What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Seungwon Shin
Google Scholar
34
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding.
Jian Cui
Hanna Kim
Eugene Jang
Dayeon Yim
Kicheol Kim
Yongjae Lee
Jin-Woo Chung
Seungwon Shin
Xiaojing Liao
2025
conf/asiaccs
AVXProbe: Enhancing Website Fingerprinting with Side-Channel-Assisted Kernel-Level Traces.
Suryeon Kim
Seung Ho Na
Jaehan Kim
Seungwon Shin
Hyunwoo Choi
2025
conf/uss
When LLMs Go Online: The Emerging Threat of Web-Enabled LLMs.
Hanna Kim
Minkyoo Song
Seung Ho Na
Seungwon Shin
Kimin Lee
2025
conf/uss
Refusal Is Not an Option: Unlearning Safety Alignment of Large Language Models.
Minkyoo Song
Hanna Kim
Jaehan Kim
Seungwon Shin
Sooel Son
2024
journals/tifs
Ambusher: Exploring the Security of Distributed SDN Controllers Through Protocol State Fuzzing.
Jinwoo Kim
Minjae Seo
Eduard Marin
Seungsoo Lee
Jaehyun Nam
Seungwon Shin
2024
conf/uss
Prefetch for Fun and Profit: A Revisit of Prefetch Attacks on Apple M1.
Hyunwoo Choi
Suryeon Kim
Seungwon Shin
2024
conf/sp
PassREfinder: Credential Stuffing Risk Prediction by Representing Password Reuse between Websites on a Graph.
Jaehan Kim
Minkyoo Song
Minjae Seo
Youngjin Jin
Seungwon Shin
2024
conf/ndss
DRAINCLoG: Detecting Rogue Accounts with Illegally-obtained NFTs using Classifiers Learned on Graphs.
Hanna Kim
Jian Cui
Eugene Jang
Chanhee Lee
Yongjae Lee
Jin-Woo Chung
Seungwon Shin
2023
journals/compsec
Extended data plane architecture for in-network security services in software-defined networks.
Jinwoo Kim
Yeonkeun Kim
Vinod Yegneswaran
Phillip A. Porras
Seungwon Shin
Taejune Park
2023
journals/compsec
AVX-TSCHA: Leaking information through AVX extensions in commercial processors.
Suryeon Kim
Seungwon Shin
Hyunwoo Choi
2023
conf/ndss
Partitioning Ethereum without Eclipsing It.
Hwanjo Heo
Seungwon Woo
Taeung Yoon
Min Suk Kang
Seungwon Shin
2022
journals/compsec
Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text.
Hyeonseong Jo
Yongjae Lee
Seungwon Shin
2022
conf/ndss
EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation.
Jinwoo Kim
Eduard Marin
Mauro Conti
Seungwon Shin
2022
conf/acsac
Closing the Loophole: Rethinking Reconstruction Attacks in Federated Learning from a Privacy Standpoint.
Seung Ho Na
Hyeong Gwon Hong
Junmo Kim
Seungwon Shin
2022
conf/acsac
Heimdallr: Fingerprinting SD-WAN Control-Plane Architecture via Encrypted Control Traffic.
Minjae Seo
Jaehan Kim
Eduard Marin
Myoungsung You
Taejune Park
Seungsoo Lee
Seungwon Shin
Jinwoo Kim
2021
journals/tifs
GapFinder: Finding Inconsistency of Security Information From Unstructured Text.
Hyeonseong Jo
Jinwoo Kim
Phillip A. Porras
Vinod Yegneswaran
Seungwon Shin
2021
journals/tifs
BottleNet: Hiding Network Bottlenecks Using SDN-Based Topology Deception.
Jinwoo Kim
Jaehyun Nam
Suyeol Lee
Vinod Yegneswaran
Phillip A. Porras
Seungwon Shin
2021
conf/acsac
Reinhardt: Real-time Reconfigurable Hardware Architecture for Regular Expression Matching in DPI.
Taejune Park
Jaehyun Nam
Seung Ho Na
Jaewoong Chung
Seungwon Shin
2020
journals/compsec
A comprehensive security assessment framework for software-defined networks.
Seungsoo Lee
Jinwoo Kim
Seungwon Woo
Changhoon Yoon
Sandra Scott-Hayward
Vinod Yegneswaran
Phillip A. Porras
Seungwon Shin
2020
journals/tifs
Automated Permission Model Generation for Securing SDN Control-Plane.
Heedo Kang
Vinod Yegneswaran
Shalini Ghosh
Phillip A. Porras
Seungwon Shin
2019
conf/ccs
Poster: TCLP: Enforcing Least Privileges to Prevent Containers from Kernel Vulnerabilities.
Suyeol Lee
Junsik Seo
Jaehyun Nam
Seungwon Shin
2019
conf/ndss
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web.
Seunghyeon Lee
Changhoon Yoon
Heedo Kang
Yeonkeun Kim
Yongdae Kim
Dongsu Han
Sooel Son
Seungwon Shin
2018
conf/ccs
Who is knocking on the Telnet Port: A Large-Scale Empirical Study of Network Scanning.
Hwanjo Heo
Seungwon Shin
2018
conf/ccs
Knowledge Seeking on The Shadow Brokers.
Seung Ho Na
Kwanwoo Kim
Seungwon Shin
2017
conf/ndss
DELTA: A Security Assessment Framework for Software-Defined Networks.
Seungsoo Lee
Changhoon Yoon
Chanhee Lee
Seungwon Shin
Vinod Yegneswaran
Phillip A. Porras
2017
conf/dsn
Software-Defined HoneyNet: Towards Mitigating Link Flooding Attacks.
Jinwoo Kim
Seungwon Shin
2017
conf/dsn
Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks.
Seunghyeon Lee
Jinwoo Kim
Seungwon Shin
Phillip A. Porras
Vinod Yegneswaran
2017
conf/acsac
A Security-Mode for Carrier-Grade SDN Controllers.
Changhoon Yoon
Seungwon Shin
Phillip A. Porras
Vinod Yegneswaran
Heedo Kang
Martin W. Fong
Brian O'Connor
Thomas Vachuska
2015
journals/tifs
A First Step Toward Network Security Virtualization: From Concept To Prototype.
Seungwon Shin
Haopei Wang
Guofei Gu
2014
conf/ccs
Rosemary: A Robust, Secure, and High-performance Network Operating System.
Seungwon Shin
YongJoo Song
Taekyung Lee
Sangho Lee
Jaewoong Chung
Phillip A. Porras
Vinod Yegneswaran
Jiseong Noh
Brent ByungHoon Kang
2013
conf/ccs
AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks.
Seungwon Shin
Vinod Yegneswaran
Phillip A. Porras
Guofei Gu
2013
conf/ndss
FRESCO: Modular Composable Security Services for Software-Defined Networks.
Seungwon Shin
Phillip A. Porras
Vinod Yegneswaran
Martin W. Fong
Guofei Gu
Mabry Tyson
2012
journals/tifs
A Large-Scale Empirical Study of Conficker.
Seungwon Shin
Guofei Gu
A. L. Narasimha Reddy
Christopher P. Lee
2010
conf/acsac
Conficker and beyond: a large-scale empirical study.
Seungwon Shin
Guofei Gu
Coauthors
A. L. Narasimha Reddy
(1)
Brent ByungHoon Kang
(1)
Brian O'Connor
(1)
Changhoon Yoon
(4)
Chanhee Lee
(2)
Christopher P. Lee
(1)
Dayeon Yim
(1)
Dongsu Han
(1)
Eduard Marin
(3)
Eugene Jang
(2)
Guofei Gu
(5)
Hanna Kim
(4)
Haopei Wang
(1)
Heedo Kang
(3)
Hwanjo Heo
(2)
Hyeong Gwon Hong
(1)
Hyeonseong Jo
(2)
Hyunwoo Choi
(3)
Jaehan Kim
(4)
Jaehyun Nam
(4)
Jaewoong Chung
(2)
Jian Cui
(2)
Jin-Woo Chung
(2)
Jinwoo Kim
(9)
Jiseong Noh
(1)
Junmo Kim
(1)
Junsik Seo
(1)
Kicheol Kim
(1)
Kimin Lee
(1)
Kwanwoo Kim
(1)
Mabry Tyson
(1)
Martin W. Fong
(2)
Mauro Conti
(1)
Min Suk Kang
(1)
Minjae Seo
(3)
Minkyoo Song
(3)
Myoungsung You
(1)
Phillip A. Porras
(11)
Sandra Scott-Hayward
(1)
Sangho Lee
(1)
Seung Ho Na
(5)
Seunghyeon Lee
(2)
Seungsoo Lee
(4)
Seungwon Shin
(34)
Seungwon Woo
(2)
Shalini Ghosh
(1)
Sooel Son
(2)
Suryeon Kim
(3)
Suyeol Lee
(2)
Taejune Park
(3)
Taekyung Lee
(1)
Taeung Yoon
(1)
Thomas Vachuska
(1)
Vinod Yegneswaran
(11)
Xiaojing Liao
(1)
Yeonkeun Kim
(2)
Yongdae Kim
(1)
Yongjae Lee
(3)
YongJoo Song
(1)
Youngjin Jin
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to