Follow
Jonghoon Kwon
Jonghoon Kwon
Network Security Group, ETH Zürich, Switzerland
Verified email at inf.ethz.ch - Homepage
Title
Cited by
Cited by
Year
PsyBoG: A scalable botnet detection method for large-scale DNS traffic
J Kwon, J Lee, H Lee, A Perrig
Computer Networks 97, 48-73, 2016
1322016
SCIONLAB: A Next-Generation Internet Testbed
J Kwon, JA García-Pardo, M Legner, F Wirz, M Frei, D Hausheer, A Perrig
In Proceedings of the 28th IEEE International Conference on Network …, 2020
422020
CLORIFI: software vulnerability discovery using code clone verification
H Li, H Kwon, J Kwon, H Lee
Concurrency and Computation: Practice and Experience 28 (6), 1900-1917, 2016
392016
An incrementally deployable anti-spoofing mechanism for software-defined networks
J Kwon, D Seo, M Kwon, H Lee, A Perrig, H Kim
Computer Communications 64, 1-20, 2015
332015
Deployment and scalability of an inter-domain multi-path routing infrastructure
C Krähenbühl, S Tabaeiaghdaei, C Gloor, J Kwon, A Perrig, D Hausheer, ...
Proceedings of the 17th International Conference on emerging Networking …, 2021
282021
PsyBoG: Power spectral density analysis for detecting botnet groups
J Kwon, J Kim, J Lee, H Lee, A Perrig
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
262014
Bingraph: Discovering mutant malware using hierarchical semantic signatures
J Kwon, H Lee
2012 7th International Conference on Malicious and Unwanted Software, 104-111, 2012
262012
A scalable approach for vulnerability discovery based on security patches
H Li, H Kwon, J Kwon, H Lee
Applications and Techniques in Information Security: 5th International …, 2014
222014
Hidden bot detection by tracing non-human generated traffic at the zombie host
J Kwon, J Lee, H Lee
International Conference on Information Security Practice and Experience …, 2011
202011
Honeyid: Unveiling hidden spywares by generating bogus events
J Han, J Kwon, H Lee
IFIP International Information Security Conference, 669-673, 2008
172008
Droidgraph: discovering android malware by analyzing semantic behavior
J Kwon, J Jeong, J Lee, H Lee
2014 IEEE Conference on Communications and Network Security, 2014
142014
MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android
J Jeong, D Seo, C Lee, J Kwon, H Lee, J Milburn
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
132014
SVLAN: Secure & scalable network virtualization
J Kwon, T Lee, C Hähni, A Perrig
Proceedings 2020 Network and Distributed System Security Symposium (NDSS …, 2020
102020
Mondrian: Comprehensive Inter-domain Network Zoning Architecture.
J Kwon, C Hähni, P Bamert, A Perrig
NDSS, 2021
52021
Creating a secure underlay for the internet
H Birge-Lee, J Wanner, GH Cimaszewski, J Kwon, L Wang, F Wirz, ...
31st USENIX Security Symposium (USENIX Security 22), 2601-2618, 2022
42022
협업 기반의 중앙집중형 봇넷 탐지 및 관제 시스템 설계
권종훈, 임채태, 최현상, 지승구, 오주형, 정현철, 이희조
정보보호학회논문지 19 (3), 83-93, 2009
42009
Carbon-Intelligent Global Routing in Path-Aware Networks
S Tabaeiaghdaei, S Scherrer, J Kwon, A Perrig
arXiv preprint arXiv:2211.00347, 2022
22022
G-sinc: Global synchronization infrastructure for network clocks
M Frei, J Kwon, S Tabaeiaghdaei, M Wyss, C Lenzen, A Perrig
2022 41st International Symposium on Reliable Distributed Systems (SRDS …, 2022
22022
Carbon-Aware Global Routing in Path-Aware Networks
S Tabaeiaghdaei, S Scherrer, J Kwon, A Perrig
Proceedings of the 14th ACM International Conference on Future Energy …, 2023
12023
Did the Shark Eat the Watchdog in the {NTP} Pool? Deceiving the {NTP}{Pool’s} Monitoring System
J Kwon, J Song, J Hur, A Perrig
32nd USENIX Security Symposium (USENIX Security 23), 6151-6166, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20