What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Min Suk Kang
Google Scholar
19
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
Understanding User Privacy Perceptions in Video Conferencing: Insights from a Feature-Specific User Study.
Hobin Kim
Wonho Song
Joseph Seering
Min Suk Kang
2025
conf/uss
Onions Got Puzzled: On the Challenges of Mitigating Denial-of-Service Problems in Tor Onion Services.
Jinseo Lee
Hobin Kim
Min Suk Kang
2024
conf/eurosp
Work in Progress: I Know You Pin Me: Privacy Risks in User Pinning of Zoom Video Conferencing.
Seungwon Woo
Wonho Song
Min Suk Kang
2023
conf/fc
On the Sustainability of Bitcoin Partitioning Attacks.
Jaehyun Ha
Seungjin Baek
Muoi Tran
Min Suk Kang
2023
conf/ndss
Preventing SIM Box Fraud Using Device Model Fingerprinting.
Beomseok Oh
Junho Ahn
Sangwook Bae
Mincheol Son
Yonghwa Lee
Min Suk Kang
Yongdae Kim
2023
conf/ndss
Partitioning Ethereum without Eclipsing It.
Hwanjo Heo
Seungwon Woo
Taeung Yoon
Min Suk Kang
Seungwon Shin
2022
conf/fc
Short Paper: On the Claims of Weak Block Synchronization in Bitcoin.
Seungjin Baek
Hocheol Nam
Yongwoo Oh
Muoi Tran
Min Suk Kang
2021
conf/uss
A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks.
Nitya Lakshmanan
Nishant Budhdev
Min Suk Kang
Mun Choon Chan
Jun Han
2021
conf/uss
On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin.
Muoi Tran
Akshaye Shenoi
Min Suk Kang
2021
conf/eurosp
Privacy of DNS-over-HTTPS: Requiem for a Dream?
Levente Csikor
Himanshu Singh
Min Suk Kang
Dinil Mon Divakaran
2020
conf/sp
A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.
Muoi Tran
Inho Choi
Gi Jun Moon
Anh V. Vu
Min Suk Kang
2019
conf/sp
On the Feasibility of Rerouting-Based DDoS Defenses.
Muoi Tran
Min Suk Kang
Hsu-Chun Hsiao
Wei-Hsuan Chiang
Shu-Po Tung
Yu-Su Wang
2019
conf/wisec
SurFi: detecting surveillance camera looping attacks with wi-fi channel state information.
Nitya Lakshmanan
Inkyu Bang
Min Suk Kang
Jun Han
Jong Taek Lee
2018
conf/acns
VeriCount: Verifiable Resource Accounting Using Hardware and Software Isolation.
Shruti Tople
Soyeon Park
Min Suk Kang
Prateek Saxena
2018
conf/acsac
Obscuro: A Bitcoin Mixer using Trusted Execution Environments.
Muoi Tran
Loi Luu
Min Suk Kang
Iddo Bentov
Prateek Saxena
2016
conf/ndss
SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks.
Min Suk Kang
Virgil D. Gligor
Vyas Sekar
2014
conf/ccs
Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures.
Min Suk Kang
Virgil D. Gligor
2013
conf/sp
The Crossfire Attack.
Min Suk Kang
Soo Bum Lee
Virgil D. Gligor
2013
conf/wisec
Selfish manipulation of cooperative cellular communications via channel fabrication.
Shrikant Adhikarla
Min Suk Kang
Patrick Tague
Coauthors
Akshaye Shenoi
(1)
Anh V. Vu
(1)
Beomseok Oh
(1)
Dinil Mon Divakaran
(1)
Gi Jun Moon
(1)
Himanshu Singh
(1)
Hobin Kim
(2)
Hocheol Nam
(1)
Hsu-Chun Hsiao
(1)
Hwanjo Heo
(1)
Iddo Bentov
(1)
Inho Choi
(1)
Inkyu Bang
(1)
Jaehyun Ha
(1)
Jinseo Lee
(1)
Jong Taek Lee
(1)
Joseph Seering
(1)
Jun Han
(2)
Junho Ahn
(1)
Levente Csikor
(1)
Loi Luu
(1)
Min Suk Kang
(19)
Mincheol Son
(1)
Mun Choon Chan
(1)
Muoi Tran
(6)
Nishant Budhdev
(1)
Nitya Lakshmanan
(2)
Patrick Tague
(1)
Prateek Saxena
(2)
Sangwook Bae
(1)
Seungjin Baek
(2)
Seungwon Shin
(1)
Seungwon Woo
(2)
Shrikant Adhikarla
(1)
Shruti Tople
(1)
Shu-Po Tung
(1)
Soo Bum Lee
(1)
Soyeon Park
(1)
Taeung Yoon
(1)
Virgil D. Gligor
(3)
Vyas Sekar
(1)
Wei-Hsuan Chiang
(1)
Wonho Song
(2)
Yongdae Kim
(1)
Yonghwa Lee
(1)
Yongwoo Oh
(1)
Yu-Su Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to