Seungwon Shin

Orcid: 0000-0002-1077-5606

According to our database1, Seungwon Shin authored at least 113 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Ignore Me But Don't Replace Me: Utilizing Non-Linguistic Elements for Pretraining on the Cybersecurity Domain.
CoRR, 2024

2023
AVX-TSCHA: Leaking information through AVX extensions in commercial processors.
Comput. Secur., November, 2023

Secure Inter-Container Communications Using XDP/eBPF.
IEEE/ACM Trans. Netw., April, 2023

DRAINCLoG: Detecting Rogue Accounts with Illegally-obtained NFTs using Classifiers Learned on Graphs.
CoRR, 2023

Extended data plane architecture for in-network security services in software-defined networks.
Comput. Secur., 2023

Witnessing Erosion of Membership Inference Defenses: Understanding Effects of Data Drift in Membership Privacy.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Partitioning Ethereum without Eclipsing It.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Evolving Bots: The New Generation of Comment Bots and their Underlying Scam Campaigns in YouTube.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

AVX Timing Side-Channel Attacks against Address Space Layout Randomization.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

HELIOS: Hardware-assisted High-performance Security Extension for Cloud Networking.
Proceedings of the 2023 ACM Symposium on Cloud Computing, SoCC 2023, 2023

Cryonics: Trustworthy Function-as-a-Service using Snapshot-based Enclaves.
Proceedings of the 2023 ACM Symposium on Cloud Computing, SoCC 2023, 2023

DarkBERT: A Language Model for the Dark Side of the Internet.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
<i>Verikube</i>: Automatic and Efficient Verification for Container Network Policies.
IEICE Trans. Inf. Syst., December, 2022

A Framework for Policy Inconsistency Detection in Software-Defined Networks.
IEEE/ACM Trans. Netw., 2022

Reconfigurable regular expression matching architecture for real-time pattern update and payload inspection.
J. Netw. Comput. Appl., 2022

Discovering Message Templates on Large Scale Bitcoin Abuse Reports Using a Two-Fold NLP-Based Clustering Method.
IEICE Trans. Inf. Syst., 2022

A Large-Scale Bitcoin Abuse Measurement and Clustering Analysis Utilizing Public Reports.
IEICE Trans. Inf. Syst., 2022

Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text.
Comput. Secur., 2022

FuzzDocs: An Automated Security Evaluation Framework for IoT.
IEEE Access, 2022

A Comprehensive Analysis of Today's Malware and Its Distribution Network: Common Adversary Strategies and Implications.
IEEE Access, 2022

EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Shedding New Light on the Language of the Dark Web.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022

MECaNIC: SmartNIC to Assist URLLC Processing in Multi-Access Edge Computing Platforms.
Proceedings of the 30th IEEE International Conference on Network Protocols, 2022

Meta-Path-based Fake News Detection Leveraging Multi-level Social Context Information.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

Heimdallr: Fingerprinting SD-WAN Control-Plane Architecture via Encrypted Control Traffic.
Proceedings of the Annual Computer Security Applications Conference, 2022

Closing the Loophole: Rethinking Reconstruction Attacks in Federated Learning from a Privacy Standpoint.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
BottleNet: Hiding Network Bottlenecks Using SDN-Based Topology Deception.
IEEE Trans. Inf. Forensics Secur., 2021

GapFinder: Finding Inconsistency of Security Information From Unstructured Text.
IEEE Trans. Inf. Forensics Secur., 2021

Understanding Block and Transaction Logs of Permissionless Blockchain Networks.
Secur. Commun. Networks, 2021

Mobius: Packet Re-processing Hardware Architecture for Rich Policy Handling on a Network Processor.
J. Netw. Syst. Manag., 2021

Hetero-SCAN: Towards Social Context Aware Fake News Detection via Heterogeneous Graph Neural Network.
CoRR, 2021

Formullar: An FPGA-based network testing tool for flexible and precise measurement of ultra-low latency networking systems.
Comput. Networks, 2021

Interaction Design of Asthma Inhaler Assistant Device.
Proceedings of Sixth International Congress on Information and Communication Technology, 2021

Behind Block Explorers: Public Blockchain Measurement and Security Implication.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Reinhardt: Real-time Reconfigurable Hardware Architecture for Regular Expression Matching in DPI.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Dynamic Control for On-Demand Interference-Managed WLAN Infrastructures.
IEEE/ACM Trans. Netw., 2020

Automated Permission Model Generation for Securing SDN Control-Plane.
IEEE Trans. Inf. Forensics Secur., 2020

A comprehensive security assessment framework for software-defined networks.
Comput. Secur., 2020

BASTION: A Security Enforcement Network Stack for Container Networks.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Efficient Network Administration for Smart Grid Data Center.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

2019
Operator-Defined Reconfigurable Network OS for Software-Defined Networks.
IEEE/ACM Trans. Netw., 2019

Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies.
IEEE Trans. Dependable Secur. Comput., 2019

MC-SDN: Supporting Mixed-Criticality Real-Time Communication Using Software-Defined Networking.
IEEE Internet Things J., 2019

SODA: A software-defined security framework for IoT environments.
Comput. Networks, 2019

Astraea: Towards an effective and usable application permission system for SDN.
Comput. Networks, 2019

Doppelgängers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services.
Proceedings of the World Wide Web Conference, 2019

Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Network Virtualization System for Smart Grid Data Acquisition System.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

DPX: Data-Plane eXtensions for SDN Security Service Instantiation.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

Poster: TCLP: Enforcing Least Privileges to Prevent Containers from Kernel Vulnerabilities.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Rethinking Network Policy Coordination: A Database Perspective.
Proceedings of the 3rd Asia-Pacific Workshop on Networking, 2019

2018
Duo: Software Defined Intrusion Tolerant System Using Dual Cluster.
Secur. Commun. Networks, 2018

NOSArmor: Building a Secure Network Operating System.
Secur. Commun. Networks, 2018

A hybrid interface tracking - level set technique for multiphase flow with soluble surfactant.
J. Comput. Phys., 2018

Probius: Automated Approach for VNF and Service Chain Analysis in Software-Defined NFV.
Proceedings of the Symposium on SDN Research, 2018

HEX Switch: Hardware-assisted security extensions of OpenFlow.
Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, 2018

AEGIS: An Automated Permission Generation and Verification System for SDNs.
Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, 2018

MC-SDN: Supporting Mixed-Criticality Scheduling on Switched-Ethernet Using Software-Defined Networking.
Proceedings of the 2018 IEEE Real-Time Systems Symposium, 2018

Towards a Security-Enhanced Cloud Platform.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

RE-CHECKER: Towards Secure RESTful Service in Software-Defined Networking.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2018

Barista: An Event-centric NOS Composition Framework for Software-Defined Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

INDAGO: A New Framework For Detecting Malicious SDN Applications.
Proceedings of the 2018 IEEE 26th International Conference on Network Protocols, 2018

CloudRand: Building Heterogeneous and Moving-Target Network Interfaces.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Toward Semantic Assessment of Vulnerability Severity: A Text Mining Approach.
Proceedings of the CIKM 2018 Workshops co-located with 27th ACM International Conference on Information and Knowledge Management (CIKM 2018), 2018

Knowledge Seeking on The Shadow Brokers.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Who is knocking on the Telnet Port: A Large-Scale Empirical Study of Network Scanning.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Fault Tolerance for Software-Defined Networking in Smart Grid.
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018

2017
Flow Wars: Systemizing the Attack Surface and Defenses in Software-Defined Networks.
IEEE/ACM Trans. Netw., 2017

An Interface-Tracking Technique for Multiphase Flow with Soluble Surfactant.
CoRR, 2017

DELTA: A Security Assessment Framework for Software-Defined Networks.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Mobility of Everything (MoE): An Integrated and Distributed Mobility Management.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Software-Defined HoneyNet: Towards Mitigating Link Flooding Attacks.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

Bridging the architectural gap between NOS design principles in software-defined networks.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017

A Security-Mode for Carrier-Grade SDN Controllers.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Finding Compact Class Sets for Korean Font Image Classification.
Proceedings of the 4th IAPR Asian Conference on Pattern Recognition, 2017

2016
Vulnerabilities of network OS and mitigation with state-based permission system.
Secur. Commun. Networks, 2016

A collaborative approach on host and network level android malware detection.
Secur. Commun. Networks, 2016

Just-in-time WLANs: On-demand interference-managed WLAN infrastructures.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Enhancing Network Security through Software Defined Networking (SDN).
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

QoSE: Quality of security a network security framework with distributed NFV.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

UNISAFE: A Union of Security Actions for Software Switches.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016

HogMap: Using SDNs to Incentivize Collaborative Security Monitoring.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016

The Smaller, the Shrewder: A Simple Malicious Application Can Kill an Entire SDN Environment.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016

SHIELD: An Automated Framework for Static Analysis of SDN Applications.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016

2015
A First Step Toward Network Security Virtualization: From Concept To Prototype.
IEEE Trans. Inf. Forensics Secur., 2015

Enabling security functions with SDN: A feasibility study.
Comput. Networks, 2015

POSTER: A Collaborative Approach on Behavior-Based Android Malware Detection.
Proceedings of the Security and Privacy in Communication Networks, 2015

SPIRIT: A Framework for Profiling SDN.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

2014
A Solver for Massively Parallel Direct Numerical Simulation of Three-Dimensional Multiphase Flows.
CoRR, 2014

Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

Rosemary: A Robust, Secure, and High-performance Network Operating System.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Exploiting Application/System-Dependent Ambient Temperature for Accurate Microarchitectural Simulation.
IEEE Trans. Computers, 2013

EFFORT: A new host-network cooperated framework for efficient and effective bot malware detection.
Comput. Networks, 2013

Network Iron Curtain: Hide Enterprise Networks with OpenFlow.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

Attacking software-defined networks: a first feasibility study.
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013

FRESCO: Modular Composable Security Services for Software-Defined Networks.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Model checking invariant security properties in OpenFlow.
Proceedings of IEEE International Conference on Communications, 2013

AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
A Large-Scale Empirical Study of Conficker.
IEEE Trans. Inf. Forensics Secur., 2012

Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter.
Proceedings of the 21st World Wide Web Conference 2012, 2012

A security enforcement kernel for OpenFlow networks.
Proceedings of the first workshop on Hot topics in software defined networks, 2012

EFFORT: Efficient and effective bot malware detection.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?).
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

2011
The Local Front Reconstruction Method for direct simulation of two- and three-dimensional multiphase flows.
J. Comput. Phys., 2011

Cross-Analysis of Botnet Victims: New Insights and Implications.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

2010
Exploiting application-dependent ambient temperature for accurate architectural simulation.
Proceedings of the 28th International Conference on Computer Design, 2010

Conficker and beyond: a large-scale empirical study.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
The impact of liquid cooling on 3D multi-core processors.
Proceedings of the 27th International Conference on Computer Design, 2009

2007
Computation of the curvature field in numerical simulation of multiphase flow.
J. Comput. Phys., 2007

2006
Malware prevalence in the KaZaA file-sharing network.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

2002
A robust audio watermarking algorithm using pitch scaling.
Proceedings of the 14th International Conference on Digital Signal Processing, 2002


  Loading...