SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs J Seo, B Lee, S Kim, MW Shih, I Shin, Han, T Kim Proceedings of the 2017 Annual Network and Distributed System Security …, 2017 | 249 | 2017 |
Preventing Use-after-free with Dangling Pointers Nullification. B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee Proceedings of the 2015 Annual Network and Distributed System Security …, 2015 | 214 | 2015 |
ASLR-Guard: Stopping address space leakage for code reuse attacks K Lu, C Song, B Lee, SP Chung, T Kim, W Lee Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 198 | 2015 |
Razzer: Finding Kernel Race Bugs through Fuzzing DR Jeong, K Kim, B Shivakumar, B Lee, I Shin Security and Privacy (SP), 2019 IEEE Symposium on, 2019 | 191 | 2019 |
HDFI: Hardware-assisted data-flow isolation C Song, H Moon, M Alam, I Yun, B Lee, T Kim, W Lee, Y Paek 2016 IEEE Symposium on Security and Privacy (SP), 1-17, 2016 | 171 | 2016 |
Enforcing Kernel Security Invariants with Data Flow Integrity. C Song, B Lee, K Lu, W Harris, T Kim, W Lee Proceedings of the 2016 Annual Network and Distributed System Security …, 2016 | 168 | 2016 |
OBLIVIATE: A Data Oblivious File System for Intel SGX A Ahmad, K Kim, MI Sarfaraz, B Lee Proceedings of the 2018 Annual Network and Distributed System Security …, 2018 | 165 | 2018 |
Protecting location privacy using location semantics B Lee, J Oh, H Yu, J Kim Proceedings of the 17th ACM SIGKDD international conference on Knowledge …, 2011 | 152 | 2011 |
HFL: Hybrid Fuzzing on the Linux Kernel K Kim, DR Jeong, CH Kim, Y Jang, I Shin, B Lee NDSS, 2020 | 130 | 2020 |
Cross-checking semantic correctness: The case of finding file system bugs C Min, S Kashyap, B Lee, C Song, T Kim Proceedings of the 25th Symposium on Operating Systems Principles, 361-377, 2015 | 130 | 2015 |
Securing Real-Time Microcontroller Systems through Customized Memory View Switching CH Kim, T Kim, H Choi, Z Gu, B Lee, X Zhang, D Xu Proceedings of the 2018 Annual Network and Distributed System Security …, 2018 | 125 | 2018 |
Understanding malvertising through ad-injecting browser extensions X Xing, W Meng, B Lee, U Weinsberg, A Sheth, R Perdisci, W Lee Proceedings of the 24th international conference on world wide web, 1286-1295, 2015 | 125 | 2015 |
Toward engineering a secure android ecosystem: A survey of existing techniques M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ... ACM Computing Surveys (CSUR) 49 (2), 1-47, 2016 | 110 | 2016 |
Type Casting Verification: Stopping an Emerging Attack Vector B Lee, C Song, T Kim, W Lee 24th USENIX Security Symposium (USENIX Security 15), 2015 | 94 | 2015 |
OBFUSCURO: A commodity obfuscation engine on Intel SGX A Ahmad, B Joe, Y Xiao, Y Zhang, I Shin, B Lee Network and Distributed System Security Symposium, 2019 | 88 | 2019 |
From zygote to morula: Fortifying weakened aslr on android B Lee, L Lu, T Wang, T Kim, W Lee 2014 IEEE Symposium on Security and Privacy, 424-439, 2014 | 82 | 2014 |
DifuzzRTL: Differential Fuzz Testing to Find CPU Bugs J Hur, S Song, D Kwon, E Baek, J Kim, B Lee 2021 IEEE Symposium on Security and Privacy (SP), 2021 | 78 | 2021 |
Hextype: Efficient detection of type confusion errors for c++ Y Jeon, P Biswas, S Carr, B Lee, M Payer Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 72 | 2017 |
Constraint-guided directed greybox fuzzing G Lee, W Shim, B Lee 30th USENIX Security Symposium (USENIX Security 21), 3559-3576, 2021 | 69 | 2021 |
{CAB-Fuzz}: Practical Concolic Testing Techniques for {COTS} Operating Systems SY Kim, S Lee, I Yun, W Xu, B Lee, Y Yun, T Kim 2017 USENIX Annual Technical Conference (USENIX ATC 17), 689-701, 2017 | 67 | 2017 |