


default search action
Min Suk Kang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Jinseo Lee, David Mohaisen, Min Suk Kang:
Measuring DNS-over-HTTPS Downgrades: Prevalence, Techniques, and Bypass Strategies. PACMNET 2(CoNEXT4): 28:1-28:22 (2024) - [c31]Yongwoo Oh, Michael Yiqing Hu, Xin Zhe Khooi, Jehyun Lee, Dinil Mon Divakaran, Min Suk Kang:
IoTell: A Privacy-Preserving Protocol for Large-scale Monitoring of IoT Security Status. CCGridW 2024: 9-17 - [c30]Seungwon Woo, Wonho Song, Min Suk Kang:
Work in Progress: I Know You Pin Me: Privacy Risks in User Pinning of Zoom Video Conferencing. EuroS&P Workshops 2024: 527-532 - [c29]Taekkyung Oh
, Sangwook Bae
, Junho Ahn
, Yonghwa Lee, Tuan Dinh Hoang
, Min Suk Kang, Nils Ole Tippenhauer
, Yongdae Kim:
Enabling Physical Localization of Uncooperative Cellular Devices. MobiCom 2024: 1530-1544 - [i6]Taekkyung Oh, Sangwook Bae, Junho Ahn, Yonghwa Lee, Dinh-Tuan Hoang, Min Suk Kang, Nils Ole Tippenhauer, Yongdae Kim:
Enabling Physical Localization of Uncooperative Cellular Devices. CoRR abs/2403.14963 (2024) - 2023
- [c28]Jaehyun Ha
, Seungjin Baek
, Muoi Tran
, Min Suk Kang
:
On the Sustainability of Bitcoin Partitioning Attacks. FC 2023: 166-181 - [c27]Hwanjo Heo, Seungwon Woo, Taeung Yoon, Min Suk Kang, Seungwon Shin:
Partitioning Ethereum without Eclipsing It. NDSS 2023 - [c26]Beomseok Oh, Junho Ahn, Sangwook Bae, Mincheol Son, Yonghwa Lee, Min Suk Kang, Yongdae Kim:
Preventing SIM Box Fraud Using Device Model Fingerprinting. NDSS 2023 - 2022
- [j4]Nitya Lakshmanan, Abdelhak Bentaleb, Byoungjun Choi, Roger Zimmermann, Jun Han, Min Suk Kang:
On Privacy Risks of Watching YouTube over Cellular Networks with Carrier Aggregation. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(1): 19:1-19:22 (2022) - [c25]Seungjin Baek, Hocheol Nam
, Yongwoo Oh, Muoi Tran, Min Suk Kang:
Short Paper: On the Claims of Weak Block Synchronization in Bitcoin. Financial Cryptography 2022: 663-671 - [c24]Jehyun Lee, Min Suk Kang, Dinil Mon Divakaran, Phyo May Thet, Videet Singhai, Jun Seung You:
A Step Towards On-Path Security Function Outsourcing. ICDCN 2022: 175-187 - [c23]Min Suk Kang:
Potential Security Concerns at the Physical Layer of 6G Cellular Systems. ICTC 2022: 981-984 - 2021
- [c22]Levente Csikor, Himanshu Singh, Min Suk Kang, Dinil Mon Divakaran:
Privacy of DNS-over-HTTPS: Requiem for a Dream? EuroS&P 2021: 252-271 - [c21]Xin Zhe Khooi
, Levente Csikor, Jialin Li, Min Suk Kang, Dinil Mon Divakaran:
Revisiting Heavy-Hitter Detection on Commodity Programmable Switches. NetSoft 2021: 79-87 - [c20]Muoi Tran, Akshaye Shenoi, Min Suk Kang:
On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin. USENIX Security Symposium 2021: 1253-1270 - [c19]Nitya Lakshmanan, Nishant Budhdev, Min Suk Kang, Mun Choon Chan, Jun Han:
A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks. USENIX Security Symposium 2021: 3899-3916 - [i5]Jehyun Lee, Min Suk Kang, Dinil Mon Divakaran, Phyo May Thet, Videet Singhai, Jun Seung You:
A Step Towards On-Path Security Function Outsourcing. CoRR abs/2110.00250 (2021) - [i4]Seungjin Baek, Hocheol Nam, Yongwoo Oh, Muoi Tran, Min Suk Kang:
On the Claims of Weak Block Synchronization in Bitcoin. IACR Cryptol. ePrint Arch. 2021: 1282 (2021) - 2020
- [c18]Xin Zhe Khooi
, Levente Csikor, Dinil Mon Divakaran, Min Suk Kang:
DIDA: Distributed In-Network Defense Architecture Against Amplified Reflection DDoS Attacks. NetSoft 2020: 277-281 - [c17]Xin Zhe Khooi
, Levente Csikor, Min Suk Kang, Dinil Mon Divakaran:
In-network defense against AR-DDoS attacks. SIGCOMM Posters and Demos 2020: 18-20 - [c16]Xin Zhe Khooi
, Levente Csikor, Min Suk Kang, Dinil Mon Divakaran:
Towards in-network time-decaying aggregates for heavy-hitter detection. SIGCOMM Posters and Demos 2020: 88-90 - [c15]Muoi Tran, Inho Choi, Gi Jun Moon, Anh V. Vu, Min Suk Kang:
A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network. SP 2020: 894-909
2010 – 2019
- 2019
- [c14]Levente Csikor, Dinil Mon Divakaran, Min Suk Kang, Attila Korösi, Balázs Sonkoly
, Dávid Haja, Dimitrios P. Pezaros, Stefan Schmid
, Gábor Rétvári:
Tuple space explosion: a denial-of-service attack against a software packet classifier. CoNEXT 2019: 292-304 - [c13]Deli Gong, Muoi Tran, Shweta Shinde
, Hao Jin, Vyas Sekar, Prateek Saxena, Min Suk Kang:
Practical Verifiable In-network Filtering for DDoS Defense. ICDCS 2019: 1161-1174 - [c12]Muoi Tran, Min Suk Kang, Hsu-Chun Hsiao, Wei-Hsuan Chiang, Shu-Po Tung, Yu-Su Wang:
On the Feasibility of Rerouting-Based DDoS Defenses. IEEE Symposium on Security and Privacy 2019: 1169-1184 - [c11]Nitya Lakshmanan, Inkyu Bang, Min Suk Kang, Jun Han, Jong Taek Lee
:
SurFi: detecting surveillance camera looping attacks with wi-fi channel state information. WiSec 2019: 239-244 - [i3]Deli Gong, Muoi Tran, Shweta Shinde, Hao Jin, Vyas Sekar, Prateek Saxena, Min Suk Kang:
Practical Verifiable In-network Filtering for DDoS defense. CoRR abs/1901.00955 (2019) - [i2]Nitya Lakshmanan, Inkyu Bang, Min Suk Kang, Jun Han, Jong Taek Lee:
SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi Channel State Information (Extended Version). CoRR abs/1904.01350 (2019) - 2018
- [c10]Shruti Tople, Soyeon Park, Min Suk Kang, Prateek Saxena:
VeriCount: Verifiable Resource Accounting Using Hardware and Software Isolation. ACNS 2018: 657-677 - [c9]Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, Prateek Saxena:
Obscuro: A Bitcoin Mixer using Trusted Execution Environments. ACSAC 2018: 692-701 - 2017
- [i1]Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, Prateek Saxena:
Obscuro: A Bitcoin Mixer using Trusted Execution Environments. IACR Cryptol. ePrint Arch. 2017: 974 (2017) - 2016
- [b1]Min Suk Kang:
Handling Large-Scale Link-Flooding Attacks in the Internet. Carnegie Mellon University, USA, 2016 - [c8]Min Suk Kang, Virgil D. Gligor, Vyas Sekar:
SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks. NDSS 2016 - [c7]Min Suk Kang, Virgil D. Gligor, Vyas Sekar:
Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents. Security Protocols Workshop 2016: 47-57 - 2014
- [c6]Min Suk Kang, Virgil D. Gligor:
Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures. CCS 2014: 321-333 - 2013
- [c5]Soo Bum Lee, Min Suk Kang, Virgil D. Gligor:
CoDef: collaborative defense against large-scale link-flooding attacks. CoNEXT 2013: 417-428 - [c4]Min Suk Kang, Soo Bum Lee, Virgil D. Gligor:
The Crossfire Attack. IEEE Symposium on Security and Privacy 2013: 127-141 - [c3]Shrikant Adhikarla, Min Suk Kang, Patrick Tague
:
Selfish manipulation of cooperative cellular communications via channel fabrication. WISEC 2013: 49-54 - 2012
- [j3]Bang Chul Jung, Min Suk Kang, Tae-Won Ban:
Hybrid Multiple Access for Uplink OFDMA System. J. Inform. and Commun. Convergence Engineering 10(2): 117-122 (2012) - 2010
- [c2]Min Suk Kang, Bang Chul Jung:
A Cognitive p-Persistent CSMA Scheme for Spectrum Sharing Based Cognitive Radio Networks. WCNC 2010: 1-6
2000 – 2009
- 2009
- [c1]Min Suk Kang, Bang Chul Jung
:
Decentralized intercell interference coordination in uplink cellular networks using adaptive sub-band exclusion. WCNC 2009: 1303-1307 - 2008
- [j2]Min Suk Kang, Bang Chul Jung
, Dan Keun Sung, Wan Choi
:
A pre-whitening scheme in a MIMO-based spectrum-sharing environment. IEEE Commun. Lett. 12(11): 831-833 (2008) - [j1]Min Suk Kang, Bang Chul Jung
, Dan Keun Sung:
Effect of cooperative and selection relaying schemes on multiuser diversity in downlink cellular systems with relays. J. Commun. Networks 10(2): 175-185 (2008)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-10 21:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint