What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jong Kim
Google Scholar
24
publications in security and cryptology related venues
Year
Venue
Title
2023
conf/wisa
Mutation Methods for Structured Input to Enhance Path Coverage of Fuzzers.
Yonggon Park
Youngjoo Ko
Jong Kim
2022
conf/esorics
The Ticket Price Matters in Sharding Blockchain.
Geunwoo Kim
Michael Franz
Jong Kim
2021
conf/acsac
Detecting Audio Adversarial Examples with Logit Noising.
Namgyu Park
Sangwoo Ji
Jong Kim
2020
conf/wisa
CAPTCHAs Are Still in Danger: An Efficient Scheme to Bypass Adversarial CAPTCHAs.
Dongbin Na
Namgyu Park
Sangwoo Ji
Jong Kim
2019
conf/ccs
Pinpoint Rowhammer: Suppressing Unwanted Bit Flips on Rowhammer Attacks.
Sangwoo Ji
Youngjoo Ko
Saeyoung Oh
Jong Kim
2019
conf/wisa
Low-Noise LLC Side-Channel Attack with Perf.
Youngjoo Ko
Sangwoo Ji
Jong Kim
2018
conf/wisa
Reliable Rowhammer Attack and Mitigation Based on Reverse Engineering Memory Address Mapping Algorithms.
Saeyoung Oh
Jong Kim
2018
conf/wisa
Security Analysis of Mobile Web Browser Hardware Accessibility: Study with Ambient Light Sensors.
Sanghak Lee
Sangwoo Ji
Jong Kim
2018
conf/dsn
Detecting and Identifying Faulty IoT Devices in Smart Home with Context Extraction.
Jiwon Choi
Hayoung Jeoung
Jihun Kim
Youngjoo Ko
Wonup Jung
Hanjun Kim
Jong Kim
2017
conf/wisa
Holistic Tracking of Products on the Blockchain Using NFC and Verified Users.
Vanesco A. J. Boehm
Jong Kim
James Won-Ki Hong
2016
conf/wisa
SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN.
Xinyu Liu
Beumjin Cho
Jong Kim
2016
conf/acsac
Inferring browser activity and status through remote monitoring of storage usage.
Hyungsub Kim
Sangho Lee
Jong Kim
2015
conf/ccs
CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks.
Jonghyuk Song
Sangho Lee
Jong Kim
2015
conf/wisa
Publishing Graph Data with Subgraph Differential Privacy.
Binh P. Nguyen
Hoa Ngo
Jihun Kim
Jong Kim
2015
conf/ndss
Identifying Cross-origin Resource Status Using Application Cache.
Sangho Lee
Hyungsub Kim
Jong Kim
2014
conf/sp
Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities.
Sangho Lee
Youngsok Kim
Jangwoo Kim
Jong Kim
2014
conf/wisa
Detection of Heap-Spraying Attacks Using String Trace Graph.
Jaehyeok Song
Jonghyuk Song
Jong Kim
2014
conf/acsac
Exploring and mitigating privacy threats of HTML5 geolocation API.
Hyungsub Kim
Sangho Lee
Jong Kim
2013
conf/wisa
Punobot: Mobile Botnet Using Push Notification Service in Android.
Hayoung Lee
Taeho Kang
Sangho Lee
Jong Kim
Yoonho Kim
2012
conf/ndss
WarningBird: Detecting Suspicious URLs in Twitter Stream.
Sangho Lee
Jong Kim
2010
conf/ccs
binOb+: a framework for potent and stealthy binary obfuscation.
Byoungyoung Lee
Yuna Kim
Jong Kim
2006
conf/wisa
PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution.
Ki Hun Lee
Yuna Kim
Sung Je Hong
Jong Kim
2003
conf/sec
PCMHoDC. A Scheme to Protect Copyright & Modification History of Digital Contents.
Heejae Park
Jong Kim
2001
conf/dsn
Performance Evaluation of Dependable Real-Time Communication with Elastic QoS.
Jong Kim
Kang G. Shin
Coauthors
Beumjin Cho
(1)
Binh P. Nguyen
(1)
Byoungyoung Lee
(1)
Dongbin Na
(1)
Geunwoo Kim
(1)
Hanjun Kim
(1)
Hayoung Jeoung
(1)
Hayoung Lee
(1)
Heejae Park
(1)
Hoa Ngo
(1)
Hyungsub Kim
(3)
Jaehyeok Song
(1)
James Won-Ki Hong
(1)
Jangwoo Kim
(1)
Jihun Kim
(2)
Jiwon Choi
(1)
Jong Kim
(24)
Jonghyuk Song
(2)
Kang G. Shin
(1)
Ki Hun Lee
(1)
Michael Franz
(1)
Namgyu Park
(2)
Saeyoung Oh
(2)
Sanghak Lee
(1)
Sangho Lee
(7)
Sangwoo Ji
(5)
Sung Je Hong
(1)
Taeho Kang
(1)
Vanesco A. J. Boehm
(1)
Wonup Jung
(1)
Xinyu Liu
(1)
Yonggon Park
(1)
Yoonho Kim
(1)
Youngjoo Ko
(4)
Youngsok Kim
(1)
Yuna Kim
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to