[Doctor] Suhyeon Lee, "Revisiting Conventional Wisdom in PoW and PoS-based Blockchains", February, 2023.
[Doctor] Sooyoung Kang, "A Study on the CIA-Level based Security-by-Design Development Framework (CIA-level 기반 보안내재화 개발 프레임워크에 관한 연구)", February, 2021.
[Doctor] Kyungsuk Yi, "A Study on the Security Enhancement Method for Chip Reverse Engineering (칩 역공학에 대한 보안성 강화방안에 관한 연구)", February, 2020.
[Doctor] Sungyong Cha, "Study on Enhancing Cybersecurity for Weapon Systems Acquisition and Operation (첨단 무기체계 획득 및 운용시 사이버보안 강화방안 연구)", August, 2019.
[Master] Jaewan Seo, "A Study on the High-Assurance Software Update Management System(SUMS) (고신뢰 소프트웨어 업데이트 관리 시스템(SUMS)에 관한 연구)", August, 2023.
[Master] Chunsung Park, "MS RDP 클라이언트 퍼징에 관한 연구", February, 2022.
[Master] Dongjoo Kim, "BinTyper : Type Confusion Detection for C++ Binaries", August, 2021.
[Master] Seungyeon Jeong, "Study on the Security-by-Design in Automotive Development (자동차 보안 내재화 방법론에 관한 연구)", February, 2021.
[Master] Hyunsuk Cho, "A Case Study on the Application of RMF to Domestic Weapon System (국내 무기체계에 대한 RMF 적용 실 사례 연구)", February, 2020.
[IJ] Taehyun Ahn, Jiwon Kwak, and Seungjoo Kim, "Secure and Efficient maTLS with Proxy Signature Scheme", IEEE Access, Vol.13, June 2025, pp.104456-104471. (SCI-E, SCOPUS, IF:3.4)
[IJ] Jung Keun Ahn, Kwangsoo Cho, Kyungdeok Seo, Hyun-ji Kim, and Seungjoo Kim, "Comprehensive Analysis and Recommendation of Supply Chain Risk Management Framework for the Military Domain", IEEE Access, Vol.13, June 2025, pp.96813-96833. (SCI-E, SCOPUS, IF:3.4)
[IJ] Inno Hwang, Hyunsuk Cho, and Seungjoo Kim, "Deriving Usability Evaluation Criteria for Threat Modeling Tools", IEEE Access, Vol.13, April 2025, pp.65246-65265. (SCI-E, SCOPUS, IF:3.4)
[IJ] Hyunsuk Cho and Seungjoo Kim, "Threat Modeling for the Defense Industry: Past, Present, and Future", IEEE Access, Vol.13, April 2025, pp.53276-53304. (SCI-E, SCOPUS, IF:3.4)
[IJ] Jaewan Seo, Jiwon Kwak, and Seungjoo Kim, "Development for High-Assurance Software Update Management System Complying with UN R156", IEEE Access, Vol.12, July 11, 2024, pp.135811-135830. (SCI-E, SCOPUS, IF:3.4)
[IJ] Yejun Kim, Kwangsoo Cho, and Seungjoo Kim, "Challenges in Dynamic Analysis of Drone Firmware and Its Solutions", IEEE Access, Vol.12, July 9, 2024, pp.106593-106604. (SCI-E, SCOPUS, IF:3.4)
[IJ] Sooyoung Kang and Seungjoo Kim, "CIA-Level Driven Secure SDLC Framework for Integrating Security into SDLC Process", Journal of Ambient Intelligence and Humanized Computing, Springer, March 7, 2022, pp.1-24. (SCI-E, SCOPUS, IF:7.104)
[IJ] Suhyeon Lee and Seungjoo Kim, "Blockchain as a Cyber Defense", IEEE Access, Vol.10, December 2021, pp.2602-2618. (SCI-E, SCOPUS, IF:3.367)
[IJ] Sungyong Cha, Seungsoo Baek, and Seungjoo Kim, "Blockchain Based Sensitive Data Management by Using Key Escrow Encryption System from the Perspective of Supply Chain", IEEE Access, Vol.8, August 2020, pp.154269-154280. (SCI-E, SCOPUS, IF:4.098)
[IJ] Kyungsuk Yi, Minsu Park, Sungyong Cha, and Seungjoo Kim, "Practical Silicon-Backside-Protection Method for Abnormally Detection", Journal of Semiconductor Technology and Science, Vol.19, No.6, December 2019, pp.577-584. (SCI-E, SCOPUS, IF:0.407)
[IJ] Sungyong Cha, Seungsoo Baek, Sooyoung Kang, and Seungjoo Kim, "Security Evaluation Framework for Military IoT Devices", Security and Communication Networks, Wiley-Hindawi, July 2018, Volume 2018, pp 1–12. (SCI-E, SCOPUS, IF:1.067)
[IJ] Kyungsuk Yi, Minsu Park, and Seungjoo Kim, "Practical Silicon-Surface-Protection Method using Metal Layer", Journal of Semiconductor Technology and Science, Vol.16, No.4, August 2016, pp.470-480. (SCI-E, SCOPUS, IF:0.515)
[IC] Jiwon Han and Seungjoo Kim, "Maintaining Assurance In Fast-Paced Software Development: Automation, Delta Evaluation, And Applicability To Common Criteria", Proc. of The 24th ICCC 2025, The 24th International Common Criteria Conference, Songdo, Korea, October 21-23, 2025.
[IC] Yejun Kim and Seungjoo Kim, "Improving CC Evaluation Efficiency Through MAL", Proc. of The 24th ICCC 2025, The 24th International Common Criteria Conference, Songdo, Korea, October 21-23, 2025.
[IC] Taisic Yun, Suhwan Jeong, Yonghwa Lee, Seungjoo Kim, Hyoungshick Kim, Insu Yun and Yongdae Kim, "Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea", USENIX Security 2025: The 34th USENIX Security Symposium, Seattle, USA, August 13–15, 2025, pp.?-?.
[IC] Taehyun Ahn, Jiwon Kwak, and Seungjoo Kim, "mdTLS: How to make middlebox-aware TLS more efficient?", Proc. of ICISC 2023, The 26th International Conference on Information Security and Cryptology, Springer-Verlag, LNCS, Seoul, Korea, 29 November - 1 December 2023, pp.39–59. (acceptance ratio: 39.7% = 31 / 78)
[IC] Jaewan Seo, Jiwon Kwak, and Seungjoo Kim, "Formally Verified Software Update Management System in Automotive", NDSS Symposium - VehicleSec 2023 (Inaugural Symposium on Vehicle Security and Privacy 2023), San Diego, California, USA, 27 February – 3 March 2023, pp.1–8.
[IC] Suhyeon Lee and Seungjoo Kim, "Do You Really Need to Disguise Normal Servers as Honeypots?", The 40th IEEE MILCOM 2022, The 40th IEEE Military Communications Conference 2022, Rockville, Maryland, USA, November 28 – December 2, 2022, pp.166-172.
[IC] Yejun Kim, Kwangsoo Cho, Paul Hong, and Seungjoo Kim, "TMoC: Threat Modelers on Chain", Black Hat Asia 2022 Arsenal, Marina Bay Sands, Singapore, May 10-13, 2022.
[IC] Shinchul Park, Jonghan Lee, and Seungjoo Kim, "Blockchain as a Threat Modeling Thinking Tool", The 29th DEF CON 2021 Blockchain Village, Hybrid Conference, August 5-8, 2021. (Note : Watch also this video)
[IC] Dongju Kim and Seungjoo Kim, "BinTyper: Type Confusion Detection for C++ Binaries", Black Hat Europe 2020 Briefings, Virtual (online) Conference, December 7-10, 2020. (Note : Watch also this video and white paper)
[IC] Seungjoo Kim, "Understanding the Cyber Threat from North Korea", 2020 KIC (Korean Institute of Criminology) International Forum - Challenges of Cybercrime as Opportunities: Prevention, Cooperation and Safety, December 2-3, 2020.
[IC] Seungyeon Jeong, Sooyoung Kang, and Seungjoo Kim, "Application of the Common Criteria to Building Trustworthy Automotive SDLC", Proc. of The 19th ICCC 2020, The 19th International Common Criteria Conference, Virtual (online) Conference, November 16-18, 2020.
[IC] Sooyoung Kang, Seungyeon Jeong, and Seungjoo Kim, "Assurance-Level Driven Method for Integrating Security into SDLC Process”, Proc. of The 18th CCUF Workshop 2020, The 18th Common Criteria Users Forum Workshop, Virtual (online) Conference, November 12, 2020.
[IC] Seungjoo Kim, "How South Korea Is Fighting North Korea's Cyber Threats", Asia Transnational Threats Forum - Virtual Roundtable on North Korean Cyber Threats, Center for East Asia Policy Studies at BROOKINGS, October 15, 2020. (Note : Watch also this summary)
[IC] Suhyeon Lee and Seungjoo Kim, "Blockchain for Cyber Defense: Will It Be As Good As You Think?" The 28th DEF CON 2020 Blockchain Village, Virtual (online) Conference, August 6-9, 2020. (Note : Watch also this video)
[DJ] Jeonghyeon Gim, Jiwon Kwak, Kwangsoo Cho, and Seungjoo Kim, "Analysis of the Problems of Domestic Studies on Threat Modeling", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.35/No.2, April 2025, pp.397-413.
[DJ] Jung Keun Ahn and Seungjoo Kim, "A Study on Software Supply Chain Risk Management Policies and Techniques Suitable for Korean Military Environment", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.35/No.1, February 2025, pp.135-155.
[DJ] Inno Hwang, Youngseop Shin, Hyunsuk Cho, and Seungjoo Kim, "Deriving Usability Evaluation Criteria for Threat Modeling Tools", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.34/No.4, August 2024, pp.763-780.
[DJ] Jung Keun Ahn, Kwangsoo Cho, Hanjin Jeong, Jihun Jeong, and Seungjoo Kim,, "A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.33/No.5, October 2023, pp.827-846.
[DJ] Paul Hong, Yejun Kim, Kwangsoo Cho, and Seungjoo Kim, "A Study on Security Requirements for 5G Base Station", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.31/No.5, October 2021, pp.919-939.
[DJ] Kwangsoo Cho and Seungjoo Kim, "A Study on Proving RMF A&A in Real World for Weapon System Development", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.31/No.4, August 2021, pp.817-839.
[DJ] Yejun Kim, Jeonghyeon Gim, and Seungjoo Kim, "A Study on Systematic Firmware Security Analysis Method for IoT Devices", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.31/No.1, February 2021, pp.31-49.
[DJ] Seungyeon Jeong, Sooyoung Kang, and Seungjoo Kim, "A Methodology for Integrating Security into the Automotive Development Process", KIPS (Korea Information Processing Society) Transactions on Software and Data Engineering, Vol.9/No.12, December 2020, pp.387-402.
[DJ] Sooyoung Kang and Seungjoo Kim, "CIA-Level Driven Secure SDLC Framework for Integrating Security into SDLC Process", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.30/No.5, October 2020, pp.909-928.
[DJ] Hynsuk Cho, Sungyong Cha and Seungjoo Kim, "A Case Study on the Application of RMF to Domestic Weapon System", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.29/No.6, December 2019, pp.1463-1475.
[DJ] Jiseop Lee, Sungyong Cha, Seungsoo Baek, and Seungjoo Kim, "Research for Construction Cybersecurity Test and Evaluation of Weapon System", Journal of the KIISC (Korean Institute of Information Security and Cryptology), Vol.28/No.3, June 2018, pp.765-774.
[DC] Suhyeon Lee and Seungjoo Kim, "데이터 중심의 무기체계 머신러닝 시험평가 개선방향 연구", 무기체계 시험평가 세미나, September 10, 2020.
[TR] Haena Kim, Yejun Kim, and Seungjoo Kim, "A Study on the Security Requirements Analysis to Build a Zero Trust-based Remote Work Environment", arXiv, 8 Jan 2024.
[TR] Yejun Kim, Kwangsoo Cho, and Seungjoo Kim, "Difficulties in Dynamic Analysis of Drone Firmware and Its Solutions", arXiv, 28 Dec 2023.
[TR] Suhyeon Lee, Kwangsoo Cho, and Seungjoo Kim, "Do You Really Need to Disguise Normal Servers as Honeypots?", arXiv, 31 Oct 2022.
[IP] Seungjoo Kim et al., "Security-by-Design Methodology Using Evidence-Based Security Approach", US 17/622,965, December 27, 2021.
[IP] Seungjoo Kim et al., “BinTyper: Type confusion Detection without Source Code”, PCT/KR2021/009092, July 15, 2021.
[IP] Seungjoo Kim et al., "Integrated Circuit Chip with Reverse Engineering Prevention", US 10,204,874 B2, February 12, 2019.
[DP] Seungjoo Kim et al., “Requirements Analysis and Design Methodology for System”, KR-10-2476360, December 6, 2022.
[DP] Seungjoo Kim et al., “Model-Driven Security Framework for Security System Design and Verification”, KR-10-2021-0020251 (Application No.), February 2, 2021.
[DP] Seungjoo Kim et al., "Detection Method for Type Confusion Errors in C++ without Source Code", KR-10-2020-0098768 (Application No.), August 6, 2020.
[DP] Seungjoo Kim et al., "A Methodology for Integrating Security into the Automotive Development Process" KR-10-2020-0092969 (Application No.), July 27, 2020.
[DP] Seungjoo Kim et al., "Security-by-Design Methodology using Evidence-based Security Approach", KR-10-2020-0085599 (Application No.), July 10, 2020.
[DP] Seungjoo Kim et al., "Practical Silicon-Backside-Protection", KR-10-2019-0135906 (Application No.), October 29, 2019.
[Article] Seungjoo Kim, "보안 내재화 시대, 국방 사이버 보안의 필수 개념 RMF와 CMMC", News2day, March 4, 2025.
[Article] Seungjoo Kim, "해킹에 안전한 제품을 만들려면 - 부제: 제대로 된 보안내재화(Security by Design)를 한다는 것은 -", DailySecu, September 1, 2020.
"고려대, 살린과 '한국형 첨단 무기 보안 프레임워크' 사업 산·학 협력 체결", DailySecu, June 8, 2020.
"고려대, VR기업 살린과 국방 위험관리프레임워크 분야 맞손", Electronic Times, June 8, 2020.
[Article] Seungjoo Kim, "첨단 무기 시스템 보안의 핵심, 국방 IT RMF", DailySecu, September 25, 2019.
[Article] Seungjoo Kim, "F-35A 최첨단 전투기가 남긴 숙제, 사이버보안", Communications of the Korean Institute of Information Scientists and Engineers, December, 2018.
[Article] Seungjoo Kim, "첨단무기 사이버보안 체계 확립해야", Digital Times, April 11, 2018.
"사이버무기도 해킹…평가체계·기술확보 시급", Inews24, September 29, 2017.
"사이버전 무기체계: 보안성 검증, 신기술, 로드맵, 데이터 우위, 실질적 훈련 필요", Boannews, September 29, 2017.
[Article] Seungjoo Kim, "군의 첨단 무기체계가 사이버 공격으로부터 안전하려면", DailySecu, August 25, 2017.
[Article] Seungjoo Kim, "사이버무기 평가체계 마련해야", Digital Times, November 1, 2016.