​
Login / Signup
Eunsoo Kim
ORCID
Publication Activity (10 Years)
Years Active: 2016-2023
Publications (10 Years): 21
Top Topics
Lessons Learned
Comparative Analysis
Anomaly Detection
Network Security
Top Venues
CoRR
USENIX Security Symposium
IMCOM
NDSS
</>
Publications
</>
Eunsoo Kim
,
Min Woo Baek
,
CheolJun Park
,
Dongkwan Kim
,
Yongdae Kim
,
Insu Yun
BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software.
USENIX Security Symposium
(2023)
Qin Chao
,
Eunsoo Kim
,
Boyang Li
Movie Box Office Prediction With Self-Supervised and Visually Grounded Pretraining.
CoRR
(2023)
Subin Kim
,
Yujin Jeong
,
Anthony Smith
,
Eunsoo Kim
,
Ahyeon Song
,
Choeun Lee
,
Jaden Soroka
Dog Bowel Pad Training IoT by Automatic Snack Feeder and Owner's Voice Compliment Speaker for Human Convenience.
ICTC
(2023)
Eunsoo Kim
,
Segyeong Kim
,
Gyuwon Kim
,
Junghwan Han
Dual-Band CMOS Down-Conversion Mixer Adopting Band-Switchable Transformer.
IEEE Trans. Circuits Syst. II Express Briefs
70 (10) (2023)
Bedeuro Kim
,
Mohsen A. Alawami
,
Eunsoo Kim
,
Sanghak Oh
,
Jeongyong Park
,
Hyoungshick Kim
A Comparative Study of Time Series Anomaly Detection Models for Industrial Control Systems.
Sensors
23 (3) (2023)
Qin Chao
,
Eunsoo Kim
,
Boyang Li
Movie Box Office Prediction With Self-Supervised and Visually Grounded Pretraining.
ICME
(2023)
Segyeong Kim
,
Eunsoo Kim
,
Junhyeop Kim
,
Junghwan Han
CMOS Variable-Gain Low-Noise Amplifier Adopting Transformer-Based Noise Cancelling Technique for 5G NR FR2 Applications.
IEEE Access
11 (2023)
Dongkwan Kim
,
Eunsoo Kim
,
Sang Kil Cha
,
Sooel Son
,
Yongdae Kim
Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned.
IEEE Trans. Software Eng.
49 (4) (2023)
Eunsoo Kim
,
Dongkwan Kim
,
CheolJun Park
,
Insu Yun
,
Yongdae Kim
BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols.
NDSS
(2021)
Dongkwan Kim
,
Eunsoo Kim
,
Mingeun Kim
,
Yeongjin Jang
,
Yongdae Kim
Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds.
IEEE Secur. Priv.
19 (6) (2021)
Dongkwan Kim
,
Eunsoo Kim
,
Sang Kil Cha
,
Sooel Son
,
Yongdae Kim
Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned.
CoRR
(2020)
Jinyong Tim Kim
,
Eunsoo Kim
,
Jinhyuk Yang
,
Jaehoon Jeong
,
Hyoungshick Kim
,
Sangwon Hyun
,
Hyunsik Yang
,
Jaewook Oh
,
Younghan Kim
,
Susan Hares
,
Linda Dunbar
IBCS: Intent-Based Cloud Services for Security Applications.
IEEE Commun. Mag.
58 (4) (2020)
Jaegwan Yu
,
Eunsoo Kim
,
Hyoungshick Kim
,
Jun Ho Huh
Design of a Framework to Detect Device Spoofing Attacks Using Network Characteristics.
IEEE Consumer Electron. Mag.
9 (2) (2020)
Eunsoo Kim
,
Young-Seob Cho
,
Bedeuro Kim
,
Woojoong Ji
,
Seok-Hyun Kim
,
Simon S. Woo
,
Hyoungshick Kim
Can We Create a Cross-Domain Federated Identity for the Industrial Internet of Things without Google?
IEEE Internet Things Mag.
3 (4) (2020)
Mingeun Kim
,
Dongkwan Kim
,
Eunsoo Kim
,
Suryeon Kim
,
Yeongjin Jang
,
Yongdae Kim
FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis.
ACSAC
(2020)
Eunsoo Kim
,
Kuyju Kim
,
Dongsoon Shin
,
Beomjin Jin
,
Hyoungshick Kim
CyTIME: Cyber Threat Intelligence ManagEment framework for automatically generating security rules.
CFI
(2018)
Eunsoo Kim
,
Kuyju Kim
,
Seungjin Lee
,
Jaehoon Paul Jeong
,
Hyoungshick Kim
A Framework for Managing User-defined Security Policies to Support Network Security Functions.
IMCOM
(2018)
Sanghak Oh
,
Eunsoo Kim
,
Jaehoon (Paul) Jeong
,
Hoon Ko
,
Hyoungshick Kim
A flexible architecture for orchestrating network security functions to support high-level security policies.
IMCOM
(2017)
Sanghak Oh
,
Eunsoo Kim
,
Hyoungshick Kim
Empirical Analysis of SSL/TLS Weaknesses in Real Websites: Who Cares?
WISA
(2016)
WonJun Song
,
Hyunwoo Choi
,
Junhong Kim
,
Eunsoo Kim
,
Yongdae Kim
,
John Kim
PIkit: A New Kernel-Independent Processor-Interconnect Rootkit.
USENIX Security Symposium
(2016)
Jaegwan Yu
,
Eunsoo Kim
,
Hyoungshick Kim
,
Jun Ho Huh
A Framework for Detecting MAC and IP Spoofing Attacks with Network Characteristics.
ICSSA
(2016)