콘텐츠로 건너뛰기

Education

  • 1994.03–1998.02: B.S. in CSE, Ewha Womans University, Korea
  • 1998.03–2000.02: M.S. in CSE, POSTEC, Korea
  • 2000.03–2004.02: Ph.D. in CSE, POSTEC, Korea

Professional Experience

  • 2008–present: Professor, Dept. of Computer Science and Engineering, Kangwon National University, Korea
  • 2006–2008: BK Research Professor, POSTECH, Korea
  • 2005–2006: Postdoctoral Researcher, University of Waterloo, Canada
  • 2004–2005: Postdoctoral Researcher, INRIA, France

Patents

  1. 최미정, 외 2명 “악성코드 패킹 탐지 장치 및 방법”, 대한민국, 10-2021-0010269, 20210125[출원]
  2. 최미정, “블록체인 네트워크의 이웃 노드 연결 제어 장치, 방법 및 프로그램”, 대한민국, 10-2020- 0145352, 20201103[출원]
  3. 최미정, “파일 언패킹 방법”, 대한민국, 10-2019-0174908, 20191226[출원]
  4. 최미정, “안티 디버깅 무력화 장치 및 그 방법”, 대한민국, 10-2019-0143201, 20191111[출원]
  5. 최미정, 외 2명 “바이너리 파일 복원을 위한 하이브리드 언패킹 방법 및 시스템”, 대한민국, 10- 2018-0148801, 20181127, 10-1990028, 2019-06-11[출원], [등록]
  6. 최미정, 외 2명 “패킹여부 탐지 및 패커 유형 탐지 프로그램”, 대한민국, C-2018-034167, 20181121, C-2018-034167, 2018-11-21[출원], [등록]
  7. 최미정, “안드로이드 스마트 기기 비정상행위 탐지,” 대한민국, C-2015-018420, 20150806, C-2015-018420, 2015-08-06[출원], [등록]

Publications

  1. Jiwon Bang and Mi-Jung Choi, “Design of Personal Data Protection Decentralized Model Using Blockchain and IPFS,” in Proc. of The 24rd Asia-Pacific Network Operations and Management Symposium (APNOMS), Sejong, Korea, Sept. 2023.[Int’l Conf.]
  2. Beom-Su Lee, Jong-Wouk Kim, and Mi-Jung Choi, “Federated Learning Based Network Intrusion Detection Model,” in Proc. of The 24rd Asia-Pacific Network Operations and Management Symposium (APNOMS), Sejong, Korea, Sept. 2023.[Int’l Conf.]
  3. 김종욱, 최미정, “비트코인에서 불법 거래 탐지를 위한 그래프 신경망 연구,” KNOM Review, Vol. 26, No. 1, pp. 53–60, Aug. 2023.[KCI]
  4. 방지원, 최미정, “블록체인 기반의 탈중앙화 신원증명 모델 연구,” 통신망운용관리 학술대회, 제주, 대한민국, pp.87–90, May 2023.[Domestic Conf.]
  5. 장선영, 김종욱, 최미정, “악성코드 탐지를 위한 4-gram 기반 모델 실험 및 평가,” 통신망운용관리 학술대회, 제주, 대한민국, pp.25–28, May 2023.[Domestic Conf.]
  6. 이범수, 김종욱, 방지원, 최미정, “네트워크 침입 탐지를 위한 연합 학습 기반 딥러닝 모델 성능 비교,” 통신망운용관리 학술대회, 제주, 대한민국, pp.6–9, May 2023.[Best Paper] [Domestic Conf.]
  7. Suman Pandey, Yang-Sae Moon, and Mi-Jung Choi, “Netflix, Amazon Prime, and YouTube: Comparative Study of Streaming Infrastructure and Strategy,” Journal of Information Processing Systems, Vol. 18, No. 6, pp. 729–740, Dec. 2022.[ESCI]
  8. Beom-Su Lee, Jong-Wouk Kim, and Mi-Jung Choi, “Experimental Comparison of Combined Sampling Methods for Efficient NIDS,” in Proc. of The 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS), Takamatsu, Japan, Sept. 2022.[Int’l Conf.]
  9. 방지원, 최미정, “스마트 컨트랙트 취약점 탐지 도구 동향 분석,” KNOM Review, Vol. 25, No. 1, pp. 49–61, Aug. 2022.[KCI]
  10. 김종욱, 최미정, “BiLSTM 기반의 악성 파일 자동 탐지 및 분류 방안 연구,” KNOM Review, Vol. 25, No. 1, pp. 37–48, Aug. 2022.[KCI]
  11. 김종욱, 최미정, “엣지 컴퓨팅에서 딥러닝 기반의 침입 탐지 시스템 설계 및 구현,” 한국통신망학회 논문지, Vol. 47, No. 8, pp.1114–1127, Aug. 2022.[KCI]
  12. Jong-Wouk Kim, Yang-Sae Moon, and Mi-Jung Choi, “An Efficient Multi-Step Framework for Malware Packing Identification,” Draft, arXiv:2208.08071, doi: https://arxiv.org/abs/2208.08071, July 2022.[Draft]
  13. 이범수, 김종욱, 방지원, 최미정, “2D CNN 기반 네트워크 침입 탐지 모델,” 통신망운용관리 학술대회, 강원도, 대한민국, pp.161–164, May 2022.[Domestic Conf.]
  14. 김종욱, 최미정, “악성코드 분류를 위한 trigram 기반의 BiLSTM 모델 연구,” 통신망운용관리 학술대회, 강원도, 대한민국, pp.57–60, May 2022.[Best Paper] [Domestic Conf.]
  15. 이종화, 김종욱, 최미정, “네트워크 침입 탐지를 위해 CICIDS2017 데이터셋으로 학습한 Stacked Sparse Autoencoder-DeepCNN 모델,” KNOM Review, Vol. 24, No. 2, pp.24–34, Dec. 2021.[KCI]
  16. Jong-Hwa Lee, Jong-Wouk Kim, and Mi-Jung Choi, “SSAE-DeepCNN model for network intrusion detection,” in Proc. of The 22nd Asia-Pacific Network Operations and Management Symposium (APNOMS 2021), Tainan, Tiwan, Sept. 2021.[Int’l Conf.]
  17. Suman Pandey, Mi-Jung Choi, Jae-Hyung Yoo, and James Won-Ki Hong, “Streaming Pattern Based Feature Extraction for Training Neural Network Classifier to Predict Quality of VOD services,” in Proc. of 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM), Bordeaux, France, May 2021.[Int’l Conf.]
  18. 이종화, 김종욱, 최미정, “네트워크 침입 탐지를 위한 Stacked Denoising Autoencoder-Deep CNN 모델,” 통신망운용관리 학술대회, 포항, 대한민국, pp.87–90, Arp. 2021.[Best Paper] [Domestic Conf.]
  19. 이종화, 방지원, 김종욱, 최미정 “데이터의 불균형성을 제거한 네트워크 침입 탐지 모델 비교 분석,” KNOM Review, Vol. 23. No. 2, Dec. 2020.[KCI]
  20. Jong-Wouk Kim, Jiwon Bang, and Mi-Jung Choi, “Defeating Anti-Debugging Techniques for Malware Analysis Using a Debugger,” Advances in Science, Technology and Engineering Systems, Vol. 5. No. 6, Dec. 2020.[SCOPUS]
  21. Jong-Wouk Kim, Juhong Namgung, Yang-Sae Moon, and Mi-Jung Choi, “Experimental Comparison of Machine Learning Models in Malware Packing Detection,” in Proc. of 2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS), Daegue, Korea, pp. 377–380, Sept. 2020.[Int’l Conf.]
  22. 방지원, 최미정, “블록 전파 시간 단축을 위한 비트코인 네트워크 이웃 연결 알고리즘 개선,” KNOM Review, Vol. 23, No. 1, pp. 26–33, Aug. 2020.[KCI]
  23. Hajin Kim, Jiwon Bang, Siwoon Son, Namsoo Joo, Mi-Jung Choi, and Yang-Sae Moon, “Message Latency-Based Load Shedding Mechanism in Apache Kafka,” in Proc. of Euro-Par 2019 Workshops, LNCS 11997, pp. 731–736, May 2020.[Int’l Conf.]
  24. Suman Pandey, Soyoung Park, and Mi-Jung Choi, “Community oriented in-network caching and edge caching for over-the-top services in adaptive network conditions to improve performance,” International Journal of Network Management, Vol. 30, No. 4, pp. 1–20, Feb. 2020.[SCI(E)]
  25. 김종욱, 방지원, 최미정, “악성코드 분석을 위한 안티-디버깅의 이해와 무력화 연구를 위한 안티-안티-디버깅 연구,” 한국통신학회 논문지, Vol. 45, No. 1, pp. 105–116, Jan. 2020.[KCI]
  26. 김기현, 최미정, “SDN, NFV, Edge-Computing을 이용한 데이터 중심 네트워크 기술 동향 분석,” KNOM Review, Vol. 22, No. 3, pp. 1–12, Dec. 2019.[KCI]
  27. Mi-Jung Choi, Jiwon Bang, Jong-Wouk Kim, Hajin Kim, and Yang-Sae Moon, “All-in-One Framework for Detection, Unpacking, and Verification for Malware Analysis,” Security and Communication Networks, Vol. 2019, Article ID 5278137, pp. 1–16, Oct. 2019.[SCI]
  28. Jong-Wouk Kim, Jiwon Bang, Yang-Sae Moon, and Mi-Jung Choi, “Disabling Anti-Debugging Techniques for Unpacking System in User-level Debugger,” in Proc. of 2019 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea, pp. 954–959, Oct. 2019.[Int’l Conf.]
  29. Jiwon Bang and Mi-Jung Choi, “Design and Implementation of Storage System for Real-time Blockchain Network Monitoring System,” in Proc. of 20th Asia-Pacific Network Operations and Management Symposium (APNOMS), Matsue, Japan, pp. 1–4, Sept. 2019.[Int’l Conf.]
  30. 이종화, 방지원, 김종욱, 최미정, “네트워크 보안을 위한 SIEM 솔루션 비교 분석,” KNOM Review, Vol. 22, No. 1, Aug. 2019.[KCI]
  31. Seokwoo Yang, Siwoon Son, Mi-Jung Choi, and Yang-Sae Moon, “Performance improvement of Apache Storm using InfiniBand RDMA,” The Journal of Supercomputing, Vol. 75, No. 10, pp. 6804–6830, June 2019.[SCI(E)]
  32. 이종화, 방지원, 김종욱, 최미정, “네트워크 보안을 위한 SIEM 솔루션 비교 분석,” 통신망운용관리 학술대회, 대구, 대한민국, pp. 1–4, May 2019.[Domestic Conf.]
  33. 김종욱, 방지원, 최미정, “Manual Unpacking을 위한 Anti-Debugging 무력화에 관한 연구,” 통신망운용관리 학술대회, 대구, 대한민국, pp. 59–61, May 2019.[Best Paper] [Domestic Conf.]
  34. 김종욱, 방지원, 최미정, “사이버보안을 위한 SIEM의 발전 동향,” 정보처리학회 추계학술발표대회, 부산, 대한민국, pp. 208–211, Nov. 2018.[Domestic Conf.]
  35. 김하진, 방지원, 손시운, 최미정, 문양세, “아파치 카프카의 메시지 지연시간 기반 로드 쉐딩 메커니즘,” 정보처리학회 추계학술발표대회, 부산, 대한민국, Nov. 2018.[Domestic Conf.]
  36. 한도경, 방지원, 최미정, “실시간 블록체인 네트워크 모니터링 시스템의 데이터베이스 시스템 설계,” 통신망운용관리 워크샵, 서울, 대한민국, Nov. 2018.[Domestic Conf.]
  37. Wonhyeong Cho, Myeong-Seon Gil, Mi-Jung Choi, and Yang-Sae Moon, “Storm-based distributed sampling system for multi-source stream environment,” International Journal of Distributed Sensor Networks, Vol. 14, No. 11, pp. 1–12, Nov. 2018.[SCI(E)]
  38. Soyoung Park, Homin Han, Byeong-Su Kim, Jun-Ho Noh, Jeonghee Chi, and Mi-Jung Choi, “Real-Time Traffic Risk Detection Model Using Smart Mobile Device,” Sensors, Vol. 18, No. 11, pp. 1–21, Oct. 2018.[SCI(E)]
  39. 김선균, 김하진, 최미정, “Anti-VM/Debugging 무력화 환경에서 악성코드자동 언패킹 시스템 설계 및 구현,” 한국통신학회 논문지, Vol. 43, No. 11, pp. 1929–1940, Sept. 2018.[KCI]
  40. Jiwon Bang and Mi-Jung Choi, “Design of Real-Time Transaction Monitoring System for Blockchain Abnormality Detection,” in Proc. of the 3rd Applied Physics, System Science and Computers (APSAC), Dubrovnik, Croatia, pp. 229–234, Sept. 2018.[Int’l Conf.]
  41. Sanghun Lee, Hajin Kim, Mi-Jung Choi, and Yang-Sae Moon, “A time-series matching approach for symmetric-invariant boundary image matching,” Multimedia Tools and Applications, Vol. 77, pp. 20979–21001, Aug. 2018.[SCI(E)]
  42. 최수길, 최성윤, 최미정, “TOSCA 기반의 NFV 서비스 모델 및 구현,”한국통신학회 논문지, Vol. 48, Vol. 8, pp. 1297–1310, Aug. 2018.[KCI]
  43. 김종욱, 방지원, 최미정, “분석회피 기술을 탑재한 악성코드 분석 방안 연구,” 통신망운용관리 학술대회, 제주, 대한민국, May 2018.[Domestic Conf.]>
  44. Jiwon Bang, Siwoon Son, Hajin Kim, Yang-Sae Moon, and Mi-Jung Choi, “Design and implementation of a load shedding engine for solving starvation problems in apache kafka,” in Proc of the 2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan , pp. 1–4, July 2018.[Int’l Conf.]
  45. Hajin Kim, Myeong-Seon Gil, Yang-Sae Moon, and Mi-Jung Choi, “Variable size sampling to support high uniformity confidence in sensor data streams,” International Journal of Distributed Sensor Networks, Vol. 14, No. 4, pp. 1–18, Apr. 2018.[SCI(E)]
  46. Minwoo Lee, Sanghun Lee, Mi-Jung Choi, Yang-Sae Moon, and Hyo-Sang Lim, “HybridFTW: Hybrid Computation of Dynamic Time Warping Distances,” IEEE Access, Vol. 6, pp. 2085–2096, Feb. 2018.[SCI(E)]
  47. Siwoon Son, Sanghun Lee, Myeong-Seon Gil, Mi-Jung Choi, and Yang-Sae Moon, “Locality Aware Traffic Distribution in Apache Storm for Energy Analytics Platform,” in Proc. of the 5th IEEE Int’l Conf. on Big Data and Smart Computing (BigComp2018), Sanghai, China, pp. 721–724, Jan. 2018.[Int’l Conf.]
  48. Minwoo Lee, Sanghun Lee, Mi-Jung Choi, Yang-Sae Moon, and Hyo-Sang Lim, “HybridFTW: Hybrid Computation of Dynamic Time Warping Distances,” IEEE Access, Vol. 6, pp. 2085–2096, Dec. 2017.[SCI(E)]
  49. 김기현, 최미정, “안드로이드 악성코드 탐지를 위한 User-permission과 SVM을 이용한 하이브리드 기법 제안,” KNOM Review, Vol. 20, No. 2, pp. 1–10, Dec. 2017.[KCI]
  50. 방지원, 손시운, 문양세, 최미정, “Apache Kafka에서 기아 문제 해결을 위한 로드 쉐딩 엔진 설계,” 한국정보과학회 학술대회, 부산, 대한민국, Dec. 2017.[Domestic Conf.]
  51. 방지원, 손시운, 문양세, 최미정, “Apache Kafka에서 효율적인 과부하 측정을 위한 모니터링 도구,” 한국정보처리학회 학술대회, 서울, 대한민국, pp. 52–54, Nov. 2017.[Domestic Conf.]
  52. 양석우, 손시운, 손시운, 최성윤, 최미정, 문양세, “InfiniBand RDMA 기반 Apache Storm의 네트워크 구조 설계,” 한국정보처리학회 학술대회, 서울, 대한민국, pp. 679–681, Nov. 2017.[Domestic Conf.]
  53. 최성윤, 문양세, 최미정, “RDMA 기반 고성능 네트워크 기술 동향,” 한국통신학회논문지, Vol. 42, No. 11, pp. 2122–2134, Nov. 2017.[KCI]
  54. Y. H. Goo, S. H. Lee, S. Choi, and M. J. Choi, M. S. Kim, “A traffic grouping method using the correlation model of network flow,” in Proc. of the 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS), Seoul, Korea, pp. 386–390, Sept. 2017.[Int’l Conf.]
  55. S. Pandey, Y. S. Moon, and M. J. Choi, “Feasibility study for simulating community based content caching on CCN network using ndnSIM simulator,” in Proc. of the 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS), Seoul, Korea, pp. 275–279, Sept. 2017.[Int’l Conf.]
  56. K. S. Shin, Y. H. Goo, S. Kim, and M. J. Choi, “SigManager: Automatic payload signature management system for the classification of dynamically changing internet applications,” in Proc. of the 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS), Seoul, Korea, pp. 350–353, Sept. 2017.[Int’l Conf.]
  57. B. D. Sija, Y. H. Goo, K. S. Shim, S. Kim, M. J. Choi, and M. S. Kim, K. S. Shin, Y. H. Goo, S. Kim, amd M. J. Choi, “Survey on network protocol reverse engineering approaches, methods and tools,” in Proc. of the 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS), Seoul, Korea, pp. 271–274, Sept. 2017.[Int’l Conf.]
  58. 김기현, 최미정, “선형 SVM 기반의 안드로이드 악성코드 탐지 성능 향상 방안,” KNOM Review, Vol. 20, No. 1, pp.34–41, Aug. 2017.[KCI]
  59. S. P. Kim, M. S. Gil, H. Kim, M. J. Choi, and Y. S. Moon, “Efficient Two-Step Protocol and Its Discriminative Feature Selections in Secure Similar Document Detection,” Security and Communication Networks, Vol. 2017, Article ID 6841216, pp.1–13, Mar. 2017.[SCI(E)]
  60. S. H. Yoon, J. S. Park, B. D. Sija, M. J. Choi, and M. S. Kim, “Header signature maintenance for Internet traffic identification,” International Journal of Network Management, Vol. 21, No. 1, pp.1–15, Jan. 2017.[SCI(E)]
  61. Working on it…