Skip to main content

Showing 1–3 of 3 results for author: Huh, J H

  1. arXiv:2406.15709  [pdf, other

    cs.CR

    I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures

    Authors: Mingyi Liu, Jun Ho Huh, HyungSeok Han, Jaehyuk Lee, Jihae Ahn, Frank Li, Hyoungshick Kim, Taesoo Kim

    Abstract: Decentralized Finance (DeFi) offers a whole new investment experience and has quickly emerged as an enticing alternative to Centralized Finance (CeFi). Rapidly growing market size and active users, however, have also made DeFi a lucrative target for scams and hacks, with 1.95 billion USD lost in 2023. Unfortunately, no prior research thoroughly investigates DeFi users' security risk awareness leve… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

    Comments: In Proceedings of the 33rd USENIX Security Symposium, Philadelphia, PA, USA, Aug. 2024

  2. arXiv:2201.08678  [pdf, other

    cs.CR

    Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild

    Authors: Jusop Choi, Wonseok Choi, William Aiken, Hyoungshick Kim, Jun Ho Huh, Taesoo Kim, Yongdae Kim, Ross Anderson

    Abstract: Since Bitcoin appeared in 2009, over 6,000 different cryptocurrency projects have followed. The cryptocurrency world may be the only technology where a massive number of competitors offer similar services yet claim unique benefits, including scalability, fast transactions, and security. But are these projects really offering unique features and significant enhancements over their competitors? To a… ▽ More

    Submitted 21 January, 2022; originally announced January 2022.

  3. arXiv:0908.2462  [pdf, ps, other

    cs.CR cs.NI

    Hybrid Spam Filtering for Mobile Communication

    Authors: Ji Won Yoon, Hyoungshick Kim, Jun Ho Huh

    Abstract: Spam messages are an increasing threat to mobile communication. Several mitigation techniques have been proposed, including white and black listing, challenge-response and content-based filtering. However, none are perfect and it makes sense to use a combination rather than just one. We propose an anti-spam framework based on the hybrid of content-based filtering and challenge-response. There is… ▽ More

    Submitted 17 August, 2009; originally announced August 2009.

    Comments: 6 pages, 5 figures, 1 table

    ACM Class: H.4; D.2.8