Kyu Hyung Lee

According to our database1, Kyu Hyung Lee authored at least 29 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
SynthDB: Synthesizing Database via Program Analysis for Security Testing of Web Applications.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Privacy invasion via smart-home hub in personal area networks.
Pervasive Mob. Comput., 2022

Dazzle-attack: Anti-Forensic Server-side Attack via Fail-Free Dynamic State Machine.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

Hiding Critical Program Components via Ambiguous Translation.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection.
IEEE Trans. Inf. Forensics Secur., 2021

GrAALF: Supporting graphical analysis of audit logs for forensics.
Softw. Impacts, 2021

ChatterHub: Privacy Invasion via Smart Home Hub.
Proceedings of the IEEE International Conference on Smart Computing, 2021

C^2SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Defeating Program Analysis Techniques via Ambiguous Translation.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

A Novel AI-based Methodology for Identifying Cyber Attacks in Honey Pots.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Measuring Abuse in Web Push Advertising.
CoRR, 2020

When Push Comes to Ads: Measuring the Rise of (Malicious) Push Advertising.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

2019
Fuzzification: Anti-Fuzzing Techniques.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning.
Proceedings of the 26th USENIX Security Symposium, 2017

Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Self Destructing Exploit Executions via Input Perturbation.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
PerfGuard: binary-centric application performance monitoring in production environments.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

emphaSSL: Towards Emphasis as a Mechanism to Harden Networking Security in Android Apps.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Infrastructure-Free Logging and Replay of Concurrent Execution on Multiple Cores.
Proceedings of the ECOOP 2014 - Object-Oriented Programming - 28th European Conference, Uppsala, Sweden, July 28, 2014

2013
High Accuracy Attack Provenance via Binary-based Execution Partition.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

LogGC: garbage collecting audit log.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2011
Toward generating reducible replay logs.
Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011

Unified debugging of distributed systems with Recon.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011


  Loading...