Byungho Min

Learn More
SUMMARY The security of modern computer systems heavily depends on security tools, especially on antivirus software solutions. In the anti-malware research community, development of techniques for evading detection by antivirus software is an active research area. This has led to malware that can bypass or subvert antivirus software. The common strategies(More)
In this paper, we propose an advanced malware, anti-virus parasitic malware (AV-Parmware). It attacks protected components of anti-virus software by their exploiting security weaknesses, and compromises the target systems by being a parasite on the anti-virus. We have investigated 18 antivirus solutions from seven major anti-virus software vendors and have(More)
Smart grid, the future power grid, is expected to provide better energy efficiency, more customer choices and improved reliability and security. As the smart grid is an integrated system that consists of multiple subsystems, understanding it as a whole system is required to fully understand the security risks it faces. In this paper, a sophisticated(More)
Increasing data rates over electrical channels with significant frequency dependent loss is difficult due to excessive inter-symbol interference (lSI). In order to achieve sufficient link margins at high rates, 110 system designers implement equalization in the transmitters and are motivated to consider more spectrally-efficient modulation formats relative(More)
Many sports fans are interested in predicting the results of sports matches. But predicting the result of a match is difficult because there are many factors to be considered. Bayesian inference and rule-based reasoning are widely used scientific techniques to predict future information including sports results, stock prices, etc. In this paper we propose a(More)
In this paper, we propose new types of cascading attacks against smart grid that use control command disaggregation and core smart grid services. Although there have been tremendous research efforts in injection attacks against the smart grid, to our knowledge most studies focus on false meter data injection, and false command and false feedback injection(More)