Publications

International Conferences, Journals, and Workshops

2024

  1. R2I: A Relative Readability Metric for Decompiled Code (To Appear)
    Haeun Eom, Dohee Kim, Sori Lim, Hyungjoon Koo, and Sungjae Hwang
    In Proceedings of the ACM International Conference on the Foundations of Software Engineering (FSE 2024), Jul 2024
  2. BinAdapter: Leveraging Continual Learning for Inferring Function Symbol Names in a Binary (To appear)
    Nozima Murodova, and Hyungjoon Koo
    In Proceedings of the 19th ACM ASIA Conference on Computer and Communications Security (ASIACCS), Jul 2024
  3. ToolPhet: Inference of Compiler Provenance from Stripped Binaries with Emerging Compilation Toolchains
    Nozima Murodova Hohyeon Jang, and Hyungjoon Koo
    IEEE Access, Jan 2024
  4. BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation
    Younggi Park, Hwiwon Lee, Jinho Jung, Hyungjoon Koo, and Huykang Kim
    In Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P), May 2024

2023

  1. Demystifying the Regional Phishing Landscape in South Korea
    Hyunjun Park, Kyungchan Lim, Doowon Kim, Donghyun Yu, and Hyungjoon Koo
    IEEE Access, Nov 2023
  2. Binary Code Representation With Well-Balanced Instruction Normalization
    Hyungjoon Koo, Soyeon Park, Daejin Choi, and Taesoo Kim
    IEEE Access, Mar 2023
  3. Smartmark: Software Watermarking Scheme for Smart Contracts
    Taeyoung Kim, Yunhee Jang, Chanjong Lee, Hyungjoon Koo, and Hyoungshick Kim
    In Proceedings of the IEEE/ACM 45th International Conference on Software Engineering (ICSE), May 2023
  4. A Transformer-Based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing
    Hyunjin Kim, Jinyeong Bak, Kyunghyun Cho, and Hyungjoon Koo
    In Proceedings of the 18th ACM ASIA Conference on Computer and Communications Security (ASIACCS), Jul 2023
  5. Evaluating Password Composition Policy and Password Meters of Popular Websites
    In Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), May 2023

2022

  1. DeView: Confining Progressive Web Applications by Debloating Web APIs
    ChangSeok Oh, Sangho Lee, Chenxiong Qian, Hyungjoon Koo, and Wenke Lee
    In Proceedings of the 38th Annual Computer Security Applications Conference (ACSAC), Dec 2022
  2. Practical Binary Code Similarity Detection with BERT-Based Transferable Similarity Learning
    Sunwoo Ahn, Seonggwan Ahn, Hyungjoon Koo, and Yunheung Paek
    In Proceedings of the 38th Annual Computer Security Applications Conference (ACSAC), Dec 2022
  3. IoTivity Packet Parser for Encrypted Messages in Internet of Things
    Hyeonah Jung, Hyungjoon Koo, and Jaehoon Paul Jeong
    In Proceedings of the 24th International Conference on Advanced Communication Technology (ICACT), Jan 2022

2021

  1. SoftMark: Software Watermarking via a Binary Function Relocation
    Honggoo Kang, Yonghwi Kwon, Sangjin Lee, and Hyungjoon Koo
    In Proceedings of the 37th Annual Computer Security Applications Conference (ACSAC), Dec 2021
  2. A Look Back on a Function Identification Problem
    Hyungjoon Koo, Soyeon Park, and Taesoo Kim
    In Proceedings of the 37th Annual Computer Security Applications Conference (ACSAC), Dec 2021

2020

  1. Slimium: Debloating the Chromium Browser with Feature Subsetting
    Chenxiong Qian, Hyungjoon Koo, ChangSeok Oh, Taesoo Kim, and Wenke Lee
    In Proceedings of the 27th ACM SIGSAC Conference on Computer and Communications Security (CCS), Nov 2020

2019

  1. Configuration-Driven Software Debloating
    Seyedhamed Ghavamnia Hyungjoon Koo, and Michalis Polychronakis
    In Proceedings of the 12th European Workshop on Systems Security (EuroSec), May 2019

2018

  1. Compiler-Assisted Code Randomization
    Hyungjoon Koo, Yaohui Chen, Long Lu, Vasileios P. Kemerlis, and Michalis Polychronakis
    In Proceedings of the 39th IEEE Symposium on Security and Privacy (S&P), May 2018

2017

  1. Defeating Zombie Gadgets by Re-randomizing Code upon Disclosure
    Micah Morton, Hyungjoon Koo, Forrest Li, Kevin Z. Snow, Michalis Polychronakis, and Fabian Monrose
    In Proceedings of the 3rd IEEE European Symposium on Security & Privacy (EuroS&P), Jul 2017

2016

  1. Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks
    Kevin Z. Snow, Roman Rogowski, Jan Werner, Hyungjoon Koo, Fabian Monrose, and Michalis Polychronakis
    In Proceedings of the 37th IEEE Symposium on Security & Privacy (S&P), May 2016
  2. The Politics of Routing: Investigating the Relationship between AS Connectivity and Internet Freedom
    Rachee Singh, Hyungjoon Koo, Najmeh Miramirkhani, Fahimeh Mirhaj, Leman Akoglu, and Phillipa Gill
    In Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI), Aug 2016
  3. Juggling the Gadgets: Binary-Level Code Randomization Using Instruction Displacement
    Hyungjoon Koo, and Michalis Polychronakis
    In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (ASIACCS), May 2016

2015

  1. Identifying Traffic Differentiation in Mobile Networks
    Arash Molavi Kakhki, Abbas Razaghpanah, Anke Li, Hyungjoon Koo, Rajesh Golani, David Choffnes, Phillipa Gill, and Alan Mislove
    In Proceedings of the 15th Internet Measurement Conference (IMC), Oct 2015