Showing results 1 to 32 of 32
AdCPG: Classifying JavaScript Code Property Graphs with Explanations for Ad and Tracker Blocking Lee, Chang Min; Son, Sooel, 30th ACM Conference on Computer and Communications Security (CCS 2023), Association for Computing Machinery, 2023-11-29 |
AdCube: WebVR Ad Fraud and Practical Confinement of Third-Party Ads Lee, Hyunjoo; Lee, Jiyeon; Kim, Daejun; Jana, Suman; Shin, Insik; Son, Sooel, 30th USENIX Security Symposium (USENIX Security 2021), pp.2543 - 2560, USENIX, 2021-08-12 |
An Empirical Study of Prioritizing JavaScript Engine Crashes via Machine Learning Park, Sunnyeo; Kim, Dohyeok; Son, Sooel, Asia Conference on Computer and Communications Security, pp.646 - 657, ACM, 2019-07-12 |
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web Lee, Seunghyeon; Yoon, Changhoon; Kang, Heedo; Kim, Yeonkeun; Kim, Yongdae; Han, Dongsu; Son, Sooel; et al, 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), pp.1 - 15, Internet Society, 2019-02-27 |
DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement through Differential Testing Wi, SeongIl; Son, Sooel; Nguyen, Trung Tin; Kim, Jiwhan; Stock, Ben, 30th Network & Distributed System Security Symposium (NDSS 2023), Network & Distributed System Security Symposium, 2023-02-27 |
Diglossia: Detecting Code Injection Attacks with Precision and Efficiency Son, Sooel; McKinley, Kathryn S.; Shmatikov, Vitaly, Conference on Computer and Communications Security, CCS, pp.1181 - 1192, ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2013-11-07 |
Doppelgangers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services Yoon, Changhoon; Kim, Kwanwoo; 김용대; Shin, Seungwon; Son, Sooel, World Wide Web Conference (WWW), pp.2225 - 2235, ASSOC COMPUTING MACHINERY, 2019-05-16 |
Effective Targeted Attacks for Adversarial Self-Supervised Learning Kim, Minseon; Ha, Hyeonjeong; Son, Sooel; Hwang, Sung Ju, 37th Conference on Neural Information Processing Systems (NeurIPS 2023), Neural Information Processing Systems Foundation, 2023-12-12 |
Effective Targeted Attacks for Adversarial Self-Supervised Learning Kim, Minseon; Ha, Hyeonjeong; Son, Sooel; Hwang, Sung Ju, Thirty-seventh Conference on Neural Information Processing Systems (NeurIPS) 2023, Thirty-seventh Conference on Neural Information Processing Systems, 2023-12-12 |
Fix Me Up: Repairing Access-Control Bugs in Web Applications Son, Sooel; McKinley, Kathryn S.; Shmatikov, Vitaly, The Network and Distributed System Security Symposium, NDSS, Internet Society, 2013-02-27 |
FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking Kim, Hyuntae; Wi, Seongil; Lee, Hyunjoo; Son, Sooel, 20th World Conference on Information Security Applications, WISA 2019, pp.41 - 54, the Korea Institute of Information Security and Cryptology (KIISC), 2019-08-22 |
FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities Park, Sunnyeo; Kim, Daejun; Jana, Suman; Son, Sooel, 31th USENIX Security Symposium (USENIX Security 2022), 31th USENIX Security Symposium (USENIX Security 2022), 2022-08-10 |
FUSE: Finding File Upload Bugs via Penetration Testing Lee, Taekjin; Wi, Seongil; Lee, Suyoung; Son, Sooel, 2020 Network and Distributed System Security Symposium, NDSS 2020, Network & Distributed System Security Symposium, 2020-02-23 |
HearMeOut: Detecting Voice Phishing Activities in Android Kim, Joongyum; Kim, Jihwan; Wi, Seongil; Kim, Yongdae; Son, Sooel, 20th ACM International Conference on Mobile Systems, Applications and Services, MobiSys 2022, pp.422 - 435, Association for Computing Machinery, Inc, 2022-06-30 |
Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models Bae, Sangwook; Son, Mincheol; Son, Sooel; Kim, Yongdae, International Workshop on Mobile Computing Systems and Applications (HotMobile), pp.75 - 80, ACM, 2019-02-27 |
HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs 위성일; Woo, Sijae; Whang, Joyce Jiyoung; Son, Sooel, 31st ACM World Wide Web Conference, WWW 2022, pp.755 - 766, Association for Computing Machinery, Inc, 2022-04-26 |
Learning to Generate Inversion-Resistant Model Explanations Jeong, Hoyong; Lee, Suyoung; Hwang, Sung Ju; Son, Sooel, 36th Annual Conference on Neural Information Processing Systems (NeurIPS 2022), NeurIPS, 2022-11-30 |
Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning Lee, Soyoung; Wi, Seongil; Son, Sooel, 31st ACM World Wide Web Conference, WWW 2022, pp.743 - 754, Association for Computing Machinery, Inc, 2022-04-27 |
Lumos: Improving Smart Home IoT Visibility and Interoperability Through Analyzing Mobile Apps Kim, Jeongmin; Ko, Steven Y; Son, Sooel; Han, Dongsu, The 28th IEEE International Conference on Network Protocols (ICNP 2020), IEEE, 2020-10-16 |
Margin-based Neural Network Watermarking Kim, Byungjoo; Lee, Suyoung; Lee, Seanie; Son, Sooel; Hwang, Sung Ju, 40th International Conference on Machine Learning (ICML 2023), Proceedings of Machine Learning Research, 2023-07-23 |
Model checking invariant security properties in OpenFlow Son, Sooel; Shin, Seungwon; Yegneswaran, Vinod; Porras, Phillip; Gu, Guofei, International Conference on Communications, ICC 2013, pp.1974 - 1979, Institute of Electrical and Electronics Engineers Inc., 2013-06-10 |
Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer Lee, Suyoung; Han, HyungSeok; Cha, Sang Kil; Son, Sooel, 29th USENIX Security Symposium (USENIX Security 2020), pp.2613 - 2630, USENIX, 2020-08-12 |
Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications Lee, Jiyeon; Kim, Hayeon; Park,Junghwan; Shin, Insik; Son, Sooel, 25th ACM Conference on Computer and Communications Security, CCS 2018, pp.1731 - 1746, Association for Computing Machinery, 2018-10-18 |
RICC: Robust Collective Classification of Sybil Accounts Shin, Dongwon; Lee, Suyoung; Son, Sooel, WWW '23: The ACM Web Conference 2023, Association for Computing Machinery, 2023-04-30 |
SAFERPHP: Finding Semantic Vulnerabilities in PHP Applications Son, Sooel; Shmatikov, Vitaly, Programming Languages and Analysis for Security, PLAS, The ACM Special Interest Group on Programming Languages (SIGPLAN), 2011-06-05 |
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem Kim, Doowon; Cho, Haehyun; Kwon, Yongwhi; Doupé, Adam; Son, Sooel; Ahn, Gail-Joon; Dumitras, Tudor, 16th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2021), pp.407 - 420, ACM, 2021-06-09 |
The Abuser Inside Apps: Finding the Culprit Committing Mobile Ad Fraud Kim, Joon Gyum; Park, Jung-hwan; Son, Sooel, 28th Annual Network and Distributed System Security Symposium (NDSS), Network & Distributed System Security Symposium, 2021-02-23 |
The Hitckhiker's Guide to DNS Cache Poisoning Son, Sooel; Shmatikov, Vitaly, International Conference on Security and Privacy in Communication Networks, SECURECOMM, pp.466 - 483, ICST Institute for Computer Science, Social Informatics and Telecommunications, 2010-09-09 |
The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites Son, Sooel; Shmatikov, Vitaly, The Network and Distributed System Security Symposium, NDSS, Internet Society, 2013-02-25 |
Watching the Watchers: Practical Video Identification Attack in LTE Networks Base, Sangwook; Son, Mincheol; Kim, Donghwan; Park, CheolJun; Lee, Jiho; Son, Sooel; Kim, Yongdae, 31th USENIX Security Symposium (USENIX Security 2022), 31th USENIX Security Symposium (USENIX Security 2022), 2022-08-10 |
What Mobile Ads Know About Mobile Users Son, Sooel; Kim, Daehyeok; Shmatikov, Vitaly, The Network and Distributed System Security Symposium, NDSS, Internet Society, 2016-02-23 |
Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO Lee, Sangsup; Kim, Daejun; Kim, Dongkwan; Son, Sooel; Kim, Yongdae, Workshop on Offensive Technologies, USENIX, 2019-08-13 |
Discover