Doowon Kim
YOU?
Author Swipe
View article: A Systematic Evaluation of Parameter-Efficient Fine-Tuning Methods for the Security of Code LLMs
A Systematic Evaluation of Parameter-Efficient Fine-Tuning Methods for the Security of Code LLMs Open
Code-generating Large Language Models (LLMs) significantly accelerate software development. However, their frequent generation of insecure code presents serious risks. We present a comprehensive evaluation of seven parameter-efficient fine…
View article: Registration, Detection, and Deregistration: Analyzing DNS Abuse for Phishing Attacks
Registration, Detection, and Deregistration: Analyzing DNS Abuse for Phishing Attacks Open
Phishing continues to pose a significant cybersecurity threat. While blocklists currently serve as a primary defense, due to their reactive, passive nature, these delayed responses leave phishing websites operational long enough to harm po…
View article: Quantitative Comparison of Ventilation Parameters of Different Approaches to Ventilator Splitting and Multiplexing
Quantitative Comparison of Ventilation Parameters of Different Approaches to Ventilator Splitting and Multiplexing Open
CONTEXT: Amid the COVID-19 pandemic, this study delves into ventilator shortages, exploring simple split ventilation (SSV), simple differential ventilation (SDV), and differential multiventilation (DMV). The knowledge gap centers on unders…
View article: An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection Open
Large Language Models (LLMs) have transformed code completion tasks, providing context-based suggestions to boost developer productivity in software engineering. As users often fine-tune these models for specific applications, poisoning an…
View article: Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models
Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models Open
Phishing attacks pose a significant threat to Internet users, with cybercriminals elaborately replicating the visual appearance of legitimate websites to deceive victims. Visual similarity-based detection systems have emerged as an effecti…
View article: Sharing cyber threat intelligence: Does it really help?
Sharing cyber threat intelligence: Does it really help? Open
The sharing of Cyber Threat Intelligence (CTI) across organizations is gaining traction, as it can automate threat analysis and improve security awareness.However, limited empirical studies exist on the prevalent types of cybersecurity thr…
View article: Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models
Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models Open
AI-powered coding assistant tools have revolutionized the software engineering ecosystem. However, prior work has demonstrated that these tools are vulnerable to poisoning attacks. In a poisoning attack, an attacker intentionally injects m…
View article: Demystifying the Regional Phishing Landscape in South Korea
Demystifying the Regional Phishing Landscape in South Korea Open
The ever-increasing phishing campaigns around the globe have been one of the main threats to cyber security. In response, the global anti-phishing entity (e. g., APWG) collectively maintains the up-to-date blacklist database (e. g., eCrime…
View article: Not All Asians are the Same: A Disaggregated Approach to Identifying Anti-Asian Racism in Social Media
Not All Asians are the Same: A Disaggregated Approach to Identifying Anti-Asian Racism in Social Media Open
Recent policy initiatives have acknowledged the importance of disaggregating data pertaining to diverse Asian ethnic communities to gain a more comprehensive understanding of their current status and to improve their overall well-being. Ho…
View article: Hiding critical program components via ambiguous translation
Hiding critical program components via ambiguous translation Open
Software systems may contain critical program components such as patented program logic or sensitive data. When those components are reverse-engineered by adversaries, it can cause significantly damage (e.g., financial loss or operational …
View article: TLS 1.3 in Practice:How TLS 1.3 Contributes to the Internet
TLS 1.3 in Practice:How TLS 1.3 Contributes to the Internet Open
Transport Layer Security (TLS) has become the norm for secure communication over the Internet. In August 2018, TLS 1.3, the latest version of TLS, was approved, providing improved security and performance of the previous TLS version. In th…
View article: Scam Pandemic: How Attackers Exploit Public Fear through Phishing
Scam Pandemic: How Attackers Exploit Public Fear through Phishing Open
As the COVID-19 pandemic started triggering widespread lockdowns across the globe, cybercriminals did not hesitate to take advantage of users' increased usage of the Internet and their reliance on it. In this paper, we carry out a comprehe…
View article: Understanding of Adversary Behavior and Security Threats in Public Key Infrastructures
Understanding of Adversary Behavior and Security Threats in Public Key Infrastructures Open
Public Key Infrastructure (PKI) is designed to guarantee the authenticity and integrity of digital assets such as messages, executable binaries, etc. In PKIs, there are two representative applications: 1) the Web PKI and 2) the Code-Signin…
View article: Issued for Abuse: Measuring the Underground Trade in Code Signing Certificate
Issued for Abuse: Measuring the Underground Trade in Code Signing Certificate Open
Recent measurements of the Windows code-signing certificate ecosystem have highlighted various forms of abuse that allow malware authors to produce malicious code carrying valid digital signatures. However, the underground trade that allow…