If you made any changes in Pure, your changes will be visible here soon.

Personal profile

Education/Academic qualification

PHD, George Mason University

… → 2000

Fingerprint Fingerprint is based on mining the text of the experts' scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 10 Similar Profiles
Access control Engineering & Materials Science
Cloud computing Engineering & Materials Science
Specifications Engineering & Materials Science
Internet Engineering & Materials Science
Industry Engineering & Materials Science
Accreditation Engineering & Materials Science
Cryptography Engineering & Materials Science
Authorization Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1999 2018

  • 4797 Citations
  • 34 h-Index
  • 138 Conference contribution
  • 69 Article
  • 4 Chapter
  • 4 Editorial

AIM-SDN: Aacking information mismanagement in SDN-datastores

Dixit, V. H., Doupe, A., Shoshitaishvili, Y., Zhao, Z. & Ahn, G-J., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 664-676 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network management
Critical infrastructures
Controllers
Cloud computing
Information management

CacheLight: Defeating the cachekit attack

Gutierrez, M., Zhao, Z., Doupe, A., Shoshitaishvili, Y. & Ahn, G-J., Oct 15 2018, ASHES 2018 - Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2018. Association for Computing Machinery, p. 65-74 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Inspection
Hardware
Malware
Hardware security

Challenges, opportunities and a framework for web environment forensics

Mabey, M., Doupe, A., Zhao, Z. & Ahn, G-J., Jan 1 2018, Advances in Digital Forensics XIV - 14th IFIP WG 11.9 International Conference, 2018. Peterson, G. & Shenoi, S. (eds.). Springer New York LLC, p. 11-33 23 p. (IFIP Advances in Information and Communication Technology; vol. 532).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

World Wide Web
Digital forensics

Challenges and preparedness of SDN-based firewalls

Dixit, V. H., Kyung, S., Zhao, Z., Doupe, A., Shoshitaishvili, Y. & Ahn, G-J., Mar 14 2018, SDN-NFVSec 2018 - Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, Co-located with CODASPY 2018. Association for Computing Machinery, Inc, Vol. 2018-January. p. 33-38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cost effectiveness
Scalability
Controllers
Industry

Defining and detecting environment discrimination in android apps

Hong, Y., Hu, Y., Lai, C. M., Felix Wu, S., Neamtiu, I., McDaniel, P., Yu, P., Cam, H. & Ahn, G-J., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Springer Verlag, p. 510-529 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Android (operating system)
Malware
Application programming interfaces (API)
Dynamic analysis

Projects 2008 2027