My name is Doowon Kim. I’m currently a Ph.D. Candidate in Computer Science at the University of Maryland, working with Prof. Tudor Dumitras.
My research focuses on data-driven security and usable security; I identify the root causes of security threats by systemically understanding actors (e.g., adversary and end-users) involved, with data-driven and human-centered perspectives (i.e., usability study). Building on insights extracted from the measurements and user studies, my research also aims to design and build new secure systems with usable security. Particularly, I study the Code-Signing PKI, the Web PKI, and the security behaviors of software developers. I have been awarded the 5th annual NSA Best Scientific Cybersecurity Paper for “how information resources can impact on code security.” My works about the Code-Signing PKI have been featured in Ars Technica, The Register, Schneier on Security, Threatpost, etc. See my CV for more information.
I am on the academic job market this year.
- Jun. 2019: Internship at Symantec Research Lab in Culver City.
- Mar. 2019: Awarded the Ann G. Wylie Dissertation Fellowship.
[USENIX Security ‘18]: The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI.
Doowon Kim, Bum Jun Kwon, Kristián Kozák, Christopher Gates, and Tudor Dumitraș.
[ACM CCS ‘17]: Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI.
Doowon Kim, Bum Jun Kwon, and Tudor Dumitraș.
[IEEE S&P ‘17]: Comparing the usability of cryptographic APIs.
Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel, Doowon Kim, Michelle L. Mazurek, and Christian Stransky. (The authors are alphabetically ordered.)
[SOUPS ‘16]: An inconvenient trust: User attitudes toward security and usability tradeoffs for key-directory encryption systems.
Wei Bai, Doowon Kim, Moses Namara, Yichen Qian, Patrick Gage Kelley, and Michelle L. Mazurek.
[IEEE S&P ‘16]: You get where you’re looking for: The impact of information sources on code security.
Awarded the 5th annual NSA Best Scientific Cybersecurity Paper.
Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, and Christian Stransky. (The authors are alphabetically ordered.)