Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Junho Jeong is active.

Publication


Featured researches published by Junho Jeong.


Future Generation Computer Systems | 2017

Design and implementation of the secure compiler and virtual machine for developing secure IoT services

YangSun Lee; Junho Jeong; Yunsik Son

Abstract Recent years have seen the development of computing environments for IoT (Internet of Things) services, which exchange large amounts of information using various heterogeneous devices that are always connected to networks. Since the data communication and services occur on a variety of devices, which not only include traditional computing environments and mobile devices such as smartphones, but also household appliances, embedded devices, and sensor nodes, the security requirements are becoming increasingly important at this point in time. Already, in the case of mobile applications, security has emerged as a new issue, as the dissemination and use of mobile applications have been rapidly expanding. This software, including IoT services and mobile applications, is continuously exposed to malicious attacks by hackers, because it exchanges data in the open Internet environment. The security weaknesses of this software are the direct cause of software breaches causing serious economic loss. In recent years, the awareness that developing secure software is intrinsically the most effective way to eliminate the software vulnerability, rather than strengthening the security system of the external environment, has increased. Therefore, methodology based on the use of secure coding rules and checking tools is attracting attention to prevent software breaches in the coding stage to eliminate the above vulnerabilities. This paper proposes a compiler and a virtual machine with secure software concepts for developing secure and trustworthy services for IoT environments. By using a compiler and virtual machine, we approach the problem in two stages: a prevention stage, in which the secure compiler removes the security weaknesses from the source code during the application development phase, and a monitoring stage, in which the secure virtual machine monitors abnormal behavior such as buffer overflow attacks or untrusted input data handling while applications are running.


Sensors | 2017

Cyber Physical Systems for User Reliability Measurements in a Sharing Economy Environment

Aria Seo; Junho Jeong; Yeichang Kim

As the sharing economic market grows, the number of users is also increasing but many problems arise in terms of reliability between providers and users in the processing of services. The existing methods provide shared economic systems that judge the reliability of the provider from the viewpoint of the user. In this paper, we have developed a system for establishing mutual trust between providers and users in a shared economic environment to solve existing problems. In order to implement a system that can measure and control users’ situation in a shared economic environment, we analyzed the necessary factors in a cyber physical system (CPS). In addition, a user measurement system based on a CPS structure in a sharing economic environment is implemented through analysis of the factors to consider when constructing a CPS.


Proceedings of the International Conference on Advances in Image Processing | 2017

The x86/64 Binary Code to Smart Intermediate Language Translation for Software Weakness

Junho Jeong; Yunsik Son; Seman Oh

Today, the proportion of software in society as a whole is steadily increasing. In addition to size of software increasing, the number of cases dealing with personal information is also increasing. This shows the importance of weekly software security verification. However, software security is very difficult in cases where libraries do not have source code. To solve this problem, it is necessary to develop a technique for checking existing binary security weaknesses. To this end, techniques for analyzing security weaknesses using intermediate languages are actively being discussed. In this paper, we propose a system that translate binary code to intermediate language to effectively analyze existing security weaknesses within binary code.


Mobile Information Systems | 2017

Automatic Optimizer Generation Method Based on Location and Context Information to Improve Mobile Services

Yunsik Son; Junho Jeong; YangSun Lee

Several location-based services (LBSs) have been recently developed for smartphones. Among these are proactive LBSs, which provide services to smartphone users by periodically collecting background logs. However, because they consume considerable battery power, they are not widely used for various LBS-based services. Battery consumption, in particular, is a significant issue on account of the characteristics of mobile systems. This problem involves a greater service restriction when performing complex operations. Therefore, to successfully enable various services based on location, this problem must be solved. In this paper, we introduce a technique to automatically generate a customized service optimizer for each application, service type, and platform using location and situation information. By using the proposed technique, energy and computing resources can be more efficiently employed for each service. Thus, users should receive more effective LBSs on mobile devices, such as smartphones.


The International Journal of Fuzzy Logic and Intelligent Systems | 2015

Automatic Fortified Password Generator System Using Special Characters

Junho Jeong; Jung-Sook Kim

The developed security scheme for user authentication, which uses both a password and the various devices, is always open by malicious user. In order to solve that problem, a keystroke dynamics is introduced. A person’s keystroke has a unique pattern. That allows the use of keystroke dynamics to authenticate users. However, it has a problem to authenticate users because it has an accuracy problem. And many people use passwords, for which most of them use a simple word such as “password” or numbers such as “1234.” Despite people already perceive that a simple password is not secure enough, they still use simple password because it is easy to use and to remember. And they have to use a secure password that includes special characters such as “#!(*)ˆ”. In this paper, we propose the automatic fortified password generator system which uses special characters and keystroke feature. At first, the keystroke feature is measured while user key in the password. After that, the feature of user’s keystroke is classified. We measure the longest or the shortest interval time as user’s keystroke feature. As that result, it is possible to change a simple password to a secure one simply by adding a special character to it according to the classified feature. This system is effective even when the cyber attacker knows the password.


Journal of Korean Institute of Intelligent Systems | 2014

Development of the Dripping Speed Measurement System of Medical Liquid using Heuristic

Jung-Sook Kim; Junho Jeong

This paper describes the medical and IT convergence system using a smart phone and a heuristic method for the measurement of the dripping speed of the liquid in a drip chamber, which can estimate the remaining time using pattern recognition and difference image from video frame information based on Android technology. The video frames were first made using a smartphone camera and we calculated the difference image between the n image and the (n-1) image and then changed into binary images using the threshold value. At this point, it is very important to find an optimal threshold value using heuristic method to recognize the dripping of the liquids. In addition, the user can adjust the dripping speed according to the doctor`s prescription, exactly like watching the progress bar of a mobile application. The experiment results show that our method using video processing technique accurately measures the dripping speed for a wide range of speeds that are sufficient for ordinary practice.


Journal of Korean Institute of Intelligent Systems | 2014

The Auto Generation Scheme of Message Frame for Testing of the Information Service Devices

Jung-Sook Kim; Jae-Hyeong Kim; Junho Jeong; Eunmi Jung

Intelligent Transportation Systems (ITS) are advanced applications which, without embodying intelligence as such, aim to provide innovative services relating to different modes of transport and traffic management and enable various users to be better informed and make safer, more coordinated, and `smarter` use of transport networks. However, ITS has the different size and shapes according to the city environment policy to adjust the city scene and it has to be displayed by different message on the information display device in real-time. And the information service providers must make the information display system which has the different information and data each time. That is very time and workers consuming and auto message frame generation system is necessary. In this paper, we design and develop the message frame generation system which can set several parameters easily for the generation of the message frame automatically on the windows environment and we do not need to go the field to get the test data.


Journal of Korean Institute of Intelligent Systems | 2013

Development of the Metal Casting Process Management System Based on Touch Screen

Jung-Sook Kim; Jae-Hyeong Kim; Junho Jeong; Jang-Young Chung

In this paper, we describe the smart metal casting processing management system, in which we applied case-based reasoning on the window environment. Metal casting is one of the most common casting processes. The metal casting processing is complex and variable depends on a kind of metal casting products. Especially, the metal casting industry has a feature which produces small quantities but produces a lot of different types of metal casting products. And we developed the smart metal casting processing management system which could show the processing route according to the product cases intelligently using the result of case-based reasoning. The experimental result shows that our metal casting processing management system schemes achieves more productivity than manual management schemes.


information technology and computer science | 2015

Development of the Graphical User Interface of Mobile Application for Remote Control of Digital Audio System

Jung-Sook Kim; Junho Jeong; Euldong Kim; Jinok Park; Sunhang Lee


Ingénierie Des Systèmes D'information | 2015

An Election scheme for Cooperative UAVs with Fault Tolerance

Junho Jeong; Yunsik Son; Jin-Woo Jung; YangSun Lee

Collaboration


Dive into the Junho Jeong's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge