Doowon Kim

Orcid: 0000-0002-9033-990X

According to our database1, Doowon Kim authored at least 38 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models.
CoRR, 2024

Not All Asians are the Same: A Disaggregated Approach to Identifying Anti-Asian Racism in Social Media.
Proceedings of the ACM on Web Conference 2024, 2024

Phishing Vs. Legit: Comparative Analysis of Client-Side Resources of Phishing and Target Brand Websites.
Proceedings of the ACM on Web Conference 2024, 2024

An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024

Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Sharing cyber threat intelligence: Does it really help?
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Beneath the Phishing Scripts: A Script-Level Analysis of Phishing Kits and Their Impact on Real-World Phishing Websites.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs.
Proc. ACM Meas. Anal. Comput. Syst., December, 2023

Demystifying the Regional Phishing Landscape in South Korea.
IEEE Access, 2023

Evaluating Password Composition Policy and Password Meters of Popular Websites.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Pyfet: Forensically Equivalent Transformation for Python Binary Decompilation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

A Longitudinal Study of Vulnerable Client-side Resources and Web Developers' Updating Behaviors.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

2022
Sinophobia, misogyny, facism, and many more: A multi-ethnic approach to identifying anti-Asian racism in social media.
CoRR, 2022

Dazzle-attack: Anti-Forensic Server-side Attack via Fail-Free Dynamic State Machine.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

Deep Sequence Models for Packet Stream Analysis and Early Decisions.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

Hiding Critical Program Components via Ambiguous Translation.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Nationwide Integrated 24/7 Monitoring System for ATSC 3.0 Single Frequency Broadcast Networks.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2022

2021
TLS 1.3 in Practice: How TLS 1.3 Contributes to the Internet.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Defeating Program Analysis Techniques via Ambiguous Translation.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Certified Malware in South Korea: A Localized Study of Breaches of Trust in Code-Signing PKI Ecosystem.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Analyzing Spatial Differences in the TLS Security of Delegated Web Services.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Understanding of Adversary Behavior and Security Threats in Public Key Infrastructures.
PhD thesis, 2020

Scam Pandemic: How Attackers Exploit Public Fear through Phishing.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

2018
fFTP: a fast file transfer protocol for home N-screen platform.
Pers. Ubiquitous Comput., 2018

Issued for Abuse: Measuring the Underground Trade in Code Signing Certificate.
CoRR, 2018

The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
Balancing Security and Usability in Encrypted Email.
IEEE Internet Comput., 2017

How Internet Resources Might Be Helping You Develop Faster but Less Securely.
IEEE Secur. Priv., 2017

Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017

Comparing the Usability of Cryptographic APIs.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
You Get Where You're Looking for: The Impact of Information Sources on Code Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

2014
Adaptive video streaming over HTTP.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
Implementation of framework to identify potential phishing websites.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

2012
USENIX Notes.
login Usenix Mag., 2012

2011
An Adaptive Primary Path Switching Scheme for Seamless mSCTP Handover.
Smart Comput. Rev., 2011


  Loading...