Taekyoung Kwon
YOU?
Author Swipe
View article: Political Bias Prediction Models Focus on Source Cues, Not Semantics
Political Bias Prediction Models Focus on Source Cues, Not Semantics Open
Significant efforts have been made to analyze the political stance or bias in news articles, especially as political polarization intensifies over the years. Recent advancements in machine learning have enabled researchers to develop vario…
View article: CovRL: Fuzzing JavaScript Engines with Coverage-Guided Reinforcement Learning for LLM-based Mutation
CovRL: Fuzzing JavaScript Engines with Coverage-Guided Reinforcement Learning for LLM-based Mutation Open
Fuzzing is an effective bug-finding technique but it struggles with complex systems like JavaScript engines that demand precise grammatical input. Recently, researchers have adopted language models for context-aware mutation in fuzzing to …
View article: Adversarial Feature Alignment: Balancing Robustness and Accuracy in Deep Learning via Adversarial Training
Adversarial Feature Alignment: Balancing Robustness and Accuracy in Deep Learning via Adversarial Training Open
Deep learning models continue to advance in accuracy, yet they remain vulnerable to adversarial attacks, which often lead to the misclassification of adversarial examples. Adversarial training is used to mitigate this problem by increasing…
View article: Amplifying Training Data Exposure through Fine-Tuning with Pseudo-Labeled Memberships
Amplifying Training Data Exposure through Fine-Tuning with Pseudo-Labeled Memberships Open
Neural language models (LMs) are vulnerable to training data extraction attacks due to data memorization. This paper introduces a novel attack scenario wherein an attacker adversarially fine-tunes pre-trained LMs to amplify the exposure of…
View article: On the Impact of Deployment Errors in Location-Based Key Predistribution Protocols for Wireless Sensor Networks
On the Impact of Deployment Errors in Location-Based Key Predistribution Protocols for Wireless Sensor Networks Open
Location-based pairwise key predistribution protocols have been developed as promising solutions for addressing security concerns in wireless sensor networks. These methods efficiently distribute symmetric keys among sensor nodes based on …
View article: Coexistence of Deepfake Defenses: Addressing the Poisoning Challenge
Coexistence of Deepfake Defenses: Addressing the Poisoning Challenge Open
As Generative Adversarial Networks advance, deepfakes have become increasingly realistic, thereby escalating societal, economic, and political threats. In confronting these heightened risks, the research community has identified two promis…
View article: Under the Hood of DANE Mismanagement in SMTP
Under the Hood of DANE Mismanagement in SMTP Open
The DNS-based Authentication of Named Entities (DANE) is an Internet security protocol that enables a TLS connection without relying on trusted third parties like CAs by introducing a new DNS record type, TLSA. DANE leverages DNSSEC PKI to…
View article: Federated Experimentation Infrastructure Interconnecting Sites from Both Europe and South Korea (SmartFIRE)
Federated Experimentation Infrastructure Interconnecting Sites from Both Europe and South Korea (SmartFIRE) Open
The main achievement of SmartFIRE [1, 2] is the design and implementation of a shared experimental facility spanning different testbeds, which are platforms located in Europe (EU) and South Korea (KR) and offered for conducting transparent…
View article: Distributed Watchdogs Based on Blockchain for Securing Industrial Internet of Things
Distributed Watchdogs Based on Blockchain for Securing Industrial Internet of Things Open
The Industrial Internet of Things (IIoT) could enhance automation and analytics in industrial environments. Despite the promising benefits of IIoT, securely managing software updates is a challenging problem for those critical applications…
View article: Towards bidirectional LUT-level detection of hardware Trojans
Towards bidirectional LUT-level detection of hardware Trojans Open
FPGAs are field-programmable and reconfigurable integrated circuits; consequently, they entail numerous security concerns. For example, malicious functions such as hardware Trojans (HTs), can be inserted into the circuits in both developme…
View article: A Password Meter without Password Exposure
A Password Meter without Password Exposure Open
To meet password selection criteria of a server, a user occasionally needs to provide multiple choices of password candidates to an on-line password meter, but such user-chosen candidates tend to be derived from the user’s previous passwor…
View article: Toward Fast and Scalable Firmware Fuzzing With Dual-Level Peripheral Modeling
Toward Fast and Scalable Firmware Fuzzing With Dual-Level Peripheral Modeling Open
Firmware vulnerabilities raise serious security concerns with the rapid growth in connected embedded devices. Fuzzing is an effective dynamic testing technique to find those vulnerabilities; however, firmware fuzzing is very limited by har…
View article: Evaluating Code Coverage for Kernel Fuzzers via Function Call Graph
Evaluating Code Coverage for Kernel Fuzzers via Function Call Graph Open
The OS kernel, which has full system privileges, is an attractive attack surface. A kernel fuzzer that targets system calls in fuzzing is a popular tool for discovering kernel bugs that can induce kernel privilege escalation attacks. To th…
View article: Birds of a <i>Feature:</i> Intrafamily Clustering for Version Identification of Packed Malware
Birds of a <i>Feature:</i> Intrafamily Clustering for Version Identification of Packed Malware Open
It is challenging for malware lineage inference to identify versions of collected malware by ensuring high accuracy in clustering. In this article, we tackle this problem and present a novel mechanism using behavioral features for version …
View article: A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things
A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things Open
Wireless sensor networks (WSNs) have played an important role in the Internet of Things (IoT), and the 5G network is being considered as a major candidate for IoT's communication network with the advent of 5G commercialization. The potenti…
View article: Cryptanalysis of the Lightweight and Anonymous Authentication and Access Control for Real-time Applications in Wireless Sensor Networks
Cryptanalysis of the Lightweight and Anonymous Authentication and Access Control for Real-time Applications in Wireless Sensor Networks Open
In wireless sensor networks, sensor nodes collect different types of data from the environment andnot all collected data has the same security importance. Basically, for real-time applications, user authenticationto ensure that only author…
View article: Special Issue on Cyber Security and AI
Special Issue on Cyber Security and AI Open
We are facing a big data world, embedded with interconnected IoT (Internet of Things) devices that generate large volumes of data. They pose a significant challenge to academia and industries focused on digital security: A variety of new m…