International Journal

1. Kim, TaeGuen; Lee, Yeo Reum; Kang, BooJoong; Im, Eul Gyu; , Binary executable file similarity calculation using function matching, The Journal of Supercomputing, 75, 2, 607-622, 2019, Springer US
2. Kim, TaeGuen; Kang, BooJoong; Im, Eul Gyu; , Runtime detection framework for android malware, Mobile Information Systems, 2018, 2018, Hindawi
3. Kim, TaeGuen; Kang, BooJoong; Rho, Mina; Sezer, Sakir; Im, Eul Gyu; , A multimodal deep learning method for android malware detection using various features, IEEE Transactions on Information Forensics and Security, 14, 3, 773-788, 2018, IEEE
4. Cho, In Kyeom; Kim, Tae Guen; Shim, Yu Jin; Ryu, Minsoo; Im, Eul Gyu; , Malware analysis and classification using sequence alignments, Intelligent Automation & Soft Computing, 22, 3, 371-377, 2016, Taylor & Francis
5. Kang, Byeongho; Kim, TaeGuen; Kim, Junhyoung; Im, Eul Gyu; , A Dynamic Taint Analysis Method of Control-Dependent Data 1, International Information Institute (Tokyo). Information, 19, 11A, 5245, 2016, International Information Institute
6. Cho, In Kyeom; Kim, TaeGuen; Shim, Yu Jin; Park, Haeryong; Choi, Bomin; Im, Eul Gyu; , Malware Similarity Analysis using API Sequence Alignments., J. Internet Serv. Inf. Secur., 4, 4, 103-114, 2014,
7. Kim, TaeGuen; Kang, Boojoong; Im, Eul Gyu; , Malware classification method via binary content comparison, International Information Institute (Tokyo). Information, 16, 8, 5773, 2013, International Information Institute
8. Kang, BooJoong; Kim, Hye Seon; Kim, Taeguen; Kwon, Heejun; Im, Eul Gyu; , Fast Malware Classification using Counting Bloom Filter1, International Information Institute (Tokyo). Information, 15, 7, 2879, 2012, International Information Institute

Domestic Journal

1. Kim, TaeGuen; Ji, H; Im, E; , Malware Classification Using Machine Learning and Binary Visualization, KIISE Transactions on Computing Practices, 24, 4, 198-203, 2018
2. Park, Jeong Been; Han, Kyung Soo; Kim, TaeGuen; Im, Eul Gyu; , A Study on Selecting Key Opcodes for Malware Classification and Its Usefulness, Journal of KIISE, 42, 5, 558-565, 2015, Korean Institute of Information Scientists and Engineers
3. Kim, TaeGuen; Im, Eul-gyu; , Analysis Method Reuse Code to Detect Variants of Malware, Journal of The Korea Institute of information Security & Cryptology, 24, 1, 32-38, 2014
4. Kim, TaeGuen; , In-Kyoung Kim, and Eul Gyu Im," Malware detection method via major block comparison,", Journal of Security Engineering, 9, 5, 401-416, 2012
5. Kang, Boojoong; Kim, Hye Seon; Kim, Taeguen; Kwon, Heejun; Im, Eul Gyu; , Fast malware family detection method using control flow graphs, Proceedings of the 2011 ACM Symposium on Research in Applied Computation, 287-292, 2011

International Conference

1. Jung, Byungho; Kim, TaeGuen; Im, Eul Gyu; , Malware classification using byte sequence information, Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 143-148, 2018
2. Li, Qing; Wang, Le; Kim, TaeGuen; Im, Eul Gyu; , Mobile-based continuous user authentication system for cloud security, 2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC), 176-179, 2016, IEEE
3. Park, JunGyu; Kim, TaeGuen; Im, Eul Gyu; , Touch Gesture Data based Authentication Method for Smartphone Users, Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 136-141, 2016
4. Lee, Tae Kyong; Kim, TaeGuen; Im, Eul Gyu; , User authentication method using shaking actions in mobile devices, Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 142-147, 2016
5. Kim, Junhyoung; Kim, TaeGuen; Im, Eul Gyu; , Structural information based malicious app similarity calculation and clustering, Proceedings of the 2015 Conference on research in adaptive and convergent systems, 314-318, 2015
6. Shim, Yu Jin; Kim, TaeGuen; Im, Eul Gyu; , A Study on Similarity Calculation Method for API Invocation Sequences, International Conference on Rough Sets and Knowledge Technology, , , 492-501, 2015, Springer
7. Kim, TaeGuen; Park, Jung Bin; Cho, In Gyeom; Kang, Boojoong; Im, Eul Gyu; Kang, SooYong; , Similarity calculation method for user-define functions to detect malware variants, Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 236-241, 2014
8. Kim, Junhyoung; Kim, TaeGuen; Im, Eul Gyu; , Survey of dynamic taint analysis, 2014 4th IEEE International Conference on Network Infrastructure and Digital Content, , , 269-272, 2014, IEEE
9. Kang, Byeongho; Kim, TaeGuen; Kang, BooJoong; Im, Eul Gyu; Ryu, Minsoo;, TASEL: Dynamic taint analysis with selective control dependency, Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 272-277, 2014,
10. Kim, SunWoo; Kim, TaeGuen; Im, Eul Gyu; , Real-time malware detection framework in intrusion detection systems, Proceedings of the 2013 Research in Adaptive and Convergent Systems, 351-352, 2013

Domestic Conference

1. Seong, Myeong-jae; Kim, TaeGuen; , Network Traffic Analysis of Android Malware, Proceedings of the Korea Contents Association Conference, 475-476, 2014, The Korea Contents Association
2. Kim, TaeGuen; Im, Eul Gyu; , User Defined Function Inference Method for Malware Detection, KICS, 776-777, 2012
3. Kim, TaeGuen; Im, Eul Gyu; , Malware Detection Method via String Comparison, KICS, 493-494, 2012
4. Kang, Boojoong; Kim, TaeGuen; Im, Eul Gyu; , Instruction Set Malware Classification using Counting Bloom Filter, KICS, 350-351, 2012
5. Kim, TaeGuen; Im, Eul Gyu; , An Analysis on Behavioral API for Accurate Malware Detection, KICS, 663-664, 2011