Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jaeyeon Jung
@inproceedings{DBLP:conf/ndss/FernandesRJP18, author = {Earlence Fernandes and Amir Rahmati and Jaeyeon Jung and Atul Prakash}, title = {Decentralized Action Integrity for Trigger-Action IoT Platforms}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_01A-3\_Fernandes\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/FernandesRJP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/FernandesRJP17, author = {Earlence Fernandes and Amir Rahmati and Jaeyeon Jung and Atul Prakash}, title = {Security Implications of Permission Models in Smart-Home Application Frameworks}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {2}, pages = {24--30}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.43}, doi = {10.1109/MSP.2017.43}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/FernandesRJP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimHCJC17, author = {Taehun Kim and Hyeonmin Ha and Seoyoon Choi and Jaeyeon Jung and Byung{-}Gon Chun}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Breaking Ad-hoc Runtime Integrity Protection Mechanisms in Android Financial Apps}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {179--192}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053018}, doi = {10.1145/3052973.3053018}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KimHCJC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FernandesRJP17, author = {Earlence Fernandes and Amir Rahmati and Jaeyeon Jung and Atul Prakash}, title = {Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms for the Internet of Things}, journal = {CoRR}, volume = {abs/1707.00405}, year = {2017}, url = {http://arxiv.org/abs/1707.00405}, eprinttype = {arXiv}, eprint = {1707.00405}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FernandesRJP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-02788, author = {Amir Rahmati and Earlence Fernandes and Jaeyeon Jung and Atul Prakash}, title = {{IFTTT} vs. Zapier: {A} Comparative Study of Trigger-Action Programming Frameworks}, journal = {CoRR}, volume = {abs/1709.02788}, year = {2017}, url = {http://arxiv.org/abs/1709.02788}, eprinttype = {arXiv}, eprint = {1709.02788}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-02788.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FernandesJP16, author = {Earlence Fernandes and Jaeyeon Jung and Atul Prakash}, title = {Security Analysis of Emerging Smart Home Applications}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {636--654}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.44}, doi = {10.1109/SP.2016.44}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/FernandesJP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2015, editor = {Jaeyeon Jung and Thorsten Holz}, title = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/EnckGCCJMS14, author = {William Enck and Peter Gilbert and Byung{-}Gon Chun and Landon P. Cox and Jaeyeon Jung and Patrick D. McDaniel and Anmol Sheth}, title = {TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones}, journal = {Commun. {ACM}}, volume = {57}, number = {3}, pages = {99--106}, year = {2014}, url = {https://doi.org/10.1145/2494522}, doi = {10.1145/2494522}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/EnckGCCJMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocs/EnckGHTCCJMS14, author = {William Enck and Peter Gilbert and Seungyeop Han and Vasant Tendulkar and Byung{-}Gon Chun and Landon P. Cox and Jaeyeon Jung and Patrick D. McDaniel and Anmol N. Sheth}, title = {TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones}, journal = {{ACM} Trans. Comput. Syst.}, volume = {32}, number = {2}, pages = {5:1--5:29}, year = {2014}, url = {https://doi.org/10.1145/2619091}, doi = {10.1145/2619091}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocs/EnckGHTCCJMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/UrJS14, author = {Blase Ur and Jaeyeon Jung and Stuart E. Schechter}, editor = {A. J. Brush and Adrian Friday and Julie A. Kientz and James Scott and Junehwa Song}, title = {Intruders versus intrusiveness: teens' and parents' perspectives on home-entryway surveillance}, booktitle = {Proceedings of the 2014 {ACM} International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '14, Seattle, WA, USA, September 13-17, 2014}, pages = {129--139}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2632048.2632107}, doi = {10.1145/2632048.2632107}, timestamp = {Tue, 26 Mar 2024 11:01:21 +0100}, biburl = {https://dblp.org/rec/conf/huc/UrJS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/JungK14, author = {Jaeyeon Jung and Tadayoshi Kohno}, editor = {A. J. Brush and Adrian Friday and Julie A. Kientz and James Scott and Junehwa Song}, title = {Workshop on usable privacy {\&} security for wearable and domestic ubiquitous devices {(UPSIDE)}}, booktitle = {Proceedings of the 2014 {ACM} International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '14 Adjunct Publication, Seattle, WA, {USA} - September 13 - 17, 2014}, pages = {1279--1282}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2638728.2641712}, doi = {10.1145/2638728.2641712}, timestamp = {Tue, 26 Mar 2024 11:01:21 +0100}, biburl = {https://dblp.org/rec/conf/huc/JungK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/JungP14, author = {Jaeyeon Jung and Matthai Philipose}, editor = {A. J. Brush and Adrian Friday and Julie A. Kientz and James Scott and Junehwa Song}, title = {Courteous glass}, booktitle = {Proceedings of the 2014 {ACM} International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '14 Adjunct Publication, Seattle, WA, {USA} - September 13 - 17, 2014}, pages = {1307--1312}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2638728.2641711}, doi = {10.1145/2638728.2641711}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/huc/JungP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/ChuJLM14, author = {Chun{-}Te Chu and Jaeyeon Jung and Zhicheng Liu and Ratul Mahajan}, editor = {Kien A. Hua and Yong Rui and Ralf Steinmetz and Alan Hanjalic and Apostol Natsev and Wenwu Zhu}, title = {sTrack: Secure Tracking in Community Surveillance}, booktitle = {Proceedings of the {ACM} International Conference on Multimedia, {MM} '14, Orlando, FL, USA, November 03 - 07, 2014}, pages = {837--840}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2647868.2655010}, doi = {10.1145/2647868.2655010}, timestamp = {Sat, 20 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mm/ChuJLM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/GuptaSPJM14, author = {Trinabh Gupta and Rayman Preet Singh and Amar Phanishayee and Jaeyeon Jung and Ratul Mahajan}, editor = {Ratul Mahajan and Ion Stoica}, title = {Bolt: Data Management for Connected Homes}, booktitle = {Proceedings of the 11th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 2014, Seattle, WA, USA, April 2-4, 2014}, pages = {243--256}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/nsdi14/technical-sessions/presentation/gupta}, timestamp = {Tue, 02 Feb 2021 08:05:43 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/GuptaSPJM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BhoraskarHJACJN0W14, author = {Ravi Bhoraskar and Seungyeop Han and Jinseong Jeon and Tanzirul Azim and Shuo Chen and Jaeyeon Jung and Suman Nath and Rui Wang and David Wetherall}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Brahmastra: Driving Apps to Test the Security of Third-Party Components}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {1021--1036}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/bhoraskar}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/BhoraskarHJACJN0W14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2014, editor = {Kevin Fu and Jaeyeon Jung}, title = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscw/BrushJMM13, author = {A. J. Bernheim Brush and Jaeyeon Jung and Ratul Mahajan and Frank Martinez}, editor = {Amy S. Bruckman and Scott Counts and Cliff Lampe and Loren G. Terveen}, title = {Digital neighborhood watch: investigating the sharing of camera data amongst neighbors}, booktitle = {Computer Supported Cooperative Work, {CSCW} 2013, San Antonio, TX, USA, February 23-27, 2013}, pages = {693--700}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2441776.2441853}, doi = {10.1145/2441776.2441853}, timestamp = {Tue, 15 Sep 2020 08:36:55 +0200}, biburl = {https://dblp.org/rec/conf/cscw/BrushJMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/BrushFHJMMMPSSS13, author = {A. J. Bernheim Brush and Evgeni Filippov and Danny Huang and Jaeyeon Jung and Ratul Mahajan and Frank Martinez and Khurshed Mazhar and Amar Phanishayee and Arjmand Samuel and James Scott and Rayman Preet Singh}, editor = {Friedemann Mattern and Silvia Santini and John F. Canny and Marc Langheinrich and Jun Rekimoto}, title = {Lab of things: a platform for conducting studies with connected devices in multiple homes}, booktitle = {The 2013 {ACM} International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '13, Zurich, Switzerland, September 8-12, 2013 - Adjunct Publication}, pages = {35--38}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2494091.2502068}, doi = {10.1145/2494091.2502068}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/huc/BrushFHJMMMPSSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interact/ChoeJLF13, author = {Eun Kyoung Choe and Jaeyeon Jung and Bongshin Lee and Kristie J. Fisher}, editor = {Paula Kotz{\'{e}} and Gary Marsden and Gitte Lindgaard and Janet Wesson and Marco Winckler}, title = {Nudging People Away from Privacy-Invasive Mobile Apps through Visual Framing}, booktitle = {Human-Computer Interaction - {INTERACT} 2013 - 14th {IFIP} {TC} 13 International Conference, Cape Town, South Africa, September 2-6, 2013, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {8119}, pages = {74--91}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40477-1\_5}, doi = {10.1007/978-3-642-40477-1\_5}, timestamp = {Wed, 18 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/interact/ChoeJLF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/BalebakoJLCN13, author = {Rebecca Balebako and Jaeyeon Jung and Wei Lu and Lorrie Faith Cranor and Carolyn Nguyen}, editor = {Lujo Bauer and Konstantin Beznosov and Lorrie Faith Cranor}, title = {"Little brothers watching you": raising awareness of data leaks on smartphones}, booktitle = {Symposium On Usable Privacy and Security, {SOUPS} '13, Newcastle, United Kingdom, July 24-26, 2013}, pages = {12:1--12:11}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2501604.2501616}, doi = {10.1145/2501604.2501616}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/BalebakoJLCN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LivshitsJ13, author = {Benjamin Livshits and Jaeyeon Jung}, editor = {Samuel T. King}, title = {Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {113--130}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/livshits}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/LivshitsJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/EnevJBRK12, author = {Miro Enev and Jaeyeon Jung and Liefeng Bo and Xiaofeng Ren and Tadayoshi Kohno}, editor = {Robert H'obbes' Zakon}, title = {SensorSift: balancing sensor data privacy and utility in automated face understanding}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {149--158}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420975}, doi = {10.1145/2420950.2420975}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/EnevJBRK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JungHW12, author = {Jaeyeon Jung and Seungyeop Han and David Wetherall}, editor = {Ting Yu and William Enck and Xuxian Jiang}, title = {Short paper: enhancing mobile application permissions with runtime feedback and constraints}, booktitle = {SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2012, October 19, 2012, Raleigh, NC, {USA}}, pages = {45--50}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381934.2381944}, doi = {10.1145/2381934.2381944}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JungHW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KelleyCCJSW12, author = {Patrick Gage Kelley and Sunny Consolvo and Lorrie Faith Cranor and Jaeyeon Jung and Norman M. Sadeh and David Wetherall}, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {A Conundrum of Permissions: Installing Applications on an Android Smartphone}, booktitle = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC} and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7398}, pages = {68--79}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34638-5\_6}, doi = {10.1007/978-3-642-34638-5\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KelleyCCJSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/ChoeCJHPK12, author = {Eun Kyoung Choe and Sunny Consolvo and Jaeyeon Jung and Beverly L. Harrison and Shwetak N. Patel and Julie A. Kientz}, editor = {Anind K. Dey and Hao{-}Hua Chu and Gillian R. Hayes}, title = {Investigating receptiveness to sensing and inference in the home using sensor proxies}, booktitle = {The 2012 {ACM} Conference on Ubiquitous Computing, Ubicomp '12, Pittsburgh, PA, USA, September 5-8, 2012}, pages = {61--70}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2370216.2370226}, doi = {10.1145/2370216.2370226}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/huc/ChoeCJHPK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/BrushJMS12, author = {A. J. Bernheim Brush and Jaeyeon Jung and Ratul Mahajan and James Scott}, editor = {Anind K. Dey and Hao{-}Hua Chu and Gillian R. Hayes}, title = {HomeLab: shared infrastructure for home technology field studies}, booktitle = {The 2012 {ACM} Conference on Ubiquitous Computing, Ubicomp '12, Pittsburgh, PA, USA, September 5-8, 2012}, pages = {1108--1113}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2370216.2370450}, doi = {10.1145/2370216.2370450}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/huc/BrushJMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/ZhuJSKW11, author = {David (Yu) Zhu and Jaeyeon Jung and Dawn Song and Tadayoshi Kohno and David Wetherall}, title = {TaintEraser: protecting sensitive data leaks using application-level taint tracking}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {45}, number = {1}, pages = {142--154}, year = {2011}, url = {https://doi.org/10.1145/1945023.1945039}, doi = {10.1145/1945023.1945039}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/ZhuJSKW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HornyackHJSW11, author = {Peter Hornyack and Seungyeop Han and Jaeyeon Jung and Stuart E. Schechter and David Wetherall}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {These aren't the droids you're looking for: retrofitting android to protect data from imperious applications}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {639--652}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2046780}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HornyackHJSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotos/WetherallCGHHJSW11, author = {David Wetherall and David R. Choffnes and Ben Greenstein and Seungyeop Han and Peter Hornyack and Jaeyeon Jung and Stuart E. Schechter and Xiao Sophia Wang}, editor = {Matt Welsh}, title = {Privacy Revelations for Web and Mobile Apps}, booktitle = {13th Workshop on Hot Topics in Operating Systems, HotOS XIII, Napa, California, USA, May 9-11, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/hotosxiii/privacy-revelations-web-and-mobile-apps}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/hotos/WetherallCGHHJSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/ChoeCJHK11, author = {Eun Kyoung Choe and Sunny Consolvo and Jaeyeon Jung and Beverly L. Harrison and Julie A. Kientz}, editor = {James A. Landay and Yuanchun Shi and Donald J. Patterson and Yvonne Rogers and Xing Xie}, title = {Living in a glass house: a survey of private moments in the home}, booktitle = {UbiComp 2011: Ubiquitous Computing, 13th International Conference, UbiComp 2011, Beijing, China, September 17-21, 2011, Proceedings}, pages = {41--44}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2030112.2030118}, doi = {10.1145/2030112.2030118}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/huc/ChoeCJHK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sensys/GilbertJLQSSC11, author = {Peter Gilbert and Jaeyeon Jung and Kyungmin Lee and Henry Qin and Daniel Sharkey and Anmol Sheth and Landon P. Cox}, editor = {Jie Liu and Philip Alexander Levis and Kay R{\"{o}}mer}, title = {YouProve: authenticity and fidelity in mobile sensing}, booktitle = {Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, SenSys 2011, Seattle, WA, USA, November 1-4, 2011}, pages = {176--189}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2070942.2070961}, doi = {10.1145/2070942.2070961}, timestamp = {Mon, 30 Aug 2021 16:43:16 +0200}, biburl = {https://dblp.org/rec/conf/sensys/GilbertJLQSSC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/MaganisJKSW11, author = {Gabriel Maganis and Jaeyeon Jung and Tadayoshi Kohno and Anmol Sheth and David Wetherall}, editor = {Anthony LaMarca and Landon P. Cox}, title = {Sensor tricorder: what does that sensor know about me?}, booktitle = {12th Workshop on Mobile Computing Systems and Applications, HotMobile '11, Phoenix, AZ, USA, March 1-3, 2011}, pages = {98--103}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2184489.2184510}, doi = {10.1145/2184489.2184510}, timestamp = {Tue, 06 Nov 2018 16:59:22 +0100}, biburl = {https://dblp.org/rec/conf/wmcsa/MaganisJKSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/ConsolvoJGPMA10, author = {Sunny Consolvo and Jaeyeon Jung and Ben Greenstein and Pauline S. Powledge and Gabriel Maganis and Daniel Avrahami}, editor = {Jakob E. Bardram and Marc Langheinrich and Khai N. Truong and Paddy Nixon}, title = {The Wi-Fi privacy ticker: improving awareness {\&} control of personal information exposure on Wi-Fi}, booktitle = {UbiComp 2010: Ubiquitous Computing, 12th International Conference, UbiComp 2010, Copenhagen, Denmark, September 26-29, 2010, Proceedings}, series = {{ACM} International Conference Proceeding Series}, pages = {321--330}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1864349.1864398}, doi = {10.1145/1864349.1864398}, timestamp = {Fri, 17 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/huc/ConsolvoJGPMA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/osdi/EnckGCCJMS10, author = {William Enck and Peter Gilbert and Byung{-}Gon Chun and Landon P. Cox and Jaeyeon Jung and Patrick D. McDaniel and Anmol Sheth}, editor = {Remzi H. Arpaci{-}Dusseau and Brad Chen}, title = {TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones}, booktitle = {9th {USENIX} Symposium on Operating Systems Design and Implementation, {OSDI} 2010, October 4-6, 2010, Vancouver, BC, Canada, Proceedings}, pages = {393--407}, publisher = {{USENIX} Association}, year = {2010}, url = {http://www.usenix.org/events/osdi10/tech/full\_papers/Enck.pdf}, timestamp = {Thu, 12 Mar 2020 11:35:55 +0100}, biburl = {https://dblp.org/rec/conf/osdi/EnckGCCJMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/GilbertCJW10, author = {Peter Gilbert and Landon P. Cox and Jaeyeon Jung and David Wetherall}, editor = {Angela Dalton and Roy Want}, title = {Toward trustworthy mobile sensing}, booktitle = {Eleventh Workshop on Mobile Computing Systems and Applications, HotMobile '10, Annapolis, Maryland, USA, February 22-23, 2010}, pages = {31--36}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1734583.1734592}, doi = {10.1145/1734583.1734592}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wmcsa/GilbertCJW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/KlasnjaCJGLPW09, author = {Predrag V. Klasnja and Sunny Consolvo and Jaeyeon Jung and Benjamin Greenstein and Louis LeGrand and Pauline S. Powledge and David Wetherall}, editor = {Dan R. Olsen Jr. and Richard B. Arthur and Ken Hinckley and Meredith Ringel Morris and Scott E. Hudson and Saul Greenberg}, title = {"When {I} am on Wi-Fi, {I} am fearless": privacy concerns {\&} practices in eeryday Wi-Fi use}, booktitle = {Proceedings of the 27th International Conference on Human Factors in Computing Systems, {CHI} 2009, Boston, MA, USA, April 4-9, 2009}, pages = {1993--2002}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1518701.1519004}, doi = {10.1145/1518701.1519004}, timestamp = {Fri, 17 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/KlasnjaCJGLPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/KonteFJ09, author = {Maria Konte and Nick Feamster and Jaeyeon Jung}, editor = {Sue B. Moon and Renata Teixeira and Steve Uhlig}, title = {Dynamics of Online Scam Hosting Infrastructure}, booktitle = {Passive and Active Network Measurement, 10th International Conference, {PAM} 2009, Seoul, Korea, April 1-3, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5448}, pages = {219--228}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00975-4\_22}, doi = {10.1007/978-3-642-00975-4\_22}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/pam/KonteFJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/JungMP08, author = {Jaeyeon Jung and Rodolfo A. Milito and Vern Paxson}, title = {On the adaptive real-time detection of fast-propagating network worms}, journal = {J. Comput. Virol.}, volume = {4}, number = {3}, pages = {197--210}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0080-y}, doi = {10.1007/S11416-007-0080-Y}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/JungMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JungSGWMK08, author = {Jaeyeon Jung and Anmol Sheth and Ben Greenstein and David Wetherall and Gabriel Maganis and Tadayoshi Kohno}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Privacy oracle: a system for finding application leaks with black box differential testing}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {279--288}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455806}, doi = {10.1145/1455770.1455806}, timestamp = {Tue, 10 Nov 2020 19:59:27 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JungSGWMK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/JungMP07, author = {Jaeyeon Jung and Rodolfo A. Milito and Vern Paxson}, editor = {Bernhard M. H{\"{a}}mmerli and Robin Sommer}, title = {On the Adaptive Real-Time Detection of Fast-Propagating Network Worms}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, {DIMVA} 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4579}, pages = {175--192}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73614-1\_11}, doi = {10.1007/978-3-540-73614-1\_11}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/JungMP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/GeambasuBJB07, author = {Roxana Geambasu and Tanya Bragin and Jaeyeon Jung and Magdalena Balazinska}, editor = {Brian Cooper and Nick Feamster}, title = {On-Demand View Materialization and Indexing for Network Forensic Analysis}, booktitle = {Third International Workshop on Networking Meets Databases, NetDB'07, Cambridge, MA, USA, April 10, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/netdb-07/demand-view-materialization-and-indexing-network-forensic-analysis}, timestamp = {Tue, 02 Feb 2021 08:05:49 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/GeambasuBJB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ndltd/Jung06, author = {Jaeyeon Jung}, title = {Real-time detection of malicious network activity using stochastic models}, school = {Massachusetts Institute of Technology, Cambridge, MA, {USA}}, year = {2006}, url = {https://hdl.handle.net/1721.1/37892}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ndltd/Jung06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/KannanJPK06, author = {Jayanthkumar Kannan and Jaeyeon Jung and Vern Paxson and Can Emre Koksal}, editor = {Jussara M. Almeida and Virg{\'{\i}}lio A. F. Almeida and Paul Barford}, title = {Semi-automated discovery of application session structure}, booktitle = {Proceedings of the 6th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2006, Rio de Janeriro, Brazil, October 25-27, 2006}, pages = {119--132}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1177080.1177096}, doi = {10.1145/1177080.1177096}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/KannanJPK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/ShinJB06, author = {Seungwon Shin and Jaeyeon Jung and Hari Balakrishnan}, editor = {Jussara M. Almeida and Virg{\'{\i}}lio A. F. Almeida and Paul Barford}, title = {Malware prevalence in the KaZaA file-sharing network}, booktitle = {Proceedings of the 6th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2006, Rio de Janeriro, Brazil, October 25-27, 2006}, pages = {333--338}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1177080.1177125}, doi = {10.1145/1177080.1177125}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/ShinJB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SchechterJSM06, author = {Stuart E. Schechter and Jaeyeon Jung and Will Stockwell and Cynthia D. McLain}, title = {Inoculating {SSH} Against Address Harvesting}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2006, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2006}, url = {https://www.ndss-symposium.org/ndss2006/inoculating-ssh-against-address-harvesting/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SchechterJSM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/FeamsterJB04, author = {Nick Feamster and Jaeyeon Jung and Hari Balakrishnan}, title = {An empirical study of "bogon" route advertisements}, journal = {Comput. Commun. Rev.}, volume = {35}, number = {1}, pages = {63--70}, year = {2004}, url = {https://doi.org/10.1145/1052812.1052826}, doi = {10.1145/1052812.1052826}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/FeamsterJB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/JungS04, author = {Jaeyeon Jung and Emil Sit}, editor = {Alfio Lombardo and James F. Kurose}, title = {An empirical study of spam traffic and the use of {DNS} black lists}, booktitle = {Proceedings of the 4th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2004, Taormina, Sicily, Italy, October 25-27, 2004}, pages = {370--375}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1028788.1028838}, doi = {10.1145/1028788.1028838}, timestamp = {Mon, 08 Jul 2019 07:25:59 +0200}, biburl = {https://dblp.org/rec/conf/imc/JungS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SchechterJB04, author = {Stuart E. Schechter and Jaeyeon Jung and Arthur W. Berger}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {Fast Detection of Scanning Worm Infections}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {59--81}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_4}, doi = {10.1007/978-3-540-30143-1\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/SchechterJB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JungPBB04, author = {Jaeyeon Jung and Vern Paxson and Arthur W. Berger and Hari Balakrishnan}, title = {Fast Portscan Detection Using Sequential Hypothesis Testing}, booktitle = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12 May 2004, Berkeley, CA, {USA}}, pages = {211--225}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SECPRI.2004.1301325}, doi = {10.1109/SECPRI.2004.1301325}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/JungPBB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/JungBB03, author = {Jaeyeon Jung and Arthur W. Berger and Hari Balakrishnan}, title = {Modelling TTL-based Internet Caches}, booktitle = {Proceedings {IEEE} {INFOCOM} 2003, The 22nd Annual Joint Conference of the {IEEE} Computer and Communications Societies, San Franciso, CA, USA, March 30 - April 3, 2003}, pages = {417--426}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/INFCOM.2003.1208693}, doi = {10.1109/INFCOM.2003.1208693}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/JungBB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/JungSBM02, author = {Jaeyeon Jung and Emil Sit and Hari Balakrishnan and Robert Tappan Morris}, title = {{DNS} performance and the effectiveness of caching}, journal = {Comput. Commun. Rev.}, volume = {32}, number = {1}, pages = {74}, year = {2002}, url = {https://doi.org/10.1145/510726.510748}, doi = {10.1145/510726.510748}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/JungSBM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/JungSBM02, author = {Jaeyeon Jung and Emil Sit and Hari Balakrishnan and Robert Tappan Morris}, title = {{DNS} performance and the effectiveness of caching}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {10}, number = {5}, pages = {589--603}, year = {2002}, url = {https://doi.org/10.1109/TNET.2002.803905}, doi = {10.1109/TNET.2002.803905}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/JungSBM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/JungKR02, author = {Jaeyeon Jung and Balachander Krishnamurthy and Michael Rabinovich}, editor = {David Lassner and David De Roure and Arun Iyengar}, title = {Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites}, booktitle = {Proceedings of the Eleventh International World Wide Web Conference, {WWW} 2002, May 7-11, 2002, Honolulu, Hawaii, {USA}}, pages = {293--304}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/511446.511485}, doi = {10.1145/511446.511485}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/JungKR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imw/JungSBM01, author = {Jaeyeon Jung and Emil Sit and Hari Balakrishnan and Robert Tappan Morris}, editor = {Vern Paxson}, title = {{DNS} performance and the effectiveness of caching}, booktitle = {Proceedings of the 1st {ACM} {SIGCOMM} Internet Measurement Workshop, {IMW} 2001, San Francisco, California, USA, November 1-2, 2001}, pages = {153--167}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/505202.505223}, doi = {10.1145/505202.505223}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imw/JungSBM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/JungLC00, author = {Jaeyeon Jung and Dongman Lee and Kilnam Chon}, title = {Proactive Web caching with cumulative prefetching for large multimedia data}, journal = {Comput. Networks}, volume = {33}, number = {1-6}, pages = {645--655}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00064-5}, doi = {10.1016/S1389-1286(00)00064-5}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/JungLC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HuffakerJNWC98, author = {Bradley Huffaker and Jaeyeon Jung and Evi Nemeth and Duane Wessels and Kimberly C. Claffy}, title = {Visualization of the Growth and Topology of the {NLANR} Caching Hierarchy}, journal = {Comput. Networks}, volume = {30}, number = {22-23}, pages = {2131--2139}, year = {1998}, url = {https://doi.org/10.1016/S0169-7552(98)00239-6}, doi = {10.1016/S0169-7552(98)00239-6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/HuffakerJNWC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.