Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hae-Young Yoo is active.

Publication


Featured researches published by Hae-Young Yoo.


acm symposium on applied computing | 2013

Measuring similarity of windows applications using static and dynamic birthmarks

Dongjin Kim; Yongman Han; Seong-je Cho; Hae-Young Yoo; Jinwoon Woo; Yunmook Nah; Minkyu Park; Lawrence Chung

A software birthmark is unique, as certain native characteristics of a program, hence can be used to measure the similarity between programs. In general, a static software birthmark does not need program execution, but is more vulnerable to attacks by semantic-preserving transformations. A dynamic software birthmark is applicable to packed executables, but cannot cover all the possible program paths. In this paper, we propose a novel effective technique to measure the similarity of Microsoft Windows applications using both static and dynamic birthmarks, which are based on the list of system APIs as well as the frequency of system API calls. Because system APIs are located in Windows system directories and act as a bridge between applications and the operating system, our birthmarks are resilient to obfuscations and compiler optimizations. A static birthmark consists of the system API call frequency of a target program, which can be extracted by scanning the executable file. A dynamic birthmark is the frequency of system API function calls, which can be extracted by a binary instrumentation tool during the execution of the program. To evaluate the effectiveness of the proposed technique, we compare various types of Windows applications using both the static and dynamic birthmarks. To demonstrate the robustness, we compare packed executables that were compressed by a binary packing tool. We carry out additional experiments for measuring the similarity between target Windows applications at the source code level and verify the evaluation results. The experimental results show that our birthmarks can effectively measure the similarity between Windows applications, as intended.


Wireless Personal Communications | 2014

Circular Hand Gesture Recognition Algorithm Using Concentric Circles

Byambasuren Sodgerel; Sang-Mu Lee; Mi-Hye Kim; Hae-Young Yoo

In this paper, we proposed a hand gesture recognition method using concentric with the coordinate information. Hand, the image of the area who entered through the camera through the binarization task and the change in the color space to extract the skin area was to determine forming a circle with the center of the center of the hand region to obtain the change of the input data. The circle and measure the similarity of the two concentric circles of different sizes. Concentric with coordinate information through image processing than the existing recognizer and the recognition through learning process is possible using a hand gesture recognition gesture.


The Kips Transactions:partd | 2011

Portability Evaluation Technique of Application for Heterogeneous Mobile Platform

Hae-Yoon Park; Hae-Young Yoo

However a mobile application has limited compatibility to other platforms and device. So a mobile application should be rebuilt as particular restrictions of platforms or mobile phones when the mobile application is reused for other platforms. However a mobile application has limited compatibility to other platforms and device. So a mobile application should be rebuilt as particular restrictions of platforms or mobile phones when the mobile application is reused for other platforms. This paper ascertains problems when a mobile application is transplanted for reusing into other platforms, and suggests to evaluation systems of portability`s quality that we can check the portability convenience of the existing mobile application. As we confirm its grade that shows convenience of suggested portability, we are able to check problems issued when a mobile application implants to other platforms. Then it is expected that we can check capability of rebuilding and endeavor rate. Also if the method will be considered at the first step of designing a mobile application, it will be the best way to develop the better mobile application that we can easily implant many other mobile platforms.


The Kips Transactions:partd | 2010

A Study of Design for the Integrated Architecture of SOA and WOA

So-Hyun Park; Hae-Young Yoo

Service Oriented Architecture (SOA), which supports various features such as interoperability and reusability of IT resources, comes into the spotlight as an effective approach for adapting new business environmental changes. SOA, however, has some problems including the high realization complexity and low Return on Investment (ROI). To solve these problems, Web Oriented Architecture (WOA) has gained attention. However, it also has some drawbacks about security concerns and unstable message transmissions. In this paper, we design a novel integrated architecture that classifies services into inside and outside ones and applies SOA for the former and WOA for the latter, respectively. By converging the advantages of SOA and WOA simultaneously, the proposed architecture becomes more simple and service-oriented, and can satisfy diverse requirements of customers. The usefulness evaluation of the proposed architecture is conducted through the Analytic Hierarchy Process (AHP) scheme.


international conference on asian digital libraries | 2005

Automatic classification of western music in digital library

Won-Jung Yoon; Kang-Kue Lee; Kyu-Sik Park; Hae-Young Yoo

In this paper, we propose a new robust content-based western music genre classification algorithm using multi-feature clustering (MFC) method combined with feature selection procedure. This paper focuses on the dependency problems of the classification result to different query patterns and query lengths which causes serious uncertainty of the system performance. In order to solve these problems, a new approach called MFC-SFSS based on k-means clustering is proposed. To verify the performance of the proposed method, several excerpts with variable duration were extracted from every other position in a same queried music file. Effectiveness of the system with MFC –SFSS and without MFC-SFSS is compared in terms of the classification results with k-NN decision rule. It is demonstrated that the use of MFC-SFSS significantly improves the system stability of musical genre classification with better accuracy.


innovative mobile and internet services in ubiquitous computing | 2013

A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications

Jongcheon Choi; Yongman Han; Seong-je Cho; Hae-Young Yoo; Ilsun You; Minkyu Park; Sangchul Han; Inshik Song

As software industry has been grown, it occurs more frequently to illegally copy software or to steal the core modules of a program. In order to detect program plagiarism, similarity analysis of suspicious programs based on source codes is one of accurate methods. However, the source codes are not always available. Therefore, it is necessary to analyze and determine software piracy or theft with only binary executables that are release versions of their products. In this paper, we propose a method to extract the feature information from the binary codes of the executable files on MS Windows systems in order to determine whether software is pirated or core modules of a program are stolen. We perform a small experiment to detect program similarity and plagiarism by comparing the statically extracted features of target programs.


international conference on pervasive services | 2008

An object identification method for segregated and reproduced contents

So-Hyun Park; In-Bok Choi; Ye-Na Kim; Taekun Park; Hae-Young Yoo

Many people have been illegally copying contents and pasting them on their blogs or other places or distributing them among other users with slight modifications, issues related distribution, accounting, and copyrights have become serious social matters. Studies focusing on producing a standard identification system for digital contents and proper methods to distribute them are necessary. The objective of this paper is to present a method providing an identification system to segregated and reproduced digital contents in order to collect information regarding the distribution and accounting of the contents.


Journal of Information Science and Engineering | 2012

Integrated Model of Service-Oriented Architecture and Web-Oriented Architecture for Financial Software *

So-Hyun Park; Jongmoo Choi; Hae-Young Yoo


Computer Science and Information Systems | 2014

A new detection scheme of software copyright infringement using software birthmark on windows systems

Yongman Han; Jongcheon Choi; Seong-je Cho; Hae-Young Yoo; Jinwoon Woo; Yunmook Nah; Minkyu Park


information security and cryptology | 2012

Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems

Dongjin Kim; Younsik Jeong; Gwangyeul Yun; Hae-Young Yoo; Seong-je Cho; Giyoun Kim; Jin-Young Lee; Hong-Geun Kim; Taeseung Lee; Jae-Myung Lim; Dongho Won

Collaboration


Dive into the Hae-Young Yoo's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Byambasuren Sodgerel

Chungbuk National University

View shared research outputs
Top Co-Authors

Avatar

Dongho Won

Sungkyunkwan University

View shared research outputs
Researchain Logo
Decentralizing Knowledge