Junghwan Rhee

According to our database1, Junghwan Rhee authored at least 59 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
ProvSec: Open Cybersecurity System Provenance Analysis Benchmark Dataset with Labels.
Int. J. Networked Distributed Comput., December, 2023

Designing a Security System Administration Course for Cybersecurity with a Companion Project.
CoRR, 2023

A Comprehensive Dataset Towards Hands-on Experience Enhancement in a Research-Involved Cybersecurity Program.
Proceedings of the 24th Annual Conference on Information Technology Education, 2023

Commit Message Can Help: Security Patch Detection in Open Source Software via Transformer.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

PowerGrader: Automating Code Assessment Based on PowerShell for Programming Courses.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

ProvSec: Cybersecurity System Provenance Analysis Benchmark Dataset.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

2022
Multi-source Inductive Knowledge Graph Transfer.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications.
Proceedings of the 30th USENIX Security Symposium, 2021

SIGL: Securing Software Installations Through Deep Graph Learning.
Proceedings of the 30th USENIX Security Symposium, 2021

Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

UTrack: Enterprise User Tracking Based on OS-Level Audit Logs.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality.
IEEE Trans. Dependable Secur. Comput., 2020

A Generic Edge-Empowered Graph Convolutional Network via Node-Edge Mutual Enhancement.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

APTrace: A Responsive System for Agile Enterprise Level Causality Analysis.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Detecting Malware Injection with Program-DNS Behavior.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Vessels: efficient and scalable deep learning prediction on trusted processors.
Proceedings of the SoCC '20: ACM Symposium on Cloud Computing, 2020

This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing.
Proceedings of the 28th USENIX Security Symposium, 2019

Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification.
Proceedings of the 2019 SIAM International Conference on Data Mining, 2019

HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Code-less Patching for Heap Vulnerabilities Using Targeted Calling Context Encoding.
CoRR, 2018

Deep Program Reidentification: A Graph Neural Network Solution.
CoRR, 2018

Towards a Timely Causality Analysis for Enterprise Security.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware.
Proceedings of the Security and Privacy in Communication Networks, 2017

2016
PerfGuard: binary-centric application performance monitoring in production environments.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Detecting Stack Layout Corruptions with Robust Stack Unwinding.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

PInfer: Learning to Infer Concurrent Request Paths from System Kernel Events.
Proceedings of the 2016 IEEE International Conference on Autonomic Computing, 2016

High Fidelity Data Reduction for Big Data Security Dependency Analyses.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Discover and Tame Long-running Idling Processes in Enterprise Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Data-Centric OS Kernel Malware Characterization.
IEEE Trans. Inf. Forensics Secur., 2014

IntroPerf: transparent context-sensitive multi-layer performance inference using system stack traces.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

Enabling layer 2 pathlet tracing through context encoding in software-defined networking.
Proceedings of the third workshop on Hot topics in software defined networking, 2014

CLUE: System trace analytics for cloud service performance diagnosis.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Uscope: A scalable unified tracer from kernel to user space.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Software system performance debugging with kernel events feature guidance.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

An analytics approach to traffic analysis in network virtualization.
Proceedings of the 10th International Conference on Network and Service Management, 2014

PerfScope: Practical Online Server Performance Bug Inference in Production Cloud Computing Infrastructures.
Proceedings of the ACM Symposium on Cloud Computing, 2014

DeltaPath: Precise and Scalable Calling Context Encoding.
Proceedings of the 12th Annual IEEE/ACM International Symposium on Code Generation and Optimization, 2014

2013
HybNET: network manager for a hybrid network infrastructure.
Proceedings of the Industrial Track of the 14th ACM/IFIP/USENIX International Middleware Conference, 2013

iProbe: A lightweight user-level dynamic instrumentation tool.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

2012
Discovering Semantic Data of Interest from Un-mappable Memory with Confidence.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Autonomic live adaptation of virtual networked environments in a multidomain infrastructure.
J. Internet Serv. Appl., 2011

SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Proceedings of the Network and Distributed System Security Symposium, 2011

Characterizing kernel malware behavior with kernel data access patterns.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
DKSM: Subverting Virtual Machine Introspection for Fun and Profit.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

2009
DeskBench: Flexible virtual desktop benchmarking toolkit.
Proceedings of the Integrated Network Management, 2009

Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring.
Proceedings of the The Forth International Conference on Availability, 2009

2006
Autonomic Live Adaptation of Virtual Computational Environments in a Multi-Domain Infrastructure.
Proceedings of the 3rd International Conference on Autonomic Computing, 2006

Autonomic Adaptation of Virtual Distributed Environments in a Multi-Domain Infrastructure.
Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, 2006

2005
Mondrix: memory isolation for linux using mondriaan memory protection.
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005

TraceBack: first fault diagnosis by reconstruction of distributed control flow.
Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, 2005


  Loading...