• 565 Citations
  • 12 h-Index
20032020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2020

Packer identification method based on byte sequences

Jung, B. H., Bae, S. I., Choi, C. & Im, E. G., 2020 Apr 25, In : Concurrency Computation. 32, 8, e5082.

Research output: Contribution to journalArticle

2 Scopus citations
2019

A multimodal deep learning method for android malware detection using various features

Kim, T., Kang, B., Rho, M., Sezer, S. & Im, E. G., 2019 Mar, In : IEEE Transactions on Information Forensics and Security. 14, 3, p. 773-788 16 p., 8443370.

Research output: Contribution to journalArticle

43 Scopus citations

Automatic hybrid analysis technique to improve botnet code coverage using fake server

Bae, S., Kim, S. H. & Im, E. G., 2019 Sep 24, Proceedings of the 2019 Research in Adaptive and Convergent Systems, RACS 2019. Association for Computing Machinery, Inc, p. 276-282 7 p. (Proceedings of the 2019 Research in Adaptive and Convergent Systems, RACS 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary executable file similarity calculation using function matching

Kim, T. G., Lee, Y. R., Kang, B. J. & Im, E. G., 2019 Feb 6, In : Journal of Supercomputing. 75, 2, p. 607-622 16 p.

Research output: Contribution to journalArticle

DGA-based malware detection using DNS traffic analysis

Lee, J. Y., Chang, J. Y. & Im, E. G., 2019 Sep 24, Proceedings of the 2019 Research in Adaptive and Convergent Systems, RACS 2019. Association for Computing Machinery, Inc, p. 283-288 6 p. (Proceedings of the 2019 Research in Adaptive and Convergent Systems, RACS 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ransomware detection using machine learning algorithms

Bae, S. I., Lee, G. B. & Im, E. G., 2019 Jan 1, In : Concurrency Computation. e5422.

Research output: Contribution to journalArticle

3 Scopus citations
2018

Detection Method for Distributed Web-Crawlers: A Long-Tail Threshold Model

Ro, I., Han, J. S. & Im, E. G., 2018, In : Security and Communication Networks. 2018, 9065424.

Research output: Contribution to journalArticle

2 Scopus citations

Malware classification using byte sequence information

Jung, B., Kim, T. & Im, E. G., 2018 Oct 9, Proceedings of the 2018 Research in Adaptive and Convergent Systems, RACS 2018. Association for Computing Machinery, Inc, p. 143-148 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Runtime Detection Framework for Android Malware

Kim, T., Kang, B. & Im, E. G., 2018, In : Mobile Information Systems. 2018, 8094314.

Research output: Contribution to journalArticle

2 Scopus citations
2017

Extracting the representative API call patterns of malware families using recurrent neural network

Kwon, I. & Im, E. G., 2017 Sep 20, Proceedings of the 2017 Research in Adaptive and Convergent Systems, RACS 2017. Association for Computing Machinery, Inc, p. 202-207 6 p. (Proceedings of the 2017 Research in Adaptive and Convergent Systems, RACS 2017; vol. 2017-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Mobile-based continuous user authentication system for cloud security

Li, Q., Wang, L., Kim, T. & Im, E. G., 2017 Jul 10, Proceedings of 2016 5th International Conference on Network Infrastructure and Digital Content, IEEE IC-NIDC 2016. Institute of Electrical and Electronics Engineers Inc., p. 176-179 4 p. 7974559. (Proceedings of 2016 5th International Conference on Network Infrastructure and Digital Content, IEEE IC-NIDC 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
2016

A dynamic taint analysis method of control-dependent data

Kang, B., Kim, T., Kim, J. & Im, E. G., 2016 Nov 1, In : Information (Japan). 19, 11, p. 5245-5259 15 p.

Research output: Contribution to journalArticle

Credible, resilient, and scalable detection of software plagiarism using authority histograms

Chae, D. K., Ha, J., Kim, S-W., Kang, B. J., Im, E. G. & Park, S. J., 2016 Mar 1, In : Knowledge-Based Systems. 95, p. 114-124 11 p.

Research output: Contribution to journalArticle

6 Scopus citations

Malware Analysis and Classification Using Sequence Alignments

Cho, I. K., Kim, T. G., Shim, Y. J., Ryu, M. & Im, E. G., 2016 Jul 2, In : Intelligent Automation and Soft Computing. 22, 3, p. 371-377 7 p.

Research output: Contribution to journalArticle

6 Scopus citations

Touch gesture data based authentication method for smartphone users

Park, J. G., Kim, T. G. & Im, E. G., 2016 Oct 11, Proceedings of the 2016 Research in Adaptive and Convergent Systems, RACS 2016. Association for Computing Machinery, Inc, p. 136-141 6 p. (Proceedings of the 2016 Research in Adaptive and Convergent Systems, RACS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

User authentication method using shaking actions in mobile devices

Lee, T. K., Kim, T. G. & Im, E. G., 2016 Oct 11, Proceedings of the 2016 Research in Adaptive and Convergent Systems, RACS 2016. Association for Computing Machinery, Inc, p. 142-147 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2015

A study on similarity calculation method for API invocation sequences

Shim, Y. J., Kim, T. G. & Im, E. G., 2015 Jan 1, Rough Sets and Knowledge Technology - 10th International Conference, RSKT 2015, Proceedings. Wu, W-Z., Ciucci, D., Wang, G. & Mitra, S. (eds.). Springer Verlag, p. 492-501 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9436).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Extracting representative API patterns of malware families using multiple sequence alignments

Cho, I. K. & Im, E. G., 2015 Oct 9, Proceeding of the 2015 Research in Adaptive and Convergent Systems, RACS 2015. Association for Computing Machinery, Inc, p. 308-313 6 p. (Proceeding of the 2015 Research in Adaptive and Convergent Systems, RACS 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Structural information based malicious app similarity calculation and clustering

Kim, J., Kim, T. G. & Im, E. G., 2015 Oct 9, Proceeding of the 2015 Research in Adaptive and Convergent Systems, RACS 2015. Association for Computing Machinery, Inc, p. 314-318 5 p. (Proceeding of the 2015 Research in Adaptive and Convergent Systems, RACS 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations
2014

Analysis of binary code topology for dynamic analysis

Kang, B. & Im, E. G., 2014 Jan 1, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC 2014. Association for Computing Machinery, p. 1731-1732 2 p. (Proceedings of the ACM Symposium on Applied Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Evading anti-debugging techniques with binary substitution

Lee, J. K., Kang, B. J. & Im, E. G., 2014 Feb 20, In : International Journal of Security and its Applications. 8, 1, p. 183-192 10 p.

Research output: Contribution to journalArticle

3 Scopus citations

Feature set reduction for the detection of packed executables

Burgess, C., Sezer, S., McLaughlin, K. & Im, E. G., 2014 Jan 1, IET Conference Publications. CP639 ed. Institution of Engineering and Technology, p. 263-268 6 p. (IET Conference Publications; vol. 2014, no. CP639).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware analysis using visualized image matrices

Han, K., Kang, B. & Im, E. G., 2014 Jan 1, In : Scientific World Journal. 2014, 132713.

Research output: Contribution to journalArticle

30 Scopus citations

Malware analysis using visualized images and entropy graphs

Han, K. S., Lim, J. H., Kang, B. & Im, E. G., 2014 Jan 1, In : International Journal of Information Security. 14, 1

Research output: Contribution to journalArticle

58 Scopus citations

Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering

Kang, B., Han, K. S., Kang, B. & Im, E. G., 2014 Dec 1, In : Digital Investigation. 11, 4, p. 323-335 13 p.

Research output: Contribution to journalArticle

11 Scopus citations

Malware detection: Program run length against detection rate

Okane, P., Sezer, S., McLaughlin, K. & Im, E. G., 2014 Jan 31, In : IET Software. 8, 1, p. 42-51 10 p.

Research output: Contribution to journalArticle

7 Scopus citations

Multiattribute SCADA-specific intrusion detection system for power networks

Yang, Y., McLaughlin, K., Sezer, S., Littler, T., Im, E. G., Pranggono, B. & Wang, H. F., 2014 Jun, In : IEEE Transactions on Power Delivery. 29, 3, p. 1092-1102 11 p., 6737311.

Research output: Contribution to journalArticle

82 Scopus citations

Similarity calculation method for user-define functions to detect malware variants

Kim, T. G., Park, J. B., Cho, I. G., Im, E. G., Kang, B. & Kang, S. Y., 2014 Oct 5, Proceedings of the 2014 Research in Adaptive and Convergent Systems, RACS 2014. Association for Computing Machinery, Inc, p. 236-241 6 p. (Proceedings of the 2014 Research in Adaptive and Convergent Systems, RACS 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Survey of dynamic taint analysis

Kim, J., Kim, T. & Im, E. G., 2014 Jan 1, Proceedings of 2014 4th IEEE International Conference on Network Infrastructure and Digital Content, IEEE IC-NIDC 2014. Zhang, L., Guo, J., Zhang, X., Yang, J. & Wang, W. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 269-272 4 p. 7000307

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

TASEL: Dynamic Taint Analysis with selective control dependency

Kang, B., Kim, T. G., Kang, B. J., Im, E. G. & Ryu, M., 2014 Jan 1, Proceedings of the 2014 Research in Adaptive and Convergent Systems, RACS 2014. Association for Computing Machinery, Inc, p. 272-277 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations
2013

Android malware classification method: Dalvik bytecode frequency analysis

Kang, B., Kang, B. J., Kim, J. & Im, E. G., 2013 Dec 1, Proceedings of the 2013 Research in Adaptive and Convergent Systems, RACS 2013. p. 349-350 2 p. (Proceedings of the 2013 Research in Adaptive and Convergent Systems, RACS 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Scopus citations

Balanced indexing method for efficient intrusion detection systems

Kang, B. J., Kim, H. S., Yang, J. S. & Im, E. G., 2013 Apr 15, Information Security and Cryptology, ICISC 2012 - 15th International Conference, Revised Selected Papers. p. 37-48 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7839 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Bosf: By-owner script filtering

Kim, J., Han, K. S., Jiang, B. & Im, E. G., 2013 Jan 1, p. 26-30. 5 p.

Research output: Contribution to conferencePaper

Function matching-based binary-level software similarity calculation

Lee, Y. R., Kang, B. J. & Im, E. G., 2013 Dec 1, Proceedings of the 2013 Research in Adaptive and Convergent Systems, RACS 2013. p. 322-327 6 p. (Proceedings of the 2013 Research in Adaptive and Convergent Systems, RACS 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

How to violate android's permission system without violating it

Han, K. S., Lee, Y., Jiang, B. & Im, E. G., 2013 Jan 1, p. 18-25. 8 p.

Research output: Contribution to conferencePaper

1 Scopus citations

Import API sequences analysis for malware classification

Han, K. S. & Im, E. G., 2013 Aug, In : Information (Japan). 16, 8 A, p. 5613-5624 12 p.

Research output: Contribution to journalArticle

Malware analysis method using visualization of binary files

Han, K., Lim, J. H. & Im, E. G., 2013 Dec 1, Proceedings of the 2013 Research in Adaptive and Convergent Systems, RACS 2013. p. 317-321 5 p. (Proceedings of the 2013 Research in Adaptive and Convergent Systems, RACS 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

39 Scopus citations

Malware classification method via binary content comparison

Kim, T. G., Kang, B. & Im, E. G., 2013 Aug, In : Information (Japan). 16, 8 A, p. 5773-5788 16 p.

Research output: Contribution to journalArticle

Real-time malware detection framework in intrusion detection systems

Kim, S. W., Kim, T. G. & Im, E. G., 2013 Dec 1, Proceedings of the 2013 Research in Adaptive and Convergent Systems, RACS 2013. p. 351-352 2 p. (Proceedings of the 2013 Research in Adaptive and Convergent Systems, RACS 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Rule-based anti-anti-debugging system

Lee, J. K., Kang, B. J. & Im, E. G., 2013 Dec 1, Proceedings of the 2013 Research in Adaptive and Convergent Systems, RACS 2013. p. 353-354 2 p. (Proceedings of the 2013 Research in Adaptive and Convergent Systems, RACS 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Software plagiarism detection: A graph-based approach

Chae, D. K., Ha, J., Kim, S-W., Kang, B. J. & Im, E. G., 2013 Dec 11, CIKM 2013 - Proceedings of the 22nd ACM International Conference on Information and Knowledge Management. p. 1577-1580 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

28 Scopus citations

SVM Training phase reduction using dataset feature filtering for malware detection

O'Kane, P., Sezer, S., McLaughlin, K. & Im, E. G., 2013 Mar 11, In : IEEE Transactions on Information Forensics and Security. 8, 3, p. 500-509 10 p., 6420939.

Research output: Contribution to journalArticle

37 Scopus citations

Web page request behavior analysis for threshold based HTTP GET Flooding attack detection

Choi, Y., Kim, I. & Im, E. G., 2013 Jan 1, In : Information (Japan). 16, 8 B, p. 6025-6039 15 p.

Research output: Contribution to journalArticle

2012

An analysis of malware attached in spam

Im, E. G. & Han, K. S., 2012 Jan 1, Proceedings of the International Conference on IT Convergence and Security 2011. p. 601-605 5 p. (Lecture Notes in Electrical Engineering; vol. 120 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A study on instruction substitution analysis of metamorphic malware

Han, K. S., Chung, K. Y. & Im, E. G., 2012 Jan 1, Proceedings of the International Conference on IT Convergence and Security 2011. p. 595-599 5 p. (Lecture Notes in Electrical Engineering; vol. 120 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A survey on P2P botnet detection

Han, K. S. & Im, E. G., 2012 Jan 1, Proceedings of the International Conference on IT Convergence and Security 2011. p. 589-593 5 p. (Lecture Notes in Electrical Engineering; vol. 120 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Detection methods for malware variant using API call related graphs

Han, K. S., Kim, I. K. & Im, E. G., 2012 Jan 1, Proceedings of the International Conference on IT Convergence and Security 2011. p. 607-611 5 p. (Lecture Notes in Electrical Engineering; vol. 120 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Fast malware classification using counting bloom filter

Kang, B. J., Kim, H. S., Kim, T., Kwon, H. & Im, E. G., 2012 Jul 1, In : Information. 15, 7, p. 2879-2892 14 p.

Research output: Contribution to journalArticle

Instruction frequency-based malware classification method

Han, K. S., Kim, S. R. & Im, E. G., 2012 Jul, In : Information. 15, 7, p. 2973-2983 11 p.

Research output: Contribution to journalArticle

5 Scopus citations

Malware classification methods using API sequence characteristics

Han, K. S., Kim, I. K. & Im, E. G., 2012 Jan 1, Proceedings of the International Conference on IT Convergence and Security 2011. p. 613-626 14 p. (Lecture Notes in Electrical Engineering; vol. 120 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations