关注
Sangho Lee
Sangho Lee
Researcher of Microsoft Research Redmond
在 microsoft.com 的电子邮件经过验证 - 首页
标题
引用次数
年份
A batch rekeying time decision algorithm for IPTV systems
S Lee, J Kim
2011 IEEE Consumer Communications and Networking Conference (CCNC), 901-905, 2011
2011
A secure and mutual-profitable DRM interoperability scheme
S Lee, H Park, J Kim
The IEEE symposium on Computers and Communications, 75-80, 2010
302010
All Your Clicks Belong to Me: Investigating Click Interception on the Web
M Zhang, W Meng, S Lee, B Lee, X Xing
28th USENIX Security Symposium (USENIX Security), 2019
302019
APRON: Authenticated and Progressive System Image Renovation
S Lee
2023 USENIX Annual Technical Conference (USENIX ATC 23), 275-292, 2023
2023
Breaking Kernel Address Space Layout Randomization with Intel TSX
Y Jang, S Lee, T Kim
23rd ACM SIGSAC Conference on Computer and Communications Security (CCS …, 2016
2272016
CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems
SY Kim, S Lee, I Yun, W Xu, B Lee, Y Yun, T Kim
2017 USENIX Annual Technical Conference (USENIX ATC), 689-701, 2017
682017
CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks
J Song, S Lee, J Kim
22nd ACM SIGSAC Conference on Computer and Communications Security (CCS …, 2015
1022015
Data race detection with per-thread memory protection
S Lee, A Ahmad
US Patent 11,556,395, 2023
2023
DeView: Confining Progressive Web Applications by Debloating Web APIs
CS Oh, S Lee, C Qian, H Koo, W Lee
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
22022
Distance Bounding with Delayed Responses
S Lee, JS Kim, SJ Hong, J Kim
IEEE Communications Letters 16 (9), 1478-1481, 2012
222012
Dominance as a New Trusted Computing Primitive for the Internet of Things
M Xu, M Huber, Z Sun, P England, M Peinado, S Lee, A Marochko, ...
2019 IEEE Symposium on Security and Privacy (SP), 1415-1430, 2019
732019
DRMFS: A file system layer for transparent access semantics of DRM-protected contents
S Lee, HR Lee, S Lee, J Kim
Journal of Systems and Software 85 (5), 1058-1066, 2012
62012
Early filtering of ephemeral malicious accounts on Twitter
S Lee, J Kim
Computer Communications 54, 48-57, 2014
1122014
Enabling Refinable Cross-host Attack Investigation with Efficient Data Flow Tagging and Tracking
Y Ji, S Lee, M Fazzini, J Allen, E Downing, T Kim, A Orso, W Lee
27th USENIX Security Symposium (USENIX Security), 2018
672018
Exploring and Mitigating Privacy Threats of HTML5 Geolocation API
H Kim, S Lee, J Kim
30th Annual Conference on Computer Security Applications (ACSAC), 2014
142014
FACT: Functionality-centric Access Control System for IoT Programming Frameworks
S Lee, J Choi, J Kim, B Cho, S Lee, H Kim, J Kim
22nd ACM on Symposium on Access Control Models and Technologies, 43-54, 2017
642017
Fluxing Botnet Command and Control Channels with URL Shortening Services
S Lee, J Kim
Computer Communications, 2012
332012
Hacksaw: Hardware-Centric Kernel Debloating via Device Inventory and Dependency Analysis
Z Hu, S Lee, M Peinado
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
22023
Hardlog: Practical tamper-proof system auditing using a novel audit device
A Ahmad, S Lee, M Peinado
2022 IEEE Symposium on Security and Privacy (SP), 1791-1807, 2022
222022
I know the shortened URLs you clicked on Twitter: inference attack using public click analytics and Twitter metadata
J Song, S Lee, J Kim
22nd international World Wide Web Conference (WWW), 1191-1200, 2013
92013
系统目前无法执行此操作,请稍后再试。
文章 1–20