Publications
International Journal
Dohyun Ryu, Yerim Kim, Junbeom Hur, "γ-Knife: Extracting Neural Network Architecture Through Software-Based Power Side-Channel", IEEE Transactions on Dependable and Secure Computing, Vol. 21, No. 4, pp. 2686-2703, DOI: 10.1109/TDSC.2023.3314710, 2024. 7. 1.
Danial Javaheri, Mahdi Fahmideh, Hassan Chizari, Pooia Lalbakhsh, Junbeom Hur, "Cybersecurity Threats in FinTech: A Systematic Review", Expert Systems With Applications, Vol. 241, No. 122697, DOI: 10.1016/j.eswa.2023.122697, 2024. 5. 1.
Mohsen Ahmadi, Danial Javaheri, Matin Khajavi, Kasra Danesh, Junbeom Hur, "A deeply supervised adaptable neural network for diagnosis and classification of Alzheimer’s severity using multitask feature extraction", PLOS ONE, Vol. 19, No. 3, DOI: 10.1371/journal.pone.0297996, 2024. 3.
Hyundo Yoon, Muncheon Yu, Chaewon Kwak, Changhee Hahn, Dongyoung Koo, Junbeom Hur, "Shedding Light on Blind Spot of Backward Privacy in Dynamic Searchable Symmetric Encryption", IEEE Access, Vol. 11, pp. 146223-146237, DOI: 10.1109/ACCESS.2023.3345024, 2023. 12. 19
Hodong Kim, Changhee Hahn, Hyunwoo J. Kim, Youngjoo Shin, Junbeom Hur, "Deep Learning based Detection for Multiple Cache Side-channel Attacks", IEEE Transactions on Information Forensics & Security, Vol. 19, pp. 1672-1686, DOI: 10.1109/TIFS.2023.3340088, 2023. 12. 5
Hyunsoo Kwon, Sangtae Lee, Minjae Kim, Changhee Hahn, and Junbeom Hur, “Certificate Transparency with Enhanced Privacy”, IEEE Transactions on Dependable and Secure Computing, Vol. 20, No. 5, pp. 3860-3872, DOI: 10.1109/TDSC.2022.3214235, 2023. 9.
Bosung Yang, Gyeongsup Lim, and Junbeom Hur, "Toward Practical Deep Blind Watermarking for Traitor Tracing", IEEE Access, Vol. 11, DOI: 10.1109/ACCESS.2023.3295699, 2023. 7.
Changhee Hahn, Junbeom Hur, "Delegatable Order-Revealing Encryption for Reliable Cross-Database Query", IEEE Transactions on Services Computing, Vol. 16, No. 3, pp. 1763-1777, DOI: 10.1109/TSC.2022.3192551, 2023. 5..
Changhee Hahn, Hodong Kim, Minjae Kim, and Junbeom Hur, "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning", IEEE Transactions on Dependable and Secure Computing, Vol. 20, No. 1, pp. 36-52, DOI: 10.1109/TDSC.2021.3126323, 2023. 1.
Changhee Hahn, Hyundo Yoon, Junbeom Hur, “Multi-Key Similar Data Search on Encrypted Storage with Secure Pay-Per-Query”, IEEE Transactions on Information Forensics and Security, Vol. 18, pp. 1169-1181, DOI: 10.1109/TIFS.2023.3236178, 2023.1.
Changhee Hahn, Hyunsoo Kwon, Daeyeong Kim, and Junbeom Hur, "Enabling Fast Public Auditing and Data Dynamics in Cloud Services", IEEE Transactions on Services Computing, Vol. 15, No. 4, pp. 2047-2059, DOI: 10.1109/TSC.2020.3030947, 2022. 8.
Hyungjun Shin, Dongyoung Koo, Junbeom Hur, "Secure and Efficient Hybrid Data Deduplication in Edge Computing", ACM Transactions on Internet Technology, Vol. 22, No. 3, Article 80, pp. 1-25, https://doi.org/10.1145/3537675, 2022. 7. 26.
Hyunsoo Kwon, Junbeom Hur, Changhee Hahn, “Order-Hiding Range Query over Encrypted Cloud Data”, IEEE Access, Vol. 10, pp. 75604-75618, DOI: 10.1109/ACCESS.2022.3192421, 2022. 7. 19.
Minjae Kim, Jinhee Lee, Hyunsoo Kwon, Junbeom Hur, "Get off of Chain: Unveiling Dark Web Using Multi-layer Bitcoin Address Clustering", IEEE Access, Vol. 10, pp. 70078-10091, DOI: 10.1109/ACCESS.2022.3187210, 2022. 6.
Changhee Hahn, Jongkil, Kim, Hyunsoo Kwon, Junbeom Hur, "Efficient IoT Management with Resilience to Unauthorized Access to Cloud Storage", IEEE Transactions on Cloud Computing, Vol. 10, No. 2, pp. 1008-1020, DOI:10.1109/TCC.2020.2985046, 2022. 4 .
Ngoc Quy tran, Junbeom Hur, Hieu Minh Nguyen, "Effective Feature Extraction method for SVM-based Profiled Attacks", Computing and Informatics, Vol. 40, No.5, pp. 1108–1135, 2021. 12.31
Xiyuan Ma, Junbeom Hur, Zexi Li, Hongfeng Zhu, "Quantum Mutual Authentication Key Agreement Scheme Using Five-Qubit Entanglement towards Different Realm Architecture", International Journal of Theoretical Physics, Vol. 60, No. 5, pp. 1933-1948, 2021. 5.
Youngjoo Shin, Dongyoung Koo, Joobeom Yun, and Junbeom Hur. "Decentralized Server-aided Encryption for Secure Deduplication in Cloud Storage", IEEE Transactions on Services Computing, Vol. 13, No. 6, pp. 1021-1033 , November/December 2020, DOI:10.1109/TSC.2017.2748594
Hyundo Yoon, Soonjung Moon, Youngki Kim, Changhee Hahn, Wonjun Lee, Junbeom Hur, "SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search", Applied Sciences, Vol. 10(21), No. 7842, 2020. 11.
Youngjoo Shin, Junbeom Hur, Dongyoung Koo, Joobeom Yun, “Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments”, Security and Communication Networks, Vol. 2020, pp. 1-15, 2020. 8.
Hyunsoo Kwon, Hyunjae Nam, Sangtae Lee, Changhee Hahn, and Junbeom Hur, “(In-)Security of Cookies in HTTPS: Cookie Theft by Removing Cookie Flags”, IEEE Transactions on Information Forensics and Security, Vol. 15, pp. 1204-1215, 2020. 8.
Hodong Kim, Hyundo Yoon, Youngjoo Shin, Junbeom Hur, "On the Security of Practical Mail User Agents against Cache Side-Channel Attacks", Applied Sciences, Vol. 10, No. 3770, pp. 1-14, 2020.5.29 .
Hoyul Choi, Jongmin Jeong, Simon S. Woo, Kyungtae Kang, and Junbeom Hur. "Password Typographical Error Resilience in Honey Encryption", Computers & Security, Vol. 87, pp. 1-12, 2019. 11.
Changhee Hahn, Hyunsoo Kwon, and Junbeom Hur. "Trustworthy Delegation toward Securing Mobile Healthcare Cyber-Physical Systems", IEEE Internet of Things Journal, Vol. 6, No. 4, pp. 6301-6309, 2019. 10.
Hyunsoo Kwon, Changhee Hahn, Kyungtae Kang, and Junbeom Hur. "Secure Deduplication with Reliable and Revocable Key Management in Fog Computing", Peer-to-Peer Networking and Applications, Vol. 12, No. 4, pp. 850-864, 2019. 7.
Zeinab Rezaeifar, Jian Wang, Heekuck Oh, Suk-Bok Lee, and Junbeom Hur. "A Reliable Adaptive Forwarding Approach in Named Data Networking", Future Generation Computer Systems, Online publish, DOI: https://doi.org/10.1016/j.future.2018.12.049, 2019. 2.
Dongyoung Koo, Youngjoo Shin, Joobeom Yun, and Junbeom Hur. "Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience", Applied Sciences, Vol. 8, No. 12, 2018. 12.
Changhee Hahn, Hyungjune Shin, Hyunsoo Kwon, and Junbeom Hur. "Efficient Multi-User Similarity Search over Encrypted Data in Cloud Storage", Wireless Personal Communications, Vol. 107, No. 3, pp. 1337-1353, 2018. 4.
Dongyoung Koo and Junbeom Hur. "Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing", Future Generation Computer Systems, Vol. 78, No. 2, pp. 739-752, 2018. 1.
Hyunsoo Kwon, Daeyoung Kim, Changhee Hahn, and Junbeom Hur. "Secure Authentication using Ciphertext Policy Attribute-based Encryption in Mobile Multi-hop Networks", Multimedia Tools and Applications, Vol. 76, No. 19, pp. 19507-19521, 2017. 10.
Youngjoo Shin, Dongyoung Koo, Junbeom Hur, and Joobeom Yun. "Secure Proof of Storage with Deduplication for Cloud Storage Systems", Multimedia Tools and Applications, Vol. 76, No. 19, pp. 19363-19378, 2017. 10.
Dongyoung Koo, Youngjoo Shin, and Junbeom Hur. "Privacy-Preserving Aggregation and Authentication of Multi-source Smart Meters in a Smart Grid System", Applied Sciences, Vol. 7, No.10, 2017. 9.
Joobeom Yun, Junbeom Hur, Youngjoo Shin, and Dongyoung Koo. "CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware", IEICE Transactions on Information and systems, Vol. E100–D, No. 9, pp. 2228-2231, 2017.9.
Junggab Son, Juyoung Park, Heekuck Oh, Md Zakirul Alam Bhuiyan, and Junbeom Hur. "Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection", Sensors, Vol. 17, No. 6, pp. 1~21, 2017. 6.
Junbeom Hur and Dong Kun Noh. "Efficient and Secure Identity-Based Onion Routing", International Journal of Applied Engineering Research, Vol. 12, No. 6, pp. 1069-1074, 2017. 3.
Hyunsoo Kwon, Changhee Hahn, Daeyoung Kim, and Junbeom Hur. "Secure Deduplication for Multimedia Data with User Revocation in Cloud Storage", Multimedia Tools and Applications, Vol. 76, No. 4, pp. 5889-5903, 2017. 2.
Youngjoo Shin, Dongyoung Koo, and Junbeom Hur. "A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems", ACM Computing Surveys (CSUR), Vol. 49, No. 4, pp. 74:1-74:38, 2017. 1.
Junbeom Hur, Dongyoung Koo, Youngjoo Shin, and Kyungtae Kang. "Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage", IEEE Transactions on Knowledge and Data Engineering, Vol. 28, No. 11, pp. 3113-3125, 2016.11.
Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, and Junbeom Hur. "Enhanced Authentication for Outsourced Educational Contents through Provable Block Possession", Multimedia Tools and Applications, Vol. 75, No. 21, pp. 13057-13076, 2016. 11.
Daeyoung Kim, Changhee Hahn, Hyunsoo Kwon, and Junbeom Hur. "Privacy-Preserving Public Auditing for Educational Multimedia Data in Cloud Computing", Multimedia Tools and Applications, Vol. 75, No. 21, pp. 13077-13091, 2016. 11.
Changhee Hahn and Junbeom Hur. "Efficient and Privacy-Preserving Biometric Identification in the Cloud", ICT Express, Vol. 2, No. 3, pp. 135-139, 2016. 9.
Changhee Hahn Hyunsoo Kwon Junbeom Hur. "Efficient Attribute-based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks", Mobile Information Systems, Vol. 2016, Article ID 6545873, 13 pages, 2016. 7.
Junbeom Hur, Mengxue Guo, Younsoo Park, Chan-Gun Lee, and Ho-Hyun Park. "Reputation-Based Collusion Detection with Majority of Colluders", IEICE Transactions on Information and systems, Vol.E99-D, No.7 2016. 7.
Junbeom Hur and Younho Lee. "A Reliable Group Key Management Scheme for Broadcast Encryption", Journal of Communications and Networks, Vol. 18, No. 2, pp. 246-260, 2016. 4.
Junbeom Hur, Dongyoung Koo, and Youngjoo Shin. "Privacy-Preserving Smart Metering with Authentication in a Smart Grid", Applied Sciences, Vol. 5, No.4, pp. 1503-1527, 2015.12.1.
Kyungtae Kang, Qixin Wang, Junbeom Hur, Kyung-Joon, and Park Lui Sha. "Medical-Grade Quality of Service for Real-Time Mobile Healthcare", Computer, Vol. 48, No. 2, pp. 41-49, 2015. 2.
Lin Dong, Jinwoo Park, Junbeom Hur, and Ho-Hyun Park. "An Enhanced Remote Data Checking Scheme for Dynamic Updates", KSII Transactions on Internet and Information Systems, Vol. 8, No. 5, pp. 1744-1765, 2014. 5.
Junbeom Hur and Kyungtae Kang. "Secure Data Retrieval for Decentralized Disruption Tolerant Military Networks", IEEE/ACM Transactions on Networking, Vol. 22, No. 1, pp. 16-26, 2014. 2.
Junbeom Hur. "Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid", IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 24, No. 11, pp. 2171-2180, 2013. 11.
Dong Kun Noh and Junbeom Hur. "Energy-aware topology control for reliable data delivery in solar-powered WSNs", EURASIP Journal on Wireless Communications and Networking, Vol. 2013, No. 258, pp. 1-13, 2013. 11. 9.
Junbeom Hur. "Improving Security and Efficiency in Attribute-Based Data Sharing", IEEE Transactions on Knowledge and Data Engineering (TKDE), Vol. 25, No. 10, pp. 2271-2282, 2013. 10.
Kyungtae Kang, Juyoung Park, and Junbeom Hur. "Cross-Layer Analysis of Protocol Delay in Mobile Devices Receiving BCMCS", Wireless Networks, Vol. 19, No.7, pp 1497-1509, 2013. 10.
Junbeom Hur, Dongyoung Koo, Seong Oun Hwang, and Kyungtae Kang. "Removing Escrow from Ciphertext Policy Attribute-Based Encryption", Computers & Mathematics with Applications, Vol. 65, No. 9, pp. 1310-1317, 2013. 5.
Kyungtae Kang, Junhee Ryu, Junbeom Hur, and Lui Sha. "Design and QoS of a Wireless System for Real-Time Remote Electrocardiography", IEEE Journal of Biomedical and Health Informatics, Vol. 17, No. 3, pp. 745-755, 2013. 5.
Dongyoung Koo, Junbeom Hur, and Hyunsoo Yoon. "Secure and Efficient Data Retrieval over Encrypted Data Using Attribute-Based Encryption in Cloud Storage", Computers & Electrical Engineering, Vol. 39, No. 1, pp. 34-46, 2013. 1.
Kyungtae Kang, Junhee Ryu, Sunghyun Choi, Kyung-Joon Park, and Junbeom Hur. "Towards energy-efficient error control in 3G broadcast video", IEEE Wireless Communications, Vol. 19, No. 6, pp. 60-67, 2012. 12.
Junbeom Hur and Kyungtae Kang. "Dependable and Secure Computing in Medical Information Systems", Computer Communications, Vol. 36, No.1, pp.20-38, 2012.12.
Junbeom Hur, Chanil Park, and Seong Oun Hwang. "Privacy-Preserving Identity-Based Broadcast Encryption", Information Fusion Elsevier, vol. 13, no. 4, pp. 296-303, 2012. 10.
Dong Kun Noh and Junbeom Hur. "Using a dynamic backbone for efficient data delivery in solar-powered WSNs", Journal of Network and Computer Applications, Vol. 35, No. 4, pp. 1277-1284, 2012. 7.
Youngjoo Shin Junbeom Hur. "Scalable and efficient approach for secure group communication using proxy cryptography", Wireless Networks, Vol. 18, No. 4, pp. 413-425, 2012. 5.
Junbeom, Hur Chanil Park, and Seong Oun Hwang. "Fine-Grained User Access Control in Ciphertext-Policy Attribute-Based Encryption", Security and Communication Networks Wiley, Vol. 5, No. 3, pp. 253-261, 2012. 3.
Chanil Park, Junbeom Hur, Seong Oun Hwang, and Hyunsoo Yoon. "Authenticated Public Key Broadcast Encryption Scheme Secure Against Insiders' Attack", Mathematical and Computer Modelling Elsevier, Vol. 55, No. 1-2, pp. 113-122, 2012. 1.
Junbeom Hur and Dong Kun Noh. "Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems", IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 22, No. 7, pp. 1214-1221, 2011. 7.
Junbeom Hur. "Fine-grained data access control for distributed sensor networks", Wireless Networks, Vol. 17, No. 5, pp. 1235-1249, 2011.6.
Junbeom Hur, Dongyoung Koo, and Hyunsoo Yoon. "Secure Many-to-Many Multicast in Heterogeneous Networks", Journal of Internet Technology, Vol. 12, No. 2, pp. 859-866, 2010. 11.
Junbeom Hur and Hyunsoo Yoon. "A Multi-Service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks", ACM Mobile Networks and Applications, Vol. 15, No. 5, pp. 680-692, 2010. 10.
Chanil Park, Junbeom Hur, Kisuk Kweon, and Hyunsoo Yoon. "Self-Healing Key Distribution Scheme with Long Service Time", IEICE Electronics Express, Vol. 7, No. 13, pp. 913-919, 2010. 7. 10.
Junbeom Hur, Chanil Park, and Hyunsoo Yoon. "Chosen-Ciphertext Secure Authenticated Group Communication Using Identity-based Signcryption", Computers & Mathematics with Applications Elsevier, Vol.60, No.2, pp. 362-375, 2010. 7.
Byungchun Chung, Junbeom Hur, Heeyoul Kim, Seong-Min Hong, and Hyunsoo Yoon. "Improved Batch Exponentiation", Information Processing Letters, Vol. 109, No. 15, pp. 832-837, 2009. 7.
Junbeom Hur and Hyunsoo Yoon. "A Decentralized Multi-Group Key Management Scheme", IEICE Transactions on Communications, Vol. E92-B, No. 02, pp. 632-635, 2009. 2.
Younho Lee, Junbeom Hur, Heeyoul Kim, Yongsu Park, and Hyunsoo Yoon. "A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rate", IEICE Transactions on Communications, Vol. E90-B, No. 11, pp. 3259-3262, 2007. 11.
International Conference
Minjae Kim, Haksu Han, Gyeongsup Lim, Yehyeong Lee, Sanghun Sim and Junbeom Hur, "Transferability Analysis of Adversarial Examples in CNN-Based SAR Image Classification", The 39th International Conference on Information Networking (ICOIN 2025), January 15-17, 2025, Chiang Mai, Thailand.
Changhee Hahn, Dongyoung Koo, Junbeom Hur, “Reducing Client-Side Cost in Secure Inner Product Evaluation”, The 39th International Conference on Information Networking (ICOIN 2025), January 15-17, 2025, Chiang Mai, Thailand.
Woonghee Lee, Donghee Kim and Jumbeom Hur, "Towards Secure and Efficient Practical Consensus Protocols in Quantum Internet", International Conference on ICT Convergence (ICTC 2024), October 16~18, 2024, Jeju Island, Korea.
Gyeongsup Lim, Wonjun Oh and Junbeom Hur, "VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators", World Conference on Information Security Applications (WISA 2024), August 21~23, 2024, Jeju, Korea.
Woonghee Lee, Junbeom Hur, Doowon Kim, "Beneath the Phishing Scripts: A Script-Level Analysis of Phishing Kits and Their Impact on Real-World Phishing Websites", ACM ASIACCS, July 1~5, 2024, Singapore.
Yoonjung Choi, Woonghee Lee, Junbeom Hur, "PhishinWebView: Analysis of Anti-Phishing Entities in Mobile Apps with WebView Targeted Phishing", The ACM Web Conference (TheWebConf 2024), May 13~17, 2024, Singapore.
Chaewon Kwak, Kangmo Ahn, Changhee Hahn, Dongyoung Koo, Junbeom Hur, "Revisiting Secure Multi-Server Oblivious RAMS", The 38th International Conference on Information Networking (ICOIN), January 17-19, 2024, Ho Chi Minh City, Vietnam.
Jonghoon Kwon, Jeonggyu Song, Junbeom Hur, Adrian Perrig, “Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool’s Monitoring System”, The 32nd USENIX Security Symposium (USENIX Security 2023), August 9-11, 2023, Anaheim, USA.
Yeomin Jeong, Woonghee Lee, Junbeom Hur, “A Honey postMessage, but a Heart of Gall: Exploiting Push Service in ServiceWorkers Via postMessage”, The 18th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2023), July 10-14, 2023, Melbourne, Australia.
Yerim Kim, Minjae Kim, Myungjae Chung, Junbeom Hur, "Detect your fingerprint in your photographs: Photography-based multi-feature Sybil detection", The 23rd Privacy Enhancing Technologies Symposium (PETS 2023), July 10-14, 2023, Laussanne, Switzerland.
Taehun Kim, Hyeongjin Park, Seokmin Lee, Seunghee Shin, Junbeom Hur, Youngjoo Shin, “DevIOus: Device-Driven Side-Channel Attacks on the IOMMU ”, The 44th IEEE Symposium on Security and Privacy (S&P 2023), May 22-25, 2023, San Francisco, USA.
Donghee Kim, Junbeom Hur, “Poster: Client-Side Byzantine Attacks on Raft Algorithm in Blockchain”, The Network and Distributed System Security Symposium (NDSS), February 27 - March 3, 2023, San Diego, USA.
Hoyong Jeong, Hodong Kim, Junbeom Hur, "Exploiting Metaobjects to Reinforce Data Leakage Attacks", The 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022), October 26-28, 2022, Limassol, Cyprus.
Hyundo Yoon, Junbeom Hur, "Comparative Analysis of Forward and Backward Private Searchable Encryption using SGX", The 13th International Conference on ICT Convergence (ICTC 2022), October 19-21, 2022, Jeju Island, Korea.
Hodong Kim, Junbeom Hur, "PCIe Side-channel Attack on I/O Device via RDMA-enabled Network Card", The 13th International Conference on ICT Convergence (ICTC 2022), October 19-21, 2022, Jeju Island, Korea.
Donghee Kim, Junbeom Hur, "A Survey on Security Threats in Blockchain-based Internet of Things System", The 13th International Conference on ICT Convergence (ICTC 2022), October 19-21, 2022, Jeju Island, Korea.
Yeomin Jeong, Junbeom Hur, "A Survey on Vulnerabilities of Service Workers", The 13th International Conference on ICT Convergence (ICTC 2022), October 19-21, 2022, Jeju Island, Korea.
Jeonggyu Song, Jonghoon Kwon, Junbeom Hur, "Analysis of Multiple Monitoring Stations based NTP Pool", The First Workshop on New EXperiments on network security Technologies (WoNEXT) (in conjunction with ACM MobiHoc 2022), October 17, 2022, Seoul, Korea.
Gyeong Sup Lim, Minjae Kim, Junbeom Hur, "Adversarial Attack on Semantic Segmentation Preprocessed with Super Resolution", The 26th International Conference on Pattern Recognition (ICPR), August 21-25, 2022, Montréal Québec.
Changseok Koh, Jonghoon Kwon, Junbeom Hur, "BLAP: Bluetooth Link key extraction And Page blocking attacks", The 52nd IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 27-30, 2022, Baltimore, Maryland, USA.
Muncheon Yoo, Hyundo Yoon, Changhee Hahn, Dongyoung Koo, Junbeom Hur, “Downgrading Backward Privacy of Searchable Encryption”, The 36th International Conference on Information Networking (ICOIN), 2022. 1. 12~15, Jeju Island, Korea.
Mriganka Mandal, Ramprasad Sarkar, Junbeom Hur, Koji Nuida, “Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security”, The 16th International Conference on Information Security Practice and Experience (ISPEC 2021), 2021. 12. 17~19, Nanjing, China.
Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, Junbeom Hur, “Enabling Fast Public Auditing and Data Dynamics in Cloud Services”, IEEE World Congress on Services (SERVICES) 2021, 2021. 9. 5~10, Virtual Conference.
Hodong Kim, Changhee Hahn, Junbeom Hur, “Real-Time Detection of Cache Side-Channel Attack Using Non-Cache Hardware Events”, The 35th International Conference on Information Networking (ICOIN), 2021. 1. 13~16, Jeju Island, Korea.
Hoyong Jeong, Dohyun Ryu, Junbeom Hur, “Neural Network Stealing via Meltdown”, The 35th International Conference on Information Networking (ICOIN), 2021. 1. 13~16, Jeju Island, Korea.
Sangtae Lee, Youngjoo Shin, Junbeom Hur, “Return of Version Downgrade Attack in the Era of TLS 1.3”, 16th ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT 2020), 2020. 12. 1~4, Virtual Conference.
Hyundo Yoon, Junbeom Hur, “A Comparative Analysis of Searchable Encryption Schemes using SGX", International Conference on ICT Convergence (ICTC), 2020. 10. 21-23, Jeju Island, Korea.
Hyeongseob Kim, Changhee Hahn, Junbeom Hur, "Forward Secure Public Key Encryption with Keyword Search for Cloud-assisted IoT", IEEE International Conference on Cloud Computing (CLOUD), 2020. 10. 18-24, Virtual Conference.
Youngjoo Shin, Dongyoung Koo, Junbeom Hur, "Inferring Firewall Rules by Cache Side-channel Analysis in Network Function Virtualization", IEEE International Conference on Computer Communications (INFOCOM), 2020. 7. 6-9, Virtual.
Hodong Kim, Hyundo Yoon, Youngjoo Shin, Junbeom Hur, "Cache Side-Channel Attack on Mail User Agent ", The 34th International Conference on Information Networking (ICOIN 2020), 2020. 1. 7-10, 2020, Barcelona, Spain.
Sangtae Lee, Junbeom Hur, "Analysis of Downgrade Attack and Protection Mechanisms in TLS 1.3", Convergence Technology Conference (CTCon), 2019. 12. 27-29, Bangkok, Thailand.
Jinhee Lee, Younggee Hong, Hyunsoo Kwon and Junbeom Hur, Shedding Light on Dark Korea: An In-depth Analysis and Profiling of the Dark Web in Korea, The 20th World Conference on Information Security Applications, 2019. 8. 21-24, Jeju Isalnd, Korea.
Hyeongseob Kim, Changhee Hahn, and Junbeom Hur. "Analysis of Forward Private Searchable Encryption and Its Application to Multi-Client Settings", The 11th International Conference on Ubiquitous and Future Networks, July 2-5, 2019, Zagreb, Croatia.
Hyundo Yoon, and Junbeom Hur. "A Survey on Vulnerabilities and Mitigations of Trusted Execution Environment", Asia Pacific International Conference on Information Science and Technology (APIC-IST 2019), 2019. 6. 23~26, Beijing, China.
Hodong Kim, Hyundo Yoon, Youngjoo Shin, and Junbeom Hur, "Poster: FLUSH+RELOAD Cache Side-Channel Attack on Mail User Agent", The Network and Distributed System Security (NDSS) Symposium 2019, 24-27 February 2019, San Diego, CA, USA
Younggee Hong, Hyunsoo Kwon, Sangtae Lee, and Junbeom Hur. "Poster: De-mixing Bitcoin Mixing Services", IEEE Symposium on Security and Privacy, May 21-23, 2018, San Francisco, California, USA
Youngjoo Shin, Hyung Chan Kim, Dokeun Kwon, Ji Hoon Jeong, and Junbeom Hur. "Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage", The 25th ACM Conference on Computer and Communications Security (ACM CCS), October 15-19, 2018, Toronto, Canada.
Changhee Hahn, Hyunsoo Kwon, and Junbeom Hur. "Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamperresistance in Public Cloud Storage", IEEE International Conference on Cloud Computing (IEEE CLOUD 2018), July 2-7, 2018, San Francisco, USA.
Hyungjune Shin, Dongyoung Koo, Youngjoo Shin, and Junbeom Hur. "Privacy-preserving and Updatable Block-level Data Deduplication in Cloud Storage Services", IEEE International Conference on Cloud Computing (IEEE CLOUD 2018), July 2-7, 2018, San Francisco, USA. (acceptance ratio: 15%)
Younggee Hong, Hyunsoo Kwon, Jihwan Lee, and Junbeom Hur. "A practical de-mixing algorithm for Bitcoin mixing services", The 2nd ACM Workshop on Blockchains, Cryptocurrencies and Contracts (BCC'18), ACM AsiaCCS’18, June 4-8, 2018, Incheon, Korea
Jiwoong Won, Oseok Kwon, Junhee Ryu, Junbeom Hur, Insup Lee, and Kyungtae Kang. "TrapFetch: A Breakpoint-based Prefetcher for Both Launch and Run-time", 2017 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC), October 5~8, 2017, Banff, Canada.
Xiaolong Sun, Juyoung Park, Kyungtae Kang, and Junbeom Hur. "Novel Hybrid CNN-SVM Model for Recognition of Functional Magnetic Resonance Images", 2017 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC), October 5~8, 2017, Banff, Canada.
Hyunjae Nam, Hyunsoo Kwon, Hyungjun Shin, Jongmin Jeong, Changhee Hahn, and Junbeom Hur. "Cookie Theft Attacks in HTTPS by Invalidating Cookie Flags", USENIX Security Symposium, July 16~18, 2017, Vancouver, BC, CANADA.
Changhee Hahn, Hyungjune Shin, and Junbeom Hur. "Cloud-based Biometrics Processing for Privacy-Preserving Identification", The 9th International Conference on Ubiquitous and Future Networks (ICUFN), 7. 4~7, 2017, Milan, Italy.
Hyunsoo Kwon, Changhee Hahn, Dongyoung Koo, and Junbeom Hur. "Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage", 10th IEEE International Conference on Cloud Computing (IEEE CLOUD), 6. 25~30, 2017, Honolulu, Hawaii, USA.
Dongyoung Koo, Youngjoo Shin, Joobeom Yun, and Junbeom Hur. "An Online Data-Oriented Authentication based on Merkle Tree with Improved Reliability", 24th IEEE International Conference on Web Services (IEEE ICWS), 2017. 6. 25~30, Honolulu, Hawaii, USA.
Junbeom Hur, Dongyoung Koo, Youngjoo Shin, and Kyungtae Kang. "Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage (Extended Abstract)", 2017 IEEE International Conference on Data Engineering (IEEE ICDE), 2017. 4. 19~22, San Diego, USA.
Dongyoung Koo, Youngjoo Shin, and Junbeom Hur. "Practical Data Outsourcing Framework with Provably Secure Deduplication in Untrusted Remote Storage", International Conference on Platform Technology and Service (Platcon), 2017. 2. 13-15, Busan, Korea
Hoyul Choi, Hyunjae Nam, and Junbeom Hur. "Password Typos Resilience in Honey Encryption", International Conference on Information Networking (ICOIN), 2017. 1. 11 ~ 13, Da Nang, Vietnam.
Youngjoo Shin, Dongyoung Koo, Joobeom Yoon, and Junbeom Hur. "SEED: Enabling Serverless and Efficient Encrypted Deduplication for Cloud Storage", 8th IEEE International Conference on Cloud Computing Technology and Science, pp. 482-487, 2016. 12. 12~15, Luxembourg.
Dongyoung Koo, Youngjoo Shin, Joobeom Yoon, and Junbeom Hur. "A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing", 8th IEEE International Conference on Cloud Computing Technology and Science, pp. 285-293, 2016. 12. 12~15, Luxembourg.
Dongyoung Koo, Youngjoo Shin, and Junbeom Hur. "HoneyDedup: Provably Secure Deduplication with Practical Data Outsourcing in Untrusted Remote Storage", 2016 Annual Computer Security Applications Conference (ACSAC), 2016. 12. 5~9, Los Angeles, USA.
Changhee Hahn and Junbeom Hur. "POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing", 23rd ACM Conference on Computer and Communications Security (ACM CCS), 2016, October 24~28, Vienna, Austria.
Jongmin Jung, Hyunsoo Kwon, Hyungjune Shin, and Junbeom Hur. "A Practical Analysis of TLS Vulnerabilities in Korea Web Environment", The 17th World Conference on Information Security Applications, 2016. 8. 25-27, Jeju Isalnd, Korea.
Juyoung Park, Mingon Kang, Junbeom Hur, and Kyungtae Kang. "Recommendations for Antiarrhythmic Drugs Based on Latent Semantic Analysis with k-Means Clustering", 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016.8.16-20, Orlando, USA.
Seung-Woo Han, Hyunsoo Kwon, Changhee Hahn, Dongyoug Koo, and Junbeom Hur. "A Survey on MITM and its Countermeasures in the TLS Handshake Protocol", International Conference on Ubiquitous and Future Networks, 2016. 7. 5~8, Vienna, Austria
Changhee Hahn and Junbeom Hur. "Scalable and Secure Private Set Intersection for Big Data", International Conference on Big Data and Smart Computing (BigComp2016), 2016. 1. 18~20, Hong Kong, China.
Hyungjoon Shin, Daeyoung Kim, and Junbeom Hur. "Secure Pattern-based Authentication Against Shoulder Surfing Attack in Smart Devices", International Conference on Ubiquitous and Future Networks, 2015. 7. 7~10, Sapporo, Japan.
Hoyul Choi, Hyunsoo Kwon, and Junbeom Hur. "A Secure OTP Algorithm Using a Smartphone Application", International Conference on Ubiquitous and Future Networks, 2015. 7. 7~10, Sapporo, Japan.
Jina Hong, Junbeom Hur, and Namgi Kim. "An Empirical Study on Channel Characteristics of Wireless Body Sensor Networks", The 8th International Conference on Future Generation Communication and Networking (FGCN 2014), 2014. 12. 20~23, Hainan, China.
Changhee Hahn and Junbeom Hur. "Enhanced User Authentication for Outsourced Multimedia Data through Provable Block Possession", International Conference on Multimedia Technology for Intelligent Computing (MuTeC 2014), 2014. 12. 5~8.
Daeyoung Kim, Hyunsoo Kwon, Changhee Hahn, and Junbeom Hur. "Privacy-Preserving Public Auditing for Multimedia Data in Cloud Storage", International Conference on Multimedia Technology for Intelligent Computing (MuTeC 2014), 2014. 12. 5~8.
Hyunsoo Kwon, Changhee Hahn, Daeyoung Kim, and Junbeom Hur. "Secure Deduplication for Multimedia Data with User Revocation in Cloud Storage", International Conference on Multimedia Technology for Intelligent Computing (MuTeC 2014), 2014. 12. 5~8.
Hyunsoo Kwon, Changhee Hahn, Daeyoung Kim, Kyungtae Kang, and Junbeom Hur. "Secure Device-to-Device Authentication in Mobile Multi-hop Networks", The 9th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2014), 2014. 6. 23~25, Harbin, China., LNCS 8491, pp. 267-278.
Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, Kyungtae Kang, and Junbeom Hur. "A Privacy Threat in 4th Generation Mobile Telephony and Its Countermeasure", The 9th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2014), 2014. 6. 23~25, Harbin, China., LNCS 8491, pp. 624-635
Jeongseok Yu, Taejin Kim, Woongsoo Na, Hyoungchel Bae, Yunseong Lee, Juho Lee, Zeynep Vatandas, Sungrae Cho, and Junbeom Hur. "Fully-Distributed Multicast Routing Protocol for IEEE 802.15.8 Peer-Aware Communications", The International Conference on Information Networking 2014 (ICOIN 2014), 2014. 2.10~12, Phuket, Thailand.
Dongyoung Koo, Junbeom Hur, and Hyunsoo Yoon. "Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage", The 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications (FCC 2014), 2014. 1.13~16, Auckland, New Zealand. Lecture Notes in Electrical Engineering (LNEE) Vol. 301, pp. 229-235. 2014. 4. 19.
Juyoung Park, Jaemyoun Lee, Kyungtae Kang, and Junbeom Hur. "Extending Service Coverage using FGS-Aware Blind Repetition", International Conference on Network-Based Information Systems, 2012. 9. 26 – 28, Melbourne, Australia.
Dongyoung Koo, Junbeom Hur, and Hyunsoo Yoon. "Secure and Efficient Data Retrieval over Encrypted Data Using Attribute-Based Encryption in Cloud Storage", The 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing, 2011. 12. 12~15, Jeju, Korea.
Junbeom Hur, Dongyoung Koo, Seong Oun Hwang, and Kyungtae Kang. "Removing Escrow from Ciphertext Policy Attribute-Based Encryption", The 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing, 2011. 12. 12~15, Jeju, Korea.
Junbeom Hur and Dong Kun Noh. "Efficient Identity-Based Onion Routing", International Conference on Computer Convergence Technology (ICCCT 2011), pp. 10-15, 2011. 10. 20~22, Seoul, Korea
Chanil Park, Junbeom Hur, and Seong Oun Hwang. "Authenticated Public Key Broadcast Encryption Scheme Secure Against Insiders' Attack", The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-10), 2010. 12. 9-11, Gwangju, Korea.
Junbeom Hur, Chanil Park, and Seong Oun Hwang. "Fine-Grained User Access Control in Ciphertext-Policy Attribute-Based Encryption", The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-10), 2010. 12. 9-11, Gwangju, Korea.
Chano Kim, Chanil Park, Junbeom Hur, Hanjin Lee, and Hyunsoo Yoon. "A Distributed Deterministic and Resilient Replica Detection Protocol in Wireless Sensor Networks", The 2009 International Conference on Future Generation Communication and Networking 2009, Communications in Computer and Information Science (CCIS) Vol. 56, pp. 405-412, 2009. 12. 10-12, Jeju, Korea.
Junbeom Hur, Dongyoung Koo, and Hyunsoo Yoon. "Secure Many-to-many Multicast in Heterogeneous Networks", The 2009 FTRG International Workshop on Advances in Cryptography, Security and Applications for Future Computing (ACSA-09), 2009. 12. 11-12, Jeju, Korea.
Junbeom Hur, Chanil Park, and Hyunsoo Yoon. "Chosen-Ciphertext Secure Authenticated Group Communication Using Identity-based Signcryption", The 2009 FTRG International Workshop on Advances in Cryptography, Security and Applications for Future Computing (ACSA-09), 2009. 12. 11-12, Jeju, Korea.
Youngjoo Shin, Junbeom Hur, and Hyunsoo Yoon. "Scalable and Efficient Approach for Secure Group Communication", International Symposium on Communications and Information Technology 2009 (ISCIT 2009), pp. 1201-1206, 2009. 9. 28-30, Icheon, Korea.
Seungjae Shin, Junbeom Hur, Hanjin Lee, and Hyunsoo Yoon. "Bandwidth Efficient Key Distribution for Secure Multicast in Dynamic Wireless Mesh Networks", IEEE Wireless Communications & Networking Conference (WCNC 2009), 2009. 4.5 - 4.8, Budapest, Hungary.
Junbeom Hur, Hyungseop Shim, Pyung, Kim, and Hyunsoo Yoon, Nah-Oak Song. "Security Considerations for Handover Schemes in Mobile WiMAX Networks", IEEE Wireless Communications & Networking Conference (WCNC 2008), 2008. 3.31 - 4.3, Las Vegas, USA.
Junbeom Hur, Chanil Park, and Hyunsoo Yoon. "An Efficient Pre-authentication Scheme for IEEE 802.11-based Vehicular Networks", The 2nd International Workshop on Security (IWSEC), LNCS vol.4751 pp.121-136, 2007.10.29-31, New Public Hall, Nara, Japan.
Junbeom Hur, Youngjoo Shin, and Hyunsoo Yoon. "Decentralized Group Key Management for Dynamic Networks Using Proxy Cryptography", The 3rd ACM International Workshop on QoS and Security for Wireless and Mobile Networks (Q2SWinet), 2007.10.22. Chania, Crete Island, Greece.
Junbeom Hur, Chanil Park, Youngjoo Shin, and Hyunsoo Yoon. "An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks", The International Conference on Information Networking (ICOIN 2007), LNCS vol.5200 (2008.2) pp. 629-638, 2007.1.23-25, Estoril, Portugal.
Chanil Park, Junbeom Hur, Chanoe Kim, Youngjoo Shin, and Hyunsoo Yoon. "Pre-authentication for Fast Handoff in Wireless mesh Networks with Mobile APs", The 7th International Workshop on Information Security Applications (WISA), LNCS vol. 4298 (2006.12), pp. 349-363, 2006.8.28-30, Jeju Island, Korea.
Junbeom Hur, Younho Lee, Seong-Min Hong, and Hyunsoo Yoon. "Trust Management for Resilient Wireless Sensor Networks", The 8th International Conference on Information Security and Cryptology (ICISC), LNCS vol.3935 (2006.2) pp.56-68, 2005.12. Seoul, Korea.
Junbeom Hur, Younho Lee, Seong-Min Hong, and Hyunsoo Yoon. "Trust-based Secure Aggregation in Wireless Sensor Networks", The 3rd International Conference on Computing, Communication and Control Technologies(CCCT), 2005.7.24-27, Austin, Texas, USA.
Junbeom Hur, Younho Lee, and Hyunsoo Yoon. "Trust Evaluation Model for Wireless Sensor Networks", The 7th International Conference on Advanced Communication Technology(ICACT), 2005.2.21-23, Phoenix Park, Korea.
Domestic Journal
권예린, 허준범, “5G/LTE 네트워크에서의 DBSCAN 클러스터링 기반 시그널링 공격 탐지”, 정보보호학회논문지, Vol. 34, No.5, pp. 1059-1071, 2024. 10. 31.
문광석, 허준범, “OSINT와 기업 내 사이버 위협 인텔리전스를 통한 효과적인 위험 대응 기법”, 정보보호학회논문지, Vol. 34, No. 5, pp. 949-959, 2024. 10. 31.
한학수, 김민재, 임경섭, 이예형, 허준범 “딥러닝 기반 SAR 표적인식 모델의 적대적 공격에 대한 취약점 분석”, 정보처리학회지, Vol. 30, No. 4, 2023, 12.
이웅희, 허준범, "TLS기반 패킷 검사 우회 표준 기술 분석 및 미래 전술네트워크 운용 가능성 연구", 한국통신학회논문지, Vo. 47, No. 9, pp. 1370-1380, 2022. 9.
김민재, 이진희, 허준범, "오프체인 데이터를 활용한 비트코인 다계층 휴리스틱", 정보과학회 컴퓨팅의 실제 논문지, 제28권, 제1호, 2022. 1.
이진희, 김민재, 허준범, "다크웹 오프체인 데이터를 이용한 다계층 비트코인 클러스터링 기법", 정보보호학회논문지, 제 31권, 제4호, 2021. 8.
윤현도, 허준범, "SGX 기반 키워드 탐색 공개키 암호 기법", 한국통신학회논문지, 제46권, 제5호, 2021. 5. 15.
김호동, 허준범, "비 캐시 하드웨어 이벤트를 이용한 캐시 부채널 공격 실시간 탐지", 정보보호학회논문지 제30권, 제6호, 2020. 12.
정호용, 류도현, 허준범, "멜트다운 취약점을 이용한 인공신경망 추출 공격", 정보보호학회논문지, 제30권, 제6호, 2020. 12.
김민재, 김보민, 허준범, "적대적 공격에 견고한 Perceptual Ad-Blocker 기법", 정보보호학회논문지, 제30권, 제5호, 2020. 10.
이선주, 허준범, "빅데이터 플랫폼 환경에서의 워크로드별 암호화 알고리즘 성능 분석", 정보보호학회논문지, 제29권, 제6호, pp. 1305-1317, 2019. 12.
김병국, 허준범, "블록체인 소프트웨어의 취약점을 이용한 OS 커맨드 인젝션 공격에 대한 연구", 정보보학회논문지, 제29권, 제2호, 2019. 4
김성진, 허준범, "모바일 어플리케이션 개인정보 유출탐지 및 보안강화 연구", 정보보호학회논문지, 제29권, 제1호, 2019. 2.
홍영기, 허준범, "비트코인 익명화 기술 연구 동향", 정보보호학회지, 제28권, 제3호, pp. 11-17, 2018. 6.
신형준, 허준범, "암호화된 클라우드 데이터의 중복제거 기법에 대한 부채널 공격", 정보보호학회논문지, 제27권, 제4호, pp. 971-980, 2017. 8.
한창희, 신형준, 허준범, "클라우드 환경에서 검색 효율성 개선과 프라이버시를 보장하는 유사 중복 검출 기법에 관한 연구", 정보과학회논문지, 제44권, 제10호, pp. 1112-1123, 2017. 10.
남현재, 최호열, 신형준, 권현수, 정종민, 한창희, 허준범, "포그 컴퓨팅 환경에서의 보안 및 프라이버시 이슈에 대한 연구", 한국통신학회논문지, 제42권, 제1호, pp. 257-267, 2017. 1.
한창희, 허준범, "고정 크기 암호 정책 속성 기반의 데이터 접근과 복호 연산 아웃소싱 기법", 정보과학회논문지, 제43권, 제8호, pp. 933-945, 2016. 8.
한창희, 권현수, 김대영, 허준범, "아웃소싱 데이터 보호를 위한 데이터 블록 기반의 상호 인증 프로토콜", 정보과학회논문지, 제42권, 제9호, 2015. 9.
신형준, 허준범, "패턴 기반 사용자 인증 시스템 기술 연구 동향 및 비교", 정보보호학회지, 제25권, 제3호, pp. 36-43, 2015. 6.
한창희, 권현수, 허준범, "LTE에서 사용자 위치 정보 보호를 위한 보안 향상 인증 프로토콜", 정보과학회논문지, 제41권, 제9호, pp. 715-727, 2014. 9.
구동영, 허준범, "스마트기기를 활용한 클라우드서비스 환경에서 안전한 데이터 중복제거 기술 동향", 전자공학회논문지, 제50권, 제10호, pp. 989-996, 2013. 10.
김평, 허준범, 윤현수, "브로드캐스팅 통신 환경 하에서의 비상태 수신자를 위한 대역폭 효율성을 고려한 탈퇴 기법", 정보과학회논문지: 정보통신, 제37권, 제5호, pp. 327-338, 2010. 10.
허준범, 윤현수, "무선 메쉬 네트워크에서의 아이디기반 프록시암호화를 이용한 안전한 다대다 멀티캐스트 기법", 정보과학회논문지: 정보통신, 제37권, 제1호, pp. 72-83, 2010. 2.
허준범, 윤현수, "신뢰성 있는 브로드캐스트 암호화를 위한 자가 키 복구 기법", 정보과학회논문지: 정보통신, 제36권, 제6호, pp. 471-480, 2009. 12.
신승재, 허준범, 이한진, 윤현수, "클러스터화된 무선 네트워크에서 전송량을 고려한 효율적인 멀티캐스트 키관리 기법", 정보과학회논문지: 정보통신, 제36권, 제5호, pp. 437-455, 2009. 10.
허준범, 윤현수, "신뢰할 수 없는 동적 네트워크 환경을 위한 비중앙화 그룹키 관리 기법", 정보과학회논문지: 정보통신, 제36권, 제4호, pp. 263-274, 2009. 8.
허준범, 이윤호, 윤현수, "신뢰도 평가를 통한 무선 센서 네트워크에서의 거짓 데이터 제거", 정보과학회논문지: 정보통신, 제35권, 제1호, pp. 76-90, 2008. 2.
Domestic Conference
한학수, 김민재, 임경섭, 이예형, 허준범, "CNN 기반 SAR 이미지 분류 모델의 적대적 예제의 전이성 분석", 한국정보과학회 한국소프트웨어종합학술대회 (KSC 2023), 부산 벡스코, 2023. 12. 20~23.
안강모, 유문천, 윤현도, 허준범, "검색 가능한 암호화 기법의 역방향 안전성 공격 기법", 한국정보과학회 한국소프트웨어종합학술대회 (KSC 2023), 부산 벡스코, 2023. 12. 20~23.
김민재, 김예림, 허준범, "포럼 기반 다크넷 마켓 다중 계정 탐지모델", 한국정보과학회 한국소프트웨어종합학술대회 (KSC 2023), 부산 벡스코, 2023. 12. 20~23.
곽채원, 윤현도, 허준범, "안전한 검색가능 암호를 위한 Oblivious RAM 기술 분석", 한국군사과학기술학회 종합학술대회 2023, ICC제주, 2023.6.15~16.
이웅희, 허준범, “양자인터넷에서 운용하는 고전인터넷 구성요소와 공격 연구 동향”, 제33회 통신정보 합동학술대회 (JCCI 2023), 여수, 2023. 4. 26~28.
김태훈, 박형진, 허준범, 신승희, 신영주, "IOMMU를 활용한 RDMA 네트워크에서의 원격 타이밍 부채널 공격", 한국컴퓨터종합학술대회 (KCC 2022), ICC 제주, 2022. 6. 29 ~ 7. 1.
이웅희, 허준범, "네트워크 피싱 은닉 기술과 데이터 유출 방법 분석", 한국정보보호학회 하계학술대회, 부산 벡스코, 2022. 6. 16~17.
송정규, 허준범, "클라우드 컴퓨팅 환경에서 양자내성암호 안전성 분석", 한국통신학회 동계종합학술대회, 온라인 컨퍼런스, 2022. 2. 9~11.
유문천, 윤현도, 한창희, 구동영, 허준범. "검색 가능 암호화 역방향 안정성 공격 기법", 한국정보보호학회 동계학술대회, 온라인 컨퍼런스, 2021. 11. 27.
양보성, 허준범. "저작권 보호를 위한 딥러닝 기반 비가시적 워터마크 생성 모델", 한국정보보호학회 동계학술대회, 온라인 컨퍼런스, 2021. 11. 27.
이진희, 김민재, 허준범, "오프체인 데이터를 활용한 비트코인 다계층 휴리스틱", 한국컴퓨터종합학술대회 2021, ICC제주, 2021. 6. 23~25.
오원준, 허준범, "기계학습 모델에 대한 멤버십 추론 공격 분석", 한국컴퓨터종합학술대회 2021, ICC제주, 2021. 6. 23~25.
이웅희, 허준범, "TLS 환경에서 ESNI 지원현황과 한계점 고찰", 한국컴퓨터종합학술대회 2021, ICC제주, 2021. 6. 23~25.
임경섭, 김민재, 허준범, "초해상화를 이용하는 물체탐지 모델에 대한 적대적 공격", 한국컴퓨터종합학술대회 2021, ICC제주, 2021. 6. 23~25.
이진희, 김민재, 허준범, "다크웹 데이터를 이용한 비트코인 트랜잭션 클러스터링 기법", 한국정보보호학회 동계학술대회,서울대학교(온라인 컨퍼런스), 2020. 11. 28.
구동영, 허준범, "SGX를 활용한 클라우드 환경에서의 프라이버시 보존 데이터 검색 효율성에 대한 고찰", 한국정보처리학회 추계학술대회, 2020. 11. 6~7.
윤현도, 허준범, "인텔 SGX를 활용한 검색 가능한 암호 기법의 연구 동향", 한국정보보호학회 하계학술대회, 대한상공회의소, 2020. 7. 15 .
한창희, 허준범, "Multi-Client 환경에서 Forward Security를 보장하는 검색 암호 동향 분석", 한국정보보호학회 하계학술대회, 대한상공회의소, 2020. 7. 15 .
한창희, 허준범, "Forward Security를 보장하는 공개키 기반 키워드 검색", 한국정보보호학회 하계학술대회, 대한상공회의소, 2020. 7. 15.
김민재, 김보민, 허준범, "적대적 공격에 견고한 Perceptual Ad-Blocking 디자인", 한국정보보호학회 하계학술대회, 대한상공회의소, 2020. 7. 15.
이상태, 허준범. "TLS 1.3의 안전성 및 효율성 분석", 한국군사과학기술학회 종합학술대회, 제주 국제컨벤션센터 (ICC JEJU) 2019.6.13~14.
윤현도, 허준범. "A Survey of Trusted Execution Environment Security", 한국정보처리학회 춘계학술대회, 숭실대학교, 2019. 5. 10.
김병국, 허준범. "블록체인 소프트웨어의 취약점을 이용한 인젝션 공격에 대한 연구", 한국정보보호학회 동계학술대회, 세종대학교, 2018. 12. 8.
김성진, 허준범. "모바일 앱 개인정보 유출과 최신 TLS 적용 필요성 연구", 한국정보보호학회 하계학술대회(CISC-S 2018), 동신대학교, 2018. 6. 21~22.
Hyundo Yoon, Hyunsoo Kwon, Junbeom Hur. "Survey of Functional Encryption and its Functionality", 한국정보보호학회 하계학술대회(CISC-S 2018), 동신대학교, 2018. 6. 21~22.
이지환, 홍영기, 허준범, “가상화폐 익명화 기술 연구 동향”, 한국정보보호학회 동계학술대회, 고려대학교, 서울, 2017. 12. 9 .
김형섭, 허준범. "포그 컴퓨팅 환경에서 안전한 서비스 탐색 기법", 한국컴퓨터종합학술대회, 라마다프라자 제주호텔, 제주, 2017. 6. 18~20.
신형준, 허준범. "전술네트워크에서의 안전한 데이터 검색 기법 동향 조사", 한국군사과학기술학회 종합학술대회, 제주 국제컨벤션센터 (ICC JEJU), 2017. 6. 8~9.
권현수, 허준범. "Secure Deduplication with Scalable Convergent Encryption Key Management in the Cloud", 한국정보보호학회 동계학술대회, 연세대학교, 2016. 12. 3.
한창희, 허준범. "Secure and Efficient Near-Duplicate Detection in the Cloud", 한국정보보호학회 동계학술대회, 연세대학교, 2016. 12. 3.
민정기, 허준범. "랭킹기반의 검색가능한 암호화 알고리즘 분석", 한국정보처리학회 추계학술발표대회, 부산대학교, 2016. 11. 4~5.
장영진, 한승우, 허준범. "하트블리드 탐지 및 대응방안", 한국정보처리학회 추계학술발표대회, 제주한라대학교, 2015. 10. 30~31.
홍기대, 이상태, 허준범, "모바일 메신저를 이용한 개선된 2-Factor 인증기법", 한국정보처리학회 제40회 추계학술발표대회, 제주한라대학교, 2013. 11. 8~9.
허준범, 조성래, "안전한 대상인식통신을 위한 보안프로토콜 설계", 표준학회 2013년도 춘계학술대회, 서울르네상스호텔, 2013. 6. 27.
신영주, 허준범, 윤현수, "확장성과 효율성을 갖는 프락시 암호 기반 안전한 그룹 통신", 한국정보과학회 가을 학술발표대회, 2007. 10.
Patent(International)
Junbeom Hur, WonJun Oh, Bosung Yang, Gyeongsup Lim, "METHOD FOR PERFORMING MEMBERSHIP INFERENCE ATTACK AGAINST GENERATIVE MODELS AND APPARATUS FOR THE SAME", International, 18/524,113. 2023.11.30
Junbeom Hur, Hoyong Jeong, Dohyun Ryu, "METHOD FOR EXTRACTING ARTIFICIAL NEURAL NETWORK BY USING MELTDOWN VULNERABILITY", International, 18/028,851. 2023.03.28
Junbeom Hur, Minjae Kim, Gyeongsup Lim, "Adversarial attack method for malfunctioning object detection model with super resolution", International, 18/077,599. 2022.12.08
Junbeom Hur, Hodong Kim, "APPARATUS AND METHOD OF DETECTING CACHE SIDE-CHANNEL ATTACK", International, 17/333,198. 2021.05.28
Hoyong Jeong, Dohyun Ryu, Junbeom Hur, "Method of extracting artificial neural network using Meltdown vulnerability", International, PCT/KR2021/013267. 2021.09.28
Junbeom Hur, Sungrae Cho, Woongsoo Na, Jeongseok Yu, Taejin Kim, Hyoungchel Bae, Yunseong Lee, Juho Lee, VATANDAS Zeynep, "DEVICE AND METHOD FOR MANAGING MULTICAST GROUP IN WIRELESS NETWORK", International, Disclosure, WO 2014/193092 A1, Dec.4.14
Patent(Domestic)
허준범, 김예림, 김민재, "다크넷 마켓 사용자의 다중 계정을 탐지하는 방법 및 이를 위한 장치", 등록 완료, 10-2739981, 2024.12.03
허준범, 자바헤리 다니엘, "변형 멀웨어의 복원을 위한 언패킹 방법", 출원 완료, 10-2024-0177582, 2024.12.03
허준범, 임경섭, 김민재, 심상훈, "연합학습에서의 은밀한 공격을 위한 방법", 출원 완료, 10-2024-0172170, 2024.11.27
허준범, 김민재, 이진희, "암호화폐 지갑 주소를 클러스터링하는 방법 및 이를 위한 장치", 등록 완료, 10-2664348, 2024.05.02
허준범, 자바헤리 다니엘, "변형 멀웨어의 복원을 위한 통합 언패커 ",출원 완료, 10-2024-0015105 , 2024.01.31
허준범, 김호동, "다종 캐시 부채널 공격 실시간 탐지 기술", 출원 완료, 10-2023-0104151, 2023.08.09
허준범, 김민재, 임경섭, "초해상화가 탑재된 물체 탐지 모델의 오작동을 유도하는 적대적 공격 방법", 등록 완료, 10-2557746, 2023.07.17
허준범, 윤현도, 유문천, "신뢰 실행 환경 기반의 동적 탐색 가능한 암호화에서 정보 유출을 최소화하는 방법, 장치 및 시스템", 출원 완료, 10-2023-0042879, 2023.03.31
허준범, 유문천, 윤현도, "탐색 가능한 암호화에서 역방향 안정성 하향 공격에 대한 방어 방법, 장치 및 시스템", 출원 완료, 10-2023-0042872, 2023.03.31
정호용, 류도현, 허준범, "멜트다운 취약점을 이용한 인공신경망 추출 방법", 등록 완료, 10-2507189, 2023.03.02
허준범, 오원준, 양보성, "생성 모델을 대상으로 멤버십 추론 공격을 수행하는 방법 및 이를 위한 장치", 출원 완료, 10-2022-0166026, 2022.12.01
허준범, 이진희, 김민재, "암호화폐 지갑 주소의 클러스터링 기법", 등록 완료, 10-2455870, 2022.10.13
허준범, 김예림, 김민재, "다크넷 마켓 사용자의 다중 계정을 탐지하는 방법 및 이를 위한 장치", 출원 완료, 10-2022-0065156, 2022.05.27
허준범, 김민재, 이진희, "암호화폐 지갑 주소를 클러스터링하는 방법 및 이를 위한 장치", 출원 완료, 10-2022-0007677, 2022.01.19
허준범, 김민재, 임경섭, "초해상화가 탑재된 물체 탐지 모델의 오작동을 유도하는 적대적 공격 방법", 출원 완료, 10-2021-0184526, 2021.12.22
허준범, 김예림, 김민재, "사진의 특성을 통해 유저의 정보를 추출한 다크넷 다중 계정 탐지 모델", 출원 완료, 10-2021-0182605, 2021.12.20
허준범, 양보성, "인공 지능 기술을 활용하여 데이터를 은닉하고 추출하기 위한 방법", 출원 완료, 10-2021-0174967, 2021.12.08
허준범, 류도현, 김예림, "인공 신경망 분석 장치 및 방법", 출원 완료, 10-2021-0147712, 2021.11.01
허준범, 권현수, "인증서 투명성 시스템", 등록 완료, 10-2322447, 2021.11.01
허준범, 한창희, "다수 개체를 위한 확장성 있고 안전한 유사도 검색 장치 및 방법", 등록 완료, 10-2292246, 2021.08.17
김호동, 허준범, "캐시 부채널 공격 탐지 장치 및 방법", 출원 완료, 10-2021-0052916, 2021.04.23
허준범, 김형섭, 박철순, "순방향 안정성을 갖는 탐색 가능한 암호화 시스템과 그 장치 및 방법", 등록 완료, 10-2021-0009782, 2021.04.29
허준범, 윤현도, "공개키 기반 암호화 시스템 및 이를 이용한 데이터 보안 방법", 출원 완료, 10-2020-0176547, 2020. 12. 16
허준범, 한창희, "모바일 헬스케어를 위한 가상 물리 시스템에서 안전한 연산 위임 방법", 등록 완료, 10-2172241, 2020.10.26
허준범, 남현재, "HTTPS에서의 쿠키 무결성 검증 방법", 등록 완료, 10-2116902, 2020.05.25
허준범, 홍영기, "비트코인 혼합 서비스의 혼합해제 방법", 등록 완료, 10-2091625, 2020.03.16
허준범, 한창희, "클라우드 컴퓨팅 환경에서 암호화된 데이터에 대한 유사도 검색 방법 및 시스템", 등록 완료, 10-2050888, 2019.11.26
허준범, 한창희, "사물인터넷 관리를 위한 클라우드 컴퓨팅 환경에서의 데이터 공유 방법 및 시스템", 등록 완료, 10-2050887, 2019.11.26
허준범, 권현수, "인증서 투명성 시스템", 출원 완료, 10-2019-0147131, 2019.11.15
허준범, 김호동, "인공지능을 활용한 캐시 부채널 공격 실시간 탐지 기술", 출원 완료, 10-2019-0141014, 2019.06.19
허준범, 한창희, "클라우드 컴퓨팅 환경에서의 속성 기반 암호화를 이용한 데이터 공유 방법 및 시스템", 등록 완료, 10-1982237, 2019.05.20
허준범, 신형준, "포그 컴퓨팅 환경에서의 하이브리드 데이터 중복제거 방법", 등록 완료, 10-1962347, 2019.03.20
허준범, 박철순, 한창희, 권현수, "중복 데이터 제거를 위한 암호화키 관리 방법", 등록 완료, 10-1913497, 2018.10.24
조성래, 나웅수, 유정석, 배형철, 김태진, 이주호, 제이냅 바탄다스, 허준범, 이윤성, "무선 네트워크에서 수신 확인 정보를 수신하는 장치 및 방법", 등록 완료, 10-1675496, 2016.11.10
조성래, 나웅수, 배형철, 유정석, 김태진, 이윤성, 이주호, 허준범, 제이냅 바탄다스, "완전 분산형 무선 네트워크", 등록 완료, 10-1639041, 2016.07.06
허준범, "중복 제거를 통해 하나의 데이터를 저장하는 클라우드 서비스 프로바이더", 등록 완료, 10-1590270, 2016.01.25
허준범, 한창희, "생체 특성에 기반해 데이터 서버로 액세스하고자 하는 사용자를 인증하기 위한 클라우드 서버", 등록 완료, 10-1528112, 2015.06.04