Follow
Doowon Kim
Title
Cited by
Cited by
Year
You get where you're looking for: The impact of information sources on code security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2016 IEEE Symposium on Security and Privacy (SP), 289-305, 2016
3622016
Comparing the usability of cryptographic apis
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017
2932017
An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems.
W Bai, D Kim, M Namara, Y Qian, PG Kelley, ML Mazurek
SOUPS, 113-130, 2016
782016
Certified malware: Measuring breaches of trust in the windows code-signing pki
D Kim, BJ Kwon, T Dumitraş
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
752017
Scam pandemic: How attackers exploit public fear through phishing
M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ...
2020 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2020
412020
How internet resources might be helping you develop faster but less securely
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
IEEE Security & Privacy 15 (2), 50-60, 2017
412017
Lessons learned from using an online platform to conduct {Large-Scale}, online controlled security experiments with software developers
C Stransky, Y Acar, DC Nguyen, D Wermke, D Kim, EM Redmiles, ...
10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17), 2017
372017
The Broken Shield: Measuring Revocation Effectiveness in the Windows {Code-Signing}{PKI}
D Kim, BJ Kwon, K Kozák, C Gates, T Dumitraș
27th USENIX Security Symposium (USENIX Security 18), 851-868, 2018
312018
Balancing security and usability in encrypted email
W Bai, D Kim, M Namara, Y Qian, PG Kelley, ML Mazurek
IEEE Internet Computing 21 (3), 30-38, 2017
292017
TLS 1.3 in practice: How TLS 1.3 contributes to the internet
H Lee, D Kim, Y Kwon
Proceedings of the Web Conference 2021, 70-79, 2021
282021
Issued for abuse: Measuring the underground trade in code signing certificate
K Kozák, BJ Kwon, D Kim, T Dumitraş
arXiv preprint arXiv:1803.02931, 2018
172018
A survey of balloon networking applications and technologies
D Kim
2013-12-20)[2014-05-20]. www. cse. wustl. edu/~ jain/cse570-13/ftp/BalloonN …, 2013
132013
Sooel Son, Gail-Joon Ahn, and Tudor Dumitras. 2021. Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem
D Kim, H Cho, Y Kwon, A Doupé
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
122021
Security analysis on practices of certificate authorities in the HTTPS phishing ecosystem
D Kim, H Cho, Y Kwon, A Doupé, S Son, GJ Ahn, T Dumitras
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
102021
Analyzing spatial differences in the TLS security of delegated web services
J Lee, H Lee, J Jeong, D Kim, TT Kwon
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
62021
Certified malware in south korea: A localized study of breaches of trust in code-signing PKI ecosystem
B Kwon, S Hong, Y Jeon, D Kim
Information and Communications Security: 23rd International Conference …, 2021
62021
A large scale study and classification of virustotal reports on phishing and malware urls
E Choo, M Nabeel, D Kim, R De Silva, T Yu, I Khalil
Proceedings of the ACM on Measurement and Analysis of Computing Systems 7 (3 …, 2023
32023
fFTP: a fast file transfer protocol for home N-screen platform
D Kim, J Baek, PS Fisher, S Kim
Personal and Ubiquitous Computing 22, 143-152, 2018
32018
Implementation of framework to identify potential phishing websites
D Kim, C Achan, J Baek, PS Fisher
2013 IEEE International Conference on Intelligence and Security Informatics …, 2013
32013
Defeating program analysis techniques via ambiguous translation
C Jung, D Kim, W Wang, Y Zheng, KH Lee, Y Kwon
2021 36th IEEE/ACM International Conference on Automated Software …, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–20