[02] Β volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model
Β Forensic Science International: Digital Investigation, 2024.07. | SCI(E), IF: 2.0
Dong Bin Oh, Donghyun Kim, Donghyun Kim, and Huy Kang Kim | Selected Paper from DFRWS USA'24 | π Paper
[01] Β Integrity check value, are you a spy? Information leakage attack on archive formats, IEEE Access, 2024.06. | SCI(E), IF: 3.4
Donghyun Kim, Jongwook Jeong, Soo-Hyun Lee, So Hyun Kang, and Youn Kyu Lee | π Paper
[02] Β NULL Byte Injection: Anti-Forensic Technique for Data Hiding in FAT32 File System, 2022.10.
WoNEXT'22 - 1st ACM MobiHoc Workshop on New EXperiments on network security Technologies (WoNEXT)
(Oral) Donghyun Kim, Youn Kyu Lee, and Jongwook Jeong | π Paper π Slide
[01] Β Detection of replay attack traffic in ICS network, 2018.08.
ACIT'18 - 6th International Conference on Applied Computing and Information Technology (ACIT)
Ki-Seob Hong, Hyo-Bin Kim, Dong-Hyun Kim, and Jung-Taek Seo | π Paper
[06] Β A Study on Mitigation for Insecure ZipCrypto Usage in Archive Utilities:
Β Focusing on a Tool for Security Configuration Enforcement and AES Conversion of Legacy ZIP Files, Journal of Defense and Security, 2025.12.
Geunho Baek, Donghyun Kim* | π TBD
[05] Β Analysis on Android UsageStats for Digital Investigation, Journal of Digital Forensics, 2021.12.
Yeji Kang, Donghyun Kim, Sunkyoung Lee, Jungheum Park, Sangjin Lee | π Paper
[04] Β A Study on Utilization of Windows 10 hiberfil.sys file for Digital Forensics, Journal of Digital Forensics, 2021.03.
Sumin Bang, Philgeun Jin, Donghyun Kim, Jungheum Park, Sangin Lee, Aran Park, Byoungmo Cho, Ilhoon Jung | π Paper
[03] Β Normalization and Application of Detection Rules for Attack Techniques based on Memory Artifacts, Journal of Digital Forensics, 2021.03.
Philgeun Jin, Donghyun Kim, Sumin Bang, Jungheum Park, Sangin Lee, Aran Park, Byoungmo Cho, Hwaseong Lee | π Paper
[02] Β A study on forensic analysis for Windows search utility Everything, Journal of Digital Forensics, 2020.09.
Donghyun Kim, Jaehyeok Han, Sangjin Lee | π Best Paper at Korea Digital Forensic Society Summer Conference | π Paper
[01] Β Investigating traces of a dropbox application for Windows, Journal of Digital Forensics, 2020.03.
Ki-Uk Nam, Dong-Hyun Kim, Ji-sung Choi, Sang-jin Lee | π Best Paper at Korea Digital Forensic Society Winter Conference | π Paper
[02] Β Cyberwarfare 101, yangseogak (in Korea)
Faculty of Computer Science at Military Academy (Army, Navy, Air force) | π ISBN : 978-89-5568-529-9
[01] Β Programming basics on groom (2nd Edition), Β© goorm Inc. (in Korea)
Faculty of Computer Science at Korea Military Academy | π ISBN : 979-11-966401-4-9
Preservation of online crime evidence from secret chat rooms on secure messengers
Improvement to the known-plaintext attack on ZIPCrypto