What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Gail-Joon Ahn
Google Scholar
ORCID:
0000-0002-4271-1666
51
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
"It's almost like Frankenstein": Investigating the Complexities of Scientific Collaboration and Privilege Management within Research Computing Infrastructures.
Souradip Nath
Ananta Soneji
Jaejong Baek
Tiffany Bao
Adam Doupé
Carlos E. Rubio-Medrano
Gail-Joon Ahn
2025
conf/ndss
SCAMMAGNIFIER: Piercing the Veil of Fraudulent Shopping Website Campaigns.
Marzieh Bitaab
Alireza Karimi
Zhuoer Lyu
Adam Oest
Dhruv Kuchhal
Muhammad Saad
Gail-Joon Ahn
Ruoyu Wang
Tiffany Bao
Yan Shoshitaishvili
Adam Doupé
2024
journals/istr
Guaranteeing anonymity in attribute-based authorization.
Erin Lanus
Charles J. Colbourn
Gail-Joon Ahn
2024
conf/sp
"Watching over the shoulder of a professional": Why Hackers Make Mistakes and How They Fix Them.
Irina Ford
Ananta Soneji
Faris Bugra Kokulu
Jayakrishna Vadayath
Zion Leonahenahe Basque
Gaurav Vipat
Adam Doupé
Ruoyu Wang
Gail-Joon Ahn
Tiffany Bao
Yan Shoshitaishvili
2023
conf/dsn
Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer.
Jaejong Baek
Pradeep Kumar Duraisamy Soundrapandian
Sukwha Kyung
Ruoyu Wang
Yan Shoshitaishvili
Adam Doupé
Gail-Joon Ahn
2022
conf/ccs
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior.
Penghui Zhang
Zhibo Sun
Sukwha Kyung
Hans Walter Behrens
Zion Leonahenahe Basque
Haehyun Cho
Adam Oest
Ruoyu Wang
Tiffany Bao
Yan Shoshitaishvili
Gail-Joon Ahn
Adam Doupé
2021
conf/uss
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service.
Zhibo Sun
Adam Oest
Penghui Zhang
Carlos E. Rubio-Medrano
Tiffany Bao
Ruoyu Wang
Ziming Zhao
Yan Shoshitaishvili
Adam Doupé
Gail-Joon Ahn
2021
conf/sp
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing.
Penghui Zhang
Adam Oest
Haehyun Cho
Zhibo Sun
RC Johnson
Brad Wardman
Shaown Sarker
Alexandros Kapravelos
Tiffany Bao
Ruoyu Wang
Yan Shoshitaishvili
Adam Doupé
Gail-Joon Ahn
2021
conf/eurosp
Poster: DyPolDroid: User-Centered Counter-Policies Against Android Permission-Abuse Attacks.
Matthew Hill
Carlos E. Rubio-Medrano
Luis Claramunt
Jaejong Baek
Gail-Joon Ahn
2021
conf/eurosp
Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies.
Luis Claramunt
Larissa Pokam Epse
Carlos E. Rubio-Medrano
Jaejong Baek
Gail-Joon Ahn
2021
conf/asiaccs
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem.
Doowon Kim
Haehyun Cho
Yonghwi Kwon
Adam Doupé
Sooel Son
Gail-Joon Ahn
Tudor Dumitras
2021
conf/ndss
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.
Sung Ta Dinh
Haehyun Cho
Kyle Martin
Adam Oest
Kyle Zeng
Alexandros Kapravelos
Gail-Joon Ahn
Tiffany Bao
Ruoyu Wang
Adam Doupé
Yan Shoshitaishvili
2020
conf/ccs
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems.
Efrén López-Morales
Carlos E. Rubio-Medrano
Adam Doupé
Yan Shoshitaishvili
Ruoyu Wang
Tiffany Bao
Gail-Joon Ahn
2020
conf/uss
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.
Adam Oest
Penghui Zhang
Brad Wardman
Eric Nunes
Jakub Burgis
Ali Zand
Kurt Thomas
Adam Doupé
Gail-Joon Ahn
2019
journals/compsec
Towards a reliable firewall for software-defined networks.
Hongxin Hu
Wonkyu Han
Sukwha Kyung
Juan Wang
Gail-Joon Ahn
Ziming Zhao
Hongda Li
2019
conf/ccs
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues.
Faris Bugra Kokulu
Ananta Soneji
Tiffany Bao
Yan Shoshitaishvili
Ziming Zhao
Adam Doupé
Gail-Joon Ahn
2019
conf/uss
Users Really Do Answer Telephone Scams.
Huahong Tu
Adam Doupé
Ziming Zhao
Gail-Joon Ahn
2019
conf/sp
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists.
Adam Oest
Yeganeh Safaei
Adam Doupé
Gail-Joon Ahn
Brad Wardman
Kevin Tyers
2018
journals/tifs
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection.
Jing Chen
Chiheng Wang
Ziming Zhao
Kai Chen
Ruiying Du
Gail-Joon Ahn
2018
conf/ccs
CacheLight: Defeating the CacheKit Attack.
Mauricio Gutierrez
Ziming Zhao
Adam Doupé
Yan Shoshitaishvili
Gail-Joon Ahn
2018
conf/ccs
AIM-SDN: Attacking Information Mismanagement in SDN-datastores.
Vaibhav Hemant Dixit
Adam Doupé
Yan Shoshitaishvili
Ziming Zhao
Gail-Joon Ahn
2018
conf/ccs
vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems.
Hongda Li
Hongxin Hu
Guofei Gu
Gail-Joon Ahn
Fuqiang Zhang
2018
conf/acsac
Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling.
Jaejong Baek
Sukwha Kyung
Haehyun Cho
Ziming Zhao
Yan Shoshitaishvili
Adam Doupé
Gail-Joon Ahn
2018
conf/acsac
Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone.
Haehyun Cho
Penghui Zhang
Donguk Kim
Jinbum Park
Choong-Hoon Lee
Ziming Zhao
Adam Doupé
Gail-Joon Ahn
2017
conf/ccs
Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control.
Carlos E. Rubio-Medrano
Josephine Lamp
Adam Doupé
Ziming Zhao
Gail-Joon Ahn
2017
conf/cns
HoneyProxy: Design and implementation of next-generation honeynet via SDN.
Sukwha Kyung
Wonkyu Han
Naveen Tiwari
Vaibhav Hemant Dixit
Lakshmi Srinivas
Ziming Zhao
Adam Doupé
Gail-Joon Ahn
2017
conf/ndss
On the Safety and Efficiency of Virtual Firewall Elasticity Control.
Juan Deng
Hongda Li
Hongxin Hu
Kuang-Ching Wang
Gail-Joon Ahn
Ziming Zhao
Wonkyu Han
2016
conf/ccs
Checking Intent-based Communication in Android with Intent Space Analysis.
Yiming Jing
Gail-Joon Ahn
Adam Doupé
Jeong Hyun Yi
2016
conf/sp
SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam.
Huahong Tu
Adam Doupé
Ziming Zhao
Gail-Joon Ahn
2015
journals/compsec
Preface - WISA 2014.
Jeong Hyun Yi
Kyung Hyune Rhee
Gail-Joon Ahn
2015
conf/ccs
ACTRA: A Case Study for Threat Information Sharing.
Jon C. Haass
Gail-Joon Ahn
Frank Grimmelmann
2014
conf/ccs
WPES 2014: 13th Workshop on Privacy in the Electronic Society.
Gail-Joon Ahn
Anupam Datta
2014
conf/acsac
Morpheus: automatically generating heuristics to detect Android emulators.
Yiming Jing
Ziming Zhao
Gail-Joon Ahn
Hongxin Hu
2013
journals/tifs
Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy.
Yan Zhu
Gail-Joon Ahn
Hongxin Hu
Di Ma
Shan-Biao Wang
2013
conf/uss
On the Security of Picture Gesture Authentication.
Ziming Zhao
Gail-Joon Ahn
Jeong-Jin Seo
Hongxin Hu
2013
conf/cns
Using instruction sequence abstraction for shellcode detection and attribution.
Ziming Zhao
Gail-Joon Ahn
2012
journals/compsec
Access control for online social networks third party applications.
Mohamed Shehab
Anna Cinzia Squicciarini
Gail-Joon Ahn
Irini Kokkinou
2012
conf/esorics
SocialImpact: Systematic Analysis of Underground Social Dynamics.
Ziming Zhao
Gail-Joon Ahn
Hongxin Hu
Deepinder Mahi
2012
conf/iwsec
Model-Based Conformance Testing for Android.
Yiming Jing
Gail-Joon Ahn
Hongxin Hu
2011
journals/compsec
Patient-centric authorization framework for electronic healthcare services.
Jing Jin
Gail-Joon Ahn
Hongxin Hu
Michael J. Covington
Xinwen Zhang
2011
conf/ccs
Poster: temporal attribute-based encryption in clouds.
Yan Zhu
Hongxin Hu
Gail-Joon Ahn
Xiaorui Gong
Shimin Chen
2011
conf/acsac
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks.
Hongxin Hu
Gail-Joon Ahn
Jan Jorgensen
2010
conf/ccs
Efficient provable data possession for hybrid clouds.
Yan Zhu
Huaixi Wang
Zexing Hu
Gail-Joon Ahn
Hongxin Hu
Stephen S. Yau
2010
conf/ccs
Cryptographic role-based security mechanisms based on role-key hierarchy.
Yan Zhu
Gail-Joon Ahn
Hongxin Hu
Huaixi Wang
2010
conf/esorics
DR@FT: Efficient Remote Attestation Framework for Dynamic Systems.
Wenjuan Xu
Gail-Joon Ahn
Hongxin Hu
Xinwen Zhang
Jean-Pierre Seifert
2008
conf/sec
Portable User-Centric Identity Management.
Gail-Joon Ahn
Moonam Ko
Mohamed Shehab
2008
conf/icics
Beyond User-to-User Access Control for Online Social Networks.
Mohamed Shehab
Anna Cinzia Squicciarini
Gail-Joon Ahn
2008
conf/acsac
Enforcing Role-Based Access Control Policies in Web Services with UML and OCL.
Karsten Sohr
Tanveer Mustafa
Xinyu Bao
Gail-Joon Ahn
2007
conf/ccs
Managing heterogeneous network environments using an extensible policy framework.
Lawrence Teo
Gail-Joon Ahn
2005
conf/esorics
Specification and Validation of Authorisation Constraints Using UML and OCL.
Karsten Sohr
Gail-Joon Ahn
Martin Gogolla
Lars Migge
2003
conf/sec
Constrained Role-based Delegation.
Longhua Zhang
Gail-Joon Ahn
Coauthors
Adam Doupé
(22)
Adam Oest
(7)
Alexandros Kapravelos
(2)
Ali Zand
(1)
Alireza Karimi
(1)
Ananta Soneji
(3)
Anna Cinzia Squicciarini
(2)
Anupam Datta
(1)
Brad Wardman
(3)
Carlos E. Rubio-Medrano
(6)
Charles J. Colbourn
(1)
Chiheng Wang
(1)
Choong-Hoon Lee
(1)
Deepinder Mahi
(1)
Dhruv Kuchhal
(1)
Di Ma
(1)
Donguk Kim
(1)
Doowon Kim
(1)
Efrén López-Morales
(1)
Eric Nunes
(1)
Erin Lanus
(1)
Faris Bugra Kokulu
(2)
Frank Grimmelmann
(1)
Fuqiang Zhang
(1)
Gail-Joon Ahn
(51)
Gaurav Vipat
(1)
Guofei Gu
(1)
Haehyun Cho
(6)
Hans Walter Behrens
(1)
Hongda Li
(3)
Hongxin Hu
(14)
Huahong Tu
(2)
Huaixi Wang
(2)
Irina Ford
(1)
Irini Kokkinou
(1)
Jaejong Baek
(5)
Jakub Burgis
(1)
Jan Jorgensen
(1)
Jayakrishna Vadayath
(1)
Jean-Pierre Seifert
(1)
Jeong Hyun Yi
(2)
Jeong-Jin Seo
(1)
Jinbum Park
(1)
Jing Chen
(1)
Jing Jin
(1)
Jon C. Haass
(1)
Josephine Lamp
(1)
Juan Deng
(1)
Juan Wang
(1)
Kai Chen
(1)
Karsten Sohr
(2)
Kevin Tyers
(1)
Kuang-Ching Wang
(1)
Kurt Thomas
(1)
Kyle Martin
(1)
Kyle Zeng
(1)
Kyung Hyune Rhee
(1)
Lakshmi Srinivas
(1)
Larissa Pokam Epse
(1)
Lars Migge
(1)
Lawrence Teo
(1)
Longhua Zhang
(1)
Luis Claramunt
(2)
Martin Gogolla
(1)
Marzieh Bitaab
(1)
Matthew Hill
(1)
Mauricio Gutierrez
(1)
Michael J. Covington
(1)
Mohamed Shehab
(3)
Moonam Ko
(1)
Muhammad Saad
(1)
Naveen Tiwari
(1)
Penghui Zhang
(5)
Pradeep Kumar Duraisamy Soundrapandian
(1)
RC Johnson
(1)
Ruiying Du
(1)
Ruoyu Wang
(8)
Shan-Biao Wang
(1)
Shaown Sarker
(1)
Shimin Chen
(1)
Sooel Son
(1)
Souradip Nath
(1)
Stephen S. Yau
(1)
Sukwha Kyung
(5)
Sung Ta Dinh
(1)
Tanveer Mustafa
(1)
Tiffany Bao
(9)
Tudor Dumitras
(1)
Vaibhav Hemant Dixit
(2)
Wenjuan Xu
(1)
Wonkyu Han
(3)
Xiaorui Gong
(1)
Xinwen Zhang
(2)
Xinyu Bao
(1)
Yan Shoshitaishvili
(12)
Yan Zhu
(4)
Yeganeh Safaei
(1)
Yiming Jing
(3)
Yonghwi Kwon
(1)
Zexing Hu
(1)
Zhibo Sun
(3)
Zhuoer Lyu
(1)
Ziming Zhao
(17)
Zion Leonahenahe Basque
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to