Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 127
1.
  • UnSafengine64: A Safengine ... UnSafengine64: A Safengine Unpacker for 64-Bit Windows Environments and Detailed Analysis Results on Safengine 2.4.0
    Choi, Seokwoo; Chang, Taejoo; Park, Yongsu Sensors (Basel, Switzerland), 2024-Jan-27, Volume: 24, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Despite recent remarkable advances in binary code analysis, malware developers still use complex anti-reversing techniques that make analysis difficult. Packers are used to protect malware, which are ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
2.
  • A practical approach for fi... A practical approach for finding anti-debugging routines in the Arm-Linux using hardware tracing
    Park, Yeongung; Choi, Seokwoo; Choi, Un Yeong ... Scientific reports, 06/2024, Volume: 14, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Abstract As IoT devices are being widely used, malicious code is increasingly appearing in Linux environments. Sophisticated Linux malware employs various evasive techniques to deter analysis. The ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
3.
  • Photochemical Reactions of ... Photochemical Reactions of the LOV and LOV-Linker Domains of the Blue Light Sensor Protein YtvA
    Choi, Seokwoo; Nakasone, Yusuke; Hellingwerf, Klaas J ... Biochemistry (Easton), 06/2016, Volume: 55, Issue: 22
    Journal Article
    Peer reviewed

    YtvA is a blue light sensor protein composed of an N-terminal LOV (light–oxygen–voltage) domain, a linker helix, and the C-terminal sulfate transporter and anti-σ factor antagonist domain. YtvA is ...
Full text
Available for: IJS, KILJ, NUK, PNG, UL, UM
4.
  • x64Unpack: Hybrid Emulation... x64Unpack: Hybrid Emulation Unpacker for 64-bit Windows Environments and Detailed Analysis Results on VMProtect 3.4
    Choi, Seokwoo; Chang, Taejoo; Kim, Changhyun ... IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    In spite of recent remarkable advances in binary code analysis, malware developers are still using complex anti-reversing techniques to make analysis difficult. To protect malware, they use packers, ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
5.
  • End-to-End Latency Predicti... End-to-End Latency Prediction for General-Topology Cut-Through Switching Networks
    Choi, Seokwoo; Shin, Kyubo; Kim, Hyoil IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    Low latency networking is gaining attention to support futuristic network applications like the Tactile Internet with stringent end-to-end latency requirements. In realizing the vision, cut-through ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
6.
  • Flit Scheduling for Cut-Thr... Flit Scheduling for Cut-Through Switching: Towards Near-Zero End-to-End Latency
    Shin, Kyubo; Choi, Seokwoo; Kim, Hyoil IEEE access, 2019, Volume: 7
    Journal Article
    Peer reviewed
    Open access

    Achieving low end-to-end latency with high reliability is one of the key objectives for future mission-critical applications, like the Tactile Internet and real-time interactive Virtual/Augmented ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
7.
  • A static API birthmark for ... A static API birthmark for Windows binary executables
    Choi, Seokwoo; Park, Heewan; Lim, Hyun-il ... The Journal of systems and software, 05/2009, Volume: 82, Issue: 5
    Journal Article
    Peer reviewed

    A software birthmark is the inherent characteristics of a program extracted from the program itself. By comparing birthmarks, we can detect whether a program is a copy of another program or not. We ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
8.
  • A method for detecting the ... A method for detecting the theft of Java programs through analysis of the control flow information
    Lim, Hyun-il; Park, Heewan; Choi, Seokwoo ... Information and software technology, 09/2009, Volume: 51, Issue: 9
    Journal Article
    Peer reviewed

    A software birthmark refers to the inherent characteristics of a program that can be used to identify the program. In this paper, a method for detecting the theft of Java programs through a static ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
9.
  • Detecting Java Theft Based ... Detecting Java Theft Based on Static API Trace Birthmark
    Park, Heewan; Choi, Seokwoo; Lim, Hyun-il ... Advances in Information and Computer Security
    Book Chapter
    Peer reviewed

    Software birthmark is the inherent program characteristics that can identify a program. In this paper, we propose a static API trace birthmark to detect Java theft. Because the API traces can reflect ...
Full text
10.
  • Photoreaction Dynamics of a... Photoreaction Dynamics of a Full-Length Protein YtvA and Intermolecular Interaction with RsbRA
    Choi, Seokwoo; Nakasone, Yusuke; Hellingwerf, Klaas J ... Biochemistry (Easton), 12/2020, Volume: 59, Issue: 50
    Journal Article
    Peer reviewed

    YtvA from Bacillus subtilis is a sensor protein that responds to blue light stress and regulates the activity of transcription factor σB. It is composed of the N-terminal LOV (light–oxygen–voltage) ...
Full text
Available for: IJS, KILJ, NUK, PNG, UL, UM
1 2 3 4 5
hits: 127

Load filters