Personal information

Activities

Employment (1)

Korea University: Seoul, KR

Employment
Source: Self-asserted source
Seunghoon Woo

Works (16)

A large-scale analysis of the effectiveness of publicly reported security patches

Computers & Security
2025-01 | Journal article
Contributors: Seunghoon Woo; Eunjin Choi; Heejo Lee
Source: check_circle
Crossref

CNEPS: A Precise Approach for Examining Dependencies among Third-Party C/C++ Open-Source Components

2024-04-12 | Conference paper
Contributors: Yoonjong Na; Seunghoon Woo; Joomyeong Lee; Heejo Lee
Source: check_circle
Crossref

A Large-Scale Analysis of the Effectiveness of Publicly Reported Security Patches

SSRN
2023 | Other
EID:

2-s2.0-85177730726

Part of ISSN: 15565068
Contributors: Woo, S.; Choi, E.; Lee, H.
Source: Self-asserted source
Seunghoon Woo via Scopus - Elsevier

V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques

32nd USENIX Security Symposium, USENIX Security 2023
2023 | Conference paper
EID:

2-s2.0-85176141806

Contributors: Woo, S.; Choi, E.; Lee, H.; Oh, H.
Source: Self-asserted source
Seunghoon Woo via Scopus - Elsevier

ZMAD: Lightweight Model-Based Anomaly Detection for the Structured Z-Wave Protocol

IEEE Access
2023 | Journal article
Contributors: Carlos Kayembe Nkuba; Seunghoon Woo; Heejo Lee; Sven Dietrich
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Circuit: A JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites

IEEE Access
2022 | Journal article
Contributors: Hyunji Hong; Seunghoon Woo; Sunghan Park; Jeongwook Lee; Heejo Lee
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing

arXiv
2022 | Other
EID:

2-s2.0-85135973314

Part of ISSN: 23318422
Contributors: Park, H.; Nkuba, C.K.; Woo, S.; Lee, H.
Source: Self-asserted source
Seunghoon Woo via Scopus - Elsevier

L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing

Proceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022
2022 | Conference paper
EID:

2-s2.0-85136335950

Contributors: Park, H.; Nkuba, C.K.; Woo, S.; Lee, H.
Source: Self-asserted source
Seunghoon Woo via Scopus - Elsevier

MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from Modified Open-Source Software Components

Proceedings of the 31st USENIX Security Symposium, Security 2022
2022 | Conference paper
EID:

2-s2.0-85140970045

Contributors: Woo, S.; Hong, H.; Choi, E.; Lee, H.
Source: Self-asserted source
Seunghoon Woo via Scopus - Elsevier

xVDB: A High-Coverage Approach for Constructing a Vulnerability Database

IEEE Access
2022 | Journal article
Contributors: Hyunji Hong; Seunghoon Woo; Eunjin Choi; Jihyun Choi; Heejo Lee
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

CENTRIS: A precise and scalable approach for identifying modified open-source software reuse

arXiv
2021 | Other
EID:

2-s2.0-85101950770

Part of ISSN: 23318422
Contributors: Woo, S.; Park, S.; Kim, S.; Lee, H.; Oh, H.
Source: Self-asserted source
Seunghoon Woo via Scopus - Elsevier

CENTRIS: A precise and scalable approach for identifying modified open-source software reuse

Proceedings - International Conference on Software Engineering
2021 | Conference paper
EID:

2-s2.0-85113459739

Part of ISSN: 02705257
Contributors: Woo, S.; Park, S.; Kim, S.; Lee, H.; Oh, H.
Source: Self-asserted source
Seunghoon Woo via Scopus - Elsevier

Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User Discussions

ACM International Conference Proceeding Series
2021 | Conference paper
EID:

2-s2.0-85121619477

Contributors: Hong, H.; Woo, S.; Lee, H.
Source: Self-asserted source
Seunghoon Woo via Scopus - Elsevier

OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept

Proceedings - 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2021
2021 | Conference paper
EID:

2-s2.0-85114900027

Contributors: Kwon, S.; Woo, S.; Seong, G.; Lee, H.
Source: Self-asserted source
Seunghoon Woo via Scopus - Elsevier

V0Finder: Discovering the correct origin of publicly reported software vulnerabilities

Proceedings of the 30th USENIX Security Symposium
2021 | Conference paper
EID:

2-s2.0-85114461716

Contributors: Woo, S.; Lee, D.; Park, S.; Lee, H.; Dietrich, S.
Source: Self-asserted source
Seunghoon Woo via Scopus - Elsevier

VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery

Proceedings - IEEE Symposium on Security and Privacy
2017 | Conference paper
EID:

2-s2.0-85024498630

Part of ISSN: 10816011
Contributors: Kim, S.; Woo, S.; Lee, H.; Oh, H.
Source: Self-asserted source
Seunghoon Woo via Scopus - Elsevier