JK
Publications
- A comprehensive security assessment framework for software-defined networks
- GapFinder: Finding Inconsistency of Security Information from Unstructured Text
- AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks
- A Framework for Policy Inconsistency Detection in Software-Defined Networks
- BottleNet: Hiding Network Bottlenecks Using SDN-Based Topology Deception
- Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks
- EqualNet: a Secure and Practical Defense for Long-term Network Topology Obfuscation
- Heimdallr: Fingerprinting SD-WAN Control-Plane Architecture via Encrypted Control Traffic
- Extended data plane architecture for in-network security services in software-defined networks
- Systematizing Attacks and Defenses in Software-Defined Networking: A Survey
- Systematizing Attacks and Defenses in Software-Defined Networking: A Survey
- Enhancing security in SDN: Systematizing attacks and defenses from a penetration perspective
- Ambusher: Exploring the Security of Distributed SDN Controllers through Protocol State Fuzzing
- Ambusher: Exploring the Security of Distributed SDN Controllers Through Protocol State Fuzzing
- Fatriot: Fault-tolerant MEC architecture for mission-critical systems using a smartNIC
- Fatriot: Fault-tolerant MEC architecture for mission-critical systems using a SmartNIC
- CENSor: Detecting Illicit Bitcoin Operation via GCN-based Hyperedge Classification
- gShock: A GNN-based Fingerprinting System for Permissioned Blockchain Networks over Encrypted Channels
- gShock: A GNN-Based Fingerprinting System for Permissioned Blockchain Networks Over Encrypted Channels
- CENSor: Detecting Illicit Bitcoin Operation via GCN-Based Hyperedge Classification
- Enhancing Security in SDN: Systematizing Attacks and Defenses from a Penetration Perspective
- Uncovering Threats in Container Systems: A Study on Misconfigured Container Components in the Wild
- Exploring Security Enhancements in Kubernetes CNI: A Deep Dive into Network Policies
- Exploring Security Enhancements in Kubernetes CNI: A Deep Dive Into Network Policies
Usage metrics
Co-workers & collaborators
- MS
Minjae Seo
- SL
Seungsoo Lee
- JN
Jaehyun Nam
- VY
Vinod Yegneswaran
- PP
Phillip Porras
- GG
Guofei Gu