HFL: Hybrid Fuzzing on the Linux Kernel K Kim, DR Jeong, CH Kim, Y Jang, I Shin, B Lee Proceedings of the 2020 Annual Network and Distributed System Security …, 2020 | 129 | 2020 |
Securing Real-Time Microcontroller Systems through Customized Memory View Switching CH Kim, T Kim, H Choi, Z Gu, B Lee, X Zhang, D Xu Proceedings of the 25th Network and Distributed Systems Security Symposium …, 2018 | 128 | 2018 |
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal Proceedings of the 27th USENIX Security Symposium (USENIX Security 2018 …, 2018 | 107 | 2018 |
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows S Ma, KH Lee, CH Kim, J Rhee, X Zhang, D Xu Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 97 | 2015 |
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing T Kim, CH Kim, J Rhee, F Fei, Z Tu, G Walkup, X Zhang, X Deng, D Xu Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), 425-442, 2019 | 82 | 2019 |
J-Force: Forced Execution on JavaScript K Kim, IL Kim, CH Kim, Y Kwon, Y Zheng, X Zhang, D Xu Proceedings of the 26th International Conference on World Wide Web (WWW 2017 …, 2017 | 79 | 2017 |
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications T Kim, CH Kim, H Choi, Y Kwon, B Saltaformaggio, X Zhang, D Xu Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 48 | 2017 |
IntroPerf: Transparent Context-Sensitive Multi-Layer Performance Inference using System Stack Traces CH Kim, J Rhee, H Zhang, N Arora, G Jiang, X Zhang, D Xu Proceedings of the 2014 ACM international Conference on Measurement and …, 2014 | 36 | 2014 |
Vessels: efficient and scalable deep learning prediction on trusted processors K Kim, CH Kim, JJ Rhee, X Yu, H Chen, D Tian, B Lee Proceedings of the 11th ACM Symposium on Cloud Computing, 462-476, 2020 | 23 | 2020 |
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications T Kim, V Kumar, J Rhee, J Chen, K Kim, CH Kim, D Xu, DJ Tian Proceedings of the 30th USENIX Security Symposium (USENIX Security 2021), 2021 | 21 | 2021 |
From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY T Kim, CH Kim, A Ozen, F Fei, Z Tu, X Zhang, X Deng, DJ Tian, D Xu Proceedings of the 29th USENIX Security Symposium (USENIX Security 2020 …, 2020 | 19 | 2020 |
PerfGuard: Binary-Centric Application Performance Monitoring in Production Environments CH Kim, J Rhee, KH Lee, X Zhang, D Xu Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations …, 2016 | 17 | 2016 |
DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing S Kim, M Liu, JJ Rhee, Y Jeon, Y Kwon, CH Kim Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 16 | 2022 |
Host Behavior and Network Analytics Based Automotive Secure Gateway J Rhee, H Li, HAO Shuai, CH Kim, Z Wu, LI Zhichun, K Jee, L Korts-Parn US Patent App. 16/146,166, 2019 | 16 | 2019 |
Detecting Malware Injection with Program-DNS Behavior Y Sun, K Jee, S Sivakorn, Z Li, C Lumezanu, L Korts-Parn, Z Wu, J Rhee, ... 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 552-568, 2020 | 11 | 2020 |
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality S Park, CH Kim, J Rhee, JJ Won, T Han, D Xu IEEE Transactions on Dependable and Secure Computing (TDSC), 2018 | 10 | 2018 |
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality CH Kim, S Park, J Rhee, JJ Won, T Han, D Xu Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 9 | 2015 |
Graphics processing unit accelerated trusted execution environment CH Kim, J Rhee, K Jee, LI Zhichun, A Ahmad, H Chen US Patent 11,295,008, 2022 | 6 | 2022 |
PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications Y Jeon, J Rhee, CH Kim, Z Li, M Payer, B Lee, Z Wu Proceedings of the 9th ACM Conference on Data and Application Security and …, 2019 | 6 | 2019 |
Confidential Execution of Deep Learning Inference at the Untrusted Edge with ARM TrustZone MS Islam, M Zamani, CH Kim, L Khan, KW Hamlen Proceedings of the Thirteenth ACM Conference on Data and Application …, 2023 | 3 | 2023 |