Daeyoung Kim

Learn More
This paper addresses the problem of detecting plagiarized mobile apps. Plagiarism is the practice of building mobile apps by reusing code from other apps without the consent of the corresponding app developers. Recent studies on third-party app markets have suggested that plagiarized apps are an important vehicle for malware delivery on mobile phones.(More)
Smart personal devices equipped with a wide range of sensors and peripherals can potentially be misused in various environments. They can be used to exfiltrate sensitive information from enterprises and federal offices or be used to smuggle unauthorized information into classrooms and examination halls. One way to prevent these situations is to regulate how(More)
As mobile phones have the ability to act as participatory sensors, we are beginning to witness the popularity of crowdsourcing and the sharing of traffic reports to improve the quality of the driving experience. This paper presents the architecture and implementation of a system called Social Vehicular Navigation (SVN), which allows users to generate and(More)
“What would have happened, had I taken the alternative route?” This is a question that many drivers often ponder, hoping that their chosen route is the best. This paper proposes DoppelDriver, a system that attempts to answer such questions on non-chosen alternative routes to a given destination by determining actual times of arrival (ATAs)(More)
Recently, the debate over the integration of Wireless Sensor Networks (WSN) and Radio Frequency Identification (RFID) has garnered an increasing amount of attention despite their appearing to be disparate technologies. On one hand, the RFID community realizes how adding sensor data to their infrastructures could provide added value to the RFID-based(More)