Search Results - "Kim, Eui Tak"
-
1
Sumav: Fully automated malware labeling
Published in ICT express (01-12-2022)“…Multiple AV engines are used to ensure more effective system protection against malicious files. These AV engines are capable of distinguishing between benign…”
Get full text
Journal Article -
2
Android malware dataset construction methodology to minimize bias–variance tradeoff
Published in ICT express (01-09-2022)“…Recently, research on Android malware categorization and detection is increasingly directed toward proposing different learned models based on various features…”
Get full text
Journal Article -
3
Malware Response Naming Scheme for Security Control Service
Published in 2020 International Conference on Information and Communication Technology Convergence (ICTC) (21-10-2020)“…The Computer Anti-virus Research Organization (CARO) malware naming scheme was created more than 30 years ago. During the 30 years, the malware naming scheme…”
Get full text
Conference Proceeding -
4
Sumav: A Scheme for Selecting a Keyword from Detection Names using Conditional Probability
Published in 2020 International Conference on Information and Communication Technology Convergence (ICTC) (21-10-2020)“…With the rapid increase of malware, the detection and recognition of malware are getting hard. In this paper, we propose a scheme for selecting the…”
Get full text
Conference Proceeding -
5
Android Malware Similarity Clustering using Method based Opcode Sequence and Jaccard Index
Published in 2019 International Conference on Information and Communication Technology Convergence (ICTC) (01-10-2019)“…Recently, Android malicious code shows a trend to spread a large number of variants in a short time. This type of malicious code is mainly produced by reusing…”
Get full text
Conference Proceeding -
6
Evaluation of Image Similarity Algorithms for Malware Fake-Icon Detection
Published in 2020 International Conference on Information and Communication Technology Convergence (ICTC) (21-10-2020)“…Malware Creators have steadily used Social engineering attacks that induce people to execute malware by stealing icons of well-known programs or disguise…”
Get full text
Conference Proceeding -
7
Design of Integrated Messenger Anti-virus System using Chatbot Service
Published in 2020 International Conference on Information and Communication Technology Convergence (ICTC) (21-10-2020)“…Today, people use various types of messengers having each own function regardless of PC or Mobile, and the number of messenger users is more and more…”
Get full text
Conference Proceeding