Follow
Doowon Kim
Title
Cited by
Cited by
Year
You get where you're looking for: The impact of information sources on code security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2016 IEEE Symposium on Security and Privacy (SP), 289-305, 2016
3402016
Comparing the usability of cryptographic apis
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017
2762017
An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems.
W Bai, D Kim, M Namara, Y Qian, PG Kelley, ML Mazurek
SOUPS, 113-130, 2016
762016
Certified malware: Measuring breaches of trust in the windows code-signing pki
D Kim, BJ Kwon, T Dumitraş
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
682017
How internet resources might be helping you develop faster but less securely
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
IEEE Security & Privacy 15 (2), 50-60, 2017
402017
Lessons learned from using an online platform to conduct {Large-Scale}, online controlled security experiments with software developers
C Stransky, Y Acar, DC Nguyen, D Wermke, D Kim, EM Redmiles, ...
10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17), 2017
362017
Scam pandemic: How attackers exploit public fear through phishing
M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ...
2020 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2020
302020
The Broken Shield: Measuring Revocation Effectiveness in the Windows {Code-Signing}{PKI}
D Kim, BJ Kwon, K Kozák, C Gates, T Dumitraș
27th USENIX Security Symposium (USENIX Security 18), 851-868, 2018
302018
Balancing security and usability in encrypted email
W Bai, D Kim, M Namara, Y Qian, PG Kelley, ML Mazurek
IEEE Internet Computing 21 (3), 30-38, 2017
292017
TLS 1.3 in practice: How TLS 1.3 contributes to the internet
H Lee, D Kim, Y Kwon
Proceedings of the Web Conference 2021, 70-79, 2021
232021
Issued for abuse: Measuring the underground trade in code signing certificate
K Kozák, BJ Kwon, D Kim, T Dumitraş
arXiv preprint arXiv:1803.02931, 2018
172018
A survey of balloon networking applications and technologies
D Kim
Saint Louis Washington University, 2013
132013
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem
D Kim, H Cho, Y Kwon, A Doupé, S Son, GJ Ahn, T Dumitras
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
62021
Certified Malware in South Korea: A Localized Study of Breaches of Trust in Code-Signing PKI Ecosystem
B Kwon, S Hong, Y Jeon, D Kim
Information and Communications Security: 23rd International Conference …, 2021
52021
Implementation of framework to identify potential phishing websites
D Kim, C Achan, J Baek, PS Fisher
2013 IEEE International Conference on Intelligence and Security Informatics …, 2013
42013
fFTP: a fast file transfer protocol for home N-screen platform
D Kim, J Baek, PS Fisher, S Kim
Personal and Ubiquitous Computing 22, 143-152, 2018
32018
Defeating program analysis techniques via ambiguous translation
C Jung, D Kim, W Wang, Y Zheng, KH Lee, Y Kwon
2021 36th IEEE/ACM International Conference on Automated Software …, 2021
22021
Analyzing Spatial Differences in the TLS Security of Delegated Web Services
J Lee, H Lee, J Jeong, D Kim, TT Kwon
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
22021
" Most of us trust our email provider": Balancing security and usability in encrypted email
W Bai, D Kim, N Moses, Y Qian, PG Kelly, M Mazurek
IEEE Internet Computing, 2017
22017
An Adaptive Primary Path Switching Scheme for Seamless mSCTP Handover
J Baek, D Kim, PS Fisher, M Jo
SmartCR 1 (2), 150-160, 2011
22011
The system can't perform the operation now. Try again later.
Articles 1–20