Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing S Lee, MW Shih, P Gera, T Kim, H Kim, M Peinado 26th USENIX Security Symposium (USENIX Security), 2017 | 629 | 2017 |
QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing I Yun, S Lee, M Xu, Y Jang, T Kim 27th USENIX Security Symposium (USENIX Security), 2018 | 576 | 2018 |
WarningBird: Detecting Suspicious URLs in Twitter Stream S Lee, J Kim 2012 Annual Network and Distributed System Security Symposium (NDSS), 2012 | 516* | 2012 |
T-SGX: Eradicating controlled-channel attacks against enclave programs MW Shih, S Lee, T Kim, M Peinado 2017 Annual Network and Distributed System Security Symposium (NDSS), 2017 | 484 | 2017 |
Spam filtering in Twitter using sender-receiver relationship J Song, S Lee, J Kim 14th International Symposium on Recent Advances in Intrusion Detection (RAID …, 2011 | 327 | 2011 |
WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream S Lee, J Kim IEEE Transactions on Dependable & Secure Computing 10 (3), 2013 | 255 | 2013 |
Breaking Kernel Address Space Layout Randomization with Intel TSX Y Jang, S Lee, T Kim 23rd ACM SIGSAC Conference on Computer and Communications Security (CCS …, 2016 | 227 | 2016 |
SGX-Bomb: Locking Down the Processor via Rowhammer Attack Y Jang, J Lee, S Lee, T Kim Proceedings of the 2nd Workshop on System Software for Trusted Execution, 5, 2017 | 201 | 2017 |
libmpk: Software Abstraction for Intel Memory Protection Keys (Intel {MPK}) S Park, S Lee, W Xu, H Moon, T Kim 2019 {USENIX} Annual Technical Conference ({USENIX}{ATC} 19), 241-254, 2019 | 184 | 2019 |
Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities S Lee, Y Kim, J Kim, J Kim 35th IEEE Symposium on Security and Privacy (Oakland), 2014 | 131 | 2014 |
RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking Y Ji, S Lee, E Downing, W Wang, M Fazzini, T Kim, A Orso, W Lee 24th ACM SIGSAC Conference on Computer and Communications Security (CCS), 2017 | 122 | 2017 |
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ... ACM Computing Surveys (CSUR) 49 (2), 38, 2016 | 112 | 2016 |
Early filtering of ephemeral malicious accounts on Twitter S Lee, J Kim Computer Communications 54, 48-57, 2014 | 112 | 2014 |
CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks J Song, S Lee, J Kim 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS …, 2015 | 102 | 2015 |
Reducing IPTV channel zapping time based on viewer’s surfing behavior and preference Y Kim, JK Park, HJ Choi, S Lee, H Park, J Kim, Z Lee, K Ko 2008 IEEE International Symposium on Broadband Multimedia Systems and …, 2008 | 74 | 2008 |
Dominance as a New Trusted Computing Primitive for the Internet of Things M Xu, M Huber, Z Sun, P England, M Peinado, S Lee, A Marochko, ... 2019 IEEE Symposium on Security and Privacy (SP), 1415-1430, 2019 | 73 | 2019 |
CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems SY Kim, S Lee, I Yun, W Xu, B Lee, Y Yun, T Kim 2017 USENIX Annual Technical Conference (USENIX ATC), 689-701, 2017 | 68 | 2017 |
Enabling Refinable Cross-host Attack Investigation with Efficient Data Flow Tagging and Tracking Y Ji, S Lee, M Fazzini, J Allen, E Downing, T Kim, A Orso, W Lee 27th USENIX Security Symposium (USENIX Security), 2018 | 67 | 2018 |
FACT: Functionality-centric Access Control System for IoT Programming Frameworks S Lee, J Choi, J Kim, B Cho, S Lee, H Kim, J Kim 22nd ACM on Symposium on Access Control Models and Technologies, 43-54, 2017 | 64 | 2017 |
Identifying Cross-origin Resource Status Using Application Cache S Lee, H Kim, J Kim 2015 Annual Network and Distributed System Security Symposium (NDSS), 2015 | 37 | 2015 |