A paper is accepted to ACSAC 2016.
Inferring Browser Activity and Status Through Remote Monitoring of Storage Usage Hyungsub Kim, Sangho Lee, and Jong Kim Proc. 32nd Annual Computer Security Applications Conference (ACSAC), Los Angeles, CA, USA, December 5-9, 2016. (48/210=22.8%) (IoT support)
A paper is accepted to WISA 2016.
SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN Xinyu Liu, Beumjin Cho, and Jong Kim Proc. 17th International Workshop on Information Security Applications (WISA), Jeju Island, Korea, August 25-27, 2016. (IoT support)
A paper is accepted to WISA 2015.
Binh Nguyen, Hoa Ngo, Jihun Kim, and Jong Kim, "Publishing Graph Data with Subgraph Differential Privacy," Proc. 16th International Workshop on Information Security Applications (WISA 2015), Jeju Island, Korea, August 20-22, 2015.
A paper is accepted to CCS 2015.
Jonghyuk Song, Sangho Lee, and Jong Kim, "CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks," Proc. 22nd ACM Conference on Computer and Communications Security (CCS 2015), Denver, CO, USA, October 12-16, 2015. "The ACM Conference on Computer and Communications Security (CCS) is the flagship annual conference of the Special Interest Group on Security, Audit [...]
A paper is accepted to CSF 2015.
Hoa Ngo and Jong Kim, "Location Privacy via Differential Private Perturbation of Cloaking Area," Proc. 28th IEEE Computer Security Foundations Symposium (CSF 2015), Verona, Italy, July 13-17, 2015.
A paper is accepted to NDSS 2015.
Sangho Lee, Hyungsub Kim, and Jong Kim, "Identifying Cross-origin Resource Status Using Application Cache," Proc. 22nd Network and Distributed System Security Symposium (NDSS 2015), San Diego, CA, USA, February 8-11, 2015. The Network and Distributed System Security (NDSS) is the top-tier security conference whose topics include distributed systems and networks, web security and privacy, intrusion [...]