A practical wireless attack on the connected car and security protocol for in-vehicle CAN S Woo, HJ Jo, DH Lee IEEE Transactions on intelligent transportation systems 16 (2), 993-1006, 2014 | 621 | 2014 |
VoltageIDS: Low-level communication characteristics for automotive intrusion detection system W Choi, K Joo, HJ Jo, MC Park, DH Lee IEEE Transactions on Information Forensics and Security 13 (8), 2114-2129, 2018 | 338 | 2018 |
Identifying ecus using inimitable characteristics of signals in controller area networks W Choi, HJ Jo, S Woo, JY Chun, J Park, DH Lee IEEE Transactions on Vehicular Technology 67 (6), 4757-4770, 2018 | 241 | 2018 |
A practical security architecture for in-vehicle CAN-FD S Woo, HJ Jo, IS Kim, DH Lee IEEE Transactions on Intelligent Transportation Systems 17 (8), 2248-2261, 2016 | 159 | 2016 |
Efficient and privacy-preserving metering protocols for smart grid systems HJ Jo, IS Kim, DH Lee IEEE Transactions on Smart Grid 7 (3), 1732-1742, 2015 | 112 | 2015 |
A survey of attacks on controller area networks and corresponding countermeasures HJ Jo, W Choi IEEE Transactions on Intelligent Transportation Systems 23 (7), 6123-6141, 2021 | 107 | 2021 |
Efficient privacy-preserving authentication in wireless mobile networks HJ Jo, JH Paik, DH Lee IEEE Transactions on Mobile Computing 13 (7), 1469-1481, 2013 | 84 | 2013 |
Mauth-can: Masquerade-attack-proof authentication for in-vehicle networks HJ Jo, JH Kim, HY Choi, W Choi, DH Lee, I Lee IEEE transactions on vehicular technology 69 (2), 2204-2218, 2019 | 79 | 2019 |
Reliable cooperative authentication for vehicular networks HJ Jo, IS Kim, DH Lee IEEE Transactions on Intelligent Transportation Systems 19 (4), 1065-1079, 2017 | 73 | 2017 |
Vulnerabilities of android OS-based telematics system HJ Jo, W Choi, SY Na, S Woo, DH Lee Wireless Personal Communications 92, 1511-1530, 2017 | 51 | 2017 |
An enhanced method for reverse engineering CAN data payload W Choi, S Lee, K Joo, HJ Jo, DH Lee IEEE Transactions on Vehicular Technology 70 (4), 3371-3381, 2021 | 29 | 2021 |
BadVoice: Soundless voice-control replay attack on modern smartphones DHL Joon Young Park, Hyo Jin Jo, Samuel Woo ICUFN 2016, 882-887, 2016 | 25* | 2016 |
BPRF: Blockchain-based privacy-preserving reputation framework for participatory sensing systems HJ Jo, W Choi Plos one 14 (12), e0225688, 2019 | 23 | 2019 |
T-box: A forensics-enabled trusted automotive data recording method S Lee, W Choi, HJ Jo, DH Lee IEEE Access 7, 49738-49755, 2019 | 22 | 2019 |
G-idcs: Graph-based intrusion detection and classification system for can protocol SB Park, HJ Jo, DH Lee IEEE Access 11, 39213-39227, 2023 | 21 | 2023 |
Method and device for authenticating personal network entity S Choi, SJ Park, DH Lee, JH Paik, HJ Jo US Patent 8,819,415, 2014 | 18 | 2014 |
TTIDS: Transmission-resuming time-based intrusion detection system for controller area network (CAN) S Lee, HJ Jo, A Cho, DH Lee, W Choi IEEE Access 10, 52139-52153, 2022 | 15 | 2022 |
How to securely record logs based on ARM trustzone S Lee, W Choi, HJ Jo, DH Lee Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 12 | 2019 |
A message authentication and key distribution mechanism secure against CAN bus attack AR Cho, HJ Jo, S Woo, YD Son, DH Lee Journal of the Korea Institute of Information Security & Cryptology 22 (5 …, 2012 | 12 | 2012 |
ErrIDS: An enhanced cumulative timing error-based automotive intrusion detection system S Lee, W Choi, HJ Jo, DH Lee IEEE Transactions on Intelligent Transportation Systems, 2023 | 8 | 2023 |