UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 105
1.
  • UnSafengine64: A Safengine ... UnSafengine64: A Safengine Unpacker for 64-Bit Windows Environments and Detailed Analysis Results on Safengine 2.4.0
    Choi, Seokwoo; Chang, Taejoo; Park, Yongsu Sensors (Basel, Switzerland), 2024-Jan-27, Volume: 24, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Despite recent remarkable advances in binary code analysis, malware developers still use complex anti-reversing techniques that make analysis difficult. Packers are used to protect malware, which are ...
Full text
2.
  • A practical approach for fi... A practical approach for finding anti-debugging routines in the Arm-Linux using hardware tracing
    Park, Yeongung; Choi, Seokwoo; Choi, Un Yeong ... Scientific reports, 06/2024, Volume: 14, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Abstract As IoT devices are being widely used, malicious code is increasingly appearing in Linux environments. Sophisticated Linux malware employs various evasive techniques to deter analysis. The ...
Full text
3.
  • Photochemical Reactions of ... Photochemical Reactions of the LOV and LOV-Linker Domains of the Blue Light Sensor Protein YtvA
    Choi, Seokwoo; Nakasone, Yusuke; Hellingwerf, Klaas J ... Biochemistry (Easton), 06/2016, Volume: 55, Issue: 22
    Journal Article
    Peer reviewed

    YtvA is a blue light sensor protein composed of an N-terminal LOV (light–oxygen–voltage) domain, a linker helix, and the C-terminal sulfate transporter and anti-σ factor antagonist domain. YtvA is ...
Full text
4.
  • x64Unpack: Hybrid Emulation... x64Unpack: Hybrid Emulation Unpacker for 64-bit Windows Environments and Detailed Analysis Results on VMProtect 3.4
    Choi, Seokwoo; Chang, Taejoo; Kim, Changhyun ... IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    In spite of recent remarkable advances in binary code analysis, malware developers are still using complex anti-reversing techniques to make analysis difficult. To protect malware, they use packers, ...
Full text

PDF
5.
  • End-to-End Latency Predicti... End-to-End Latency Prediction for General-Topology Cut-Through Switching Networks
    Choi, Seokwoo; Shin, Kyubo; Kim, Hyoil IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    Low latency networking is gaining attention to support futuristic network applications like the Tactile Internet with stringent end-to-end latency requirements. In realizing the vision, cut-through ...
Full text

PDF
6.
  • Flit Scheduling for Cut-Thr... Flit Scheduling for Cut-Through Switching: Towards Near-Zero End-to-End Latency
    Shin, Kyubo; Choi, Seokwoo; Kim, Hyoil IEEE access, 2019, Volume: 7
    Journal Article
    Peer reviewed
    Open access

    Achieving low end-to-end latency with high reliability is one of the key objectives for future mission-critical applications, like the Tactile Internet and real-time interactive Virtual/Augmented ...
Full text

PDF
7.
  • A static API birthmark for ... A static API birthmark for Windows binary executables
    Choi, Seokwoo; Park, Heewan; Lim, Hyun-il ... The Journal of systems and software, 05/2009, Volume: 82, Issue: 5
    Journal Article
    Peer reviewed

    A software birthmark is the inherent characteristics of a program extracted from the program itself. By comparing birthmarks, we can detect whether a program is a copy of another program or not. We ...
Full text
8.
  • A method for detecting the ... A method for detecting the theft of Java programs through analysis of the control flow information
    Lim, Hyun-il; Park, Heewan; Choi, Seokwoo ... Information and software technology, 09/2009, Volume: 51, Issue: 9
    Journal Article
    Peer reviewed

    A software birthmark refers to the inherent characteristics of a program that can be used to identify the program. In this paper, a method for detecting the theft of Java programs through a static ...
Full text
9.
  • Photoreaction Dynamics of a... Photoreaction Dynamics of a Full-Length Protein YtvA and Intermolecular Interaction with RsbRA
    Choi, Seokwoo; Nakasone, Yusuke; Hellingwerf, Klaas J ... Biochemistry (Easton), 12/2020, Volume: 59, Issue: 50
    Journal Article
    Peer reviewed

    YtvA from Bacillus subtilis is a sensor protein that responds to blue light stress and regulates the activity of transcription factor σB. It is composed of the N-terminal LOV (light–oxygen–voltage) ...
Full text
10.
  • What are the Future Extreme... What are the Future Extreme Risks in the Ocean and Fisheries Sector?
    Park, Kwang Seo; Kim, Juhyeon; Kim, Taehan ... Journal of coastal research, 1/2024, Volume: 116, Issue: sp1
    Journal Article
    Peer reviewed

    Park, K.S.; Kim, J.; Kim, T., and Choi, S., 2023. What are the future extreme risks in the ocean and fisheries sector? In: Lee, J.L.; Lee, H.; Min, B.I.; Chang, J.-I.; Cho, G.T.; Yoon, J.-S., and ...
Full text
1 2 3 4 5
hits: 105

Load filters