BUM JUN KWON
Title
Cited by
Cited by
Year
The dropper effect: Insights into malware distribution with downloader graph analytics
BJ Kwon, J Mondal, J Jang, L Bilge, T Dumitraş
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1162015
Certified malware: Measuring breaches of trust in the windows code-signing pki
D Kim, BJ Kwon, T Dumitraş
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
502017
Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns
BJ Kwon, V Srinivas, A Deshpande, T Dumitras
The Network and Distributed System Security Symposium 2017, 2017
312017
The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing {PKI}
D Kim, BJ Kwon, K Kozák, C Gates, T Dumitraș
27th {USENIX} Security Symposium ({USENIX} Security 18), 851-868, 2018
162018
Issued for Abuse: Measuring the Underground Trade in Code Signing Certificate
K Kozák, BJ Kwon, D Kim, C Gates, T Dumitraş
https://weis2018.econinfosec.org/wp-content/uploads/sites/5/2018/06 …, 0
16*
Detecting malicious beaconing communities using lockstep detection and co-occurrence graph
J Jang, DH Kirat, BJ Kwon, DL Schales, MP Stoecklin
US Patent 10,887,323, 2021
12021
Certified Malware in South Korea: A Localized Study of Breaches of Trust in Code-Signing PKI Ecosystem
B Kwon, S Hong, Y Jeon, D Kim
International Conference on Information and Communications Security, 59-77, 2021
2021
Detecting malicious beaconing communities using lockstep detection and co-occurrence graph
J Jang, DH Kirat, BJ Kwon, DL Schales, MP Stoecklin
US Patent App. 17/137,595, 2021
2021
Understand, Detect, and Block Malware Distribution from a Global Viewpoint
BJ Kwon
University of Maryland, College Park, 2018
2018
Development of grasping/manipulating system simulation platform considering collision model
B Kwon, N Motoi, T Shimono, A Kawamura
2013 IEEE International Conference on Mechatronics (ICM), 522-527, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–10