Theo dõi
Chung Hwan Kim
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
HFL: Hybrid Fuzzing on the Linux Kernel
K Kim, DR Jeong, CH Kim, Y Jang, I Shin, B Lee
Proceedings of the 2020 Annual Network and Distributed System Security …, 2020
1622020
Securing Real-Time Microcontroller Systems through Customized Memory View Switching
CH Kim, T Kim, H Choi, Z Gu, B Lee, X Zhang, D Xu
Proceedings of the 25th Network and Distributed Systems Security Symposium …, 2018
1482018
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
Proceedings of the 27th USENIX Security Symposium (USENIX Security 2018 …, 2018
1182018
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing
T Kim, CH Kim, J Rhee, F Fei, Z Tu, G Walkup, X Zhang, X Deng, D Xu
Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), 425-442, 2019
1092019
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows
S Ma, KH Lee, CH Kim, J Rhee, X Zhang, D Xu
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
1032015
J-Force: Forced Execution on JavaScript
K Kim, IL Kim, CH Kim, Y Kwon, Y Zheng, X Zhang, D Xu
Proceedings of the 26th International Conference on World Wide Web (WWW 2017 …, 2017
912017
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications
T Kim, CH Kim, H Choi, Y Kwon, B Saltaformaggio, X Zhang, D Xu
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
502017
IntroPerf: Transparent Context-Sensitive Multi-Layer Performance Inference using System Stack Traces
CH Kim, J Rhee, H Zhang, N Arora, G Jiang, X Zhang, D Xu
Proceedings of the 2014 ACM international Conference on Measurement and …, 2014
392014
DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing
S Kim, M Liu, JJ Rhee, Y Jeon, Y Kwon, CH Kim
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
372022
Vessels: efficient and scalable deep learning prediction on trusted processors
K Kim, CH Kim, JJ Rhee, X Yu, H Chen, D Tian, B Lee
Proceedings of the 11th ACM Symposium on Cloud Computing, 462-476, 2020
352020
From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY
T Kim, CH Kim, A Ozen, F Fei, Z Tu, X Zhang, X Deng, DJ Tian, D Xu
Proceedings of the 29th USENIX Security Symposium (USENIX Security 2020 …, 2020
332020
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications
T Kim, V Kumar, J Rhee, J Chen, K Kim, CH Kim, D Xu, DJ Tian
Proceedings of the 30th USENIX Security Symposium (USENIX Security 2021), 2021
252021
Confidential Execution of Deep Learning Inference at the Untrusted Edge with ARM TrustZone
MS Islam, M Zamani, CH Kim, L Khan, KW Hamlen
Proceedings of the Thirteenth ACM Conference on Data and Application …, 2023
182023
Host Behavior and Network Analytics Based Automotive Secure Gateway
J Rhee, H Li, HAO Shuai, CH Kim, Z Wu, LI Zhichun, K Jee, L Korts-Parn
US Patent App. 16/146,166, 2019
182019
PerfGuard: Binary-Centric Application Performance Monitoring in Production Environments
CH Kim, J Rhee, KH Lee, X Zhang, D Xu
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations …, 2016
172016
Detecting Malware Injection with Program-DNS Behavior
Y Sun, K Jee, S Sivakorn, Z Li, C Lumezanu, L Korts-Parn, Z Wu, J Rhee, ...
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 552-568, 2020
142020
Junghwan" John" Rhee, Xiao Yu, Haifeng Chen, Dave Tian, and Byoungyoung Lee. 2020. Vessels: Efficient and scalable deep learning prediction on trusted processors
K Kim, CH Kim
Proceedings of the 11th ACM Symposium on Cloud Computing, 462-476, 0
10
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality
S Park, CH Kim, J Rhee, JJ Won, T Han, D Xu
IEEE Transactions on Dependable and Secure Computing (TDSC), 2018
92018
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality
CH Kim, S Park, J Rhee, JJ Won, T Han, D Xu
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
92015
PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications
Y Jeon, J Rhee, CH Kim, Z Li, M Payer, B Lee, Z Wu
Proceedings of the 9th ACM Conference on Data and Application Security and …, 2019
82019
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20