关注
Sangho Lee
Sangho Lee
Researcher of Microsoft Research Redmond
在 microsoft.com 的电子邮件经过验证 - 首页
标题
引用次数
年份
Hacksaw: Hardware-Centric Kernel Debloating via Device Inventory and Dependency Analysis
Z Hu, S Lee, M Peinado
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
22023
APRON: Authenticated and Progressive System Image Renovation
S Lee
2023 USENIX Annual Technical Conference (USENIX ATC 23), 275-292, 2023
2023
Memory protection keys: Facts, key extension perspectives, and discussions
S Park, S Lee, T Kim
IEEE Security & Privacy 21 (3), 8-15, 2023
62023
Data race detection with per-thread memory protection
S Lee, A Ahmad
US Patent 11,556,395, 2023
2023
Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability
V Gandhi, S Banerjee, A Agrawal, A Ahmad, S Lee, M Peinado
32nd USENIX Security Symposium (USENIX Security 23), 391-408, 2023
22023
Selective boot sequence controller for resilient storage memory
S Thom, P England, RK Spiger, B Telfer, S Lee, M Peinado
US Patent 11,520,596, 2022
92022
DeView: Confining Progressive Web Applications by Debloating Web APIs
CS Oh, S Lee, C Qian, H Koo, W Lee
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
22022
Spacelord: Private and Secure Smart Space Sharing
Y Bae, S Banerjee, S Lee, M Peinado
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
42022
Hardlog: Practical tamper-proof system auditing using a novel audit device
A Ahmad, S Lee, M Peinado
2022 IEEE Symposium on Security and Privacy (SP), 1791-1807, 2022
222022
Mitigating Low-volume DoS Attacks with Data-driven Resource Accounting
CS Oh, S Lee, W Xu, RD Vora, T Kim
arXiv preprint arXiv:2205.00056, 2022
2022
PRIDWEN: Universally Hardening SGX Programs via Load-Time Synthesis
F Sang, MW Shih, S Lee, X Zhang, M Steiner, M Vij, T Kim
2022 USENIX Annual Technical Conference (USENIX ATC 22), 455-472, 2022
42022
Kard: lightweight data race detection with per-thread memory protection
A Ahmad, S Lee, P Fonseca, B Lee
Proceedings of the 26th ACM International Conference on Architectural …, 2021
202021
All Your Clicks Belong to Me: Investigating Click Interception on the Web
M Zhang, W Meng, S Lee, B Lee, X Xing
28th USENIX Security Symposium (USENIX Security), 2019
302019
Dominance as a New Trusted Computing Primitive for the Internet of Things
M Xu, M Huber, Z Sun, P England, M Peinado, S Lee, A Marochko, ...
2019 IEEE Symposium on Security and Privacy (SP), 1415-1430, 2019
732019
libmpk: Software Abstraction for Intel Memory Protection Keys (Intel {MPK})
S Park, S Lee, W Xu, H Moon, T Kim
2019 {USENIX} Annual Technical Conference ({USENIX}{ATC} 19), 241-254, 2019
1842019
Multi-stage Dynamic Information Flow Tracking Game
S Moothedath, D Sahabandu, A Clark, S Lee, W Lee, R Poovendran
International Conference on Decision and Game Theory for Security, 80-101, 2018
142018
QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing
I Yun, S Lee, M Xu, Y Jang, T Kim
27th USENIX Security Symposium (USENIX Security), 2018
5762018
Enabling Refinable Cross-host Attack Investigation with Efficient Data Flow Tagging and Tracking
Y Ji, S Lee, M Fazzini, J Allen, E Downing, T Kim, A Orso, W Lee
27th USENIX Security Symposium (USENIX Security), 2018
672018
Prevention of Cross-update Privacy Leaks on Android
B Cho, S Lee, M Xu, S Ji, T Kim, J Kim
Computer Science and Information Systems 15 (1), 111-137, 2018
92018
SGX-Bomb: Locking Down the Processor via Rowhammer Attack
Y Jang, J Lee, S Lee, T Kim
Proceedings of the 2nd Workshop on System Software for Trusted Execution, 5, 2017
2012017
系统目前无法执行此操作,请稍后再试。
文章 1–20