Personal Information
Organization / Workplace
Korea Korea, South
Occupation
Security Intelligence Analyst at IBM
Website
noentrypoint.blogspot.kr/
About
Senior Security professional with over 15 years of experience actively involved in Anti-Malware defense and research, various technical skills including reverse engineering, testing Anti-Malware and security solutions since 2002.
At a corporate and international level with close ties to the international Anti-Malware efforts and fellow researchers. Have worked as a Virus Laboratory and Field researcher for major organizations providing expert support for malware outbreaks.
Internationally, a member of several open and private Internet Security communities. Have attended and presented at international conferences, including the AVAR (Association of anti-Virus Asia Researchers) and ISOI ...
Presentations
(57)Likes
(64)Malicious Url Detection Using Machine Learning
securityxploded
•
9 years ago
Insider Threat – The Visual Conviction - FIRST 2007 - Sevilla
Raffael Marty
•
12 years ago
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bitdefender and Ravi Sahita, Intel
The Linux Foundation
•
9 years ago
Scalability, Fidelity and Stealth in the DRAKVUF Dynamic Malware Analysis System
Tamas K Lengyel
•
9 years ago
데이터는 차트가 아니라 돈이 되어야 한다.
Yongho Ha
•
8 years ago
Examining Malware with Python
mrphilroth
•
8 years ago
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research analyst – Qualys
SegInfo
•
12 years ago
Windows 10 Forensics: OS Evidentiary Artefacts
Brent Muir
•
8 years ago
개영한줄영작_Giving Advice on Debugging
Nasol Kim
•
9 years ago
01 우리시대 코딩(coding) 이야기
the Learning & Company
•
9 years ago
오픈스택데이 오픈소스PaaS 솔루션 - openshift 소개
Hojoong Kim
•
9 years ago
Hardware Trojans
Rahul Krishnamurthy
•
10 years ago
Live Response Collection Overview
BriMorLabs
•
9 years ago
Google Apps를 활용한 Smart Work 구축
선진 장
•
10 years ago
[KGC 2013] Online Game Security in China
Seungmin Shin
•
10 years ago
System hacking basics
gnomekr
•
10 years ago
System Hacking Tutorial #2 - Buffer Overflow - Overwrite EIP
sanghwan ahn
•
9 years ago
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Chong-Kuan Chen
•
9 years ago
Netsec-kr 2013 발표자료 - 악성코드 유사도 분석 기술 동향 (김휘강)
Korea University
•
10 years ago
Fireshark - Brucon 2010
Stephan Chenette
•
11 years ago
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
Rapid7
•
9 years ago
7 Creative Habbit
Jinho Jung
•
10 years ago
Treat Detection using Hadoop
DataWorks Summit
•
9 years ago
[D2 campus seminar]개발자가 꼭 알아야 할 보안이야기
NAVER D2
•
9 years ago
도커 무작정 따라하기: 도커가 처음인 사람도 60분이면 웹 서버를 올릴 수 있습니다!
pyrasis
•
9 years ago
보안프로젝트 세미나 Viper-v1.2
Jason Choi
•
9 years ago
내가 대학원에 들어왔을 때 알았더라면 좋았을 연구 노하우 (개정증보판) (UST 대학원 신입생 OT 강연)
Yoon Sup Choi
•
11 years ago
CrowdCasts Monthly: Going Beyond the Indicator
CrowdStrike
•
10 years ago
2006 03 15_pe & api hook
용환 노
•
9 years ago
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Cyphort
•
9 years ago
Personal Information
Organization / Workplace
Korea Korea, South
Occupation
Security Intelligence Analyst at IBM
Website
noentrypoint.blogspot.kr/
About
Senior Security professional with over 15 years of experience actively involved in Anti-Malware defense and research, various technical skills including reverse engineering, testing Anti-Malware and security solutions since 2002.
At a corporate and international level with close ties to the international Anti-Malware efforts and fellow researchers. Have worked as a Virus Laboratory and Field researcher for major organizations providing expert support for malware outbreaks.
Internationally, a member of several open and private Internet Security communities. Have attended and presented at international conferences, including the AVAR (Association of anti-Virus Asia Researchers) and ISOI ...