Grants per year
Personal profile
Education/Academic qualification
PHD
… → 2000
Fingerprint
Dive into the research topics where Gail-Joon Ahn is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
- 1 Similar Profiles
Network
Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
Grants
- 31 Finished
-
CDF: Advanced Solutions for Security and Privacy Challenges (Year 4 Membership)
INDUSTRY: Various Consortium Members
12/4/20 → 12/31/21
Project: Research project
-
-
-
CDF Project- Securing Systems Software via Information Leakage Prevention
12/4/18 → 12/5/18
Project: Research project
-
CDF: Aetna Research Project 1
INDUSTRY: Various Consortium Members
12/15/16 → 12/15/17
Project: Research project
-
DyPolDroid: Protecting Against Permission-Abuse Attacks in Android
Rubio-Medrano, C. E., Soundrapandian, P. K. D., Hill, M., Claramunt, L., Baek, J., S, G. & Ahn, G. J., Apr 2023, In: Information Systems Frontiers. 25, 2, p. 529-548 20 p.Research output: Contribution to journal › Article › peer-review
1 Scopus citations -
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems
Morales, E. L., Rubio-Medrano, C. E., Wang, R., Shoshitaishvili, Y., Bao, T. & Ahn, G. J., 2023, Advances in Information Security. Springer, p. 145-181 37 p. (Advances in Information Security; vol. 89).Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing
Zhang, P., Oest, A., Cho, H., Sun, Z., Johnson, R. C., Wardman, B., Sarker, S., Kapravelos, A., Bao, T., Wang, R., Shoshitaishvili, Y. & Ahn, G. J., 2022, In: IEEE Security and Privacy. 20, 2, p. 10-21 12 p.Research output: Contribution to journal › Article › peer-review
Open Access -
DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android
Rubio-Medrano, C. E., Hill, M., Claramunt, L. M., Baek, J. & Ahn, G. J., 2022, Secure Knowledge Management In The Artificial Intelligence Era - 9th International Conference, SKM 2021, Proceedings. Krishnan, R., Rao, H. R., Sahay, S. K., Samtani, S. & Zhao, Z. (eds.). Springer Science and Business Media Deutschland GmbH, p. 23-36 14 p. (Communications in Computer and Information Science; vol. 1549 CCIS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Scopus citations -
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior
Zhang, P., Sun, Z., Kyung, S., Behrens, H. W., Basque, Z. L., Cho, H., Oest, A., Wang, F., Bao, T., Shoshitaishvili, Y. & Ahn, G. J., Nov 7 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 3165-3179 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access