Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Geumhwan Cho is active.

Publication


Featured researches published by Geumhwan Cho.


human factors in computing systems | 2015

On the Effectiveness of Pattern Lock Strength Meters: Measuring the Strength of Real World Pattern Locks

Youngbae Song; Geumhwan Cho; Seongyeol Oh; Hyoungshick Kim; Jun Ho Huh

We propose an effective pattern lock strength meter to help users choose stronger pattern locks on Android devices. To evaluate the effectiveness of the proposed meter with a real world dataset (i.e., with complete ecological validity), we created an Android application called EnCloud that allows users to encrypt their Dropbox files. 101 pattern locks generated by real EnCloud users were collected and analyzed, where some portion of the users were provided with the meter support. Our statistical analysis indicates that about 10% of the pattern locks that were generated without the meter support could be compromised through just 16 guessing attempts. As for the pattern locks that were generated with the meter support, that number goes up to 48 guessing attempts, showing significant improvement in security. Our recommendation is to implement a strength meter in the next version of Android.


advanced information networking and applications | 2015

A Framework for Security Services Based on Software-Defined Networking

Jaehoon Jeong; Jihyeok Seo; Geumhwan Cho; Hyoungshick Kim; Jungsoo Park

This paper proposes a framework for security services using Software-Defined Networking (SDN) and specifies requirements for such a framework. It describes two representative security services, such as (i) centralized firewall system and (ii) centralized DDoS-attack mitigation system. For each service, this paper discusses the limitations of legacy systems and presents a possible SDN-based system to protect network resources by controlling suspicious and dangerous network traffic that can be regarded as security attacks.


availability, reliability and security | 2015

An Empirical Study of Click Fraud in Mobile Advertising Networks

Geumhwan Cho; Junsung Cho; Youngbae Song; Hyoungshick Kim

Smartphone advertisement is increasingly used among many applications and allows developers to obtain revenue through in-app advertising. Our study aims at identifying potential security risks of a type of mobile advertisement where advertisers are charged for their advertisements only when a user clicks (or touches) on the advertisements in their applications. In the Android platform, we design an automated click generation attack and empirically evaluate eight popular advertising networks by performing real attacks on them. Our experimental results show that six advertising networks (75%) out of eight (Millennial Media, App Lovin, Ad Fit, Mdot M, Rev Mob and Cauly Ads) are vulnerable to our attacks. We also discuss how to develop effective defense mechanisms to mitigate such automated click fraud attacks.


computer and communications security | 2018

The Personal Identification Chord: A Four ButtonAuthentication System for Smartwatches

Ian Oakley; Jun Ho Huh; Junsung Cho; Geumhwan Cho; Rasel Islam; Hyoungshick Kim

Smartwatches support access to a wide range of private information but little is known about the security and usability of existing smartwatch screen lock mechanisms. Prior studies suggest that smartwatch authentication via standard techniques such as 4-digit PINs is challenging and error-prone. We conducted interviews to shed light on current practices, revealing that smartwatch users consider the ten-key keypad required for PIN entry to be hard to use due to its small button sizes. To address this issue, we propose the Personal Identification Chord (PIC), an authentication system based on a four-button chorded keypad that enables users to enter ten different inputs via taps to one or two larger buttons. Two studies assessing usability and security of our technique indicate PICs lead to increases in setup and (modestly) recall time, but can be entered accurately while maintaining high recall rates and may improve guessing entropy compared to PINs.


Security and Communication Networks | 2018

Design and Analysis of Push Notification-Based Malware on Android

Sangwon Hyun; Junsung Cho; Geumhwan Cho; Hyoungshick Kim

Establishing secret command and control (C&C) channels from attackers is important in malware design. This paper presents design and analysis of malware architecture exploiting push notification services as C&C channels. The key feature of the push notification-based malware design is remote triggering, which allows attackers to trigger and execute their malware by push notifications. The use of push notification services as covert channels makes it difficult to distinguish this type of malware from other normal applications also using the same services. We implemented a backdoor prototype on Android devices as a proof-of-concept of the push notification-based malware and evaluated its stealthiness and feasibility. Our malware implementation effectively evaded the existing malware analysis tools such as 55 antimalware scanners from VirusTotal and SandDroid. In addition, our backdoor implementation successfully cracked about 98% of all the tested unlock secrets (either PINs or unlock patterns) in 5 seconds with only a fraction (less than 0.01%) of the total power consumption of the device. Finally, we proposed several defense strategies to mitigate push notification-based malware by carefully analyzing its attack process. Our defense strategies include filtering subscription requests for push notifications from suspicious applications, providing centralized management and access control of registration tokens of applications, detecting malicious push messages by analyzing message contents and characteristic patterns demonstrated by malicious push messages, and detecting malware by analyzing the behaviors of applications after receiving push messages.


Computers & Security | 2018

Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks

DaeHun Nyang; Hyoungshick Kim; Woojoo Lee; Sung-bae Kang; Geumhwan Cho; Mun-Kyu Lee; Aziz Mohaisen

Abstract We present a new Personal Identification Number (PIN) entry method for smartphones that can be used in security-critical applications, such as smartphone banking. The proposed “Two-Thumbs-Up” (TTU) scheme is resilient against observation attacks such as shoulder-surfing and camera recording, and guides users to protect their PIN information from eavesdropping by shielding the challenge area on the touch screen. To demonstrate the feasibility of TTU, we conducted a user study for TTU, and compared it with existing authentication methods (Normal PIN, Black and White PIN, and ColorPIN) in terms of usability and security. The study results demonstrate that TTU is more secure than other PIN entry methods in the presence of an observer recording multiple authentication sessions.


european symposium on research in computer security | 2017

Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN

SoYoung Kim; Sora Lee; Geumhwan Cho; Muhammad Ejaz Ahmed; Jaehoon Jeong; Hyoungshick Kim

Domain Name System (DNS) amplification attack is a sophisticated Distributed Denial of Service (DDoS) attack by sending a huge volume of DNS name lookup requests to open DNS servers with the source address spoofed as a victim host. However, from the point of view of an individual network resource such as DNS server and switch, it is not easy to mitigate such attacks because a distributed attack could be performed with multiple DNS servers and/or switches. To overcome this limitation, we propose a novel security framework using Software-Defined Networking (SDN) to store the history of DNS queries as an evidence to distinguish normal DNS responses from attack packets. Our evaluation results demonstrate that the network traffic for DNS amplification attack can completely be blocked under various network conditions without incurring a significant communication overhead.


Eurasip Journal on Information Security | 2016

Combating online fraud attacks in mobile-based advertising

Geumhwan Cho; Junsung Cho; Youngbae Song; Donghyun Choi; Hyoungshick Kim


ieee symposium on security and privacy | 2017

SysPal: System-Guided Pattern Locks for Android

Geumhwan Cho; Jun Ho Huh; Junsung Cho; Seongyeol Oh; Youngbae Song; Hyoungshick Kim


conference on privacy security and trust | 2015

Keyboard or keylogger?: A security analysis of third-party keyboards on Android

Junsung Cho; Geumhwan Cho; Hyoungshick Kim

Collaboration


Dive into the Geumhwan Cho's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Junsung Cho

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sangwon Hyun

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

Seongyeol Oh

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ian Oakley

Ulsan National Institute of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge