Min Suk Kang
Cited by
Cited by
The Crossfire Attack
MS Kang, SB Lee, VD Gligor
IEEE Symposium on Security and Privacy, 127-141, 2013
SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks
MS Kang, VD Gligor, V Sekar
Network and Distributed System Security (NDSS) Symposium, 2016
CoDef: Collaborative defense against large-scale link-flooding attacks
SB Lee, MS Kang, VD Gligor
Proceedings of the ninth ACM conference on Emerging networking experiments …, 2013
A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network
M Tran, I Choi, GJ Moon, VA Vu, MS Kang
Proceedings of IEEE Symposium on Security and Privacy 2020 (IEEE S&P 2020), 2020
Adaptive interference-aware multi-channel clustering algorithm in a ZigBee network in the presence of WLAN interference
MS Kang, JW Chong, H Hyun, SM Kim, BH Jung, DK Sung
2007 2nd International Symposium on Wireless Pervasive Computing, 2007
Obscuro: A bitcoin mixer using trusted execution environments
M Tran, L Luu, MS Kang, I Bentov, P Saxena
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
Routing bottlenecks in the internet: Causes, exploits, and countermeasures
MS Kang, VD Gligor
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
On the Feasibility of Rerouting-based DDoS Defenses
M Tran, MS Kang, HC Hsiao, WH Chiang, SP Tung, YS Wang
Proceedings of IEEE Symposium on Security and Privacy 2019 (IEEE S&P 2019), 2019
Data transfer method, data transmission apparatus, and communication system in multi-hop relay system
YH Jeon, TK Yu, JH Kwun, CH Min, MS Kang, HD Kim, BC Jung, DW Lee
US Patent 8,897,698, 2014
A pre-whitening scheme in a MIMO-based spectrum-sharing environment
MS Kang, BC Jung, DK Sung, W Choi
IEEE Communications Letters 12 (11), 831-833, 2008
DIDA: Distributed in-network defense architecture against amplified reflection DDoS attacks
XZ Khooi, L Csikor, DM Divakaran, MS Kang
2020 6th IEEE Conference on Network Softwarization (NetSoft), 277-281, 2020
Practical verifiable in-network filtering for DDoS defense
D Gong, M Tran, S Shinde, H Jin, V Sekar, P Saxena, MS Kang
2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019
A study on the green cellular network with femtocells
D Chee, M suk Kang, H Lee, BC Jung
2011 third international conference on ubiquitous and future networks (ICUFN …, 2011
Privacy of DNS-over-HTTPS: Requiem for a Dream?
L Csikor, H Singh, MS Kang, DM Divakaran
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 252-271, 2021
On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin
M Tran, A Shenoi, MS Kang
USENIX Security 2021, 2021
Ubiquitous wearable computer (UWC)-aided coexistence algorithm in an overlaid network environment of WLAN and ZigBee networks
BH Jung, JW Chong, SH Jeong, HY Hwang, SM Kim, MS Kang, DK Sung
2007 2nd International Symposium on Wireless Pervasive Computing, 2007
Decentralized intercell interference coordination in uplink cellular networks using adaptive sub-band exclusion
MS Kang, BC Jung
2009 IEEE Wireless Communications and Networking Conference, 1-5, 2009
Tuple space explosion: A denial-of-service attack against a software packet classifier
L Csikor, DM Divakaran, MS Kang, A Kőrösi, B Sonkoly, D Haja, ...
Proceedings of the 15th International Conference on Emerging Networking …, 2019
A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks
N Lakshmanan, N Budhdev, MS Kang, MC Chan, J Han
USENIX Security 2021, 2021
SurFi: Detecting surveillance camera looping attacks with Wi-Fi channel state information
N Lakshmanan, I Bang, MS Kang, J Han, JT Lee
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20