2018

2017

  • Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI.
    Doowon Kim, Bum Jun Kwon, and Tudor Dumitraș.
    CCS 2017.
    Media: Schneier on Security, The Register, The SSL Store, Ars Technica, Threatpost, Tech Wire Asia, End Game, CPS-VO, Systweak, Fortuna’s Corner, Security Affairs, The Hacker News, Security Intelligence, Tech Target, Cyber Defense Magazine, ENISA, INTEZER

  • fFTP: a fast file transfer protocol for home N-screen platform.
    Doowon Kim, Jinsuk Baek, Paul S Fisher, Sangchul Kim.
    Personal and Ubiquitous Computing. October 2017. DOI: 10.1007/s00779-017-1082-5.

  • Lessons learned from using an online platform to conduct large-scale, online controlled security experiments with software developers.
    Christian Stransky, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Elissa M. Redmiles, Doowon Kim, Michael Backes, Simson Garfinkel, Michelle L. Mazurek, and Sascha Fahl.
    CSET 2017.

  • Balancing security and usability in encrypted email.
    Wei Bai, Doowon Kim, Moses Namara, Yichen Qian, Patrick Gage Kelley, and Michelle L. Mazurek.
    IEEE Internet Computing: 21 (3), 30-38. 2017.

  • How Internet Resources Might Be Helping You Develop Faster but Less Securely.
    Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L Mazurek, Christian Stransky. (The authors are alphabetically ordered.)
    IEEE Security & Privacy, vol. 15, no. 2, pp. 50-60, 2017. doi: 10.1109/MSP.2017.24.

  • Comparing the usability of cryptographic APIs.
    Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel, Doowon Kim, Michelle L. Mazurek, and Christian Stransky. (The authors are alphabetically ordered.)
    IEEE Security and Privacy (S&P) 2017.

2016

  • An inconvenient trust: User attitudes toward security and usability tradeoffs for key-directory encryption systems.
    Wei Bai, Doowon Kim, Moses Namara, Yichen Qian, Patrick Gage Kelley, and Michelle L. Mazurek.
    SOUPS 2016

  • You get where you’re looking for: The impact of information sources on code security.
    Awarded the 5th annual NSA Best Scientific Cybersecurity Paper.
    Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, and Christian Stransky. (The authors are alphabetically ordered.)
    IEEE Security and Privacy 2016.

2014

  • An Adaptive Primary Path Switching Scheme for Seamless mSCTP Handover.
    Jinsuk Baek, Doowon Kim, Paul S. Fisher, and Minho Jo. Smart Computing Review (Smart CR) 2014. (Invited Paper)

Posters

  • Poster: Analysis of Reused Private Keys in the Code Signing PKI.
    Doowon Kim, S. Gokberk Karaca and Tudor Dumitras.
    Network and Distributed System Security Symposium (NDSS 2019). Feb. 2019.

  • You get where you’re looking for: The impact of information sources on code security.
    Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, and Christian Stransky.
    Symposium on Usable Privacy and Security (SOUPS 2016). June 2016. (Previously published paper.)

  • Adaptive Video Streaming over HTTP.
    Doowon Kim, Jinsuk Baek, and Paul S. Fisher.
    The 49th ACM Southeast Conference (ACM SE 2014). March 2014.

  • Implementation of Framework to Identify Potential Phishing Websites.
    Doowon Kim, Chaitanya Achan, Jinsuk Baek, and Paul S. Fisher.
    2013 IEEE Intelligence and Security Informatics (IEEE ISI 2013). June 2013.


Others

  • An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems. Wei Bai, Doowon Kim, Moses Namara, Yichen Qian, Patrick Gage Kelley, Michelle L. Mazurek.
    Black Hat USA, August 2016.