Follow
Min Suk Kang
Title
Cited by
Cited by
Year
The Crossfire Attack
MS Kang, SB Lee, VD Gligor
IEEE Symposium on Security and Privacy, 127-141, 2013
3712013
SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks
MS Kang, VD Gligor, V Sekar
Network and Distributed System Security (NDSS) Symposium, 2016
1462016
CoDef: Collaborative defense against large-scale link-flooding attacks
SB Lee, MS Kang, VD Gligor
Proceedings of the ninth ACM conference on Emerging networking experiments …, 2013
1412013
A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network
M Tran, I Choi, GJ Moon, VA Vu, MS Kang
Proceedings of IEEE Symposium on Security and Privacy 2020 (IEEE S&P 2020), 2020
1262020
Adaptive interference-aware multi-channel clustering algorithm in a ZigBee network in the presence of WLAN interference
MS Kang, JW Chong, H Hyun, SM Kim, BH Jung, DK Sung
2007 2nd International Symposium on Wireless Pervasive Computing, 2007
1142007
Obscuro: A bitcoin mixer using trusted execution environments
M Tran, L Luu, MS Kang, I Bentov, P Saxena
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
792018
Routing bottlenecks in the internet: Causes, exploits, and countermeasures
MS Kang, VD Gligor
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
542014
On the Feasibility of Rerouting-based DDoS Defenses
M Tran, MS Kang, HC Hsiao, WH Chiang, SP Tung, YS Wang
Proceedings of IEEE Symposium on Security and Privacy 2019 (IEEE S&P 2019), 2019
432019
Data transfer method, data transmission apparatus, and communication system in multi-hop relay system
YH Jeon, TK Yu, JH Kwun, CH Min, MS Kang, HD Kim, BC Jung, DW Lee
US Patent 8,897,698, 2014
352014
A pre-whitening scheme in a MIMO-based spectrum-sharing environment
MS Kang, BC Jung, DK Sung, W Choi
IEEE Communications Letters 12 (11), 831-833, 2008
342008
DIDA: Distributed in-network defense architecture against amplified reflection DDoS attacks
XZ Khooi, L Csikor, DM Divakaran, MS Kang
2020 6th IEEE Conference on Network Softwarization (NetSoft), 277-281, 2020
332020
Practical verifiable in-network filtering for DDoS defense
D Gong, M Tran, S Shinde, H Jin, V Sekar, P Saxena, MS Kang
2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019
302019
A study on the green cellular network with femtocells
D Chee, M suk Kang, H Lee, BC Jung
2011 third international conference on ubiquitous and future networks (ICUFN …, 2011
262011
Privacy of DNS-over-HTTPS: Requiem for a Dream?
L Csikor, H Singh, MS Kang, DM Divakaran
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 252-271, 2021
232021
On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin
M Tran, A Shenoi, MS Kang
USENIX Security 2021, 2021
222021
Ubiquitous wearable computer (UWC)-aided coexistence algorithm in an overlaid network environment of WLAN and ZigBee networks
BH Jung, JW Chong, SH Jeong, HY Hwang, SM Kim, MS Kang, DK Sung
2007 2nd International Symposium on Wireless Pervasive Computing, 2007
222007
Decentralized intercell interference coordination in uplink cellular networks using adaptive sub-band exclusion
MS Kang, BC Jung
2009 IEEE Wireless Communications and Networking Conference, 1-5, 2009
192009
Tuple space explosion: A denial-of-service attack against a software packet classifier
L Csikor, DM Divakaran, MS Kang, A Kőrösi, B Sonkoly, D Haja, ...
Proceedings of the 15th International Conference on Emerging Networking …, 2019
152019
A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks
N Lakshmanan, N Budhdev, MS Kang, MC Chan, J Han
USENIX Security 2021, 2021
142021
SurFi: Detecting surveillance camera looping attacks with Wi-Fi channel state information
N Lakshmanan, I Bang, MS Kang, J Han, JT Lee
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
142019
The system can't perform the operation now. Try again later.
Articles 1–20