Follow
Seunghoon Woo
Seunghoon Woo
Assistant Professor at Korea University Software Security & Privacy Lab
Verified email at korea.ac.kr - Homepage
Title
Cited by
Cited by
Year
Vuddy: A scalable approach for vulnerable code clone discovery
S Kim, S Woo, H Lee, H Oh
2017 IEEE symposium on security and privacy (SP), 595-614, 2017
3532017
CENTRIS: A Precise and Scalable Approach for Identifying Modified Open-Source Software Reuse
S Woo, S Park, S Kim, H Lee, H Oh
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
37*2021
{MOVERY}: A Precise Approach for Modified Vulnerable Code Clone Discovery from Modified {Open-Source} Software Components
S Woo, H Hong, E Choi, H Lee
31st USENIX Security Symposium (USENIX Security 22), 3037-3053, 2022
162022
{V0Finder}: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities
S Woo, D Lee, S Park, H Lee, S Dietrich
30th USENIX Security Symposium (USENIX Security 21), 3041-3058, 2021
162021
Poster: Iotcube: an automated analysis platform for finding security vulnerabilities
S Kim, S Woo, H Lee, H Oh
Proceedings of the 38th IEEE Symposium on Poster presented at Security and …, 2017
102017
Dicos: Discovering insecure code snippets from stack overflow posts by leveraging user discussions
H Hong, S Woo, H Lee
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
92021
xVDB: A high-coverage approach for constructing a vulnerability database
H Hong, S Woo, E Choi, J Choi, H Lee
IEEE Access 10, 85050-85063, 2022
82022
L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing
H Park, CK Nkuba, S Woo, H Lee
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022
52022
{V1SCAN}: Discovering 1-day Vulnerabilities in Reused {C/C++} Open-source Software Components Using Code Classification Techniques
S Woo, E Choi, H Lee, H Oh
32nd USENIX Security Symposium (USENIX Security 23), 6541-6556, 2023
42023
OCTOPOCS: automatic verification of propagated vulnerable code using reformed proofs of concept
S Kwon, S Woo, G Seong, H Lee
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
42021
ZMAD: Lightweight Model-Based Anomaly Detection for the Structured Z-Wave Protocol
CK Nkuba, S Woo, H Lee, S Dietrich
IEEE Access, 2023
32023
Circuit: A javascript memory heap-based approach for precisely detecting cryptojacking websites
H Hong, S Woo, S Park, J Lee, H Lee
IEEE Access 10, 95356-95368, 2022
32022
공급망 보안을 위한 오픈소스 소프트웨어 취약점 관리 기술
홍현지, 우승훈, 이희조
정보보호학회지 32 (5), 35-43, 2022
12022
Cneps: A Precise Approach for Examining Dependencies among Third-Party C/C++ Open-Source Components
Y Na, S Woo, J Lee, H Lee
2024
오픈소스 SW 취약점 분석및 탐지기술 동향
우승훈, 홍현지, 이희조
OSIA Standards & Technology Review Journal 35 (2), 31-39, 2022
2022
A Large-Scale Analysis of the Effectiveness of Publicly Reported Security Patches
S Woo, E Choi, H Lee
Available at SSRN 4630707, 0
The system can't perform the operation now. Try again later.
Articles 1–16