default search action
Sooel Son
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Hoyong Jeong, Kiwon Chung, Sung Ju Hwang, Sooel Son:
Targeted Model Inversion: Distilling style encoded in predictions. Comput. Secur. 144: 103967 (2024) - 2023
- [j4]Suyoung Lee, Wonho Song, Suman Jana, Meeyoung Cha, Sooel Son:
Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks. IEEE Trans. Dependable Secur. Comput. 20(4): 3434-3448 (2023) - [j3]Juhyeng Han, Insu Yun, Seongmin Kim, Taesoo Kim, Sooel Son, Dongsu Han:
Scalable and Secure Virtualization of HSM With ScaleTrust. IEEE/ACM Trans. Netw. 31(4): 1595-1610 (2023) - [j2]Dongkwan Kim, Eunsoo Kim, Sang Kil Cha, Sooel Son, Yongdae Kim:
Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned. IEEE Trans. Software Eng. 49(4): 1661-1682 (2023) - [c33]Changmin Lee, Sooel Son:
AdCPG: Classifying JavaScript Code Property Graphs with Explanations for Ad and Tracker Blocking. CCS 2023: 3505-3518 - [c32]Byungjoo Kim, Suyoung Lee, Seanie Lee, Sooel Son, Sung Ju Hwang:
Margin-based Neural Network Watermarking. ICML 2023: 16696-16711 - [c31]Seongil Wi, Trung Tin Nguyen, Jihwan Kim, Ben Stock, Sooel Son:
DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement through Differential Testing. NDSS 2023 - [c30]Minseon Kim, Hyeonjeong Ha, Sooel Son, Sung Ju Hwang:
Effective Targeted Attacks for Adversarial Self-Supervised Learning. NeurIPS 2023 - [c29]Dongwon Shin, Suyoung Lee, Sooel Son:
RICC: Robust Collective Classification of Sybil Accounts. WWW 2023: 2329-2339 - 2022
- [j1]Myoungsung You, Yeonkeun Kim, Jaehan Kim, Minjae Seo, Sooel Son, Seungwon Shin, Seungsoo Lee:
FuzzDocs: An Automated Security Evaluation Framework for IoT. IEEE Access 10: 102406-102420 (2022) - [c28]Joongyum Kim, Jihwan Kim, Seongil Wi, Yongdae Kim, Sooel Son:
HearMeOut: detecting voice phishing activities in Android. MobiSys 2022: 422-435 - [c27]Hoyong Jeong, Suyoung Lee, Sung Ju Hwang, Sooel Son:
Learning to Generate Inversion-Resistant Model Explanations. NeurIPS 2022 - [c26]Sunnyeo Park, Daejun Kim, Suman Jana, Sooel Son:
FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities. USENIX Security Symposium 2022: 197-214 - [c25]Sangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee, Sooel Son, Yongdae Kim:
Watching the Watchers: Practical Video Identification Attack in LTE Networks. USENIX Security Symposium 2022: 1307-1324 - [c24]Soyoung Lee, Seongil Wi, Sooel Son:
Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning. WWW 2022: 743-754 - [c23]Seongil Wi, Sijae Woo, Joyce Jiyoung Whang, Sooel Son:
HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs. WWW 2022: 755-766 - [i5]Minseon Kim, Hyeonjeong Ha, Sooel Son, Sung Ju Hwang:
Targeted Adversarial Self-Supervised Learning. CoRR abs/2210.10482 (2022) - 2021
- [c22]Doowon Kim, Haehyun Cho, Yonghwi Kwon, Adam Doupé, Sooel Son, Gail-Joon Ahn, Tudor Dumitras:
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem. AsiaCCS 2021: 407-420 - [c21]Joongyum Kim, Junghwan Park, Sooel Son:
The Abuser Inside Apps: Finding the Culprit Committing Mobile Ad Fraud. NDSS 2021 - [c20]Hyunjoo Lee, Jiyeon Lee, Daejun Kim, Suman Jana, Insik Shin, Sooel Son:
AdCube: WebVR Ad Fraud and Practical Confinement of Third-Party Ads. USENIX Security Symposium 2021: 2543-2560 - [i4]Suyoung Lee, Wonho Song, Suman Jana, Meeyoung Cha, Sooel Son:
Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks. CoRR abs/2106.10147 (2021) - 2020
- [c19]Jeongmin Kim, Steven Y. Ko, Sooel Son, Dongsu Han:
Lumos: Improving Smart Home IoT Visibility and Interoperability Through Analyzing Mobile Apps. ICNP 2020: 1-13 - [c18]Taekjin Lee, Seongil Wi, Suyoung Lee, Sooel Son:
FUSE: Finding File Upload Bugs via Penetration Testing. NDSS 2020 - [c17]Suyoung Lee, HyungSeok Han, Sang Kil Cha, Sooel Son:
Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer. USENIX Security Symposium 2020: 2613-2630 - [i3]Suyoung Lee, HyungSeok Han, Sang Kil Cha, Sooel Son:
Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer. CoRR abs/2001.04107 (2020) - [i2]Dongkwan Kim, Eunsoo Kim, Sang Kil Cha, Sooel Son, Yongdae Kim:
Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned. CoRR abs/2011.10749 (2020) - [i1]Byunggill Joe, Jihun Hamm, Sung Ju Hwang, Sooel Son, Insik Shin:
Learning to Separate Clusters of Adversarial Representations for Robust Adversarial Detection. CoRR abs/2012.03483 (2020)
2010 – 2019
- 2019
- [c16]Sunnyeo Park, Dohyeok Kim, Sooel Son:
An Empirical Study of Prioritizing JavaScript Engine Crashes via Machine Learning. AsiaCCS 2019: 646-657 - [c15]Seunghyeon Lee, Changhoon Yoon, Heedo Kang, Yeonkeun Kim, Yongdae Kim, Dongsu Han, Sooel Son, Seungwon Shin:
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web. NDSS 2019 - [c14]Hyuntae Kim, Seongil Wi, Hyunjoo Lee, Sooel Son:
FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking. WISA 2019: 41-54 - [c13]Sangwook Bae, Mincheol Son, Sooel Son, Yongdae Kim:
Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models. HotMobile 2019: 75-80 - [c12]Sangsup Lee, Daejun Kim, Dongkwan Kim, Sooel Son, Yongdae Kim:
Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO. WOOT @ USENIX Security Symposium 2019 - [c11]Changhoon Yoon, Kwanwoo Kim, Yongdae Kim, Seungwon Shin, Sooel Son:
Doppelgängers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services. WWW 2019: 2225-2235 - 2018
- [c10]Jiyeon Lee, Hayeon Kim, Junghwan Park, Insik Shin, Sooel Son:
Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications. CCS 2018: 1731-1746 - 2016
- [c9]Sooel Son, Daehyeok Kim, Vitaly Shmatikov:
What Mobile Ads Know About Mobile Users. NDSS 2016 - 2013
- [c8]Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov:
Diglossia: detecting code injection attacks with precision and efficiency. CCS 2013: 1181-1192 - [c7]Sooel Son, Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
Model checking invariant security properties in OpenFlow. ICC 2013: 1974-1979 - [c6]Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov:
Fix Me Up: Repairing Access-Control Bugs in Web Applications. NDSS 2013 - [c5]Sooel Son, Vitaly Shmatikov:
The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites. NDSS 2013 - 2011
- [c4]Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov:
RoleCast: finding missing security checks when you do not know what checks are. OOPSLA 2011: 1069-1084 - [c3]Sooel Son, Vitaly Shmatikov:
SAFERPHP: finding semantic vulnerabilities in PHP applications. PLAS 2011: 8 - 2010
- [c2]Sooel Son, Vitaly Shmatikov:
The Hitchhiker's Guide to DNS Cache Poisoning. SecureComm 2010: 466-483
2000 – 2009
- 2008
- [c1]Taehwan Choi, Sooel Son, Mohamed G. Gouda, Jorge Arturo Cobb:
Pharewell to Phishing. SSS 2008: 233-245
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint