Byungho Min

Learn More
SUMMARY The security of modern computer systems heavily depends on security tools, especially on antivirus software solutions. In the anti-malware research community, development of techniques for evading detection by antivirus software is an active research area. This has led to malware that can bypass or subvert antivirus software. The common strategies(More)
In this paper, we propose an advanced malware, anti-virus parasitic malware (AV-Parmware). It attacks protected components of anti-virus software by their exploiting security weaknesses, and compromises the target systems by being a parasite on the anti-virus. We have investigated 18 antivirus solutions from seven major anti-virus software vendors and have(More)
Increasing data rates over electrical channels with significant frequency dependent loss is difficult due to excessive inter-symbol interference (lSI). In order to achieve sufficient link margins at high rates, 110 system designers implement equalization in the transmitters and are motivated to consider more spectrally-efficient modulation formats relative(More)
Smart grid, the future power grid, is expected to provide better energy efficiency, more customer choices and improved reliability and security. As the smart grid is an integrated system that consists of multiple subsystems, understanding it as a whole system is required to fully understand the security risks it faces. In this paper, a sophisticated(More)
Many sports fans are interested in predicting the results of sports matches. But predicting the result of a match is difficult because there are many factors to be considered. Bayesian inference and rule-based reasoning are widely used scientific techniques to predict future information including sports results, stock prices, etc. In this paper we propose a(More)
In this paper, we propose a cross verification mechanism for secure execution and dynamic component loading. Our mechanism is based on a combination of code signing and same-origin policy, and it blocks several types of attacks from drive-by download attacks to malicious component loadings such as DLL hijacking, DLL side-loading, binary hijacking, typical(More)