Jonghoon Kwon

Orcid: 0000-0002-3853-242X

According to our database1, Jonghoon Kwon authored at least 23 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Debuglet: Programmable and Verifiable Inter-Domain Network Telemetry.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

2023
Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool's Monitoring System.
Proceedings of the 32nd USENIX Security Symposium, 2023

Qualitative Intention-aware Attribute-based Access Control Policy Refinement.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

Carbon-Aware Global Routing in Path-Aware Networks.
Proceedings of the 14th ACM International Conference on Future Energy Systems, 2023

2022
Creating a Secure Underlay for the Internet.
Proceedings of the 31st USENIX Security Symposium, 2022

G-SINC: Global Synchronization Infrastructure for Network Clocks.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022

Analysis of NTP pool monitoring system based on multiple monitoring stations.
Proceedings of the MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, Seoul, Republic of Korea, October 17, 2022

Consent Routing: Towards Bilaterally Trusted Communication Paths.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

BLAP: Bluetooth Link Key Extraction and Page Blocking Attacks.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Mondrian: Comprehensive Inter-domain Network Zoning Architecture.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

SpeedCam: Towards Efficient Flow Monitoring for Multipath Communication.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Deployment and scalability of an inter-domain multi-path routing infrastructure.
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021

2020
SVLAN: Secure & Scalable Network Virtualization.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

SCIONLAB: A Next-Generation Internet Testbed.
Proceedings of the 28th IEEE International Conference on Network Protocols, 2020

2016
CLORIFI: software vulnerability discovery using code clone verification.
Concurr. Comput. Pract. Exp., 2016

PsyBoG: A scalable botnet detection method for large-scale DNS traffic.
Comput. Networks, 2016

2015
An incrementally deployable anti-spoofing mechanism for software-defined networks.
Comput. Commun., 2015

2014
PsyBoG: Power spectral density analysis for detecting botnet groups.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

DroidGraph: discovering Android malware by analyzing semantic behavior.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2012
BinGraph: Discovering mutant malware using hierarchical semantic signatures.
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012

2011
Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host.
Proceedings of the Information Security Practice and Experience, 2011

2008
HoneyID : Unveiling Hidden Spywares by Generating Bogus Events.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008


  Loading...