Sooel Son

Orcid: 0000-0003-0904-2875

According to our database1, Sooel Son authored at least 40 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Targeted Model Inversion: Distilling style encoded in predictions.
Comput. Secur., 2024

2023
Scalable and Secure Virtualization of HSM With ScaleTrust.
IEEE/ACM Trans. Netw., August, 2023

Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned.
IEEE Trans. Software Eng., April, 2023

Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks.
IEEE Trans. Dependable Secur. Comput., 2023

RICC: Robust Collective Classification of Sybil Accounts.
Proceedings of the ACM Web Conference 2023, 2023

Effective Targeted Attacks for Adversarial Self-Supervised Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement through Differential Testing.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Margin-based Neural Network Watermarking.
Proceedings of the International Conference on Machine Learning, 2023

AdCPG: Classifying JavaScript Code Property Graphs with Explanations for Ad and Tracker Blocking.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Targeted Adversarial Self-Supervised Learning.
CoRR, 2022

FuzzDocs: An Automated Security Evaluation Framework for IoT.
IEEE Access, 2022

HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities.
Proceedings of the 31st USENIX Security Symposium, 2022

Watching the Watchers: Practical Video Identification Attack in LTE Networks.
Proceedings of the 31st USENIX Security Symposium, 2022

Learning to Generate Inversion-Resistant Model Explanations.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

HearMeOut: detecting voice phishing activities in Android.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

2021
AdCube: WebVR Ad Fraud and Practical Confinement of Third-Party Ads.
Proceedings of the 30th USENIX Security Symposium, 2021

The Abuser Inside Apps: Finding the Culprit Committing Mobile Ad Fraud.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Learning to Separate Clusters of Adversarial Representations for Robust Adversarial Detection.
CoRR, 2020

Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer.
Proceedings of the 29th USENIX Security Symposium, 2020

FUSE: Finding File Upload Bugs via Penetration Testing.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Lumos: Improving Smart Home IoT Visibility and Interoperability Through Analyzing Mobile Apps.
Proceedings of the 28th IEEE International Conference on Network Protocols, 2020

2019
Doppelgängers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services.
Proceedings of the World Wide Web Conference, 2019

Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019

Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models.
Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, 2019

FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

An Empirical Study of Prioritizing JavaScript Engine Crashes via Machine Learning.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2016
What Mobile Ads Know About Mobile Users.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2013
The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Fix Me Up: Repairing Access-Control Bugs in Web Applications.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Model checking invariant security properties in OpenFlow.
Proceedings of IEEE International Conference on Communications, 2013

Diglossia: detecting code injection attacks with precision and efficiency.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2011
SAFERPHP: finding semantic vulnerabilities in PHP applications.
Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, 2011

RoleCast: finding missing security checks when you do not know what checks are.
Proceedings of the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2011

2010
The Hitchhiker's Guide to DNS Cache Poisoning.
Proceedings of the Security and Privacy in Communication Networks, 2010

2008
Pharewell to Phishing.
Proceedings of the Stabilization, 2008


  Loading...