default search action
Jaeyeon Jung
Person information
- affiliation: MIT, Cambridge, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c41]Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash:
Decentralized Action Integrity for Trigger-Action IoT Platforms. NDSS 2018 - 2017
- [j10]Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash:
Security Implications of Permission Models in Smart-Home Application Frameworks. IEEE Secur. Priv. 15(2): 24-30 (2017) - [c40]Taehun Kim, Hyeonmin Ha, Seoyoon Choi, Jaeyeon Jung, Byung-Gon Chun:
Breaking Ad-hoc Runtime Integrity Protection Mechanisms in Android Financial Apps. AsiaCCS 2017: 179-192 - [i2]Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash:
Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms for the Internet of Things. CoRR abs/1707.00405 (2017) - [i1]Amir Rahmati, Earlence Fernandes, Jaeyeon Jung, Atul Prakash:
IFTTT vs. Zapier: A Comparative Study of Trigger-Action Programming Frameworks. CoRR abs/1709.02788 (2017) - 2016
- [c39]Earlence Fernandes, Jaeyeon Jung, Atul Prakash:
Security Analysis of Emerging Smart Home Applications. IEEE Symposium on Security and Privacy 2016: 636-654 - 2015
- [e2]Jaeyeon Jung, Thorsten Holz:
24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015. USENIX Association 2015 [contents] - 2014
- [j9]William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D. McDaniel, Anmol Sheth:
TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones. Commun. ACM 57(3): 99-106 (2014) - [j8]William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D. McDaniel, Anmol N. Sheth:
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. ACM Trans. Comput. Syst. 32(2): 5:1-5:29 (2014) - [c38]Blase Ur, Jaeyeon Jung, Stuart E. Schechter:
Intruders versus intrusiveness: teens' and parents' perspectives on home-entryway surveillance. UbiComp 2014: 129-139 - [c37]Jaeyeon Jung, Tadayoshi Kohno:
Workshop on usable privacy & security for wearable and domestic ubiquitous devices (UPSIDE). UbiComp Adjunct 2014: 1279-1282 - [c36]Jaeyeon Jung, Matthai Philipose:
Courteous glass. UbiComp Adjunct 2014: 1307-1312 - [c35]Chun-Te Chu, Jaeyeon Jung, Zhicheng Liu, Ratul Mahajan:
sTrack: Secure Tracking in Community Surveillance. ACM Multimedia 2014: 837-840 - [c34]Trinabh Gupta, Rayman Preet Singh, Amar Phanishayee, Jaeyeon Jung, Ratul Mahajan:
Bolt: Data Management for Connected Homes. NSDI 2014: 243-256 - [c33]Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang, David Wetherall:
Brahmastra: Driving Apps to Test the Security of Third-Party Components. USENIX Security Symposium 2014: 1021-1036 - [e1]Kevin Fu, Jaeyeon Jung:
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014. USENIX Association 2014 [contents] - 2013
- [c32]A. J. Bernheim Brush, Jaeyeon Jung, Ratul Mahajan, Frank Martinez:
Digital neighborhood watch: investigating the sharing of camera data amongst neighbors. CSCW 2013: 693-700 - [c31]A. J. Bernheim Brush, Evgeni Filippov, Danny Huang, Jaeyeon Jung, Ratul Mahajan, Frank Martinez, Khurshed Mazhar, Amar Phanishayee, Arjmand Samuel, James Scott, Rayman Preet Singh:
Lab of things: a platform for conducting studies with connected devices in multiple homes. UbiComp (Adjunct Publication) 2013: 35-38 - [c30]Eun Kyoung Choe, Jaeyeon Jung, Bongshin Lee, Kristie J. Fisher:
Nudging People Away from Privacy-Invasive Mobile Apps through Visual Framing. INTERACT (3) 2013: 74-91 - [c29]Rebecca Balebako, Jaeyeon Jung, Wei Lu, Lorrie Faith Cranor, Carolyn Nguyen:
"Little brothers watching you": raising awareness of data leaks on smartphones. SOUPS 2013: 12:1-12:11 - [c28]Benjamin Livshits, Jaeyeon Jung:
Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications. USENIX Security Symposium 2013: 113-130 - 2012
- [c27]Miro Enev, Jaeyeon Jung, Liefeng Bo, Xiaofeng Ren, Tadayoshi Kohno:
SensorSift: balancing sensor data privacy and utility in automated face understanding. ACSAC 2012: 149-158 - [c26]Jaeyeon Jung, Seungyeop Han, David Wetherall:
Short paper: enhancing mobile application permissions with runtime feedback and constraints. SPSM@CCS 2012: 45-50 - [c25]Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman M. Sadeh, David Wetherall:
A Conundrum of Permissions: Installing Applications on an Android Smartphone. Financial Cryptography Workshops 2012: 68-79 - [c24]Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly L. Harrison, Shwetak N. Patel, Julie A. Kientz:
Investigating receptiveness to sensing and inference in the home using sensor proxies. UbiComp 2012: 61-70 - [c23]A. J. Bernheim Brush, Jaeyeon Jung, Ratul Mahajan, James Scott:
HomeLab: shared infrastructure for home technology field studies. UbiComp 2012: 1108-1113 - 2011
- [j7]David (Yu) Zhu, Jaeyeon Jung, Dawn Song, Tadayoshi Kohno, David Wetherall:
TaintEraser: protecting sensitive data leaks using application-level taint tracking. ACM SIGOPS Oper. Syst. Rev. 45(1): 142-154 (2011) - [c22]Peter Hornyack, Seungyeop Han, Jaeyeon Jung, Stuart E. Schechter, David Wetherall:
These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. CCS 2011: 639-652 - [c21]David Wetherall, David R. Choffnes, Ben Greenstein, Seungyeop Han, Peter Hornyack, Jaeyeon Jung, Stuart E. Schechter, Xiao Sophia Wang:
Privacy Revelations for Web and Mobile Apps. HotOS 2011 - [c20]Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly L. Harrison, Julie A. Kientz:
Living in a glass house: a survey of private moments in the home. UbiComp 2011: 41-44 - [c19]Peter Gilbert, Jaeyeon Jung, Kyungmin Lee, Henry Qin, Daniel Sharkey, Anmol Sheth, Landon P. Cox:
YouProve: authenticity and fidelity in mobile sensing. SenSys 2011: 176-189 - [c18]Gabriel Maganis, Jaeyeon Jung, Tadayoshi Kohno, Anmol Sheth, David Wetherall:
Sensor tricorder: what does that sensor know about me? HotMobile 2011: 98-103 - 2010
- [c17]Sunny Consolvo, Jaeyeon Jung, Ben Greenstein, Pauline S. Powledge, Gabriel Maganis, Daniel Avrahami:
The Wi-Fi privacy ticker: improving awareness & control of personal information exposure on Wi-Fi. UbiComp 2010: 321-330 - [c16]William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D. McDaniel, Anmol Sheth:
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. OSDI 2010: 393-407 - [c15]Peter Gilbert, Landon P. Cox, Jaeyeon Jung, David Wetherall:
Toward trustworthy mobile sensing. HotMobile 2010: 31-36
2000 – 2009
- 2009
- [c14]Predrag V. Klasnja, Sunny Consolvo, Jaeyeon Jung, Benjamin Greenstein, Louis LeGrand, Pauline S. Powledge, David Wetherall:
"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use. CHI 2009: 1993-2002 - [c13]Maria Konte, Nick Feamster, Jaeyeon Jung:
Dynamics of Online Scam Hosting Infrastructure. PAM 2009: 219-228 - 2008
- [j6]Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson:
On the adaptive real-time detection of fast-propagating network worms. J. Comput. Virol. 4(3): 197-210 (2008) - [c12]Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David Wetherall, Gabriel Maganis, Tadayoshi Kohno:
Privacy oracle: a system for finding application leaks with black box differential testing. CCS 2008: 279-288 - 2007
- [c11]Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson:
On the Adaptive Real-Time Detection of Fast-Propagating Network Worms. DIMVA 2007: 175-192 - [c10]Roxana Geambasu, Tanya Bragin, Jaeyeon Jung, Magdalena Balazinska:
On-Demand View Materialization and Indexing for Network Forensic Analysis. NetDB 2007 - 2006
- [b1]Jaeyeon Jung:
Real-time detection of malicious network activity using stochastic models. Massachusetts Institute of Technology, Cambridge, MA, USA, 2006 - [c9]Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Can Emre Koksal:
Semi-automated discovery of application session structure. Internet Measurement Conference 2006: 119-132 - [c8]Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan:
Malware prevalence in the KaZaA file-sharing network. Internet Measurement Conference 2006: 333-338 - [c7]Stuart E. Schechter, Jaeyeon Jung, Will Stockwell, Cynthia D. McLain:
Inoculating SSH Against Address Harvesting. NDSS 2006 - 2004
- [j5]Nick Feamster, Jaeyeon Jung, Hari Balakrishnan:
An empirical study of "bogon" route advertisements. Comput. Commun. Rev. 35(1): 63-70 (2004) - [c6]Jaeyeon Jung, Emil Sit:
An empirical study of spam traffic and the use of DNS black lists. Internet Measurement Conference 2004: 370-375 - [c5]Stuart E. Schechter, Jaeyeon Jung, Arthur W. Berger:
Fast Detection of Scanning Worm Infections. RAID 2004: 59-81 - [c4]Jaeyeon Jung, Vern Paxson, Arthur W. Berger, Hari Balakrishnan:
Fast Portscan Detection Using Sequential Hypothesis Testing. S&P 2004: 211-225 - 2003
- [c3]Jaeyeon Jung, Arthur W. Berger, Hari Balakrishnan:
Modelling TTL-based Internet Caches. INFOCOM 2003: 417-426 - 2002
- [j4]Jaeyeon Jung, Emil Sit, Hari Balakrishnan, Robert Tappan Morris:
DNS performance and the effectiveness of caching. Comput. Commun. Rev. 32(1): 74 (2002) - [j3]Jaeyeon Jung, Emil Sit, Hari Balakrishnan, Robert Tappan Morris:
DNS performance and the effectiveness of caching. IEEE/ACM Trans. Netw. 10(5): 589-603 (2002) - [c2]Jaeyeon Jung, Balachander Krishnamurthy, Michael Rabinovich:
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. WWW 2002: 293-304 - 2001
- [c1]Jaeyeon Jung, Emil Sit, Hari Balakrishnan, Robert Tappan Morris:
DNS performance and the effectiveness of caching. Internet Measurement Workshop 2001: 153-167 - 2000
- [j2]Jaeyeon Jung, Dongman Lee, Kilnam Chon:
Proactive Web caching with cumulative prefetching for large multimedia data. Comput. Networks 33(1-6): 645-655 (2000)
1990 – 1999
- 1998
- [j1]Bradley Huffaker, Jaeyeon Jung, Evi Nemeth, Duane Wessels, Kimberly C. Claffy:
Visualization of the Growth and Topology of the NLANR Caching Hierarchy. Comput. Networks 30(22-23): 2131-2139 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint