Doowon Kim
Orcid: 0000-0002-9033-990X
According to our database1,
Doowon Kim
authored at least 38 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models.
CoRR, 2024
Not All Asians are the Same: A Disaggregated Approach to Identifying Anti-Asian Racism in Social Media.
Proceedings of the ACM on Web Conference 2024, 2024
Phishing Vs. Legit: Comparative Analysis of Client-Side Resources of Phishing and Target Brand Websites.
Proceedings of the ACM on Web Conference 2024, 2024
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024
Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Beneath the Phishing Scripts: A Script-Level Analysis of Phishing Kits and Their Impact on Real-World Phishing Websites.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs.
Proc. ACM Meas. Anal. Comput. Syst., December, 2023
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
A Longitudinal Study of Vulnerable Client-side Resources and Web Developers' Updating Behaviors.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
2022
Sinophobia, misogyny, facism, and many more: A multi-ethnic approach to identifying anti-Asian racism in social media.
CoRR, 2022
Proceedings of the Information Security Applications - 23rd International Conference, 2022
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Nationwide Integrated 24/7 Monitoring System for ATSC 3.0 Single Frequency Broadcast Networks.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2022
2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Certified Malware in South Korea: A Localized Study of Breaches of Trust in Code-Signing PKI Ecosystem.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Understanding of Adversary Behavior and Security Threats in Public Key Infrastructures.
PhD thesis, 2020
Proceedings of the APWG Symposium on Electronic Crime Research, 2020
2018
Pers. Ubiquitous Comput., 2018
CoRR, 2018
The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI.
Proceedings of the 27th USENIX Security Symposium, 2018
2017
IEEE Secur. Priv., 2017
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
You Get Where You're Looking for: The Impact of Information Sources on Code Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
2014
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014
2013
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013
2012
2011
Smart Comput. Rev., 2011