaw Jarecki, Taekyoung Kwon, Joohee Lee, Ji Sun Shin, Jiayu Xu, “Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange,” in Proc. 11th Conference on Security and Cryptography for Networks (SCN 2018), Amalfi, Italy, Sep. 2018.
Yezee Seo, Junghwan Yoon, Jaedong Jang, Mingi Cho, Hoon-Kyu Kim, and Taekyoung Kwon, “Poster: Towards Reverse Engineering FPGA Bitstreams for Static Hardware Trojan Detection,” in Proc. the Network and Distributed System Security Symposium (NDSS 2018), San Diego, California, Feb. 2018.
Leo Hyun Park, JungBeen Yu, and Taekyoung Kwon, “Poster: Exploring Family Features for Classification and Lineage Inference of Packed Malware,” in Proc. the Network and Distributed System Security Symposium (NDSS 2018), San Diego, California, Feb. 2018. (Honorable Mention)
Hoyeon Lee, Seungyeon Kim, and Taekyoung Kwon, “Here Is Your Fingerprint! Actual Risk versus User Perception of Latent Fingerprints and Smudges Remaining on Smartphones,” in Proc. the 33rd Annual Computer Security Applications Conference (ACSAC 2017), San Juan, Puerto Rico, USA, Dec. 2017.
Youngjoo Lee, Wonseok Yang, and Taekyoung Kwon, “POSTER: Watch Out Your Smart Watch When Paired,” in Proc. the ACM Conference on Computer and Communications Security (CCS 2017), Dallas, Texas, pp. 2527-2529, Nov. 2017.
Seungyeon Kim, Hoyeon Lee, and Taekyoung Kwon, “POSTER: Rethinking Fingerprint Identification on Smartphones,” in Proc. the ACM Conference on Computer and Communications Security (CCS 2017), Dallas, Texas, pp. 2515-2517, Nov. 2017.
Jungwoo Joh, Yezee Seo, Hoon-Kyu Kim, and Taekyoung Kwon, “Glitch Recall: A Hardware Trojan Exploiting Natural Glitches in Logic Circuits,” in Proc. the World Conference of Information Security Applications (WISA), Aug. 2017.
Sangbong Yoo, HongRyeol Ryu, Hanbyul Yeon, Taekyoung Kwon, and Yun Jang, “Personal visual analytics for android security risk lifelog,” Proceedings of the 10th International Symposium on Visual Information Communication and Interaction, pp. 29-36, Aug. 2017.
MinSik Shin, JungBeen Yu, YoungJin Yoon, and Taekyoung Kwon, “The Fuzzing Awakens: File Format-Aware Mutational Fuzzing on Smartphone Media Server Daemons,” in Proc. the IFIP International Information Security and Privacy (SEC), pp. 219-232, May 2017.
Wonseok Yang, Youngjoo Lee, and Taekyoung Kwon, “The Bourne Security: Your Wearable Device Can Leak Your Sensitive Data in Locked States,” Annual Computer Security Applications Conference (ACSAC), 2016. (poster)
JungBin Yu, MinSik Shin, Taejin Lee, Hong-Koo Kang, and Taekyoung Kwon, “The Malware Identity: Toward Efficient Identification of Malware Mutants,” Annual Computer Security Applications Conference (ACSAC), 2016. (poster)
Sooyeon Shin, Seungyeon Kim, and Taekyoung Kwon, “Identification of Corrupted Cloud Storage in Batch Auditing for Multi-Cloud Environments,” AsiaARES 2015, pp. 221-225, 2015.
Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, and Taekyoung Kwon, “Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM,” Information Security Applications (WISA), Lecture Notes in Computer Science, Vol. 2015, Springer-Verlag, pp. 606-619, 2015.
Taekyoung Kwon and Sarang Na, “SwitchPIN: Securing Smartphone PIN Entry with Switchable Keypads,” IEEE ICCE 2014, pp. 27-28, Jan. 2014.
Sarang Na and Taekyoung Kwon, “RIK: A Virtual Keyboard Resilient to Spyware in Smartphones,” IEEE ICCE 2014, pp. 25-26, Jan. 2014.
Taekyoung Kwon, Sarang Na, and Sooyeon Shin, “Touch Pointer: Rethink Point-and-Click for Accurate Indirect Touch Interactions on Small Touchscreens,” IEEE ICCE 2013, pp. 600-601, Jan. 2013.
Taekyoung Kwon, Sarang Na, and Sang-ho Park, “Drag-and-Type: A New Method for Typing with Virtual Keyboards on Small Touchscreens,” IEEE ICCE 2013, pp. 460-461 Jan. 2013.
Taekyoung Kwon, JongHyup Lee, and JooSeok Song, “On the privacy-preserving HCI issues,” Human Computer Interaction, Lecture Notes in Computer Science, Vol. 5614, Springer-Verlag, pp. 544-549, 2009.
Kwang-Kyu Park, JongHyup Lee, Taekyoung Kwon, and JooSeok Song, “Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks,” Ubiquitous Intelligence and Computing, Lecture Notes in Computer Science, Vol. 4611, pp. 653-662, 2007.
Jiyong Jang, Taekyoung Kwon, and Jooseok Song, “A time-based key management protocol for wireless sensor networks,” Information Security Practice and Experience, Lecture Notes in Computer Science, Vol. 4464, Springer-Verlag, pp. 314-328, 2007.
Taekyoung Kwon, Jung Hee Cheon, Yongdae Kim, and Jae-il Lee, “Privacy protection in PKIs: A separation-of-authority approach,” Information Security Applications, Lecture Notes in Computer Science, Vol. 4298, Springer-Verlag, pp.297-311, 2007.
Taekyoung Kwon and Dong Hoon Lee, “Three-party password authenticated key agreement resistant to server compromise,” Information Security Applications, Lecture Notes in Computer Science, Vol. 4298, Springer-Verlag, pp.312-323, 2007.
Taekyoung Kwon and Soo-Mi Choi, “Deriving the virtual world from wireless sensor networks for interaction with consumer electronic devices,” In the Proceedings of IEEE International Conference on Consumer Electronics, 2007.
Taekyoung Kwon and Sang-ho Park, “Experimental study on wireless sensor network security,” Intelligence and Security Informatics, Lecture Notes in Computer Science, Vol. 3975, Springer-Verlag, pp.741-743, 2006.
Sang-ho Park , Jaewoong Jeong, and Taekyoung Kwon, “Content distribution system based on MPEG-4 ISMACryp in set-top box environments,” In the Proceedings of IEEE International Conference on Consumer Electronics, Vol. 52, No. 2, May 2006.
Hyeonjoon Moon and Taekyoung Kwon, “Biometric Person Authentication for Access Control Scenario based on Face Recognition,” In Proceedings of the Workshop on Information Security Applications, Aug. 2004.
Taekyoung Kwon, “Authentication and key agreement via memorable passwords,” In Proceedings of the ISOC Network and Distributed System Security (NDSS) Symposium, San Diego, CA, USA, Feb. 2001.
Taekyoung Kwon and C. V. Ramamoorthy, “Practical approach of networked smart cards,” In Proceedings of the SDPS World Conference on Integrated Design Process Technology (IDPT), Dallas, TX, USA, Jun. 2000.
Taekyoung Kwon, Myeongkun Yoon, Jiwon Kang, and Jooseok Song, “A modeling of security management system for electronic data interchange,” In Proceedings of the IEEE Symposium on Computers Communications, Jul. 1997.
Taekyoung Kwon, Myeongho Kang, and Jooseok Song, “An adaptable and reliable authentication protocol for communication networks,” In Proceedings of IEEE INFOCOM 97, Vol. 2, pp. 738-745, Apr. 1997.
Myeongho Kang, Taekyoung Kwon, Changyong Yang, and Jooseok Song, “The design and verification of service feature interaction manager on AIN using Z schema,” In Proceedings of IEEE COMPSAC 96, pp. 477-482, Aug.1996.
Taekyoung Kwon and Jooseok Song, “A key distribution and authentication method on the Q.931 calling sequence of ISDN,” In Proceedings of ICCC 95, pp. 623-628, Aug. 1995.등…