Seungwon Shin
Orcid: 0000-0002-1077-5606Affiliations:
- KAIST, Daejeon, Korea
According to our database1,
Seungwon Shin
authored at least 113 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Ambusher: Exploring the Security of Distributed SDN Controllers Through Protocol State Fuzzing.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Cloud Comput., 2024
Improbable Bigrams Expose Vulnerabilities of Incomplete Tokens in Byte-Level Tokenizers.
CoRR, 2024
Obliviate: Neutralizing Task-agnostic Backdoors within the Parameter-efficient Fine-tuning Paradigm.
CoRR, 2024
Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding.
CoRR, 2024
Enhancing security in SDN: Systematizing attacks and defenses from a penetration perspective.
Comput. Networks, 2024
BotFence: A Framework for Network-Enriched Botnet Detection and Response With SmartNICs.
IEEE Access, 2024
gShock: A GNN-Based Fingerprinting System for Permissioned Blockchain Networks Over Encrypted Channels.
IEEE Access, 2024
IEEE Access, 2024
Uncovering Threats in Container Systems: A Study on Misconfigured Container Components in the Wild.
IEEE Access, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
PassREfinder: Credential Stuffing Risk Prediction by Representing Password Reuse between Websites on a Graph.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
DRAINCLoG: Detecting Rogue Accounts with Illegally-obtained NFTs using Classifiers Learned on Graphs.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Ignore Me But Don't Replace Me: Utilizing Non-Linguistic Elements for Pretraining on the Cybersecurity Domain.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2024, 2024
HardWhale: A Hardware-Isolated Network Security Enforcement System for Cloud Environments.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
2023
Comput. Secur., November, 2023
IEEE/ACM Trans. Netw., April, 2023
Extended data plane architecture for in-network security services in software-defined networks.
Comput. Secur., 2023
Witnessing Erosion of Membership Inference Defenses: Understanding Effects of Data Drift in Membership Privacy.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Evolving Bots: The New Generation of Comment Bots and their Underlying Scam Campaigns in YouTube.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
Proceedings of the 2023 ACM Symposium on Cloud Computing, SoCC 2023, 2023
Proceedings of the 2023 ACM Symposium on Cloud Computing, SoCC 2023, 2023
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023
2022
<i>Verikube</i>: Automatic and Efficient Verification for Container Network Policies.
IEICE Trans. Inf. Syst., December, 2022
IEEE/ACM Trans. Netw., 2022
Reconfigurable regular expression matching architecture for real-time pattern update and payload inspection.
J. Netw. Comput. Appl., 2022
Discovering Message Templates on Large Scale Bitcoin Abuse Reports Using a Two-Fold NLP-Based Clustering Method.
IEICE Trans. Inf. Syst., 2022
A Large-Scale Bitcoin Abuse Measurement and Clustering Analysis Utilizing Public Reports.
IEICE Trans. Inf. Syst., 2022
Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text.
Comput. Secur., 2022
A Comprehensive Analysis of Today's Malware and Its Distribution Network: Common Adversary Strategies and Implications.
IEEE Access, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022
MECaNIC: SmartNIC to Assist URLLC Processing in Multi-Access Edge Computing Platforms.
Proceedings of the 30th IEEE International Conference on Network Protocols, 2022
Meta-Path-based Fake News Detection Leveraging Multi-level Social Context Information.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
Heimdallr: Fingerprinting SD-WAN Control-Plane Architecture via Encrypted Control Traffic.
Proceedings of the Annual Computer Security Applications Conference, 2022
Closing the Loophole: Rethinking Reconstruction Attacks in Federated Learning from a Privacy Standpoint.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Secur. Commun. Networks, 2021
Mobius: Packet Re-processing Hardware Architecture for Rich Policy Handling on a Network Processor.
J. Netw. Syst. Manag., 2021
Hetero-SCAN: Towards Social Context Aware Fake News Detection via Heterogeneous Graph Neural Network.
CoRR, 2021
Formullar: An FPGA-based network testing tool for flexible and precise measurement of ultra-low latency networking systems.
Comput. Networks, 2021
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Reinhardt: Real-time Reconfigurable Hardware Architecture for Regular Expression Matching in DPI.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
IEEE/ACM Trans. Netw., 2020
IEEE Trans. Inf. Forensics Secur., 2020
Comput. Secur., 2020
Proceedings of the 2020 USENIX Annual Technical Conference, 2020
AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020
2019
IEEE/ACM Trans. Netw., 2019
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies.
IEEE Trans. Dependable Secur. Comput., 2019
MC-SDN: Supporting Mixed-Criticality Real-Time Communication Using Software-Defined Networking.
IEEE Internet Things J., 2019
Comput. Networks, 2019
Comput. Networks, 2019
Doppelgängers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services.
Proceedings of the World Wide Web Conference, 2019
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Poster: TCLP: Enforcing Least Privileges to Prevent Containers from Kernel Vulnerabilities.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 3rd Asia-Pacific Workshop on Networking, 2019
2018
Secur. Commun. Networks, 2018
Probius: Automated Approach for VNF and Service Chain Analysis in Software-Defined NFV.
Proceedings of the Symposium on SDN Research, 2018
Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, 2018
Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, 2018
MC-SDN: Supporting Mixed-Criticality Scheduling on Switched-Ethernet Using Software-Defined Networking.
Proceedings of the 2018 IEEE Real-Time Systems Symposium, 2018
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 2018 IEEE 26th International Conference on Network Protocols, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the CIKM 2018 Workshops co-located with 27th ACM International Conference on Information and Knowledge Management (CIKM 2018), 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Who is knocking on the Telnet Port: A Large-Scale Empirical Study of Network Scanning.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018
2017
IEEE/ACM Trans. Netw., 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017
Bridging the architectural gap between NOS design principles in software-defined networks.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Secur. Commun. Networks, 2016
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
The Smaller, the Shrewder: A Simple Malicious Application Can Kill an Entire SDN Environment.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015
2014
Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
EFFORT: A new host-network cooperated framework for efficient and effective bot malware detection.
Comput. Networks, 2013
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of IEEE International Conference on Communications, 2013
AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter.
Proceedings of the 21st World Wide Web Conference 2012, 2012
Proceedings of the first workshop on Hot topics in software defined networks, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?).
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012
2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010