Computer & Communication Security Laboratory (CCS Lab) was established in 2004 for the purpose of studying security problems and proper countermeasures. The members of CCS Lab are pursuing research on system security and network security. We take part in activities related to computer security and cooperate with professors and researchers inside and outside the country for research advances. We continue to publish the results of our researches and projects in the major international journals and conferences.

CCSLAB - Main

News

2020/09/25 It has been published as a special feature article in the 2020 issue of 'Engineering Journal' on the theme of 'Going to Korea University Blockchain Research Institute'.
Pre-checking and preventing security vulnerabilities caused by open source code reuse in the block chain has been introduced.
Picture
2020/07/13 MBC news regarding the safety problem by the security vulnerabilities is reported at July 13, 2020.
One message can stop a fast moving scooter remotely which can be fatal to the user.
The news story is based on the analysis by CCS lab members.
(https://imnews.imbc.com/replay/2020/nwdesk/article/5841148_32524.html)
(Video with English subtitles: https://youtu.be/H23Ezt5QGq4")
2018/09/14 CCSLAB got the 1st prize for UDC2018 contest.
CCSLAB got the first prize for the UDC2018 contest with SmartWall, the firewall system for the smart contract.
Picture
2018/09/14 Prof. Lee presented about blockchain security in UDC2018
Professor presented about software security issues can be included such as vulnerability propagation through the code clones of open source software (OSS) and the existence of same vulnerabilities in multiple locations via the code reuse of reference implementations through the sessions. (https://youtu.be/LnLWcQlR3Bw)
2017/12/19 Jisu Park got a prize for SW Challenge
Congratulations! Jisu Park got 1st prize for 2017 SW Challenge.
* Picture: Image1 Image2 Image3 Image4 Image5 Image6 Image7
2017/02/09 Seulbae's paper was accepted in IEEE S&P 2017
Congratulations! The paper entitled "VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery" by Seulbae Kim, Seunghoon Woo, Heejo Lee, and Hakjoo Oh was accepted in IEEE Symposium on Security and Privacy 2017 (IEEE S&P 2017), one of the top-tier conferences in computer science.

More News.......

Registered CVEs

2021/08/04 CVE-2021-37232 Choongin Lee, Taewoo Kim
2021/08/04 CVE-2021-37231 Choongin Lee, Taewoo Kim
2022/01/07 CVE-2020-10137 Nkuba Kayembe Carlos
2022/01/07 CVE-2020-9061 Nkuba Kayembe Carlos
2022/01/07 CVE-2020-9060 Nkuba Kayembe Carlos
2022/01/07 CVE-2020-9059 Nkuba Kayembe Carlos
2022/01/07 CVE-2020-9058 Nkuba Kayembe Carlos
2022/01/07 CVE-2020-9057 Nkuba Kayembe Carlos
2020/12/25 CVE-2020-35376 Seunghoon Woo, Seongkyong Kwon
2020/12/25 CVE-2020-20412 Seunghoon Woo, Seongkyong Kwon
2020/06/15 CVE-2020-14147 Seunghoon Woo

Publication

2021/12/11 Riding the IoT Wave With VFuzz: Discovering Security Flaws in Smart Homes, IEEE Access Carlos Kayembe Nkuba
2021/12/06 Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User Discussions, Annual Computer Security Applications Conference (ACSAC) Hyunji Hong
2021/12/01 소프트웨어 보안 관점에서 본 미국 사이버보안 행정명령과 우리의 대응방안, KISA Report 12월호_4 이태준
2021/11/23 오픈소스 SW 공급망 공격 대응기술 동향, 전자금융과 금융보안 이희조
2021/10/22 METHOD FOR DETECTING SOFTWARE VULNERABILITY BASED ON BINARY CODE CLONE Heejo Lee
2021/10/19 METHOD FOR IDENTIFYING OPEN-SOURCE SOFTWARE COMPONENTS AT THE SOURCE-CODE LEVEL Heejo Lee
2021/10/15 METHOD FOR IDENTIFYING OPENSOURCE SOFTWARE COMPONENTS AT THE SOURCECODE LEVEL Heejo Lee
2021/08/11 V0Finder: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities, USENIX Security Symposium Seunghoon Woo
2021/06/22 Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC Security, IFIP International Conference on ICT Systems Security and Privacy Protection Junwon Lee
2021/06/22 QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection, IFIP International Conference on ICT Systems Security and Privacy Protection Hajin Jang
2021/06/21 OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept, Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Seongkyeong Kwon

More Publication...