Æȷοì
Sooel Son
Sooel Son
kaist.ac.krÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Model checking invariant security properties in OpenFlow
S Son, S Shin, V Yegneswaran, P Porras, G Gu
2013 IEEE international conference on communications (ICC), 1974-1979, 2013
2322013
The hitchhiker¡¯s guide to DNS cache poisoning
S Son, V Shmatikov
Security and Privacy in Communication Networks: 6th Iternational ICST ¡¦, 2010
1782010
What Mobile Ads Know About Mobile Users.
S Son, D Kim, V Shmatikov
Ndss, 2016
1362016
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web
SS Seunghyeon Lee, Changhoon Yoon, Heedo Kang, Yeonkeun Kim, Yongdae Kim ...
Network & Distributed System Security Symposium 2019, 2019
1172019
Rolecast: finding missing security checks when you do not know what checks are
S Son, KS McKinley, V Shmatikov
Proceedings of the 2011 ACM international conference on Object oriented ¡¦, 2011
1152011
Montage: A neural network language {Model-Guided}{JavaScript} engine fuzzer
S Lee, HS Han, SK Cha, S Son
29th USENIX Security Symposium (USENIX Security 20), 2613-2630, 2020
1122020
Fix Me Up: Repairing Access-Control Bugs in Web Applications.
S Son, KS McKinley, V Shmatikov
NDSS, 2013
1052013
The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites.
S Son, V Shmatikov
NDSS, 2013
1022013
Diglossia: detecting code injection attacks with precision and efficiency
S Son, KS McKinley, V Shmatikov
Proceedings of the 2013 ACM SIGSAC conference on computer & communications ¡¦, 2013
1012013
SAFERPHP: Finding semantic vulnerabilities in PHP applications
S Son, V Shmatikov
Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and ¡¦, 2011
862011
Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned
D Kim, E Kim, SK Cha, S Son, Y Kim
IEEE Transactions on Software Engineering 49 (4), 1661-1682, 2022
622022
Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications
J Lee, H Kim, J Park, I Shin, S Son
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications ¡¦, 2018
612018
{FUGIO}: Automatic Exploit Generation for {PHP} Object Injection Vulnerabilities
S Park, D Kim, S Jana, S Son
31st USENIX Security Symposium (USENIX Security 22), 197-214, 2022
312022
Doppelgängers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services
SS C Yoon, K Kim, Y Kim, S Shin
The World Wide Web Conference, 2225--2235, 2019
312019
FUSE: Finding File Upload Bugs via Penetration Testing.
T Lee, S Wi, S Lee, S Son
NDSS, 2020
282020
Link: Black-box detection of cross-site scripting vulnerabilities using reinforcement learning
S Lee, S Wi, S Son
Proceedings of the ACM Web Conference 2022, 743-754, 2022
262022
Who Spent My {EOS}? On the ({In) Security} of Resource Management of {EOS. IO}
S Lee, D Kim, D Kim, S Son, Y Kim
13th USENIX workshop on offensive technologies (WOOT 19), 2019
262019
Watching the watchers: Practical video identification attack in {LTE} networks
S Bae, M Son, D Kim, CJ Park, J Lee, S Son, Y Kim
31st USENIX Security Symposium (USENIX Security 22), 1307-1324, 2022
212022
{AdCube}:{WebVR} Ad Fraud and Practical Confinement of {Third-Party} Ads
H Lee, J Lee, D Kim, S Jana, I Shin, S Son
30th USENIX Security Symposium (USENIX Security 21), 2543-2560, 2021
212021
Security analysis on practices of certificate authorities in the HTTPS phishing ecosystem
D Kim, H Cho, Y Kwon, A Doupé, S Son, GJ Ahn, T Dumitras
Proceedings of the 2021 ACM Asia Conference on Computer and Communications ¡¦, 2021
172021
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20