Gail-Joon Ahn
Arizona State University
H-index: 65
North America-United States
Top articles of Gail-Joon Ahn
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Systems and methods for a policy-governed content mediation model for mobile augmented reality applications | 2024/3/7 | ||
SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality | Luis Claramunt Carlos Rubio-Medrano Jaejong Baek Gail-Joon Ahn | 2023/5/24 | |
DyPolDroid: Protecting against permission-abuse attacks in android | Information Systems Frontiers | Carlos E Rubio-Medrano Pradeep Kumar Duraisamy Soundrapandian Matthew Hill Luis Claramunt Jaejong Baek | 2023/4 |
Systems and methods for blockchain-based automatic key generation | 2023/2/21 | ||
Guaranteeing Anonymity in Attribute-Based Authorization | arXiv preprint arXiv:2310.04896 | Erin Lanus Charles J Colbourn Gail-Joon Ahn | 2023/10/7 |
Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer | Jaejong Baek Pradeep Kumar Duraisamy Soundrapandian Sukwha Kyung Ruoyu Wang Yan Shoshitaishvili | 2023/6/27 | |
ViK: practical mitigation of temporal memory safety violations through object ID inspection | Haehyun Cho Jinbum Park Adam Oest Tiffany Bao Ruoyu Wang | 2022/2/28 | |
DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android | Secure Knowledge Management In The Artificial Intelligence Era: 9th International Conference, SKM 2021, San Antonio, TX, USA, October 8–9, 2021, Proceedings | Jaejong Baek Gail-Joon Ahn | 2022/2/22 |
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior | Penghui Zhang Zhibo Sun Sukwha Kyung Hans Walter Behrens Zion Leonahenahe Basque | 2022/11/7 | |
Towards automated content-based photo privacy control in user-centered social networks | Nishant Vishwamitra Yifang Li Hongxin Hu Kelly Caine Long Cheng | 2022/4/14 | |
Mitigating the CACHEKIT attack | Mauricio Gutierrez Ziming Zhao Adam Doupé Yan Shoshitaishvili Gail Joon Ahn | 2021/1/1 | |
Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing | Penghui Zhang Adam Oest Haehyun Cho Zhibo Sun RC Johnson | 2021/5/24 | |
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases. | Sung Ta Dinh Haehyun Cho Kyle Martin Adam Oest Kyle Zeng | 2021/2/21 | |
Poster: DyPolDroid: User-centered counter-policies against android permission-abuse attacks | Matthew Hill Carlos E Rubio-Medrano Luis M Claramunt Jaejong Baek Gail-Joon Ahn | 2021/9/6 | |
Mutent: Dynamic android intent protection with ownership-based key distribution and security contracts | Pradeep Kumar Duraisamy Soundrapandian Tiffany Bao Jaejong Baek Yan Shoshitaishvili Adam Doupé | 2021/1/5 | |
Poster: Preventing spatial and privacy attacks in mobile augmented reality technologies | Luis M Claramunt Larissa Pokam Epse Carlos E Rubio-Medrano Jaejong Baek Gail-Joon Ahn | 2021/9/6 | |
What's in a Name? Exploring {CA} Certificate Control | Zane Ma Joshua Mason Sarvar Patel Manos Antonakakis Mariana Raykova | 2021 | |
ExSol Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems | Digital Threats: Research and Practice | Josephine Lamp Carlos E Rubio-Medrano Ziming Zhao Gail-Joon Ahn | 2021/6/8 |
Having Your Cake and Eating It: An Analysis of {Concession-Abuse-as-a-Service} | Zhibo Sun Adam Oest Penghui Zhang Carlos Rubio-Medrano Tiffany Bao | 2021 | |
Security analysis on practices of certificate authorities in the HTTPS phishing ecosystem | Doowon Kim Haehyun Cho Yonghwi Kwon Adam Doupé Sooel Son | 2021/5/24 |