Seguir
Sooel Son
Sooel Son
Dirección de correo verificada de kaist.ac.kr - Página principal
Título
Citado por
Citado por
Año
Model checking invariant security properties in OpenFlow
S Son, S Shin, V Yegneswaran, P Porras, G Gu
2013 IEEE international conference on communications (ICC), 1974-1979, 2013
2322013
The hitchhiker’s guide to DNS cache poisoning
S Son, V Shmatikov
Security and Privacy in Communication Networks: 6th Iternational ICST …, 2010
1732010
What Mobile Ads Know About Mobile Users.
S Son, D Kim, V Shmatikov
NDSS, 2016
1212016
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web
SS Seunghyeon Lee, Changhoon Yoon, Heedo Kang, Yeonkeun Kim, Yongdae Kim ...
Network & Distributed System Security Symposium 2019, 2019
108*2019
Fix Me Up: Repairing Access-Control Bugs in Web Applications.
S Son, KS McKinley, V Shmatikov
NDSS, 2013
1062013
Rolecast: finding missing security checks when you do not know what checks are
S Son, KS McKinley, V Shmatikov
Proceedings of the 2011 ACM international conference on Object oriented …, 2011
1062011
The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites.
S Son, V Shmatikov
NDSS, 2013
1032013
Montage: A neural network language {Model-Guided}{JavaScript} engine fuzzer
S Lee, HS Han, SK Cha, S Son
29th USENIX Security Symposium (USENIX Security 20), 2613-2630, 2020
962020
Diglossia: detecting code injection attacks with precision and efficiency
S Son, KS McKinley, V Shmatikov
Proceedings of the 2013 ACM SIGSAC conference on computer & communications …, 2013
962013
SAFERPHP: Finding semantic vulnerabilities in PHP applications
S Son, V Shmatikov
Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and …, 2011
842011
Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications
J Lee, H Kim, J Park, I Shin, S Son
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
522018
Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned
D Kim, E Kim, SK Cha, S Son, Y Kim
IEEE Transactions on Software Engineering 49 (4), 1661-1682, 2022
422022
Doppelgängers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services
SS C Yoon, K Kim, Y Kim, S Shin
The World Wide Web Conference, 2225--2235, 2019
262019
Who Spent My {EOS}? On the ({In) Security} of Resource Management of {EOS. IO}
S Lee, D Kim, D Kim, S Son, Y Kim
13th USENIX workshop on offensive technologies (WOOT 19), 2019
252019
{FUGIO}: Automatic Exploit Generation for {PHP} Object Injection Vulnerabilities
S Park, D Kim, S Jana, S Son
31st USENIX Security Symposium (USENIX Security 22), 197-214, 2022
232022
Link: Black-box detection of cross-site scripting vulnerabilities using reinforcement learning
S Lee, S Wi, S Son
Proceedings of the ACM Web Conference 2022, 743-754, 2022
202022
FUSE: Finding File Upload Bugs via Penetration Testing.
T Lee, S Wi, S Lee, S Son
NDSS, 2020
202020
{AdCube}:{WebVR} Ad Fraud and Practical Confinement of {Third-Party} Ads
H Lee, J Lee, D Kim, S Jana, I Shin, S Son
30th USENIX Security Symposium (USENIX Security 21), 2543-2560, 2021
182021
HiddenCPG: large-scale vulnerable clone detection using subgraph isomorphism of code property graphs
S Wi, S Woo, JJ Whang, S Son
Proceedings of the ACM Web Conference 2022, 755-766, 2022
112022
Security analysis on practices of certificate authorities in the HTTPS phishing ecosystem
D Kim, H Cho, Y Kwon, A Doupé, S Son, GJ Ahn, T Dumitras
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
112021
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20