What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kang G. Shin
Google Scholar
ORCID:
0000-0003-0086-8777
46
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/dsn
MichiCAN: Spoofing and Denial-of-Service Protection using Integrated CAN Controllers.
Mert D. Pesé
Bulut Gözübüyük
Eric Andrechek
Habeeb Olufowobi
Mohammad Hamad
Kang G. Shin
2025
conf/uss
Navigating Cookie Consent Violations Across the Globe.
Brian Tang
Duc Bui
Kang G. Shin
2024
journals/tifs
iCoding: Countermeasure Against Interference and Eavesdropping in Wireless Communications.
Yicheng Liu
Zhao Li
Kang G. Shin
Zheng Yan
Jia Liu
2024
journals/popets
PrivacyLens: On-Device PII Removal from RGB Images using Thermally-Enhanced Sensing.
Yasha Iravantchi
Thomas Krolikowski
William Wang
Kang G. Shin
Alanson P. Sample
2024
conf/uss
Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage.
Youssef Tobah
Andrew Kwong
Ingab Kang
Daniel Genkin
Kang G. Shin
2023
conf/uss
Eye-Shield: Real-Time Protection of Mobile Device Screen Information from Shoulder Surfing.
Brian Tang
Kang G. Shin
2023
conf/sp
Detection of Inconsistencies in Privacy Practices of Browser Extensions.
Duc Bui
Brian Tang
Kang G. Shin
2023
conf/asiaccs
T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing.
Timothy Trippel
Kang G. Shin
Kevin B. Bush
Matthew Hicks
2023
conf/cns
Using Phone Sensors to Augment Vehicle Reliability.
Noah T. Curran
Arun Ganesan
Mert D. Pesé
Kang G. Shin
2022
conf/ccs
Do Opt-Outs Really Opt Me Out?
Duc Bui
Brian Tang
Kang G. Shin
2022
conf/uss
Fuzzing Hardware Like Software.
Timothy Trippel
Kang G. Shin
Alex Chernyakhovsky
Garret Kelly
Dominic Rizzo
Matthew Hicks
2022
conf/sp
SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks.
Youssef Tobah
Andrew Kwong
Ingab Kang
Daniel Genkin
Kang G. Shin
2022
conf/acsac
Are There Wireless Hidden Cameras Spying on Me?
Jeongyoon Heo
Sangwon Gil
Youngman Jung
Jinmok Kim
Donguk Kim
Woojin Park
Yongdae Kim
Kang G. Shin
Choong-Hoon Lee
2021
journals/popets
Automated Extraction and Presentation of Data Practices in Privacy Policies.
Duc Bui
Kang G. Shin
Jong-Min Choi
Junbum Shin
2021
conf/ccs
Consistency Analysis of Data-Usage Purposes in Mobile Apps.
Duc Bui
Yuan Yao
Kang G. Shin
Jong-Min Choi
Junbum Shin
2021
conf/sp
Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time.
Timothy Trippel
Kang G. Shin
Kevin B. Bush
Matthew Hicks
2021
conf/acsac
S2-CAN: Sufficiently Secure Controller Area Network.
Mert D. Pesé
Jay W. Schauer
Junhui Li
Kang G. Shin
2020
journals/popets
SPy: Car Steering Reveals Your Trip Route!
Mert D. Pesé
Xiaoying Pu
Kang G. Shin
2020
conf/sp
ICAS: an Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.
Timothy Trippel
Kang G. Shin
Kevin B. Bush
Matthew Hicks
2020
conf/cns
Off is Not Off: On the Security of Parked Vehicles.
Kyong-Tak Cho
Kang G. Shin
Yu Seung Kim
Byung-Ho Cha
2019
conf/ccs
LibreCAN: Automated CAN Message Translator.
Mert D. Pesé
Troy Stacer
C. Andrés Campos
Eric Newberry
Dongyao Chen
Kang G. Shin
2019
conf/ccs
Exploiting Sound Masking for Audio Privacy in Smartphones.
Yu-Chih Tung
Kang G. Shin
2018
conf/uss
Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning.
Hamza Harkous
Kassem Fawaz
Rémi Lebret
Florian Schaub
Kang G. Shin
Karl Aberer
2017
conf/ccs
Viden: Attacker Identification on In-Vehicle Networks.
Kyong-Tak Cho
Kang G. Shin
2016
journals/popets
Privacy vs. Reward in Indoor Location-Based Services.
Kassem Fawaz
Kyu-Han Kim
Kang G. Shin
2016
conf/ccs
Error Handling of In-vehicle Networks Makes Them Vulnerable.
Kyong-Tak Cho
Kang G. Shin
2016
conf/uss
Fingerprinting Electronic Control Units for Vehicle Intrusion Detection.
Kyong-Tak Cho
Kang G. Shin
2016
conf/uss
Protecting Privacy of BLE Device Users.
Kassem Fawaz
Kyu-Han Kim
Kang G. Shin
2016
conf/soups
PriBots: Conversational Privacy with Chatbots.
Hamza Harkous
Kassem Fawaz
Kang G. Shin
Karl Aberer
2016
conf/acsac
Understanding and defending the binder attack surface in Android.
Huan Feng
Kang G. Shin
2015
conf/uss
Anatomization and Protection of Mobile Apps' Location Privacy Threats.
Kassem Fawaz
Huan Feng
Kang G. Shin
2015
conf/uss
LinkDroid: Reducing Unregulated Aggregation of App Usage Behaviors.
Huan Feng
Kassem Fawaz
Kang G. Shin
2014
conf/ccs
POSTER: Positioning Attack on Proximity-Based People Discovery.
Huan Feng
Kang G. Shin
2014
conf/ccs
Vulnerability and Protection of Channel State Information in Multiuser MIMO Networks.
Yu-Chih Tung
Sihui Han
Dongyao Chen
Kang G. Shin
2014
conf/ccs
Location Privacy Protection for Smartphone Users.
Kassem Fawaz
Kang G. Shin
2013
conf/cns
Secure cooperative spectrum sensing in cognitive radio networks using interference signatures.
Sunghyun Choi
Kang G. Shin
2013
conf/cns
LISA: Location information ScrAmbler for privacy protection on smartphones.
Zhigang Chen
Xin Hu
Xiaoen Ju
Kang G. Shin
2013
conf/acsac
DUET: integration of dynamic and static analyses for malware clustering with cluster ensembles.
Xin Hu
Kang G. Shin
2012
conf/wisec
Design of SMS commanded-and-controlled and P2P-structured mobile botnets.
Yuanyuan Zeng
Kang G. Shin
Xin Hu
2010
conf/dsn
Detection of botnets using combined host- and network-level information.
Yuanyuan Zeng
Xin Hu
Kang G. Shin
2009
conf/ccs
Large-scale malware indexing using function-call graphs.
Xin Hu
Tzi-cker Chiueh
Kang G. Shin
2009
conf/ndss
RB-Seeker: Auto-detection of Redirection Botnets.
Xin Hu
Matthew Knysz
Kang G. Shin
2005
conf/dsn
SMRP: Fast Restoration of Multicast Sessions from Persistent Failures.
Jian Wu
Kang G. Shin
2003
conf/ccs
Hop-count filtering: an effective defense against spoofed DDoS traffic.
Cheng Jin
Haining Wang
Kang G. Shin
2001
conf/dsn
Design and Evaluation of Routing Schemes for Dependable Real-Time Connections.
Songkuk Kim
Daji Qiao
Sharath Kodase
Kang G. Shin
2001
conf/dsn
Performance Evaluation of Dependable Real-Time Communication with Elastic QoS.
Jong Kim
Kang G. Shin
Coauthors
Alanson P. Sample
(1)
Alex Chernyakhovsky
(1)
Andrew Kwong
(2)
Arun Ganesan
(1)
Brian Tang
(4)
Bulut Gözübüyük
(1)
Byung-Ho Cha
(1)
C. Andrés Campos
(1)
Cheng Jin
(1)
Choong-Hoon Lee
(1)
Daji Qiao
(1)
Daniel Genkin
(2)
Dominic Rizzo
(1)
Donguk Kim
(1)
Dongyao Chen
(2)
Duc Bui
(5)
Eric Andrechek
(1)
Eric Newberry
(1)
Florian Schaub
(1)
Garret Kelly
(1)
Habeeb Olufowobi
(1)
Haining Wang
(1)
Hamza Harkous
(2)
Huan Feng
(4)
Ingab Kang
(2)
Jay W. Schauer
(1)
Jeongyoon Heo
(1)
Jia Liu
(1)
Jian Wu
(1)
Jinmok Kim
(1)
Jong Kim
(1)
Jong-Min Choi
(2)
Junbum Shin
(2)
Junhui Li
(1)
Kang G. Shin
(46)
Karl Aberer
(2)
Kassem Fawaz
(7)
Kevin B. Bush
(3)
Kyong-Tak Cho
(4)
Kyu-Han Kim
(2)
Matthew Hicks
(4)
Matthew Knysz
(1)
Mert D. Pesé
(5)
Mohammad Hamad
(1)
Noah T. Curran
(1)
Rémi Lebret
(1)
Sangwon Gil
(1)
Sharath Kodase
(1)
Sihui Han
(1)
Songkuk Kim
(1)
Sunghyun Choi
(1)
Thomas Krolikowski
(1)
Timothy Trippel
(4)
Troy Stacer
(1)
Tzi-cker Chiueh
(1)
William Wang
(1)
Woojin Park
(1)
Xiaoen Ju
(1)
Xiaoying Pu
(1)
Xin Hu
(6)
Yasha Iravantchi
(1)
Yicheng Liu
(1)
Yongdae Kim
(1)
Youngman Jung
(1)
Youssef Tobah
(2)
Yu Seung Kim
(1)
Yu-Chih Tung
(2)
Yuan Yao
(1)
Yuanyuan Zeng
(2)
Zhao Li
(1)
Zheng Yan
(1)
Zhigang Chen
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to