Hyunguk Yoo
Hyunguk Yoo
Unknown affiliation
No verified email
Cited by
Cited by
Challenges and research directions for heterogeneous cyber–physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture
H Yoo, T Shon
Future generation computer systems 61, 128-136, 2016
CLIK on PLCs! Attacking control logic with decompilation and virtual PLC
S Kalle, N Ameen, H Yoo, I Ahmed
Binary Analysis Research (BAR) Workshop, Network and Distributed System …, 2019
Control logic injection attacks on industrial control systems
H Yoo, I Ahmed
ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019
Novel approach for detecting network anomalies for substation automation based on IEC 61850
H Yoo, T Shon
Multimedia Tools and Applications 74, 303-318, 2015
IEEE 1815.1-based power system security with bidirectional RNN-based network anomalous attack detection for cyber-physical system
S Kwon, H Yoo, T Shon
IEEE Access 8, 77572-77586, 2020
Denial of engineering operations attacks in industrial control systems
S Senthivel, S Dhungana, H Yoo, I Ahmed, V Roussev
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
Design and implementation of cybersecurity testbed for industrial IoT systems
S Lee, S Lee, H Yoo, S Kwon, T Shon
The Journal of Supercomputing 74, 4506-4520, 2018
Empirical study of PLC authentication protocols in industrial control systems
A Ayub, H Yoo, I Ahmed
2021 IEEE Security and Privacy Workshops (SPW), 383-397, 2021
Overshadow plc to detect remote control-logic injection attacks
H Yoo, S Kalle, J Smith, I Ahmed
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
Grammar-based adaptive fuzzing: Evaluation on SCADA modbus protocol
H Yoo, T Shon
2016 IEEE International conference on smart grid communications …, 2016
PEM: Remote forensic acquisition of PLC memory in industrial control systems
N Zubair, A Ayub, H Yoo, I Ahmed
Forensic Science International: Digital Investigation 40, 301336, 2022
Whitelist-based anomaly detection for industrial control system security
H Yoo, JH Yun, T Shon
The Journal of Korean Institute of Communications and Information Sciences …, 2013
Secure and reliable electronic record management system using digital forensic technologies
SA Majore, H Yoo, T Shon
The Journal of Supercomputing 70, 149-165, 2014
Control logic obfuscation attack in industrial control systems
N Zubair, A Ayub, H Yoo, I Ahmed
2022 IEEE International Conference on Cyber Security and Resilience (CSR …, 2022
RNN-based anomaly detection in DNP3 transport layer
S Kwon, H Yoo, T Shon
2019 IEEE international conference on communications, control, and computing …, 2019
Gadgets of gadgets in industrial control systems: Return oriented programming attacks on PLCs
A Ayub, N Zubair, H Yoo, W Jo, I Ahmed
2023 IEEE International Symposium on Hardware Oriented Security and Trust …, 2023
Packet diversity-based anomaly detection system with OCSVM and representative model
S Lee, H Yoo, J Seo, T Shon
2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016
Next Generation Electronic Record Management System based on Digital Forensics
SA Majore, H Yoo, T Shon
International Journal of Security and Its Applications 7 (1), 189-194, 2013
Anomaly detection for IEC 61850 substation network
Y Lim, H Yoo, T Shon
Journal of the Korea Institute of Information Security & Cryptology 23 (5 …, 2013
Recovery measure against disabling reassembly attack to DNP3 communication
S Kwon, H Yoo, T Shon
IEICE TRANSACTIONS on Information and Systems 100 (8), 1790-1797, 2017
The system can't perform the operation now. Try again later.
Articles 1–20