Suivre
Doowon Kim
Doowon Kim
Adresse e-mail validée de utk.edu - Page d'accueil
Titre
Citée par
Citée par
Année
You get where you're looking for: The impact of information sources on code security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2016 IEEE Symposium on Security and Privacy (SP), 289-305, 2016
3202016
Comparing the usability of cryptographic apis
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017
2572017
An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems.
W Bai, D Kim, M Namara, Y Qian, PG Kelley, ML Mazurek
SOUPS, 113-130, 2016
732016
Certified malware: Measuring breaches of trust in the windows code-signing pki
D Kim, BJ Kwon, T Dumitraş
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
672017
How internet resources might be helping you develop faster but less securely
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
IEEE Security & Privacy 15 (2), 50-60, 2017
372017
Lessons learned from using an online platform to conduct large-scale, online controlled security experiments with software developers
C Stransky, Y Acar, DC Nguyen, D Wermke, D Kim, EM Redmiles, ...
10th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 17), 2017
332017
Balancing security and usability in encrypted email
W Bai, D Kim, M Namara, Y Qian, PG Kelley, ML Mazurek
IEEE Internet Computing 21 (3), 30-38, 2017
292017
The broken shield: Measuring revocation effectiveness in the windows code-signing {PKI}
D Kim, BJ Kwon, K Kozák, C Gates, T Dumitraș
27th {USENIX} Security Symposium ({USENIX} Security 18), 851-868, 2018
282018
Scam pandemic: How attackers exploit public fear through phishing
M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ...
2020 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2020
232020
Issued for abuse: Measuring the underground trade in code signing certificate
K Kozák, BJ Kwon, D Kim, T Dumitraş
arXiv preprint arXiv:1803.02931, 2018
172018
TLS 1.3 in practice: How TLS 1.3 contributes to the internet
H Lee, D Kim, Y Kwon
Proceedings of the Web Conference 2021, 70-79, 2021
152021
A survey of balloon networking applications and technologies
D Kim
2013-12-20)[2014-05-20]. www. cse. wustl. edu/~ jain/cse570-13/ftp/BalloonN …, 2013
132013
Certified Malware in South Korea: A Localized Study of Breaches of Trust in Code-Signing PKI Ecosystem
B Kwon, S Hong, Y Jeon, D Kim
Information and Communications Security: 23rd International Conference …, 2021
52021
Implementation of framework to identify potential phishing websites
D Kim, C Achan, J Baek, PS Fisher
2013 IEEE International Conference on Intelligence and Security Informatics …, 2013
42013
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem
D Kim, H Cho, Y Kwon, A Doupé, S Son, GJ Ahn, T Dumitras
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
32021
fFTP: a fast file transfer protocol for home N-screen platform
D Kim, J Baek, PS Fisher, S Kim
Personal and Ubiquitous Computing 22, 143-152, 2018
32018
Defeating program analysis techniques via ambiguous translation
C Jung, D Kim, W Wang, Y Zheng, KH Lee, Y Kwon
2021 36th IEEE/ACM International Conference on Automated Software …, 2021
22021
Analyzing Spatial Differences in the TLS Security of Delegated Web Services
J Lee, H Lee, J Jeong, D Kim, TT Kwon
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
22021
An Adaptive Primary Path Switching Scheme for Seamless mSCTP Handover
J Baek, D Kim, PS Fisher, M Jo
SmartCR 1 (2), 150-160, 2011
22011
Hiding critical program components via ambiguous translation
C Jung, D Kim, A Chen, W Wang, Y Zheng, KH Lee, Y Kwon
Proceedings of the 44th International Conference on Software Engineering …, 2022
12022
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20