Volgen
Doowon Kim
Doowon Kim
Geverifieerd e-mailadres voor utk.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
You get where you're looking for: The impact of information sources on code security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2016 IEEE symposium on security and privacy (SP), 289-305, 2016
4072016
Comparing the usability of cryptographic apis
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017
3222017
Certified malware: Measuring breaches of trust in the windows code-signing pki
D Kim, BJ Kwon, T Dumitraş
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
842017
An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems.
W Bai, D Kim, M Namara, Y Qian, PG Kelley, ML Mazurek
SOUPS, 113-130, 2016
842016
Scam pandemic: How attackers exploit public fear through phishing
M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ...
2020 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2020
512020
How internet resources might be helping you develop faster but less securely
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
IEEE Security & Privacy 15 (2), 50-60, 2017
442017
TLS 1.3 in practice: How TLS 1.3 contributes to the internet
H Lee, D Kim, Y Kwon
Proceedings of the Web Conference 2021, 70-79, 2021
422021
Lessons learned from using an online platform to conduct {Large-Scale}, online controlled security experiments with software developers
C Stransky, Y Acar, DC Nguyen, D Wermke, D Kim, EM Redmiles, ...
10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17), 2017
422017
The Broken Shield: Measuring Revocation Effectiveness in the Windows {Code-Signing}{PKI}
D Kim, BJ Kwon, K Kozák, C Gates, T Dumitraș
27th USENIX Security Symposium (USENIX Security 18), 851-868, 2018
382018
Balancing security and usability in encrypted email
W Bai, D Kim, M Namara, Y Qian, PG Kelley, ML Mazurek
IEEE Internet Computing 21 (3), 30-38, 2017
302017
Issued for abuse: Measuring the underground trade in code signing certificate
K Kozák, BJ Kwon, D Kim, T Dumitraş
arXiv preprint arXiv:1803.02931, 2018
222018
Security analysis on practices of certificate authorities in the HTTPS phishing ecosystem
D Kim, H Cho, Y Kwon, A Doupé, S Son, GJ Ahn, T Dumitras
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
192021
Sooel Son, Gail-Joon Ahn, and Tudor Dumitras. 2021. Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem
D Kim, H Cho, Y Kwon, A Doupé
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
172021
A survey of balloon networking applications and technologies
D Kim
2013-12-20)[2014-05-20]. www. cse. wustl. edu/~ jain/cse570-13/ftp/BalloonN …, 2013
152013
Certified malware in south korea: A localized study of breaches of trust in code-signing PKI ecosystem
B Kwon, S Hong, Y Jeon, D Kim
Information and Communications Security: 23rd International Conference …, 2021
112021
A large scale study and classification of virustotal reports on phishing and malware urls
E Choo, M Nabeel, D Kim, R De Silva, T Yu, I Khalil
ACM SIGMETRICS Performance Evaluation Review 52 (1), 55-56, 2024
92024
Poisoned chatgpt finds work for idle hands: Exploring developers’ coding practices with insecure suggestions from poisoned ai models
S Oh, K Lee, S Park, D Kim, H Kim
2024 IEEE Symposium on Security and Privacy (SP), 1141-1159, 2024
92024
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection
S Yan, S Wang, Y Duan, H Hong, K Lee, D Kim, Y Hong
arXiv preprint arXiv:2406.06822, 2024
72024
Analyzing spatial differences in the TLS security of delegated web services
J Lee, H Lee, J Jeong, D Kim, TT Kwon
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
62021
Sharing cyber threat intelligence: Does it really help?
B Jin, E Kim, H Lee, E Bertino, D Kim, H Kim
Proceedings of the 31st Annual Network and Distributed System Security …, 2024
32024
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20