Hongjun Choi
Cited by
Cited by
Detecting attacks against robotic vehicles: A control invariant approach
H Choi, WC Lee, Y Aafer, F Fei, Z Tu, X Zhang, D Xu, X Deng
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic.
B Saltaformaggio, H Choi, K Johnson, Y Kwon, Q Zhang, X Zhang, D Xu, ...
WOOT 16, 69-78, 2016
Securing Real-Time Microcontroller Systems through Customized Memory View Switching.
CH Kim, T Kim, H Choi, Z Gu, B Lee, X Zhang, D Xu
NDSS, 2018
RevARM: A platform-agnostic ARM binary rewriter for security applications
T Kim, CH Kim, H Choi, Y Kwon, B Saltaformaggio, X Zhang, D Xu
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles.
H Choi, S Kate, Y Aafer, X Zhang, D Xu
RAID, 349-364, 2020
Physical attack on monocular depth estimation with optimal adversarial patches
Z Cheng, J Liang, H Choi, G Tao, Z Cao, D Liu, X Zhang
Computer Vision–ECCV 2022: 17th European Conference, Tel Aviv, Israel …, 2022
Cyber-physical inconsistency vulnerability identification for safety checks in robotic vehicles
H Choi, S Kate, Y Aafer, X Zhang, D Xu
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
White-box program tuning
WC Lee, Y Liu, P Liu, S Ma, H Choi, X Zhang, R Gupta
2019 IEEE/ACM International Symposium on Code Generation and Optimization …, 2019
PHYSFRAME: type checking physical frames of reference for robotic systems
S Kate, M Chinn, H Choi, X Zhang, S Elbaum
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
Fusion is Not Enough: Single-Modal Attacks to Compromise Fusion Models in Autonomous Driving
Z Cheng, H Choi, J Liang, S Feng, G Tao, D Liu, M Zuzak, X Zhang
arXiv preprint arXiv:2304.14614, 2023
Screen after Previous Screens:{Spatial-Temporal} Recreation of Android App Displays from Memory Images
B Saltaformaggio, R Bhatia, X Zhang, D Xu, GG Richard III
25th USENIX Security Symposium (USENIX Security 16), 1137-1151, 2016
The system can't perform the operation now. Try again later.
Articles 1–11