[Published]
(2025) UTRA: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing Encryption. Jaehwan Park*, Hyeonbum Lee*, Junbeom Hur, Jae Hong Seo, and Doowon Kim. ESORICS '25: European Symposium on Research in Computer Security. Acceptance rate: 16.5% (out of 605) 🔗Link: Conference Paper, Arxiv Full Paper
(2024) Securing Multi-client range queries over encrypted data. Jaehwan Park, Zeinab Rezaeifar, and Changhee Hahn. Cluster Computing: The Journal of Networks, Software Tools and Applications. 🔗Link: Journal Paper
(2024) Phishing Vs. Legit: Comparative Analysis of Client-side Resources of Phishing and Target Brand websites. Kyungchan Lim, Jaehwan Park, and Doowon Kim. WWW '24: The Web Conference. Acceptance rate: 20.2% (out of 2008) 🔗Link: Conference Paper
(2023) Priest: Adversarial Attack Detection Techniques for Signal Injection Attacks. Jaehwan Park and Changhee Hahn. IEEE Access: The Multidisciplinary Open Access Journal. 🔗Link: Journal Paper
[Manuscript or Under review]
Due to the double-blind policy, the title is hashed by SHA-256 or simplified.
As a first author:
(2025) Supporting Students in Navigating LLM-Generated Insecure Code Jaehwan Park, Kyungchan Lim, Seonhye Park, and Doowon Kim. 🔗Link: https://arxiv.org/pdf/2511.20878
(2025) e39c541a0fdd4ff34daee2471bb384ec9b96d0ac84bd293a41172a1562e21df0 (Phishing) Jaehwan Park, Kyungchan Lim, Yonghwi Kwon, Yuseok Jeon, and Doowon Kim.
As a co-author:
(2025) f5037336624dfba51ae5f127b49840f58f19f3e7c78f284646949fe044ce0f8c (Phishing)
(2025) 43e29301422b3ebaf897e25b4fc60d2e14eee9a82ff5ebb5ca9f8b8fef56da3b (Phishing)