The dropper effect: Insights into malware distribution with downloader graph analytics BJ Kwon, J Mondal, J Jang, L Bilge, T Dumitraş Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 172 | 2015 |
Certified malware: Measuring breaches of trust in the windows code-signing pki D Kim, BJ Kwon, T Dumitraş Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 78 | 2017 |
Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns BJ Kwon, V Srinivas, A Deshpande, T Dumitras The Network and Distributed System Security Symposium 2017, 2017 | 39 | 2017 |
The Broken Shield: Measuring Revocation Effectiveness in the Windows {Code-Signing}{PKI} D Kim, BJ Kwon, K Kozák, C Gates, T Dumitraș 27th USENIX Security Symposium (USENIX Security 18), 851-868, 2018 | 36 | 2018 |
Issued for Abuse: Measuring the Underground Trade in Code Signing Certificate K Kozák, BJ Kwon, D Kim, C Gates, T Dumitraş https://weis2018.econinfosec.org/wp-content/uploads/sites/5/2018/06 …, 0 | 20* | |
Certified malware in south korea: A localized study of breaches of trust in code-signing PKI ecosystem B Kwon, S Hong, Y Jeon, D Kim Information and Communications Security: 23rd International Conference …, 2021 | 9 | 2021 |
Detecting malicious beaconing communities using lockstep detection and co-occurrence graph J Jang, DH Kirat, BJ Kwon, DL Schales, MP Stoecklin US Patent 10,887,323, 2021 | 7 | 2021 |
Detecting malicious beaconing communities using lockstep detection and co-occurrence graph J Jang, DH Kirat, BJ Kwon, DL Schales, MP Stoecklin US Patent 11,936,661, 2024 | | 2024 |
Understand, Detect, and Block Malware Distribution from a Global Viewpoint BJ Kwon University of Maryland, College Park, 2018 | | 2018 |
Development of grasping/manipulating system simulation platform considering collision model B Kwon, N Motoi, T Shimono, A Kawamura 2013 IEEE International Conference on Mechatronics (ICM), 522-527, 2013 | | 2013 |