Photo of BumJun

BumJun Kwon

Primary:
Academic:
Work:

Links: Instagram LinkedIn GoogleScholar

I am a young professional in Data Driven Cyber Security; I attained my Ph.D. degree at the University of Maryland College Park; and I am currently at Samsung Research, Korea. I enjoy finding hidden relationships from the underground economy and applying graph algorithms that could reveal these dependencies among the malicious entities. Besides research, my current interests include golf, piano, and photography.

Current Position

Samsung Research, Seoul, KOREA

Staff Engineer, Advanced Research Part, Security Team

Education

University of Maryland, College Park

Ph.D Student in Electrical and Computer Engineering
Maryland Cyber Security Center (MC2)
Advisor: Tudor Dumitras

Yokohama National University

Korea-Japan joint government scholarship student

Bachelor in Electrical Engineering and Computer Science
Advisor: Atsuo Kawamura

Publications

SkullID: Through-Skull Sound Conduction based Authentication for Smartglasses

H.Shin, J.Heo, B.Kwon, I.Kim, E.Cheon, H.Kim, C.Lee, I.Oakley
Accepted to the ACM Conference on Human Factors in Computing Systems, CHI 2024 [1,060/4,028(26.3%)]

Beewolves: Unsupervised Detection of Silent Campaigns in Parallel

B.Kwon, M.Petrişor, V.Srinivas, A.Deshpande, and T.Dumitraş
Under review

The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI

[link]

D.Kim, B.Kwon, K.Kozák, C.Gates, T.Dumitraş
Accepted to the 27th USENIX Security Symposium, USENIX 2018 [100/524 (19.1%)]

Issued for Abuse: Measuring the Underground Trade in Code Signing Certificate

[link]

K.Kozák, B.Kwon, D.Kim, T.Dumitraş
Accepted to the 2018 Workshop on the Economics of Information Security, WEIS 2018 [22/57 (38.6%)]

Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI

[link]

D.Kim, B.Kwon, and T.Dumitraş
Proceedings of the 2017 ACM conference on Computer and Communications Security, CCS 2017 [151/836 (18.1%)]

Catching Worms, Trojan Horses and PuPs: Unsupervised Detection of Silent Delivery Campaigns

[link]

B.Kwon, V.Srinivas, A.Deshpande, and T.Dumitraş
24th Annual Network and Distributed System Security Symposium, NDSS 2017 [68/423 (16.1%)]

The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics

[link]

B.Kwon, J.Mondal, J.Jang, L.Bilge, and T.Dumitraş
Proceedings of the 2015 ACM conference on Computer and Communications Security, CCS 2015 [128/660 (19.4%)]

Awards

2018: 2nd/4th Place at 2018 Cybersecurity Research Competition

Hosted by Korea Institute of Information Security and Cryptology

Patents

US10887323B2: Detecting malicious beaconing communities using lockstep detection and co-occurrence graph

Research Experience

Maryland Cybersecurity Center, University of Maryland, College park, Maryland, USA


Graduate Research Assistant, Nov. 2013-Dec. 2018

  • My research focus is on data driven security, graph analytics.
  • Supervised by professor Tudor Dumitras.

Kawamura Lab, Yokohama National University, Yokohama, Japan


Undergraduate Researcher, Apr. 2012 - Mar. 2013

  • Developed a grasping/manipulating system simulation platform.
  • Supervised by professor Atsuo Kawamura.
Prior Work Experience

National Security Research Institute, Daejeon, KOREA


Researcher, Dec. 2018 - Aug. 2021

  • Worked with the cyber security research division.
  • Main research topic: steganography and steganalysis.

IBM Research, Yorktown Heights, New York, USA


Summer Internship, Jun. 2016 - Aug. 2016

  • Worked with the security services group.
  • Developed a system to detect synchronized attacks from the enterprise proxy logs.

Symantec, Culver City, California, USA


Summer Internship, Jun. 2014 - Aug. 2014

  • At Symantec Research Labs, my task was to fix the WINE loading process.
  • Mainly dealt with Greenplum.
Service

Program Committee Member

  • International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2021 (Session Chair of Detect it already!), 2022, 2023
  • ACM Conference on Computer and Communications Security (CCS), 2019

Reviewing Activities for Journals

  • IEEE Transactions on Information Forensics and Security (TIFS)