Kangkook Jee

Orcid: 0000-0003-3797-4637

According to our database1, Kangkook Jee authored at least 31 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Advanced Persistent Threat Detection Using Data Provenance and Metric Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features.
CoRR, 2023

Evading Provenance-Based ML Detectors with Adversarial System Actions.
Proceedings of the 32nd USENIX Security Symposium, 2023

Reassembly is Hard: A Reflection on Challenges and Strategies.
Proceedings of the 32nd USENIX Security Symposium, 2023

An Investigation on the Fragility of Graph Neural Networks: The Impact of Node Feature Modification on Graph Classification Accuracy.
Proceedings of the 5th IEEE International Conference on Trust, 2023

2022
Back-Propagating System Dependency Impact for Attack Investigation.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression.
Proceedings of the 30th USENIX Security Symposium, 2021

UTrack: Enterprise User Tracking Based on OS-Level Audit Logs.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

APTrace: A Responsive System for Agile Enterprise Level Causality Analysis.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Detecting Malware Injection with Program-DNS Behavior.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security.
Proc. VLDB Endow., 2019

A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security.
CoRR, 2019

Countering Malicious Processes with Process-DNS Association.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
A Query Tool for Efficiently Investigating Risky Software Behaviors.
CoRR, 2018

AIQL: Enabling Efficient Attack Investigation from System Monitoring Data.
CoRR, 2018

SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection.
Proceedings of the 27th USENIX Security Symposium, 2018

Towards a Timely Causality Analysis for Enterprise Security.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2016
High Fidelity Data Reduction for Big Data Security Dependency Analyses.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
On Efficiency and Accuracy of Data Flow Tracking Systems.
PhD thesis, 2015

2014
IntFlow: improving the accuracy of arithmetic error detection using information flow tracking.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
ShadowReplica: efficient parallelization of dynamic data flow tracking.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
libdft: practical dynamic data flow tracking for commodity systems.
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012

A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2010
An Adversarial Evaluation of Network Signaling and Control Mechanisms.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010


  Loading...