default search action
Seungwon Shin 0001
Person information
- affiliation: KAIST, Daejeon, Korea
Other persons with the same name
- Seungwon Shin — disambiguation page
- Seungwon Shin 0002 — Hongik University, Seoul, Korea
- Seungwon Shin 0003 — Gyeonggi Science High School, Suwon, Korea
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Hyunmin Seo, Seungwon Shin, Seungsoo Lee:
BotFence: A Framework for Network-Enriched Botnet Detection and Response With SmartNICs. IEEE Access 12: 114878-114893 (2024) - [j37]Minjae Seo, Jaehan Kim, Myoungsung You, Seungwon Shin, Jinwoo Kim:
gShock: A GNN-Based Fingerprinting System for Permissioned Blockchain Networks Over Encrypted Channels. IEEE Access 12: 146328-146342 (2024) - [j36]Suyeol Lee, Jaehan Kim, Minjae Seo, Seung Ho Na, Seungwon Shin, Jinwoo Kim:
CENSor: Detecting Illicit Bitcoin Operation via GCN-Based Hyperedge Classification. IEEE Access 12: 152330-152346 (2024) - [j35]Jinwoo Kim, Minjae Seo, Seungsoo Lee, Jaehyun Nam, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu, Seungwon Shin:
Enhancing security in SDN: Systematizing attacks and defenses from a penetration perspective. Comput. Networks 241: 110203 (2024) - [j34]Myoungsung You, Minjae Seo, Jaehan Kim, Seungwon Shin, Jaehyun Nam:
Hyperion: Hardware-Based High-Performance and Secure System for Container Networks. IEEE Trans. Cloud Comput. 12(3): 844-858 (2024) - [j33]Jinwoo Kim, Minjae Seo, Eduard Marin, Seungsoo Lee, Jaehyun Nam, Seungwon Shin:
Ambusher: Exploring the Security of Distributed SDN Controllers Through Protocol State Fuzzing. IEEE Trans. Inf. Forensics Secur. 19: 6264-6279 (2024) - [c68]Myoungsung You, Jaehyun Nam, Hyunmin Seo, Minjae Seo, Jaehan Kim, Dongmin Choi, Seungwon Shin:
HardWhale: A Hardware-Isolated Network Security Enforcement System for Cloud Environments. ICDCS 2024: 496-507 - [c67]Eugene Jang, Jian Cui, Dayeon Yim, Youngjin Jin, Jin-Woo Chung, Seungwon Shin, Yongjae Lee:
Ignore Me But Don't Replace Me: Utilizing Non-Linguistic Elements for Pretraining on the Cybersecurity Domain. NAACL-HLT (Findings) 2024: 29-42 - [c66]Hanna Kim, Jian Cui, Eugene Jang, Chanhee Lee, Yongjae Lee, Jin-Woo Chung, Seungwon Shin:
DRAINCLoG: Detecting Rogue Accounts with Illegally-obtained NFTs using Classifiers Learned on Graphs. NDSS 2024 - [c65]Jaehan Kim, Minkyoo Song, Minjae Seo, Youngjin Jin, Seungwon Shin:
PassREfinder: Credential Stuffing Risk Prediction by Representing Password Reuse between Websites on a Graph. SP 2024: 1385-1404 - [c64]Hyunwoo Choi, Suryeon Kim, Seungwon Shin:
Prefetch for Fun and Profit: A Revisit of Prefetch Attacks on Apple M1. USENIX Security Symposium 2024 - [i11]Eugene Jang, Jian Cui, Dayeon Yim, Youngjin Jin, Jin-Woo Chung, Seungwon Shin, Yongjae Lee:
Ignore Me But Don't Replace Me: Utilizing Non-Linguistic Elements for Pretraining on the Cybersecurity Domain. CoRR abs/2403.10576 (2024) - [i10]Jian Cui, Hanna Kim, Eugene Jang, Dayeon Yim, Kicheol Kim, Yongjae Lee, Jin-Woo Chung, Seungwon Shin, Xiaojing Liao:
Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding. CoRR abs/2409.08221 (2024) - [i9]Jaehan Kim, Minkyoo Song, Seung Ho Na, Seungwon Shin:
Obliviate: Neutralizing Task-agnostic Backdoors within the Parameter-efficient Fine-tuning Paradigm. CoRR abs/2409.14119 (2024) - [i8]Minkyoo Song, Hanna Kim, Jaehan Kim, Youngjin Jin, Seungwon Shin:
Claim-Guided Textual Backdoor Attack for Practical Applications. CoRR abs/2409.16618 (2024) - [i7]Hanna Kim, Minkyoo Song, Seung Ho Na, Seungwon Shin, Kimin Lee:
When LLMs Go Online: The Emerging Threat of Web-Enabled LLMs. CoRR abs/2410.14569 (2024) - [i6]Eugene Jang, Kimin Lee, Jin-Woo Chung, Keuntae Park, Seungwon Shin:
Improbable Bigrams Expose Vulnerabilities of Incomplete Tokens in Byte-Level Tokenizers. CoRR abs/2410.23684 (2024) - 2023
- [j32]Jinwoo Kim, Yeonkeun Kim, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin, Taejune Park:
Extended data plane architecture for in-network security services in software-defined networks. Comput. Secur. 124: 102976 (2023) - [j31]Suryeon Kim, Seungwon Shin, Hyunwoo Choi:
AVX-TSCHA: Leaking information through AVX extensions in commercial processors. Comput. Secur. 134: 103437 (2023) - [j30]Jaehyun Nam, Seungsoo Lee, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin:
Secure Inter-Container Communications Using XDP/eBPF. IEEE/ACM Trans. Netw. 31(2): 934-947 (2023) - [c63]Youngjin Jin, Eugene Jang, Jian Cui, Jin-Woo Chung, Yongjae Lee, Seungwon Shin:
DarkBERT: A Language Model for the Dark Side of the Internet. ACL (1) 2023: 7515-7533 - [c62]Myoungsung You, Jaehyun Nam, Minjae Seo, Seungwon Shin:
HELIOS: Hardware-assisted High-performance Security Extension for Cloud Networking. SoCC 2023: 486-501 - [c61]Seong-Joong Kim, Myoungsung You, Byung Joon Kim, Seungwon Shin:
Cryonics: Trustworthy Function-as-a-Service using Snapshot-based Enclaves. SoCC 2023: 528-543 - [c60]Hyunwoo Choi, Suryeon Kim, Seungwon Shin:
AVX Timing Side-Channel Attacks against Address Space Layout Randomization. DAC 2023: 1-6 - [c59]Seung Ho Na, Sumin Cho, Seungwon Shin:
Evolving Bots: The New Generation of Comment Bots and their Underlying Scam Campaigns in YouTube. IMC 2023: 297-312 - [c58]Hwanjo Heo, Seungwon Woo, Taeung Yoon, Min Suk Kang, Seungwon Shin:
Partitioning Ethereum without Eclipsing It. NDSS 2023 - [c57]Seung Ho Na, Kwanwoo Kim, Seungwon Shin:
Witnessing Erosion of Membership Inference Defenses: Understanding Effects of Data Drift in Membership Privacy. RAID 2023: 250-263 - [i5]Hanna Kim, Jian Cui, Eugene Jang, Chanhee Lee, Yongjae Lee, Jin-Woo Chung, Seungwon Shin:
DRAINCLoG: Detecting Rogue Accounts with Illegally-obtained NFTs using Classifiers Learned on Graphs. CoRR abs/2301.13577 (2023) - [i4]Hyunwoo Choi, Suryeon Kim, Seungwon Shin:
AVX Timing Side-Channel Attacks against Address Space Layout Randomization. CoRR abs/2304.07940 (2023) - [i3]Youngjin Jin, Eugene Jang, Jian Cui, Jin-Woo Chung, Yongjae Lee, Seungwon Shin:
DarkBERT: A Language Model for the Dark Side of the Internet. CoRR abs/2305.08596 (2023) - 2022
- [j29]Siwon Huh, SeongHwan Cho, Jinho Choi, Seungwon Shin, Hojoon Lee:
A Comprehensive Analysis of Today's Malware and Its Distribution Network: Common Adversary Strategies and Implications. IEEE Access 10: 49566-49584 (2022) - [j28]Myoungsung You, Yeonkeun Kim, Jaehan Kim, Minjae Seo, Sooel Son, Seungwon Shin, Seungsoo Lee:
FuzzDocs: An Automated Security Evaluation Framework for IoT. IEEE Access 10: 102406-102420 (2022) - [j27]Hyeonseong Jo, Yongjae Lee, Seungwon Shin:
Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text. Comput. Secur. 120: 102763 (2022) - [j26]Jinho Choi, Taehwa Lee, Kwanwoo Kim, Minjae Seo, Jian Cui, Seungwon Shin:
Discovering Message Templates on Large Scale Bitcoin Abuse Reports Using a Two-Fold NLP-Based Clustering Method. IEICE Trans. Inf. Syst. 105-D(4): 824-827 (2022) - [j25]Jinho Choi, Jaehan Kim, Minkyoo Song, Hanna Kim, Nahyeon Park, Minjae Seo, Youngjin Jin, Seungwon Shin:
A Large-Scale Bitcoin Abuse Measurement and Clustering Analysis Utilizing Public Reports. IEICE Trans. Inf. Syst. 105-D(7): 1296-1307 (2022) - [j24]Haney Kang, Seungwon Shin:
Verikube: Automatic and Efficient Verification for Container Network Policies. IEICE Trans. Inf. Syst. 105-D(12): 2131-2134 (2022) - [j23]Jaehyun Nam, Seung Ho Na, Seungwon Shin, Taejune Park:
Reconfigurable regular expression matching architecture for real-time pattern update and payload inspection. J. Netw. Comput. Appl. 208: 103507 (2022) - [j22]Seungsoo Lee, Seungwon Woo, Jinwoo Kim, Jaehyun Nam, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin:
A Framework for Policy Inconsistency Detection in Software-Defined Networks. IEEE/ACM Trans. Netw. 30(3): 1410-1423 (2022) - [c56]Seung Ho Na, Hyeong Gwon Hong, Junmo Kim, Seungwon Shin:
Closing the Loophole: Rethinking Reconstruction Attacks in Federated Learning from a Privacy Standpoint. ACSAC 2022: 332-345 - [c55]Minjae Seo, Jaehan Kim, Eduard Marin, Myoungsung You, Taejune Park, Seungsoo Lee, Seungwon Shin, Jinwoo Kim:
Heimdallr: Fingerprinting SD-WAN Control-Plane Architecture via Encrypted Control Traffic. ACSAC 2022: 949-963 - [c54]Jian Cui, Kwanwoo Kim, Seung Ho Na, Seungwon Shin:
Meta-Path-based Fake News Detection Leveraging Multi-level Social Context Information. CIKM 2022: 325-334 - [c53]Taejune Park, Myoungsung You, Jian Cui, Youngjin Jin, Kilho Lee, Seungwon Shin:
MECaNIC: SmartNIC to Assist URLLC Processing in Multi-Access Edge Computing Platforms. ICNP 2022: 1-12 - [c52]Youngjin Jin, Eugene Jang, Yongjae Lee, Seungwon Shin, Jin-Woo Chung:
Shedding New Light on the Language of the Dark Web. NAACL-HLT 2022: 5621-5637 - [c51]Jinwoo Kim, Eduard Marin, Mauro Conti, Seungwon Shin:
EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation. NDSS 2022 - [i2]Youngjin Jin, Eugene Jang, Yongjae Lee, Seungwon Shin, Jin-Woo Chung:
Shedding New Light on the Language of the Dark Web. CoRR abs/2204.06885 (2022) - 2021
- [j21]Taejune Park, Seungwon Shin, Insik Shin, Kilho Lee:
Formullar: An FPGA-based network testing tool for flexible and precise measurement of ultra-low latency networking systems. Comput. Networks 185: 107689 (2021) - [j20]Taejune Park, Seungwon Shin:
Mobius: Packet Re-processing Hardware Architecture for Rich Policy Handling on a Network Processor. J. Netw. Syst. Manag. 29(1): 3 (2021) - [j19]Hwanjo Heo, Seungwon Shin:
Understanding Block and Transaction Logs of Permissionless Blockchain Networks. Secur. Commun. Networks 2021: 9549602:1-9549602:18 (2021) - [j18]Hyeonseong Jo, Jinwoo Kim, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin:
GapFinder: Finding Inconsistency of Security Information From Unstructured Text. IEEE Trans. Inf. Forensics Secur. 16: 86-99 (2021) - [j17]Jinwoo Kim, Jaehyun Nam, Suyeol Lee, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin:
BottleNet: Hiding Network Bottlenecks Using SDN-Based Topology Deception. IEEE Trans. Inf. Forensics Secur. 16: 3138-3153 (2021) - [c50]Taejune Park, Jaehyun Nam, Seung Ho Na, Jaewoong Chung, Seungwon Shin:
Reinhardt: Real-time Reconfigurable Hardware Architecture for Regular Expression Matching in DPI. ACSAC 2021: 620-633 - [c49]Hwanjo Heo, Seungwon Shin:
Behind Block Explorers: Public Blockchain Measurement and Security Implication. ICDCS 2021: 216-226 - [i1]Jian Cui, Kwanwoo Kim, Seung Ho Na, Seungwon Shin:
Hetero-SCAN: Towards Social Context Aware Fake News Detection via Heterogeneous Graph Neural Network. CoRR abs/2109.08022 (2021) - 2020
- [j16]Seungsoo Lee, Jinwoo Kim, Seungwon Woo, Changhoon Yoon, Sandra Scott-Hayward, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin:
A comprehensive security assessment framework for software-defined networks. Comput. Secur. 91: 101720 (2020) - [j15]Heedo Kang, Vinod Yegneswaran, Shalini Ghosh, Phillip A. Porras, Seungwon Shin:
Automated Permission Model Generation for Securing SDN Control-Plane. IEEE Trans. Inf. Forensics Secur. 15: 1668-1682 (2020) - [j14]Seokhyun Kim, Kimin Lee, Yeonkeun Kim, Jinwoo Shin, Seungwon Shin, Song Chong:
Dynamic Control for On-Demand Interference-Managed WLAN Infrastructures. IEEE/ACM Trans. Netw. 28(1): 84-97 (2020) - [c48]Seonyong Jeong, Seungwon Shin:
Efficient Network Administration for Smart Grid Data Center. ICACT 2020: 48-51 - [c47]Seungsoo Lee, Seungwon Woo, Jinwoo Kim, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin:
AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks. INFOCOM 2020: 1788-1797 - [c46]Jaehyun Nam, Seungsoo Lee, Hyunmin Seo, Phil Porras, Vinod Yegneswaran, Seungwon Shin:
BASTION: A Security Enforcement Network Stack for Container Networks. USENIX ATC 2020: 81-95
2010 – 2019
- 2019
- [j13]Heedo Kang, Changhoon Yoon, Seungwon Shin:
Astraea: Towards an effective and usable application permission system for SDN. Comput. Networks 155: 1-14 (2019) - [j12]Yeonkeun Kim, Jaehyun Nam, Taejune Park, Sandra Scott-Hayward, Seungwon Shin:
SODA: A software-defined security framework for IoT environments. Comput. Networks 163 (2019) - [j11]Kilho Lee, Minsu Kim, Taejune Park, Hoon Sung Chwa, Jinkyu Lee, Seungwon Shin, Insik Shin:
MC-SDN: Supporting Mixed-Criticality Real-Time Communication Using Software-Defined Networking. IEEE Internet Things J. 6(4): 6325-6344 (2019) - [j10]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies. IEEE Trans. Dependable Secur. Comput. 16(6): 913-914 (2019) - [j9]Jaehyun Nam, Hyeonseong Jo, Yeonkeun Kim, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin:
Operator-Defined Reconfigurable Network OS for Software-Defined Networks. IEEE/ACM Trans. Netw. 27(3): 1206-1219 (2019) - [c45]Anduo Wang, Seungwon Shin, Eduard C. Dragut:
Rethinking Network Policy Coordination: A Database Perspective. APNet 2019: 29-35 - [c44]Suyeol Lee, Junsik Seo, Jaehyun Nam, Seungwon Shin:
Poster: TCLP: Enforcing Least Privileges to Prevent Containers from Kernel Vulnerabilities. CCS 2019: 2665-2667 - [c43]Taejune Park, Yeonkeun Kim, Vinod Yegneswaran, Phillip A. Porras, Zhaoyan Xu, KyoungSoo Park, Seungwon Shin:
DPX: Data-Plane eXtensions for SDN Security Service Instantiation. DIMVA 2019: 415-437 - [c42]Seonyong Jeong, Yongjae Lee, Seungwon Shin:
Network Virtualization System for Smart Grid Data Acquisition System. ICACT 2019: 295-298 - [c41]Seunghyeon Lee, Changhoon Yoon, Heedo Kang, Yeonkeun Kim, Yongdae Kim, Dongsu Han, Sooel Son, Seungwon Shin:
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web. NDSS 2019 - [c40]Changhoon Yoon, Kwanwoo Kim, Yongdae Kim, Seungwon Shin, Sooel Son:
Doppelgängers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services. WWW 2019: 2225-2235 - [e4]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
SDN-NFV@CODASPY 2019 - roceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, Richardson, TX, USA, March 27, 2019. ACM 2019, ISBN 978-1-4503-6179-8 [contents] - 2018
- [j8]Yongjae Lee, Seunghyeon Lee, Hyunmin Seo, Changhoon Yoon, Seungwon Shin, Hyunsoo Yoon:
Duo: Software Defined Intrusion Tolerant System Using Dual Cluster. Secur. Commun. Networks 2018: 6751042:1-6751042:13 (2018) - [j7]Hyeonseong Jo, Jaehyun Nam, Seungwon Shin:
NOSArmor: Building a Secure Network Operating System. Secur. Commun. Networks 2018: 9178425:1-9178425:14 (2018) - [c39]Chanhee Lee, Seungwon Shin:
Fault Tolerance for Software-Defined Networking in Smart Grid. BigComp 2018: 705-708 - [c38]Hwanjo Heo, Seungwon Shin:
Who is knocking on the Telnet Port: A Large-Scale Empirical Study of Network Scanning. AsiaCCS 2018: 625-636 - [c37]Seung Ho Na, Kwanwoo Kim, Seungwon Shin:
Knowledge Seeking on The Shadow Brokers. CCS 2018: 2249-2251 - [c36]Yongjae Lee, Seungwon Shin:
Toward Semantic Assessment of Vulnerability Severity: A Text Mining Approach. CIKM Workshops 2018 - [c35]Seungwon Shin, Zhaoyan Xu, Yeonkeun Kim, Guofei Gu:
CloudRand: Building Heterogeneous and Moving-Target Network Interfaces. ICCCN 2018: 1-11 - [c34]Chanhee Lee, Changhoon Yoon, Seungwon Shin, Sang Kil Cha:
INDAGO: A New Framework For Detecting Malicious SDN Applications. ICNP 2018: 220-230 - [c33]Jaehyun Nam, Hyeonseong Jo, Yeonkeun Kim, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin:
Barista: An Event-centric NOS Composition Framework for Software-Defined Networks. INFOCOM 2018: 980-988 - [c32]Seungwon Woo, Seungsoo Lee, Jinwoo Kim, Seungwon Shin:
RE-CHECKER: Towards Secure RESTful Service in Software-Defined Networking. NFV-SDN 2018: 1-5 - [c31]Junsik Seo, Jaehyun Nam, Seungwon Shin:
Towards a Security-Enhanced Cloud Platform. PRDC 2018: 229-230 - [c30]Kilho Lee, Taejune Park, Minsu Kim, Hoon Sung Chwa, Jinkyu Lee, Seungwon Shin, Insik Shin:
MC-SDN: Supporting Mixed-Criticality Scheduling on Switched-Ethernet Using Software-Defined Networking. RTSS 2018: 288-299 - [c29]Heedo Kang, Seungwon Shin, Vinod Yegneswaran, Shalini Ghosh, Phillip A. Porras:
AEGIS: An Automated Permission Generation and Verification System for SDNs. SecSoN@SIGCOMM 2018: 20-26 - [c28]Taejune Park, Zhaoyan Xu, Seungwon Shin:
HEX Switch: Hardware-assisted security extensions of OpenFlow. SecSoN@SIGCOMM 2018: 33-39 - [c27]Jaehyun Nam, Junsik Seo, Seungwon Shin:
Probius: Automated Approach for VNF and Service Chain Analysis in Software-Defined NFV. SOSR 2018: 14:1-14:13 - [e3]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018. ACM 2018 [contents] - 2017
- [j6]Changhoon Yoon, Seungsoo Lee, Heedo Kang, Taejune Park, Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
Flow Wars: Systemizing the Attack Surface and Defenses in Software-Defined Networks. IEEE/ACM Trans. Netw. 25(6): 3514-3530 (2017) - [c26]Changhoon Yoon, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Heedo Kang, Martin W. Fong, Brian O'Connor, Thomas Vachuska:
A Security-Mode for Carrier-Grade SDN Controllers. ACSAC 2017: 461-473 - [c25]Jaehyun Nam, Hyeonseong Jo, Yeonkeun Kim, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin:
Bridging the architectural gap between NOS design principles in software-defined networks. SoCC 2017: 637 - [c24]Jinwoo Kim, Seungwon Shin:
Software-Defined HoneyNet: Towards Mitigating Link Flooding Attacks. DSN Workshops 2017: 99-100 - [c23]Seunghyeon Lee, Jinwoo Kim, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran:
Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks. DSN 2017: 249-260 - [c22]Sangyup Han, Jaehyun Park, Haeun Kim, Jaehee Ha, Seungwon Shin, Sungwon Kang, Myungchul Kim:
Mobility of Everything (MoE): An Integrated and Distributed Mobility Management. ICCCN 2017: 1-11 - [c21]Seungsoo Lee, Changhoon Yoon, Chanhee Lee, Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras:
DELTA: A Security Assessment Framework for Software-Defined Networks. NDSS 2017 - [e2]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017. ACM 2017, ISBN 978-1-4503-4908-6 [contents] - 2016
- [j5]Jiseong Noh, Seunghyeon Lee, Jaehyun Park, Seungwon Shin, Brent ByungHoon Kang:
Vulnerabilities of network OS and mitigation with state-based permission system. Secur. Commun. Networks 9(13): 1971-1982 (2016) - [c20]Xiang Pan, Vinod Yegneswaran, Yan Chen, Phillip A. Porras, Seungwon Shin:
HogMap: Using SDNs to Incentivize Collaborative Security Monitoring. SDN-NFV@CODASPY 2016: 7-12 - [c19]Taejune Park, Yeonkeun Kim, Seungwon Shin:
UNISAFE: A Union of Security Actions for Software Switches. SDN-NFV@CODASPY 2016: 13-18 - [c18]Seungsoo Lee, Changhoon Yoon, Seungwon Shin:
The Smaller, the Shrewder: A Simple Malicious Application Can Kill an Entire SDN Environment. SDN-NFV@CODASPY 2016: 23-28 - [c17]Chanhee Lee, Seungwon Shin:
SHIELD: An Automated Framework for Static Analysis of SDN Applications. SDN-NFV@CODASPY 2016: 29-34 - [c16]Taejune Park, Yeonkeun Kim, Jaehyun Park, Hyunmin Suh, Byeongdo Hong, Seungwon Shin:
QoSE: Quality of security a network security framework with distributed NFV. ICC 2016: 1-6 - [c15]Seungwon Shin, Lei Xu, Sungmin Hong, Guofei Gu:
Enhancing Network Security through Software Defined Networking (SDN). ICCCN 2016: 1-9 - [e1]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFV@CODASPY 2016, New Orleans, LA, USA, March 11, 2016. ACM 2016, ISBN 978-1-4503-4078-6 [contents] - 2015
- [j4]Changhoon Yoon, Taejune Park, Seungsoo Lee, Heedo Kang, Seungwon Shin, Zonghua Zhang:
Enabling security functions with SDN: A feasibility study. Comput. Networks 85: 19-35 (2015) - [j3]Seungwon Shin, Haopei Wang, Guofei Gu:
A First Step Toward Network Security Virtualization: From Concept To Prototype. IEEE Trans. Inf. Forensics Secur. 10(10): 2236-2249 (2015) - [c14]Heedo Kang, Seungsoo Lee, Chanhee Lee, Changhoon Yoon, Seungwon Shin:
SPIRIT: A Framework for Profiling SDN. ICNP 2015: 417-424 - [c13]Chanwoo Bae, Jesung Jung, Jaehyun Nam, Seungwon Shin:
POSTER: A Collaborative Approach on Behavior-Based Android Malware Detection. SecureComm 2015: 594-597 - 2014
- [c12]Seungwon Shin, YongJoo Song, Taekyung Lee, Sangho Lee, Jaewoong Chung, Phillip A. Porras, Vinod Yegneswaran, Jiseong Noh, Brent ByungHoon Kang:
Rosemary: A Robust, Secure, and High-performance Network Operating System. CCS 2014: 78-89 - [c11]Il-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, Myungchul Kim:
Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks. RAID 2014: 362-383 - 2013
- [j2]Seungwon Shin, Zhaoyan Xu, Guofei Gu:
EFFORT: A new host-network cooperated framework for efficient and effective bot malware detection. Comput. Networks 57(13): 2628-2642 (2013) - [c10]Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks. CCS 2013: 413-424 - [c9]Sooel Son, Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
Model checking invariant security properties in OpenFlow. ICC 2013: 1974-1979 - [c8]Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, Guofei Gu, Mabry Tyson:
FRESCO: Modular Composable Security Services for Software-Defined Networks. NDSS 2013 - [c7]Seungwon Shin, Guofei Gu:
Attacking software-defined networks: a first feasibility study. HotSDN 2013: 165-166 - 2012
- [j1]Seungwon Shin, Guofei Gu, A. L. Narasimha Reddy, Christopher P. Lee:
A Large-Scale Empirical Study of Conficker. IEEE Trans. Inf. Forensics Secur. 7(2): 676-690 (2012) - [c6]Seungwon Shin, Guofei Gu:
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?). ICNP 2012: 1-6 - [c5]Seungwon Shin, Zhaoyan Xu, Guofei Gu:
EFFORT: Efficient and effective bot malware detection. INFOCOM 2012: 2846-2850 - [c4]Phillip A. Porras, Seungwon Shin, Vinod Yegneswaran, Martin W. Fong, Mabry Tyson, Guofei Gu:
A security enforcement kernel for OpenFlow networks. HotSDN@SIGCOMM 2012: 121-126 - [c3]Chao Yang, Robert Chandler Harkreader, Jialong Zhang, Seungwon Shin, Guofei Gu:
Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. WWW 2012: 71-80 - 2011
- [c2]Seungwon Shin, Raymond Lin, Guofei Gu:
Cross-Analysis of Botnet Victims: New Insights and Implications. RAID 2011: 242-261 - 2010
- [c1]Seungwon Shin, Guofei Gu:
Conficker and beyond: a large-scale empirical study. ACSAC 2010: 151-160
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint