- Security Analyst Summit(SAS) 2023: A Cascade of Compromise: Unveiling Lazarus' Campaign Exploiting Software Company Products and its Intricate Connections with Other Campaigns
- BotConf 2023: "Perfect Smoke and Mirrors of Enemy: Following Lazarus group by tracking DeathNote"
- Kaspersky Cyber Security Weekend(CSW) 2022: "What if.. We can see another dimension of cyber attacks?"
- Defcon 2023 Blue Team Village: "Attribution and bias: My terrible mistakes in theat intelligence attribution"
- Quarterly Cyber Threat Report(QCTR) 2021Q4: "The BlueNoroff group cryptocurrency hunt is still on"
- Virus Bulletin 2021: "Multi-universe of adversary: multiple campaigns of the Lazarus group and their connection"
- K-CTI 2021: "Lazarus group's campaigns Target for defense industry"
- GReAT IDEA 2021: "A deep dive into ThreatNeedle cluster of Lazarus group"
- International Symposium on Cybercrime Response(ISCR) 2020: "Deep dive into cybercrime-like APT attack of Lazarus group"
- K-CTI 2020: "Dissecting Lazarus's operation target for cryptocurrency business"
- Security Analyst Summit(SAS) 2019: "Behind the mask of ScarCruft: Unveiling endeavor of shady actor"
- Shakacon 2018: "Hell of attribution: OlympicDestroyer is here to trick the industry"
- AREA41 2018: "Anatomy of attacks aimed at financial sector by the Lazarus group"
- ETNews conference 2018: "Kimsuky: She is back with fairy tale"
- Kaspersky Cyber Security Weekend(CSW) 2017: "Never let your infrastructure go malicious: digging into C&C infrastructure of Lazarus"
- Security Analyst Summit(SAS) 2017: "Endless gunfire in South Korea"
- Digital Crimes Consortium(DCC) 2017: "Ambiguous boundary between cyber crime and cyber espionage: 2016 Korea APT attack case study"