Min Suk Kang

Orcid: 0000-0002-8334-2262

According to our database1, Min Suk Kang authored at least 38 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enabling Physical Localization of Uncooperative Cellular Devices.
CoRR, 2024

Work in Progress: I Know You Pin Me: Privacy Risks in User Pinning of Zoom Video Conferencing.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

IoTell: A Privacy-Preserving Protocol for Large-scale Monitoring of IoT Security Status.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024

2023
Preventing SIM Box Fraud Using Device Model Fingerprinting.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Partitioning Ethereum without Eclipsing It.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

On the Sustainability of Bitcoin Partitioning Attacks.
Proceedings of the Financial Cryptography and Data Security, 2023

2022
On Privacy Risks of Watching YouTube over Cellular Networks with Carrier Aggregation.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Potential Security Concerns at the Physical Layer of 6G Cellular Systems.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

A Step Towards On-Path Security Function Outsourcing.
Proceedings of the ICDCN '22: 23rd International Conference on Distributed Computing and Networking, Delhi, AA, India, January 4, 2022

Short Paper: On the Claims of Weak Block Synchronization in Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2022

2021
On the Claims of Weak Block Synchronization in Bitcoin.
IACR Cryptol. ePrint Arch., 2021

On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin.
Proceedings of the 30th USENIX Security Symposium, 2021

A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks.
Proceedings of the 30th USENIX Security Symposium, 2021

Revisiting Heavy-Hitter Detection on Commodity Programmable Switches.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

Privacy of DNS-over-HTTPS: Requiem for a Dream?
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Towards in-network time-decaying aggregates for heavy-hitter detection.
Proceedings of the SIGCOMM '20: ACM SIGCOMM 2020 Conference, 2020

In-network defense against AR-DDoS attacks.
Proceedings of the SIGCOMM '20: ACM SIGCOMM 2020 Conference, 2020

DIDA: Distributed In-Network Defense Architecture Against Amplified Reflection DDoS Attacks.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

2019
SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi Channel State Information (Extended Version).
CoRR, 2019

SurFi: detecting surveillance camera looping attacks with wi-fi channel state information.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

On the Feasibility of Rerouting-Based DDoS Defenses.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Practical Verifiable In-network Filtering for DDoS Defense.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Tuple space explosion: a denial-of-service attack against a software packet classifier.
Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019

2018
VeriCount: Verifiable Resource Accounting Using Hardware and Software Isolation.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Obscuro: A Bitcoin Mixer using Trusted Execution Environments.
IACR Cryptol. ePrint Arch., 2017

2016
Handling Large-Scale Link-Flooding Attacks in the Internet.
PhD thesis, 2016

Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents.
Proceedings of the Security Protocols XXIV, 2016

SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2014
Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Selfish manipulation of cooperative cellular communications via channel fabrication.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

The Crossfire Attack.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

CoDef: collaborative defense against large-scale link-flooding attacks.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2013

2012
Hybrid Multiple Access for Uplink OFDMA System.
J. Inform. and Commun. Convergence Engineering, 2012

2010
A Cognitive p-Persistent CSMA Scheme for Spectrum Sharing Based Cognitive Radio Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

2009
Decentralized intercell interference coordination in uplink cellular networks using adaptive sub-band exclusion.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

2008
Effect of cooperative and selection relaying schemes on multiuser diversity in downlink cellular systems with relays.
J. Commun. Networks, 2008

A pre-whitening scheme in a MIMO-based spectrum-sharing environment.
IEEE Commun. Lett., 2008


  Loading...