scispace - formally typeset
D

DaeHun Nyang

Researcher at Ewha Womans University

Publications -  214
Citations -  2640

DaeHun Nyang is an academic researcher from Ewha Womans University. The author has contributed to research in topics: Authentication & Computer science. The author has an hindex of 21, co-authored 202 publications receiving 1686 citations. Previous affiliations of DaeHun Nyang include Electronics and Telecommunications Research Institute & Yonsei University.

Papers
More filters
Journal ArticleDOI

Exploring the Attack Surface of Blockchain: A Comprehensive Survey

TL;DR: This paper systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains, and outlines several attacks, including selfish mining, the 51% attack, DNS attacks, distributed denial-of-service (DDoS) attacks, consensus delay, orphaned and stale blocks, block ingestion, wallet thefts, smart contract attacks, and privacy attacks.
Posted Content

Exploring the Attack Surface of Blockchain: A Systematic Overview.

TL;DR: This paper systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains, and outlines several attacks, including selfish mining, the 51% attack, Domain Name System attacks, distributed denial-of-service (DDoS) attacks, consensus delay, orphaned blocks, block ingestion, wallet thefts, smart contract attacks, and privacy attacks.
Journal ArticleDOI

Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach

TL;DR: This paper builds a detection mechanism of IoT malware utilizing control flow graphs (CFGs), and shows that IoT malware samples have a large number of edges despite a smaller number of nodes, which demonstrate a richer flow structure and higher complexity.
Journal ArticleDOI

AUTo Sen : Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors

TL;DR: AUToSen is a deep-learning-based active authentication approach that exploits sensors in consumer-grade smartphones to authenticate a user based on deep learning to identify user distinct behavior from the embedded sensors with and without the user’s interaction with the smartphone.
Posted Content

Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks.

TL;DR: Wang et al. as discussed by the authors pointed out that Das's protocol is vulnerable to an offline password guessing attack, and also showed a countermeasure to overcome the vulnerability without sacrificing any efficiency and usability.