Ikkyun KIM


Hash Table with Expanded-Key for High-Speed Networking
Seon-Ho SHIN Jooyoung LEE Jong-Hyun KIM Ikkyun KIM MyungKeun YOON 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/03/01
Vol. E99-D  No. 3  pp. 747-750
Type of Manuscript:  LETTER
Category: Fundamentals of Information Systems
Keyword: 
hash tableBloom filtermultiple hash functions
 Summary | Full Text:PDF

Tracing Stored Program Counter to Detect Polymorphic Shellcode
Daewon KIM Ikkyun KIM Jintae OH Jongsoo JANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/08/01
Vol. E91-D  No. 8  pp. 2192-2195
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
networksecurityshellcodepolymorphism
 Summary | Full Text:PDF

Executable Code Recognition in Network Flows Using Instruction Transition Probabilities
Ikkyun KIM Koohong KANG Yangseo CHOI Daewon KIM Jintae OH Jongsoo JANG Kijun HAN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/07/01
Vol. E91-D  No. 7  pp. 2076-2078
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
executable codemalware detectionIA-32 Instruction
 Summary | Full Text:PDF