Junghwan Rhee

According to our database1, Junghwan Rhee authored at least 46 papers between 2005 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality.
IEEE Trans. Dependable Secur. Comput., 2020

SIGL: Securing Software Installations Through Deep Graph Learning.
CoRR, 2020

A Generic Edge-Empowered Graph Convolutional Network via Node-Edge Mutual Enhancement.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

APTrace: A Responsive System for Agile Enterprise Level Causality Analysis.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Detecting Malware Injection with Program-DNS Behavior.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Vessels: efficient and scalable deep learning prediction on trusted processors.
Proceedings of the SoCC '20: ACM Symposium on Cloud Computing, 2020

This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing.
Proceedings of the 28th USENIX Security Symposium, 2019

Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification.
Proceedings of the 2019 SIAM International Conference on Data Mining, 2019

HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Code-less Patching for Heap Vulnerabilities Using Targeted Calling Context Encoding.
CoRR, 2018

Deep Program Reidentification: A Graph Neural Network Solution.
CoRR, 2018

Towards a Timely Causality Analysis for Enterprise Security.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware.
Proceedings of the Security and Privacy in Communication Networks, 2017

PerfGuard: binary-centric application performance monitoring in production environments.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Detecting Stack Layout Corruptions with Robust Stack Unwinding.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

PInfer: Learning to Infer Concurrent Request Paths from System Kernel Events.
Proceedings of the 2016 IEEE International Conference on Autonomic Computing, 2016

High Fidelity Data Reduction for Big Data Security Dependency Analyses.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Discover and Tame Long-running Idling Processes in Enterprise Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

Data-Centric OS Kernel Malware Characterization.
IEEE Trans. Inf. Forensics Secur., 2014

IntroPerf: transparent context-sensitive multi-layer performance inference using system stack traces.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

Enabling layer 2 pathlet tracing through context encoding in software-defined networking.
Proceedings of the third workshop on Hot topics in software defined networking, 2014

CLUE: System trace analytics for cloud service performance diagnosis.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Uscope: A scalable unified tracer from kernel to user space.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Software system performance debugging with kernel events feature guidance.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

An analytics approach to traffic analysis in network virtualization.
Proceedings of the 10th International Conference on Network and Service Management, 2014

PerfScope: Practical Online Server Performance Bug Inference in Production Cloud Computing Infrastructures.
Proceedings of the ACM Symposium on Cloud Computing, 2014

DeltaPath: Precise and Scalable Calling Context Encoding.
Proceedings of the 12th Annual IEEE/ACM International Symposium on Code Generation and Optimization, 2014

HybNET: network manager for a hybrid network infrastructure.
Proceedings of the Industrial Track of the 14th ACM/IFIP/USENIX International Middleware Conference, 2013

iProbe: A lightweight user-level dynamic instrumentation tool.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Discovering Semantic Data of Interest from Un-mappable Memory with Confidence.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Autonomic live adaptation of virtual networked environments in a multidomain infrastructure.
J. Internet Serv. Appl., 2011

SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Proceedings of the Network and Distributed System Security Symposium, 2011

Characterizing kernel malware behavior with kernel data access patterns.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

DKSM: Subverting Virtual Machine Introspection for Fun and Profit.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

DeskBench: Flexible virtual desktop benchmarking toolkit.
Proceedings of the Integrated Network Management, 2009

Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring.
Proceedings of the The Forth International Conference on Availability, 2009

Autonomic Live Adaptation of Virtual Computational Environments in a Multi-Domain Infrastructure.
Proceedings of the 3rd International Conference on Autonomic Computing, 2006

Autonomic Adaptation of Virtual Distributed Environments in a Multi-Domain Infrastructure.
Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, 2006

Mondrix: memory isolation for linux using mondriaan memory protection.
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005

TraceBack: first fault diagnosis by reconstruction of distributed control flow.
Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, 2005