Doowon Kim
Title
Cited by
Cited by
Year
You get where you're looking for: The impact of information sources on code security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2016 IEEE Symposium on Security and Privacy (SP), 289-305, 2016
1752016
Comparing the usability of cryptographic apis
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017
1432017
An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems.
W Bai, D Kim, M Namara, Y Qian, PG Kelley, ML Mazurek
SOUPS, 113-130, 2016
442016
Certified malware: Measuring breaches of trust in the windows code-signing pki
D Kim, BJ Kwon, T Dumitraş
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications†…, 2017
412017
How internet resources might be helping you develop faster but less securely
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
IEEE Security & Privacy 15 (2), 50-60, 2017
212017
Lessons learned from using an online platform to conduct large-scale, online controlled security experiments with software developers
C Stransky, Y Acar, DC Nguyen, D Wermke, D Kim, EM Redmiles, ...
10th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 17), 2017
172017
Balancing security and usability in encrypted email
W Bai, D Kim, M Namara, Y Qian, PG Kelley, ML Mazurek
IEEE Internet Computing 21 (3), 30-38, 2017
162017
Issued for abuse: Measuring the underground trade in code signing certificate
K KozŠk, BJ Kwon, D Kim, T Dumitraş
arXiv preprint arXiv:1803.02931, 2018
142018
A survey of balloon networking applications and technologies
D Kim
2013-12-20)[2014-05-20]. www. cse. wustl. edu/~ jain/cse570-13/ftp/BalloonN†…, 2013
132013
The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing {PKI}
D Kim, BJ Kwon, K KozŠk, C Gates, T Dumitraș
27th {USENIX} Security Symposium ({USENIX} Security 18), 851-868, 2018
112018
fFTP: a fast file transfer protocol for home N-screen platform
D Kim, J Baek, PS Fisher, S Kim
Personal and Ubiquitous Computing 22 (1), 143-152, 2018
32018
Implementation of framework to identify potential phishing websites
D Kim, C Achan, J Baek, PS Fisher
2013 IEEE International Conference on Intelligence and Security Informatics†…, 2013
32013
An Adaptive Primary Path Switching Scheme for Seamless mSCTP Handover
J Baek, D Kim, PS Fisher, M Jo
SmartCR 1 (2), 150-160, 2011
22011
An Inconvenient Trust
W Bai, M Namara, Y Qian, PG Kelley, ML Mazurek, D Kim
User Attitudes toward Security and Usability Tradeoffs for Key-Directory†…, 2016
12016
" Youhan", New Whole Crop Barley Cultivar of Hooded Spike and Fine Growth Ability in Spring 초기생육이 빠른 삼차망 청보리 신품종'유한'
TI Park, YJ Oh, HH Park, JC Park, SK Cho, JH Noh, DW Kim, TH Song, ...
Journal of The Korean Society of Grassland and Forage Science (한국초지조사†…, 0
1
Understanding of Adversary Behavior and Security Threats in Public Key Infrastructures
D Kim
2020
Poster: Analysis of Reused Private Keys in the Code Signing PKI
Doowon Kim, S. Gokberk Karaca, Tudor Dumitras
The Network and Distributed System Security Symposium 2019, 2019
2019
Rigor in Experimentation
G Voelker, M Sherr, R Groz, A Doupť, L Mounier, D McCoy, G Stringhini, ...
10th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 17), 2017
2017
Insights into Malware Distribution with Graph Analytics
M Gao, D Kim, T Li, V Srinivas
2016
Analyzing privacy leakage from used electronic devices in secondhand market
SE Banafati, J Ghurye, K Lee, D Kim
The system can't perform the operation now. Try again later.
Articles 1–20