Personal information

Activities

Employment (4)

Soongsil University: Dongjak-gu, Seoul, KR

2008-09-01 to present | Professor (Software)
Employment
Source: Self-asserted source
Jeong Hyun Yi

Samsung Advanced Institute of Technology: Yongin, KR

2005-10-01 to 2008-08-31 | Principal Researcher
Employment
Source: Self-asserted source
Jeong Hyun Yi

Electronics and Telecommunications Research Institute: Daejeon, KR

1995-02-01 to 2001-07-31 | Researcher
Employment
Source: Self-asserted source
Jeong Hyun Yi

National Institute of Standards and Technology: Gaithersburg, MD, US

2000-04-01 to 2001-03-31 | Guest Researcher
Employment
Source: Self-asserted source
Jeong Hyun Yi

Education and qualifications (1)

University of California Irvine: Irvine, CA, US

2001-09-01 to 2005-08-31 | Ph.D. (Information and Computer Science)
Education
Source: Self-asserted source
Jeong Hyun Yi

Works (50 of 62)

Items per page:
Page 1 of 2

Pinicorn: Towards Automated Dynamic Analysis for Unpacking 32-Bit PE Malware

Electronics
2024-05-27 | Journal article
Contributors: Gwangyeol Lee; Minho Kim; Jeong Hyun Yi; Haehyun Cho
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

FAM: Featuring Android Malware for Deep Learning-Based Familial Analysis

IEEE Access
2022 | Journal article
Contributors: Younghoon Ban; Sunjun Lee; Dokyung Song; Haehyun Cho; Jeong Hyun Yi
Source: check_circle
Crossref

Large-Scale Analysis on Anti-Analysis Techniques in Real-World Malware

IEEE Access
2022 | Journal article
Contributors: Minho Kim; Haehyun Cho; Jeong Hyun Yi
Source: check_circle
Crossref

MAPAS: a practical deep learning-based android malware detection system

International Journal of Information Security
2022-08 | Journal article
Contributors: Jinsung Kim; Younghoon Ban; Eunbyeol Ko; Haehyun Cho; Jeong Hyun Yi
Source: check_circle
Crossref

Automated Multi-Layered Bytecode Generation for Preventing Sensitive Information Leaks From Android Applications

IEEE Access
2021 | Journal article
Contributors: Geochang Jeon; Minseong Choi; Sunjun Lee; Jeong Hyun Yi; Haehyun Cho
Source: check_circle
Crossref

ACAMA: Deep Learning-Based Detection and Classification of Android Malware Using API-Based Features

Security and Communication Networks
2021-12-29 | Journal article
Contributors: Eunbyeol Ko; Jinsung Kim; Younghoon Ban; Haehyun Cho; Jeong Hyun Yi; Ilsun You
Source: check_circle
Crossref

Risk Assessment Scheme for Mobile Applications Based on Tree Boosting

IEEE Access
2020 | Journal article
Contributors: Kichang Kim; Jinsung Kim; Eunbyeol Ko; Jeong Hyun Yi
Source: check_circle
Crossref

Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting

Mobile Information Systems
2020-10-10 | Journal article
Contributors: Sungtae Kim; Taeyong Park; Geochang Jeon; Jeong Hyun Yi
Source: check_circle
Crossref

Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART

Sensors
2019-06-10 | Journal article
Contributors: Geonbae Na; Jongsu Lim; Sunjun Lee; Jeong Hyun Yi
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Code-Based Authentication Scheme for Lightweight Integrity Checking of Smart Vehicles

IEEE Access
2018 | Journal article
Contributors: Joonsang Yoo; Jeong Hyun Yi
Source: check_circle
Crossref

DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications

IEEE Access
2018 | Journal article
Contributors: Haehyun Cho; Jeong Hyun Yi; Gail-Joon Ahn
Source: check_circle
Crossref

Empirical analysis of anti-reversing schemes for protecting mobile codes in the internet-of-things

International Journal of Services, Technology and Management
2017 | Journal article
EID:

2-s2.0-85011264964

Contributors: Cho, H.; Kim, H.; Lim, J.; Lee, J.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Security Assessment of Code Obfuscation Based on Dynamic Monitoring in Android Things

IEEE Access
2017 | Journal article
Contributors: Taejoo Cho; Hyunki Kim; Jeong Hyun Yi
Source: check_circle
Crossref

Advances in Mobile Security Technologies

Mobile Information Systems
2016 | Journal article
EID:

2-s2.0-84979671259

Contributors: Yi, J.H.; Mohaisen, A.; Yang, S.; Hsu, C.-H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Anti-debugging scheme for protecting mobile apps on android platform

Journal of Supercomputing
2016 | Journal article
EID:

2-s2.0-84957430599

Contributors: Cho, H.; Lim, J.; Kim, H.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications

Journal of Supercomputing
2016 | Journal article
EID:

2-s2.0-84982129484

Contributors: Kim, S.R.; Kim, J.N.; Kim, S.T.; Shin, S.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Checking intent-based communication in android with intent space analysis

ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security
2016 | Conference paper
EID:

2-s2.0-84979680901

Contributors: Jing, Y.; Ahn, G.-J.; Doupé, A.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Cyber threats to mobile messenger apps from identity cloning

Intelligent Automation and Soft Computing
2016 | Journal article
EID:

2-s2.0-84951280715

Contributors: Park, S.; Seo, C.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Hardware-assisted credential management scheme for preventing private data analysis from cloning attacks

Multimedia Tools and Applications
2016 | Journal article
EID:

2-s2.0-84955279617

Contributors: Choi, J.; Na, G.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Mobile application tamper detection scheme using dynamic code injection against repackaging attacks

Journal of Supercomputing
2016 | Journal article
EID:

2-s2.0-84983507478

Contributors: Cho, H.; Bang, J.; Ji, M.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Server-based code obfuscation scheme for APK tamper detection

Security and Communication Networks
2016 | Journal article
EID:

2-s2.0-84959272528

Contributors: Piao, Y.; Jung, J.-H.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Structural analysis of packing schemes for extracting hidden codes in mobile malware

Eurasip Journal on Wireless Communications and Networking
2016 | Journal article
EID:

2-s2.0-84988432691

Contributors: Lim, J.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Tamper detection scheme using signature segregation on android platform

5th IEEE International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2015
2016 | Conference paper
EID:

2-s2.0-84977630678

Contributors: Bang, J.; Cho, H.; Ji, M.; Cho, T.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Account forgery and privilege escalation attacks on android home cloud devices

Advanced Science Letters
2015 | Journal article
EID:

2-s2.0-84941042077

Contributors: Cho, T.; Na, G.; Lee, D.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Cyber threats to industrial control systems

MIST 2015 - Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, co-located with CCS 2015
2015 | Conference paper
EID:

2-s2.0-84956603741

Contributors: Yim, K.; Castiglione, A.; Yi, J.H.; Migliardi, M.; You, I.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Information security applications: 15th International workshop, WISA 2014 jeju island, korea, august 25-27, 2014 revised selected papers

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2015 | Book
EID:

2-s2.0-84922175287

Contributors: Rhee, K.-H.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Mobile device management system with portable devices

Proceedings of the International Symposium on Consumer Electronics, ISCE
2015 | Conference paper
EID:

2-s2.0-84953303041

Contributors: Ji, M.; Kim, S.; Park, Y.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Personal information leaks with automatic login in mobile social network services

Entropy
2015 | Journal article
EID:

2-s2.0-84934325878

Contributors: Choi, J.; Cho, H.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Preface

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2015 | Book
EID:

2-s2.0-84922191513

Contributors: Rhee, K.-H.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

The endpoint application execution control scheme based on the whitelist

International Journal of Control and Automation
2015 | Journal article
EID:

2-s2.0-84929314392

Contributors: Kim, C.-H.; Yi, J.-H.; Kim, J.-B.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

FakePIN: Dummy key based mobile user authentication scheme

Lecture Notes in Electrical Engineering
2014 | Book
EID:

2-s2.0-84958535674

Contributors: Kim, S.; Yi, H.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Spyware resistant smartphone user authentication scheme

International Journal of Distributed Sensor Networks
2014 | Journal article
EID:

2-s2.0-84897561804

Contributors: Kim, T.; Yi, J.H.; Seo, C.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier
grade
Preferred source (of 2)‎

Touch logger resistant mobile authentication scheme using multimodal sensors

Lecture Notes in Electrical Engineering
2014 | Book
EID:

2-s2.0-84898478500

Contributors: Yi, H.; Piao, Y.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Automatic email configuration system using multimodal authentication interfaces for smartphones

Applied Mechanics and Materials
2013 | Book
EID:

2-s2.0-84886296881

Contributors: Kim, T.J.; Piao, Y.X.; Seo, C.H.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Elastic password authentication scheme using the Passcell-based virtual scroll wheel

International Journal of Computer Mathematics
2013 | Journal article
EID:

2-s2.0-84890122771

Contributors: Yi, H.; Kim, S.; Ma, G.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Mobile user authentication scheme based on minesweeper game

Lecture Notes in Electrical Engineering
2013 | Book
EID:

2-s2.0-84880749285

Contributors: Kim, T.; Kim, S.; Yi, H.; Ma, G.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Multi-signature based tamper detection scheme of android applications

Sensor Letters
2013 | Journal article
EID:

2-s2.0-84893473031

Contributors: Lee, H.-C.; Jung, J.-H.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Repackaging attack on android banking applications and its countermeasures

Wireless Personal Communications
2013 | Journal article
EID:

2-s2.0-84890552399

Contributors: Jung, J.-H.; Kim, J.Y.; Lee, H.-C.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Secure and lightweight authentication protocol for mobile RFID privacy

Applied Mathematics and Information Sciences
2013 | Journal article
EID:

2-s2.0-84873434287

Contributors: Lee, H.-C.; Eom, T.Y.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Shoulder-surfing resistant smartphone authentication scheme using virtual joystick

Applied Mechanics and Materials
2013 | Book
EID:

2-s2.0-84873907826

Contributors: Kim, S.; Yi, H.; Ma, G.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Design and implementation of smart channel establishment schemes for mobile wallet services

Advanced Science Letters
2012 | Journal article
EID:

2-s2.0-84862906585

Contributors: Ma, G.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Smartphone remote lock and data wipe system based on message authentication codes

Applied Mechanics and Materials
2012 | Book
EID:

2-s2.0-84555191215

Contributors: Ma, G.; Park, K.; Yi, J.H.; Jin, S.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Development of privacy-preserving RFID authentication system using mobile devices

2011 International Conference on ICT Convergence, ICTC 2011
2011 | Conference paper
EID:

2-s2.0-83755220482

Contributors: Lee, H.-C.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Experimenting with system and Libc call interception attacks on ARM-based Linux kernel

Proceedings of the ACM Symposium on Applied Computing
2011 | Conference paper
EID:

2-s2.0-79959308664

Contributors: Lee, H.-C.; Kim, C.H.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Human verifiable au thentication schemes geared to smart wallet applications

Digest of Technical Papers - IEEE International Conference on Consumer Electronics
2011 | Conference paper
EID:

2-s2.0-79952917609

Contributors: Ma, G.I.; Lee, H.C.; Yi, J.H.; Ki, H.; Choi, D.; Jin, S.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Smartphone remote lock and wipe system with integrity checking of SMS notification

Digest of Technical Papers - IEEE International Conference on Consumer Electronics
2011 | Conference paper
EID:

2-s2.0-79952918800

Contributors: Park, K.; Ma, G.I.; Yi, J.H.; Cho, Y.; Cho, S.; Park, S.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

A study of mobile proxy for privacy enhancement

ICCE 2010 - 2010 Digest of Technical Papers International Conference on Consumer Electronics
2010 | Conference paper
EID:

2-s2.0-77950106128

Contributors: Kim, E.; Kwon, T.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs

IEEE Transactions on Parallel and Distributed Systems
2009 | Journal article
EID:

2-s2.0-85008065996

Contributors: Saxena, N.; Tsudik, G.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Noninteractive self-certification for long-lived mobile ad hoc networks

IEEE Transactions on Information Forensics and Security
2009 | Journal article
EID:

2-s2.0-70450248854

Contributors: Saxena, N.; Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier

Self-configurable authentication mechanism with verifiability in wireless ad hoc networks

GLOBECOM - IEEE Global Telecommunications Conference
2008 | Conference paper
EID:

2-s2.0-67249151068

Contributors: Yi, J.H.
Source: Self-asserted source
Jeong Hyun Yi via Scopus - Elsevier
Items per page:
Page 1 of 2