๊น์ค์ผ(Kim, Yun-Sam)
ํ์ ๋ ผ๋ฌธ: ํฅ์๋ ๊ฐ์ธ์ ๋ณด๋ณดํธ๋ฅผ ์ํ ์ถ์ํ ๊ธฐ๋ฐ ์ ๊ทผ ์ฒด์ด ํ๋ ์์(Abstraction Based Access Control Framework for Enhanced Privacy). 2012. 2
๋ธ์ดํ๋ฌ์ค๋ฉ(์ฃผ)(V+Lab , VPlusLab Inc. ) ์ฌ์ง
๋ฐฑ์ค์(Paik, Joon-Young)
ํ์ ๋ ผ๋ฌธ: Application-based Performance Improvement Schemes for NAND Flash Memory, 2013. 8 (in English)
์์ํธ(Suh, Young-Ho)
ํ์ ๋ ผ๋ฌธ: Integrated Control Architecture for the Robotic Mediator in Smart Environments, 2013. 2 (in English)
ํ๊ตญ์ ์ํต์ ์ฐ๊ตฌ์(ETRI, Electronics and Telecommunications Research Institute) ์ฌ์ง
ํ์ ๋ ผ๋ฌธ: Byte Frequency based Indicators for Crypto-Ransomware Detection from Empirical Analysis, 2022.8 (in English)
(์ ) ๊ตญ๊ฐ๋ณด์๊ธฐ์ ์ฐ๊ตฌ์(NSR)
ํ์ ๋ ผ๋ฌธ: Toward Enhancement of Vulnerability Detection via Program Analysis, 2023.2 (in English)
๊ตญ๊ฐ๋ณด์๊ธฐ์ ์ฐ๊ตฌ์(NSR) ์ฌ์ง
Research Area and more : click hereย
๋ฐ์คํ(Park, Jun-Hong)
ํ์ ๋ ผ๋ฌธ: ์ ์ฑ ๊ธฐ๋ฐ ๋ก๋ด ํ์ ํ๋ก๊ทธ๋๋ฐ ํ๊ฒฝ(Policy-based Robot Collaboration Programming Environment), 2011.2
(์ฃผ)์ ๋ฏธํ ํฌ(Ubiquitous Media Technology Co, Ltd) ์ฌ์ง
๋ฏผ์๋ชฉ(Min, Young-Mok)
ํ์ ๋ ผ๋ฌธ: ์ํฉ ์ธ์ ์ปดํจํ ํ๊ฒฝ์์์ ๋ฏธ๋ค์จ์ด ๋ ๋ฆฝ์ ์ธ ๋ฐ์์ ํ๋ก๊ทธ๋๋ฐ ๊ตฌ์กฐ ์ฐ๊ตฌ(Research about middle-ware dependent programming structure in context-aware computing environments)
(์ฃผ)์ผ์ด์ํฌ(KSEEK Co, Ltd) ์ฌ์ง
์ต๋๋ฏผ(Choi, Nak-min)
ํ์ ๋ ผ๋ฌธ: ํฅ์๋ ๊ฐ์ธ์ ๋ณด๋ณดํธ๋ฅผ ์ํ ์ถ์ํ ๊ธฐ๋ฐ ์ ๊ทผ ์ฒด์ด ํ๋ ์์ํฌ(Abstraction Based Access Control Framework for Enhanced Privacy). 2012. 2
(์ฃผ) LIG ๋ฅ์ค์(LIG Nex1 Co., Ltd. ) ์ฌ์ง
์ ๊ทผํ(Shin Keuntae)
ํ์ ๋ ผ๋ฌธ: ์ด์ง ์ฝ๋์ ํ์ ๋ฉ๋ชจ๋ฆฌ ํฌ๊ธฐ ์ ์ ๋ถ์(Memory size analysis on binary level), 2011.2
(์ฃผ)์ผ์ฑ์ ์(Samsung Electronics Co, Ltd) ์ฌ์ง
์คํ์ญ(Yoon, Tae Seob)
ํ์ ๋ ผ๋ฌธ: An Automatic Exception Detection Framework, 2014. 8 (in English)
ํ๊ตญํนํ์ ๋ณด์ (KIPI, Korea Institue of Patent Information) ์ฌ์ง
ํ์ ๋ ผ๋ฌธ: ์ํฉ์ธ์ง ์์คํ ์ ์ํ ์ด๋ฒคํธ ์คํธ๋ฆผ ์ง์ ์ฒ๋ฆฌ์ ์ฑ๋ฅ ๊ฐ์ ๋ฐฉ์ ์ฐ๊ตฌ(The Performance Improvement of Event Stream Query Processing for Context- Aware System),ย 2015. 2
(์ฃผ)์นด์นด์ค (Kakao Corp. ) ์ฌ์ง (ํ ๋ฐ์ฌ๊ณผ์ )
์๊ธฐ์ง(Eom, Ki Jin)
ํ์ ๋ ผ๋ฌธ: ๊ณต๊ฒฉ ๊ฐ๋ฅํ ํฌ๋์ ํ์ง๋ฅผ ์ํ ARM ๋ฐ์ด๋๋ฆฌ์ ์ ์ ๋ถ์ ๋ฐฉ๋ฒ(A Static Analysis Technique on ARM Binaries For Detecting Exploitable Crash), 2015. 2
Klaytn Foundation ์ฌ์ง
์ ํ๊ตฌ(Jeon, Hyeon Gu)
ํ์ ๋ ผ๋ฌธ: ๋ฐ์ด๋๋ฆฌ ํ๋ก๊ทธ๋จ์ ์ ์ ๋ถ์์์ ๋ฉ๋ชจ๋ฆฌ ๋ถ์ ๋ฐ ๋ถ์๋ฒ์ ํ์ฅ์ ํตํ ์ ๊ต์ฑ ํฅ์ (Improvement on Accuracy Using Location Analysis and Inter-Procedure Analysis in Static Analysis for Binary Program) 2017.2
(์ฃผ)์ฐ์ํํ์ ๋ค(Woowa Brothers Corp.) ์ฌ์ง
ํ์ ๋ ผ๋ฌธ: ํจ๊ณผ์ ์ธ ์ ์ฌ๋๋ฅผ ์ด์ฉํ ๊ธฐ๊ณํ์ต ๊ธฐ๋ฐ ํจ์ปค ์๋ณ ๋ฐฉ๋ฒ(Packer Identification Method Using Efficient Similarity Analysis and Machine Learning),ย 2018.2
์์ด์ํํธํ ํฌ(์ฃผ) (Suresoft Technologies Inc. ) ์ฌ์ง
ํ์ ๋ ผ๋ฌธ: ์ ๋ฐ์ ๋ชฉ์ ์ง ๋ฐ ๋์ฐฉ์๊ฐ ์ถ์ ์ฐ๊ตฌ (Estimation of Ships' Destination and Arrival Time) 2019.8
(์ฃผ)์ผ์ฑ์ ์ (Samsung Electronics Co. Ltd) ์ฌ์ง
ํ์ ๋ ผ๋ฌธ: ๊ธฐ๊ณํ์ต ์๊ณ ๋ฆฌ์ฆ์ ์ด์ฉํ ์์ถ๋ ํ์จ์ด ์ด๋ฏธ์ง ํ์ผ ์ ๋ณด ๋ถ์ ๋๊ตฌ (Compressed Firmware Image File Information Analysis Tool Using Machine Learning Algorithm) 2019.8
์ ์์ด์ํํธํ ํฌ(์ฃผ) (Suresoft Technologies Inc. ), ํ ๋ฐ์ฌ๊ณผ์
ํ์ ๋ ผ๋ฌธ: ์๋๋ก์ด๋ ๋ฏธ๋์ดํ๋ ์์ํฌ ์ทจ์ฝ์ ์ฌ๊ฐ๋ ๋ถ๋ฅ ์ ๋ณด๋ฅผ ์ ๊ณตํ๊ธฐ ์ํ ์ ์ ๋ถ์ ์๋ํ ๋๊ตฌย (Static analysis tools that provide Android media Framework Vulnerability Serverity Classification Information ) 2020.2
Research Area : openstack ๊ธฐ๋ฐ์ ํด๋ผ์ฐ๋ ์์คํ IaaS ์๋น์ค ์ด์, openstack swiftย
(์ฃผ) ๋ทฐ์ปด์ฆ (VIEWCOMMZ Co.) ์ฌ์ง
ํ์ ๋ ผ๋ฌธ: ํจ์ ํธ์ถ ์์ ์ฑ ํฅ์์ ์ํ ์ค๋งํธ ์ปจํธ๋ํธ ๊ฐ์๋จธ์ ๊ฐ์ (To improve the safety of function calls Smart contract virtual machine improvement),ย 2020.8
CJ ์ฌ๋ฆฌ๋ธ๋คํธ์์ค(์ฃผ) (OliveNetworks Co. Ltd.) ์ฌ์ง
ํ์๋ ผ๋ฌธ: Semantic aware backward bounded symbolic analysis for opaque predicate detection, 2021.8 (in English)
Research Area : Binary code analyses
ํ์๋ ผ๋ฌธ: ์ค๋งํธ ์ปจํธ๋ํธ ๋ฐํ์ ์์ ์ฑ์ ์ํ ํจ์ ํธ์ถ ๊ฐ๋ก์ฑ๊ธฐ๋ฅผ ํ์ฉํ ์ ์ฑ ๊ธฐ๋ฐ ์ด๋๋ฆฌ์ ๋ฐ์ดํธ์ฝ๋ ์ฌ์์ฑ๊ธฐ (Policy-based Ethereum bytecode rewriter utilizing function call interception for smart contract runtime safety), 2023.2
Research Area : Byte code anaysis for evm based smart contracts and Android framework analysis
ํ์๋ ผ๋ฌธ: ํจ๊ณผ์ ์ธ ์ ์ฑ์ฝ๋๋ถ์์ ์ํ ๋ฅ๋ฌ๋๊ธฐ๋ฐ์ ๋ฐ์ด๋๋ฆฌ ์ฝ๋ ๋ถ์ ๋๊ตฌ (Deep Learning-based Binary code Analysis Method for Effective Malware Analysis), 2023.2
Research Area : ๋จธ์ ๋ฌ๋ ๊ธฐ๋ฐ ๋ฐ์ด๋๋ฆฌ ์ฝ๋ ๋ถ์ ๋ฐ ๋๊ตฌ ๊ฐ๋ฐ
๊ตญ๊ฐ๋ณด์๊ธฐ์ ์ฐ๊ตฌ์ (NSR) ์ฌ์ง
ํ์๋ ผ๋ฌธ: Performance improvement of MBA expression simplification based on program synthesis, 2023.2 (in English)
Research Area : Mixed Boolean Arithmetic Expression Deobfuscation
ํ์๋ ผ๋ฌธ: MyBatis ํ๋ก๊ทธ๋จ ์์ ์ฑ ํฅ์์ ์ํ ๋ฉํ๋ฐ์ดํฐ ๊ธฐ๋ฐ์ ์ค๋ฅ๋ถ์ ๋ฐ ํํฐ๋ง ๊ธฐ๋ฒ (Metadata-Based Error Analysis and Filtering Method to Enforce the Safety of MyBatis Program), 2023.2
ํ๊ตญํญ๊ณต์ฐ์ฃผ์ฐ๊ตฌ์ (Korea Aerospace Research Institute) ์ฌ์ง
ํ์๋ ผ๋ฌธ: ๊ณ ๋ํ๋ Opaque Predicate ํ์ง๋ฅผ ์ํ ์ญ๋๋ ํ ๋๊ตฌ ๊ฐ์ , 2025.2
๊ตญ๊ฐ๋ณด์๊ธฐ์ ์ฐ๊ตฌ์ (NSR) ์ฌ์ง
ํ์๋ ผ๋ฌธ: Malware Deobfuscation Using Artificial Intelligence, 2025.8
ํ์๋ ผ๋ฌธ: WeBMO: WebAssembly ๋ฉ๋ชจ๋ฆฌ ๋๋ ํ ๊ธฐ๋ฒ, 2026.2
๊ตฌ๋ณธ์ฒ (Goo, Bonchul)
The 1st Member of PLAS Lab.!!
(์ฃผ)์ผ์ฑ์ ์ย (Samsung Electronics Co. Ltd) ์ฌ์ง
์ง์ตํ(Jin, Ik-Hyoun)
๋ฐํ ๋ ผ๋ฌธ: "Intergration of RDF Processing into a Programming Language," Ik-Hyun Jhin, Nak-Min Choi, Eun-Sun Cho, 5th International conference of Advanced information Management and Service, Aug. 2009
(์ฃผ)์ผ์ฑ์ ์ (Samsung Electronics Co. Ltd) ์ฌ์ง
๋ฐํ ๋ ผ๋ฌธ: "Dystone: Program Analysis-Based Privacy Enhancement System for Smart Contracts" Dahyeon Jeong, Jihyeon Kim, Jisoo Kim and Eun-Sun Cho, Annual Computer Security Applications Conference ย (ACSAC), Work-in-Progress Talk (peer reviewed), Dec. 2021
(์ฃผ)๋ค์ด๋ฒ (Naver Corp.) ์ฌ์ง
๋ฐํ ๋ ผ๋ฌธ: "Stone: A Privacy Policy Enforcement System for Smart Contracts ", Jihyeon Kim, Dahyeon Jeong, Jisoo Kim and Eun-Sun Cho, the 5th International IEEE Workshop on Blockchain Oriented Software Engineering (BOSE), held within IEEE SANER, Mar. 2022
(์ฃผ)๋น์ฆํ ํฌ์์ด(BizTechi) ์ฌ์ง
๋ฐํ ๋ ผ๋ฌธ: "BiSwert: Control Stucture Identification Model in Binary Programs Using Large Language Models", Hyeyeon Park, Yejin Son, Sangjun An, Eun-Sun Cho, Conference on Information Security and Cryptography Summer 2025 (CISC-S'25), Jul. 2025
ํ๊ตญํ์ด์ด์คํ ํฌ๋๋ก์ง ์ฌ์ง
๋ฐ๋ณํ(Park, Byeong Hwi), ๊น์ ์ง(Kim, Yu Jin), ์ด์ฐ์ฃผ(Lee, YeonJu)