Jaeyeon Jung

Affiliations:
  • MIT, Cambridge, USA


According to our database1, Jaeyeon Jung authored at least 51 papers between 1998 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
Decentralized Action Integrity for Trigger-Action IoT Platforms.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Security Implications of Permission Models in Smart-Home Application Frameworks.
IEEE Secur. Priv., 2017

IFTTT vs. Zapier: A Comparative Study of Trigger-Action Programming Frameworks.
CoRR, 2017

Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms for the Internet of Things.
CoRR, 2017

Breaking Ad-hoc Runtime Integrity Protection Mechanisms in Android Financial Apps.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Security Analysis of Emerging Smart Home Applications.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2014
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.
ACM Trans. Comput. Syst., 2014

TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones.
Commun. ACM, 2014

Brahmastra: Driving Apps to Test the Security of Third-Party Components.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Bolt: Data Management for Connected Homes.
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, 2014

sTrack: Secure Tracking in Community Surveillance.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

Intruders versus intrusiveness: teens' and parents' perspectives on home-entryway surveillance.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Courteous glass.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Workshop on usable privacy & security for wearable and domestic ubiquitous devices (UPSIDE).
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

2013
Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

"Little brothers watching you": raising awareness of data leaks on smartphones.
Proceedings of the Symposium On Usable Privacy and Security, 2013

Nudging People Away from Privacy-Invasive Mobile Apps through Visual Framing.
Proceedings of the Human-Computer Interaction - INTERACT 2013, 2013

Lab of things: a platform for conducting studies with connected devices in multiple homes.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Digital neighborhood watch: investigating the sharing of camera data amongst neighbors.
Proceedings of the Computer Supported Cooperative Work, 2013

2012
Investigating receptiveness to sensing and inference in the home using sensor proxies.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

HomeLab: shared infrastructure for home technology field studies.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

A Conundrum of Permissions: Installing Applications on an Android Smartphone.
Proceedings of the Financial Cryptography and Data Security, 2012

Short paper: enhancing mobile application permissions with runtime feedback and constraints.
Proceedings of the SPSM'12, 2012

SensorSift: balancing sensor data privacy and utility in automated face understanding.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
TaintEraser: protecting sensitive data leaks using application-level taint tracking.
ACM SIGOPS Oper. Syst. Rev., 2011

Sensor tricorder: what does that sensor know about me?
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

YouProve: authenticity and fidelity in mobile sensing.
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011

Living in a glass house: a survey of private moments in the home.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011

Privacy Revelations for Web and Mobile Apps.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

These aren't the droids you're looking for: retrofitting android to protect data from imperious applications.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Toward trustworthy mobile sensing.
Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, 2010

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

The Wi-Fi privacy ticker: improving awareness & control of personal information exposure on Wi-Fi.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

2009
Dynamics of Online Scam Hosting Infrastructure.
Proceedings of the Passive and Active Network Measurement, 10th International Conference, 2009

"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
On the adaptive real-time detection of fast-propagating network worms.
J. Comput. Virol., 2008

Privacy oracle: a system for finding application leaks with black box differential testing.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
On-Demand View Materialization and Indexing for Network Forensic Analysis.
Proceedings of the Third International Workshop on Networking Meets Databases, 2007

2006
Real-time detection of malicious network activity using stochastic models.
PhD thesis, 2006

Inoculating SSH Against Address Harvesting.
Proceedings of the Network and Distributed System Security Symposium, 2006

Malware prevalence in the KaZaA file-sharing network.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

Semi-automated discovery of application session structure.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

2004
An empirical study of "bogon" route advertisements.
Comput. Commun. Rev., 2004

Fast Portscan Detection Using Sequential Hypothesis Testing.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Fast Detection of Scanning Worm Infections.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

An empirical study of spam traffic and the use of DNS black lists.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

2003
Modelling TTL-based Internet Caches.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

2002
DNS performance and the effectiveness of caching.
Comput. Commun. Rev., 2002

Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites.
Proceedings of the Eleventh International World Wide Web Conference, 2002

2000
Proactive Web caching with cumulative prefetching for large multimedia data.
Comput. Networks, 2000

1998
Visualization of the Growth and Topology of the NLANR Caching Hierarchy.
Comput. Networks, 1998


  Loading...