Gail-Joon Ahn
Orcid: 0000-0002-4271-1666
According to our database1,
Gail-Joon Ahn
authored at least 248 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on sis.uncc.edu
On csauthors.net:
Bibliography
2024
"Watching over the shoulder of a professional": Why Hackers Make Mistakes and How They Fix Them.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Proceedings of the 15th International Conference on Network of the Future, 2024
Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
2023
Inf. Syst. Frontiers, April, 2023
SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
2022
IEEE Secur. Priv., 2022
Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
ViK: practical mitigation of temporal memory safety violations through object ID inspection.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022
2021
Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps.
IEEE Trans. Dependable Secur. Comput., 2021
<i>ExSol</i>: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems.
DTRAP, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android.
Proceedings of the Secure Knowledge Management In The Artificial Intelligence Era, 2021
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Poster: DyPolDroid: User-Centered Counter-Policies Against Android Permission-Abuse Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.
Proceedings of the 29th USENIX Security Symposium, 2020
Toward Automated Enforcement of Cyber-Physical Security Requirements for Energy Delivery Systems.
Proceedings of the Second IEEE International Conference on Trust, 2020
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020
Proceedings of the APWG Symposium on Electronic Crime Research, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies.
IEEE Trans. Dependable Secur. Comput., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems.
Proceedings of the 7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
IEEE Trans. Inf. Forensics Secur., 2018
Multim. Tools Appl., 2018
IEEE Access, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018
The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018
vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
IEEE Commun. Stand. Mag., 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 Workshop on Moving Target Defense, 2017
A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017
2016
TripleMon: A multi-layer security framework for mediating inter-process communication on Android.
J. Comput. Secur., 2016
IEEE Secur. Priv., 2016
Digit. Investig., 2016
CoRR, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation.
Proceedings of the 2016 ITU Kaleidoscope: ICTs for a Sustainable World, 2016
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control.
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract).
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016
2015
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation.
ACM Trans. Inf. Syst. Secur., 2015
IEEE Trans. Dependable Secur. Comput., 2015
EAI Endorsed Trans. Collab. Comput., 2015
Federated Access Management for Collaborative Network Environments: Framework and Case Study.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2015
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015
Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015
Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, 2015
2014
J. Netw. Comput. Appl., 2014
Proceedings of the third workshop on Hot topics in software defined networking, 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the Open Networking Summit 2014 - Research Track, 2014
Policy-driven security management for fog computing: Preliminary framework and a case study.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
IEEE Trans. Serv. Comput., 2013
IEEE Trans. Knowl. Data Eng., 2013
Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy.
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Dependable Secur. Comput., 2013
Int. J. Inf. Sec., 2013
Int. J. Inf. Comput. Secur., 2013
Computer, 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Simulation-Based Validation for Smart Grid Environments: Framework and Experimental Results.
Proceedings of the Integration of Reusable Systems [extended versions of the best papers which were presented at IEEE International Conference on Information Reuse and Integration and IEEE International Workshop on Formal Methods Integration, 2013
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013
Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage.
IEEE Trans. Parallel Distributed Syst., 2012
IEEE Trans. Dependable Secur. Comput., 2012
IEEE Trans. Dependable Secur. Comput., 2012
IEEE Trans. Dependable Secur. Comput., 2012
Secur. Commun. Networks, 2012
J. Syst. Softw., 2012
J. Comput. Secur., 2012
Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL.
Inf. Softw. Technol., 2012
Int. J. Comput. Model. Algorithms Medicine, 2012
Int. J. Cooperative Inf. Syst., 2012
Comput. Secur., 2012
Efficient construction of provably secure steganography under ordinary covert channels.
Sci. China Inf. Sci., 2012
Proceedings of the Advances in Information and Computer Security, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the ACM International Health Informatics Symposium, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
J. Comput. Sci. Technol., 2011
Comput. Secur., 2011
Proceedings of the 18th Working Conference on Reverse Engineering, 2011
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the Global Communications Conference, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
IEEE Trans. Syst. Man Cybern. Part C, 2010
IEEE Secur. Priv., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the Computer Security, 2010
SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
2009
Proceedings of the Encyclopedia of Database Systems, 2009
IEEE Trans. Syst. Man Cybern. Part C, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Grid and Distributed Computing, 2009
Proceedings of the Data and Applications Security XXIII, 2009
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
2008
IEEE Trans. Knowl. Data Eng., 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008
Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology.
Proceedings of the Conceptual Modeling, 2008
Proceedings of the Collaborative Computing: Networking, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
ACM Trans. Inf. Syst. Secur., 2007
Softw. Process. Improv. Pract., 2007
J. Netw. Comput. Appl., 2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
2006
Building Decision Support Problem Domain Ontology from Natural Language Requirements for Software Assurance.
Int. J. Softw. Eng. Knowl. Eng., 2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006
Proceedings of the Current Trends in Database Technology - EDBT 2006, 2006
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006
2005
ACM SIGSOFT Softw. Eng. Notes, 2005
Establishing trustworthiness in services of the critical infrastructure through certification and accreditation.
ACM SIGSOFT Softw. Eng. Notes, 2005
Role-based privilege and trust management.
Comput. Syst. Sci. Eng., 2005
Proceedings of the Visualization and Data Analysis 2005, 2005
Formal specification of role-based security policies for clinical information systems.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
Proceedings of the Intelligence and Security Informatics, 2005
Proceedings of the Computer Security, 2005
Proceedings of the 2005 Workshop on Digital Identity Management, 2005
Common criteria requirements modeling and its uses for quality of information assurance (QoIA).
Proceedings of the 43nd Annual Southeast Regional Conference, 2005
Proceedings of the 43nd Annual Southeast Regional Conference, 2005
2004
Concurr. Pract. Exp., 2004
Proceedings of the Web Information Systems, 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Group Hierarchies with Constrained User Assignment in Linux.
Proceedings of the Security In Information Systems, 2004
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004
Proceedings of the 10th IEEE Symposium on Information Visualization (InfoVis 2004), 2004
Role-based Trust Assignment in Trust Management Systems.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004
2003
ACM Trans. Inf. Syst. Secur., 2003
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003
Locale-based access control: placing collaborative authorization decisions in context.
Proceedings of the IEEE International Conference on Systems, 2003
Proceedings of the IEEE International Conference on Systems, 2003
Constrained Role-based Delegation.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
A Role Administration System in Role-based Authorization Infrastructures - Design and Implementation.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), 2003
2002
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 2002
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
Challenges to Multi-Enterprise Integration.
Proceedings of the Enterprise Inter- and Intra-Organizational Integration: Building International Consensus, 2002
Using X.509 Attribute Certificates for Role-Based EAM.
Proceedings of the Research Directions in Data and Applications Security, 2002
An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC).
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002
2001
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
Role-based Access Control on the Web Using LDAP.
Proceedings of the Database and Application Security XV, 2001
2000
ACM Trans. Inf. Syst. Secur., 2000
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000
1999
J. Netw. Comput. Appl., 1999
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999