A batch rekeying time decision algorithm for IPTV systems S Lee, J Kim 2011 IEEE Consumer Communications and Networking Conference (CCNC), 901-905, 2011 | | 2011 |
A secure and mutual-profitable DRM interoperability scheme S Lee, H Park, J Kim The IEEE symposium on Computers and Communications, 75-80, 2010 | 30 | 2010 |
All Your Clicks Belong to Me: Investigating Click Interception on the Web M Zhang, W Meng, S Lee, B Lee, X Xing 28th USENIX Security Symposium (USENIX Security), 2019 | 30 | 2019 |
APRON: Authenticated and Progressive System Image Renovation S Lee 2023 USENIX Annual Technical Conference (USENIX ATC 23), 275-292, 2023 | | 2023 |
Breaking Kernel Address Space Layout Randomization with Intel TSX Y Jang, S Lee, T Kim 23rd ACM SIGSAC Conference on Computer and Communications Security (CCS …, 2016 | 227 | 2016 |
CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems SY Kim, S Lee, I Yun, W Xu, B Lee, Y Yun, T Kim 2017 USENIX Annual Technical Conference (USENIX ATC), 689-701, 2017 | 68 | 2017 |
CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks J Song, S Lee, J Kim 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS …, 2015 | 102 | 2015 |
Data race detection with per-thread memory protection S Lee, A Ahmad US Patent 11,556,395, 2023 | | 2023 |
DeView: Confining Progressive Web Applications by Debloating Web APIs CS Oh, S Lee, C Qian, H Koo, W Lee Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 2 | 2022 |
Distance Bounding with Delayed Responses S Lee, JS Kim, SJ Hong, J Kim IEEE Communications Letters 16 (9), 1478-1481, 2012 | 22 | 2012 |
Dominance as a New Trusted Computing Primitive for the Internet of Things M Xu, M Huber, Z Sun, P England, M Peinado, S Lee, A Marochko, ... 2019 IEEE Symposium on Security and Privacy (SP), 1415-1430, 2019 | 73 | 2019 |
DRMFS: A file system layer for transparent access semantics of DRM-protected contents S Lee, HR Lee, S Lee, J Kim Journal of Systems and Software 85 (5), 1058-1066, 2012 | 6 | 2012 |
Early filtering of ephemeral malicious accounts on Twitter S Lee, J Kim Computer Communications 54, 48-57, 2014 | 112 | 2014 |
Enabling Refinable Cross-host Attack Investigation with Efficient Data Flow Tagging and Tracking Y Ji, S Lee, M Fazzini, J Allen, E Downing, T Kim, A Orso, W Lee 27th USENIX Security Symposium (USENIX Security), 2018 | 67 | 2018 |
Exploring and Mitigating Privacy Threats of HTML5 Geolocation API H Kim, S Lee, J Kim 30th Annual Conference on Computer Security Applications (ACSAC), 2014 | 14 | 2014 |
FACT: Functionality-centric Access Control System for IoT Programming Frameworks S Lee, J Choi, J Kim, B Cho, S Lee, H Kim, J Kim 22nd ACM on Symposium on Access Control Models and Technologies, 43-54, 2017 | 64 | 2017 |
Fluxing Botnet Command and Control Channels with URL Shortening Services S Lee, J Kim Computer Communications, 2012 | 33 | 2012 |
Hacksaw: Hardware-Centric Kernel Debloating via Device Inventory and Dependency Analysis Z Hu, S Lee, M Peinado Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 2 | 2023 |
Hardlog: Practical tamper-proof system auditing using a novel audit device A Ahmad, S Lee, M Peinado 2022 IEEE Symposium on Security and Privacy (SP), 1791-1807, 2022 | 22 | 2022 |
I know the shortened URLs you clicked on Twitter: inference attack using public click analytics and Twitter metadata J Song, S Lee, J Kim 22nd international World Wide Web Conference (WWW), 1191-1200, 2013 | 9 | 2013 |