Yoon-Chan Jhi
Yoon-Chan Jhi
Director of Software Security in Samsung SDS Research Center, Seoul, Korea
Verified email at samsung.com
Title
Cited by
Cited by
Year
Proactive worm containment (PWC) for enterprise networks
P Liu, YC Jhi, L Li
US Patent 8,904,535, 2014
2472014
Behavior based software theft detection
X Wang, YC Jhi, S Zhu, P Liu
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1322009
Detecting software theft via system call based birthmarks
X Wang, YC Jhi, S Zhu, P Liu
2009 Annual Computer Security Applications Conference, 149-158, 2009
1162009
Value-based program characterization and its application to software plagiarism detection
YC Jhi, X Wang, X Jia, S Zhu, P Liu, D Wu
Proceedings of the 33rd International Conference on Software Engineering …, 2011
1022011
Still: Exploit code detection via static taint and initialization analyses
X Wang, YC Jhi, S Zhu, P Liu
2008 Annual Computer Security Applications Conference (ACSAC), 289-298, 2008
862008
A first step towards algorithm plagiarism detection
F Zhang, YC Jhi, D Wu, P Liu, S Zhu
Proceedings of the 2012 International Symposium on Software Testing and …, 2012
732012
Program characterization using runtime values and its application to software plagiarism detection
YC Jhi, X Jia, X Wang, S Zhu, P Liu, D Wu
IEEE Transactions on Software Engineering 41 (9), 925-943, 2015
402015
Demise: Interpretable deep extraction and mutual information selection techniques for IoT intrusion detection
LR Parker, PD Yoo, TA Asyhari, L Chermak, Y Jhi, K Taha
Proceedings of the 14th international conference on availability …, 2019
192019
IMPACT: Impersonation attack detection via edge computing using deep autoencoder and feature abstraction
SJ Lee, PD Yoo, AT Asyhari, Y Jhi, L Chermak, CY Yeun, K Taha
IEEE Access 8, 65520-65529, 2020
182020
Cross-layer damage assessment for cyber situational awareness
P Liu, X Jia, S Zhang, X Xiong, YC Jhi, K Bai, J Li
Cyber Situational Awareness, 155-176, 2010
162010
Evaluation of Collaborative Worm Containments on DETER Testbed.
L Li, P Liu, Y Jhi, G Kesidis
DETER, 2007
122007
SAS: semantics aware signature generation for polymorphic worm detection
D Kong, YC Jhi, T Gong, S Zhu, P Liu, H Xi
International Journal of Information Security 10 (5), 269-283, 2011
112011
Sas: Semantics aware signature generation for polymorphic worm detection
D Kong, YC Jhi, T Gong, S Zhu, P Liu, H Xi
International Conference on Security and Privacy in Communication Systems, 1-19, 2010
102010
Protecting web services from remote exploit code: a static analysis approach
X Wang, YC Jhi, S Zhu, P Liu
Proceedings of the 17th international conference on World Wide Web, 1139-1140, 2008
92008
PWC: A proactive worm containment solution for enterprise networks
YC Jhi, P Liu, L Li, Q Gu, J Jing, G Kesidis
Security and Communication Networks 3 (4), 334-354, 2010
72010
Apparatus and method for detecting malicious code
YC Jhi, S Hwang
US Patent App. 15/333,849, 2017
12017
Method and apparatus for detecting vulnerability of multi-language program
YJ Kum, YC Jhi, HC Park
US Patent App. 17/081,594, 2021
2021
Method and apparatus for detecting nop sled
YC Jhi, YJ Kum, JH Kim, IS Jeong
US Patent App. 15/933,522, 2018
2018
A study of selected security measures against non-legitimate use of code
YC Jhi
The Pennsylvania State University, 2010
2010
A prolog tailoring technique on an epilog tailored procedure
YC Jhi, KC Kim, K Ebcioglu, YS Lee
International Andrei Ershov Memorial Conference on Perspectives of System …, 2001
2001
The system can't perform the operation now. Try again later.
Articles 1–20