• 1033 Citations
  • 16 h-Index
19962020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2019

Intriguer: Field-level constraint solving for hybrid fuzzing

Cho, M., Kim, S. & Kwon, T., 2019 Nov 6, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 515-530 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Poster: Evaluating code coverage for system call fuzzers

Kim, S., Jeong, S., Cho, M., Chung, S. & Kwon, T., 2019 Nov 6, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2689-2691 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Poster: Effective layers in coverage metrics for deep neural networks

Park, L. H., Oh, S., Kim, J., Chung, S. & Kwon, T., 2019 Nov 6, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2681-2683 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

Glitch Recall: A Hardware Trojan Exploiting Natural Glitches in Logic Circuits

Joh, J., Seo, Y., Kim, H. K. & Kwon, T., 2018, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 150-161 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Round-reduced modular construction of asymmetric password-authenticated key exchange

Hwang, J. Y., Jarecki, S., Kwon, T., Lee, J., Shin, J. S. & Xu, J., 2018, Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings. Catalano, D. & De Prisco, R. (eds.). Springer Verlag, p. 485-504 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11035 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2017

Here is your fingerprint! actual risk versus user perception of latent fingerprints and smudges remaining on smartphones

Lee, H., Kim, S. & Kwon, T., 2017 Dec 4, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Association for Computing Machinery, p. 512-527 16 p. (ACM International Conference Proceeding Series; vol. Part F132521).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Personal visual analytics for android security risk lifelog

Yoo, S., Ryu, H. R., Yeon, H., Kwon, T. & Jang, Y., 2017 Aug 14, VINCI 2017 - 10th International Symposium on Visual Information Communication and Interaction. Takahashi, S. & Li, J. (eds.). Association for Computing Machinery, p. 29-36 8 p. (ACM International Conference Proceeding Series; vol. Part F130152).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Poster: Rethinking fingerprint identification on smartphones

Kim, S., Lee, H. & Kwon, T., 2017 Oct 30, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2515-2517 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Poster:Watch out your smartwatch when paired

Lee, Y., Yang, W. S. & Kwon, T., 2017 Oct 30, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2527-2529 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

The fuzzing awakens: File format-aware mutational fuzzing on smartphone media server daemons

Shin, M. S., Yu, J. B., Yoon, Y. J. & Kwon, T., 2017 Jan 1, ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Proceedings. De Capitani di Vimercati, S. & Martinelli, F. (eds.). Springer New York LLC, p. 219-232 14 p. (IFIP Advances in Information and Communication Technology; vol. 502).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

Constructing efficient PAKE protocols from identity-based KEM/DEM

Choi, K. Y., Cho, J., Hwang, J. Y. & Kwon, T., 2016 Jan 1, Information Security Applications - 16th International Workshop, WISA 2015, Revised Selected Papers. Choi, D. & Kim, H-W. (eds.). Springer Verlag, p. 411-422 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2015

Identification of corrupted cloud storage in batch auditing for multi-cloud environments

Shin, S., Kim, S. & Kwon, T., 2015, Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings. You, I., Xu, L. D., Neuhold, E., Tjoa, A. M. & Khalil, I. (eds.). Springer Verlag, p. 221-225 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9357).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
2014

RIK: A virtual keyboard resilient to spyware in smartphones

Na, S. & Kwon, T., 2014 Jan 1, 2014 IEEE International Conference on Consumer Electronics, ICCE 2014. Institute of Electrical and Electronics Engineers Inc., p. 21-22 2 p. 6775891. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

SwitchPIN: Securing smartphone PIN entry with switchable keypads

Kwon, T. & Na, S., 2014 Jan 1, 2014 IEEE International Conference on Consumer Electronics, ICCE 2014. Institute of Electrical and Electronics Engineers Inc., p. 23-24 2 p. 6775892

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)
2013

Drag-And-Type: A new method for typing with virtual keyboards on small touchscreens

Kwon, T., Na, S. & Park, S. H., 2013 Apr 24, 2013 IEEE International Conference on Consumer Electronics, ICCE 2013. p. 458-459 2 p. 6486974

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Touch pointer: Rethink point-and-click for accurate indirect touch interactions on small touchscreens

Kwon, T., Na, S. & Shin, S., 2013 Apr 24, 2013 IEEE International Conference on Consumer Electronics, ICCE 2013. p. 598-599 2 p. 6487034. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2010

A study of mobile proxy for privacy enhancement

Kim, E., Kwon, T. & Yi, J. H., 2010 Apr 1, ICCE 2010 - 2010 Digest of Technical Papers International Conference on Consumer Electronics. p. 177-178 2 p. 5418783. (ICCE 2010 - 2010 Digest of Technical Papers International Conference on Consumer Electronics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2009

On the privacy-preserving HCI issues

Kwon, T., Lee, J. & Song, J., 2009 Dec 1, Universal Access in Human-Computer Interaction: Addressing Diversity - 5th International Conference, UAHCI 2009, Held as Part of HCI International 2009, Proceedings. PART 1 ed. p. 544-549 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5614 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2007

A time-based key management protocol for wireless sensor networks

Jang, J., Kwon, T. & Song, J., 2007 Dec 20, Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings. p. 314-328 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4464 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

32 Citations (Scopus)

Biometric digital key mechanisms for telebiometric authentication based on biometric certificate

Lee, H. W. & Kwon, T., 2007 Jan 1, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 428-437 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Biometric person authentication for access control scenario based on face recognition

Moon, H. & Kwon, T., 2007 Jan 1, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 463-472 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Deriving the virtual world from wireless sensor networks for interaction with consumer electronic devices

Kwon, T. & Choi, S. M., 2007 Aug 24, Digest of Technical Papers - 2007 International Conference on Consumer Electronics, ICCE 2007. 4146240. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Knowledge-based user authentication associated with biometrics

Kwon, T. & Moon, H., 2007, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 414-419 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Multi-modal authentication for ubiquitous computing environments

Kwon, T., Park, S. H. & Shin, S., 2007, Universal Access in Human-Computer Interaction: Ambient Interaction - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 2 ed. Springer Verlag, p. 113-121 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4555 LNCS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy protection in PKIs: A separation-of-authority approach

Kwon, T., Cheon, J. H., Kim, Y. & Lee, J. I., 2007 Dec 1, Information Security Applications - 7th International Workshop, WISA 2006 Revised Selected Papers. p. 297-311 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4298 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Secure dynamic network reprogramming using supplementary hash in wireless sensor networks

Park, K., Lee, J. H., Kwon, T. & Song, J., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 653-662 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Three-party password authenticated key agreement resistant to server compromise

Kwon, T. & Lee, D. H., 2007 Jan 1, Information Security Applications - 7th International Workshop, WISA 2006 Revised Selected Papers. Springer Verlag, p. 312-323 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4298 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
2006

An improved fingerprint-based remote user authentication scheme using smart cards

Lee, Y. & Kwon, T., 2006 Jan 1, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part II. Springer Verlag, p. 915-922 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3981 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Cluster-based certificate chain for mobile ad hoc networks

Hahn, G., Kwon, T., Kim, S. & Song, J., 2006 Jan 1, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part II. Springer Verlag, p. 769-778 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3981 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Content distribution system based on MPEG-4 ISMACryp in set-top box environments

Park, S. H., Jeong, J. & Kwon, T., 2006 Sep 18, 2006 Digest of Technical Papers - International Conference on Consumer Electronics, ICCE '06. p. 235-236 2 p. 1598397. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Efficient linear array for multiplication over NIST recommended binary fields

Kwon, S., Kwon, T. & Park, Y. H., 2006 Jun 23, Fuzzy Logic and Applications - 6th International Workshop, WILF 2005, Revised Selected Papers. p. 427-436 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3849 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experimental study on wireless sensor network security

Kwon, T. & Park, S. H., 2006 Jan 1, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer Verlag, p. 741-743 3 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Location-aware key management using multi-layer grids for wireless sensor networks

Lee, J. H., Kwon, T. & Song, J., 2006 Jan 1, Applied Cryptography and Network Security - 4th International Conference, ACNS 2006, Proceedings. Springer Verlag, p. 390-404 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3989 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

New architecture for multiplication in GF(2m) and comparisons with normal and polynomial basis multipliers for elliptic curve cryptography

Kwon, S., Kwon, T. & Park, Y. H., 2006 Jan 1, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer Verlag, p. 335-351 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Security analysis of secure password authentication for keystroke dynamics

Song, H. & Kwon, T., 2006 Jan 1, Knowledge-Based Intelligent Information and Engineering Systems - 10th International Conference, KES 2006, Proceedings. Springer Verlag, p. 916-923 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4251 LNAI - I).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Strong and robust RFID authentication enabling perfect ownership transfer

Lim, C. H. & Kwon, T., 2006, Information and Communications Security - 8th International Conference, ICICS 2006, Proceedings. Ning, P., Qing, S. & Li, N. (eds.). Springer Verlag, p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4307 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

118 Citations (Scopus)
2005

An authentication scheme based upon face recognition for the mobile environment

Kim, Y. G. & Kwon, T., 2005 Jan 1, Computational and Information Science - 1st International Symposium, CIS 2004, Proceedings. Zhang, J., He, J-H. & Fu, Y. (eds.). Springer Verlag, p. 274-279 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3314 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An efficient message broadcast authentication scheme for sensor networks

Park, S. H. & Kwon, T., 2005 Jan 1, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings. Springer Verlag, p. 427-432 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3802 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Efficient key agreement for merging clusters in ad-hoc networking environments

Shin, S. & Kwon, T., 2005 Dec 1, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 996-1005 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2002

On the difficulty of protecting private keys in software

Kwon, T., 2002 Jan 1, Information Security - 5th International Conference, ISC 2002, Proceedings. Chan, A. H. & Gligor, V. (eds.). Springer Verlag, p. 17-31 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Virtual software tokens - A practical way to secure PKI roaming

Kwon, T., 2002, Infrastructure Security - International Conference, InfraSec 2002, Proceedings. Davida, G., Frankel, Y., Rees, O. & Davida, G. (eds.). Springer Verlag, p. 288-302 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2437).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Citations (Scopus)