Hacksaw: Hardware-Centric Kernel Debloating via Device Inventory and Dependency Analysis Z Hu, S Lee, M Peinado Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 2 | 2023 |
APRON: Authenticated and Progressive System Image Renovation S Lee 2023 USENIX Annual Technical Conference (USENIX ATC 23), 275-292, 2023 | | 2023 |
Memory protection keys: Facts, key extension perspectives, and discussions S Park, S Lee, T Kim IEEE Security & Privacy 21 (3), 8-15, 2023 | 6 | 2023 |
Data race detection with per-thread memory protection S Lee, A Ahmad US Patent 11,556,395, 2023 | | 2023 |
Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability V Gandhi, S Banerjee, A Agrawal, A Ahmad, S Lee, M Peinado 32nd USENIX Security Symposium (USENIX Security 23), 391-408, 2023 | 2 | 2023 |
Selective boot sequence controller for resilient storage memory S Thom, P England, RK Spiger, B Telfer, S Lee, M Peinado US Patent 11,520,596, 2022 | 9 | 2022 |
DeView: Confining Progressive Web Applications by Debloating Web APIs CS Oh, S Lee, C Qian, H Koo, W Lee Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 2 | 2022 |
Spacelord: Private and Secure Smart Space Sharing Y Bae, S Banerjee, S Lee, M Peinado Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 4 | 2022 |
Hardlog: Practical tamper-proof system auditing using a novel audit device A Ahmad, S Lee, M Peinado 2022 IEEE Symposium on Security and Privacy (SP), 1791-1807, 2022 | 22 | 2022 |
Mitigating Low-volume DoS Attacks with Data-driven Resource Accounting CS Oh, S Lee, W Xu, RD Vora, T Kim arXiv preprint arXiv:2205.00056, 2022 | | 2022 |
PRIDWEN: Universally Hardening SGX Programs via Load-Time Synthesis F Sang, MW Shih, S Lee, X Zhang, M Steiner, M Vij, T Kim 2022 USENIX Annual Technical Conference (USENIX ATC 22), 455-472, 2022 | 4 | 2022 |
Kard: lightweight data race detection with per-thread memory protection A Ahmad, S Lee, P Fonseca, B Lee Proceedings of the 26th ACM International Conference on Architectural …, 2021 | 20 | 2021 |
All Your Clicks Belong to Me: Investigating Click Interception on the Web M Zhang, W Meng, S Lee, B Lee, X Xing 28th USENIX Security Symposium (USENIX Security), 2019 | 30 | 2019 |
Dominance as a New Trusted Computing Primitive for the Internet of Things M Xu, M Huber, Z Sun, P England, M Peinado, S Lee, A Marochko, ... 2019 IEEE Symposium on Security and Privacy (SP), 1415-1430, 2019 | 73 | 2019 |
libmpk: Software Abstraction for Intel Memory Protection Keys (Intel {MPK}) S Park, S Lee, W Xu, H Moon, T Kim 2019 {USENIX} Annual Technical Conference ({USENIX}{ATC} 19), 241-254, 2019 | 184 | 2019 |
Multi-stage Dynamic Information Flow Tracking Game S Moothedath, D Sahabandu, A Clark, S Lee, W Lee, R Poovendran International Conference on Decision and Game Theory for Security, 80-101, 2018 | 14 | 2018 |
QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing I Yun, S Lee, M Xu, Y Jang, T Kim 27th USENIX Security Symposium (USENIX Security), 2018 | 576 | 2018 |
Enabling Refinable Cross-host Attack Investigation with Efficient Data Flow Tagging and Tracking Y Ji, S Lee, M Fazzini, J Allen, E Downing, T Kim, A Orso, W Lee 27th USENIX Security Symposium (USENIX Security), 2018 | 67 | 2018 |
Prevention of Cross-update Privacy Leaks on Android B Cho, S Lee, M Xu, S Ji, T Kim, J Kim Computer Science and Information Systems 15 (1), 111-137, 2018 | 9 | 2018 |
SGX-Bomb: Locking Down the Processor via Rowhammer Attack Y Jang, J Lee, S Lee, T Kim Proceedings of the 2nd Workshop on System Software for Trusted Execution, 5, 2017 | 201 | 2017 |