Prof. Changwoo Pyo

Prof. Changwoo Pyo

Hongik University, South Korea




1989  Ph.D., University of Illinois, USA

1982  M.Sc., Seoul Nation University, South Korea

1980  B.Sc., Seoul National University, South Korea

Publications (Selected)

  1. S. Park, C. Pyo, S. Kim, G. Lee, “An Implementation of Program Counter Encoding using TPM,” J. of KIISE: Computing Practices and Letters, accepted in 2010
  2. K. Kim, S. Kwon, C. Pyo. “Vulnerability of Code Pointers in Android Platform,” The 37th KIISE Fall Conference, Nov. 2010.
  3. C. Pyo, “Random Number Generation using SDRAM,” J. of KIISE: Computing Practices and Letters, Vol. 16, No. 4, Apr. 2010.
  4. C. Pyo and K. Han, “Coding Standards for Secure C Programs,” Communications of the KIISE, Vol. 28, No. 2, Feb. 2010.
  5. C. Pyo, S. Pae and G. Lee, “DRAM as source of randomness,” Electronics Letters, Vol. 45, No. 1, Jan. 2009
  6. G. Lee, C. Pyo, T. Kim, “Run Time Encoding of Function Pointers by Dynamic Linker” Dependable systems and Networks, Jun. 2005.
  7. C. Pyo B. Bae, T. Kim and G. Lee, “Run-Time Detection of Buffer Overflow Attacks without Explicit Sensor Data Objects,” International Conference on Information Technology: Coding and Computing, 2004
  8. C. Pyo and J. Lee, “Random Number Generator using Time-Stamp Counter Register,” The 31st Fall Conference of KIISE, 2004
  9. C. Pyo, J. Lee, K. Chong, J. Lee, “An Optimal Algorithm for Maximal Connectivity of HFC Network,” LNCS 2662, May 2003
  10. C. Pyo and G. Lee, “Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack,” LNCS 2513, Dec. 2002
  11. H. Yang, C. Pyo and G. Lee, “Performance Evaluation of Detecting Stack Inversion for Defending from Buffer Overflow Attack,” The 29th Fall KIISE Conference, Oct. 2002
  12. D. Wu, K. Han, C. Pyo and H. Kim, “Incremental and Retargetable Linker for Embedded System,” J. of KISS: Computing Practice, Vol. 7, No. 2, Apr. 2001
  13. D. Wu, C. Pyo and S. Yoon, “A Program Transformation Framework for Improving Data Locality based on Loop Distribution, Interchange, Unrolling, and Scalarization,” J. of KISS (B), Vol. 26, No. 4, Apr. 1999