Ph.D. Student in Computer Science, concentrating on Information Assurance, at Arizona State University.

Currently affiliated with SEFCOM led by Dr. Gail-Joon Ahn, Dr. Adam Doupé, Dr. Yan Shoshitaishvili, Dr. Ruoyu (Fish) Wang, and Dr. Tiffany Bao.

My primary research interests lie in the field of systems security, which is to address and discover security concerns stemmed from insecure designs. I am, also, eager to resolve security issues in a wide range of topics.


Curriculum Vitae: [PDF] (updated at Nov, 2018)

Email: haehyun@asu.edu, haehyuncho@gmail.com

Publications

  1. iCORE: Continuous and Proactive Extrospection on Multi-core IoT Devices. (PDF)
    Penghui Zhang, Haehyun Cho, Ziming Zhao, Adam Doupé, and Gail-Joon Ahn.
    Proceedings of the 34th ACM/SIGAPP Symposium On Applied Computing (SAC), Limassol, Cyprus, Apr 2019.

  2. Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone. (PDF)
    Haehyun Cho, Penghui Zhang, Donguk Kim, Jinbum Park, Choong-Hoon Lee, Ziming Zhao, Adam Doupé, and Gail-Joon Ahn.
    Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, USA, Dec 2018.

  3. Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling. (PDF)
    Jaejong Baek, Sukwha Kyung, Haehyun Cho, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, and Gail-Joon Ahn.
    Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, USA, Dec 2018.

  4. DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications. (PDF)
    Haehyun Cho, Jeong Hyun Yi, and Gail-Joon Ahn.
    IEEE Access, Vol.6, pp.71229-71240, Nov 2018.

  5. Trustzone explained: Architectural features and use cases. (PDF)
    Bernard Ngabonziza, Daniel Martin, Anna Bailey, Haehyun Cho, and Sarah Martin.
    Proceedings of the IEEE 2nd International Conference on Collaboration and Internet Computing (CIC), Pittsburgh, PA, Nov 2016.

  6. Mobile application tamper detection scheme using dynamic code injection against repackaging attacks. (PDF)
    Haehyun Cho, Jiwoong Bang, Myeongju Ji, and Jeong Hyun Yi.
    The Journal of Supercomputing, Vol.72, No.9, pp.3629-3645, Sep 2016.

  7. TRIPLEMON: A Multi-layer Security Framework for Mediating Inter-Process Communication on Android. (PDF)
    Yiming Jing, Gail-Joon Ahn, Hongxin Hu, Haehyun Cho, and Ziming Zhao.
    Journal of Computer Security, Vol.24, No.4, pp.405-426, Sep 2016.

  8. Anti-debugging scheme for protecting mobile apps on android platform. (PDF)
    Haehyun Cho, Jiwoong Bang, Myeongju Ji, and Jeong Hyun Yi.
    The Journal of Supercomputing, Vol.72, No.1, pp.232-246, Jan 2016.

  9. Personal Information Leaks with Automatic Login in Mobile Social Network Services. (PDF)
    Jongwon Choi, Haehyun Cho, and Jeong Hyun Yi.
    Entropy Journal, Vol.17, No.6, pp.3947-3962, Jun 2015.

Patents

  1. Application Code Analysis Apparatus and Method for Code Analysis Using the Same.
    Jeong Hyun Yi, Haehyun Cho, Jiwoong Bang, and Myeongju Ji.
    KR Patent, Patent No.: 10-1557455, Sep 2015.

  2. User Terminal to Detect the Tampering of the Applications Using Core Code and Method for Tamper Detection Using The Same.
    Jeong Hyun Yi and Haehyun Cho.
    KR Patent, Patent No.: 10-1518689, Apr 2015.

Education

  • PhD, Computer Science, Arizona State University, Tempe, AZ, 08/2016 - present

  • MS, Computer Science and Engineering, Soongsil University, Seoul, Republic of Korea, 03/2013 - 02/2015
  • - Thesis : Mobile App Tamper Detection Scheme Based on Core Code Attestation

  • BS, Computer Science and Engineering, Soongsil University, Seoul, Republic of Korea, 03/2006 - 02/2013