Inferring fine-grained control flow inside {SGX} enclaves with branch shadowing S Lee, MW Shih, P Gera, T Kim, H Kim, M Peinado 26th USENIX Security Symposium (USENIX Security 17), 557-574, 2017 | 597 | 2017 |
{QSYM}: A practical concolic execution engine tailored for hybrid fuzzing I Yun, S Lee, M Xu, Y Jang, T Kim 27th USENIX Security Symposium (USENIX Security 18), 745-761, 2018 | 539 | 2018 |
{STEALTHMEM}:{System-Level} protection against {Cache-Based} side channel attacks in the cloud T Kim, M Peinado, G Mainar-Ruiz 21st USENIX Security Symposium (USENIX Security 12), 189-204, 2012 | 476 | 2012 |
T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. MW Shih, S Lee, T Kim, M Peinado NDSS, 2017 | 471 | 2017 |
SGX-shield: Enabling address space layout randomization for SGX programs. J Seo, B Lee, SM Kim, MW Shih, I Shin, D Han, T Kim NDSS, 2017 | 248 | 2017 |
SplitFS: Reducing software overhead in file systems for persistent memory R Kadekodi, SK Lee, S Kashyap, T Kim, A Kolli, V Chidambaram Proceedings of the 27th ACM Symposium on Operating Systems Principles, 494-508, 2019 | 226 | 2019 |
Breaking kernel address space layout randomization with intel tsx Y Jang, S Lee, T Kim Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 226 | 2016 |
Hacking in darkness: Return-oriented programming against secure enclaves J Lee, J Jang, Y Jang, N Kwak, Y Choi, C Choi, T Kim, M Peinado, ... 26th USENIX Security Symposium (USENIX Security 17), 523-539, 2017 | 224 | 2017 |
Preventing Use-after-free with Dangling Pointers Nullification. B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee NDSS, 2015 | 213 | 2015 |
ASLR-Guard: Stopping address space leakage for code reuse attacks K Lu, C Song, B Lee, SP Chung, T Kim, W Lee Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 199 | 2015 |
Recipe: Converting concurrent dram indexes to persistent-memory indexes SK Lee, J Mohan, S Kashyap, T Kim, V Chidambaram Proceedings of the 27th ACM Symposium on Operating Systems Principles, 462-477, 2019 | 196 | 2019 |
Log2: A {Cost-Aware} logging mechanism for performance diagnosis R Ding, H Zhou, JG Lou, H Zhang, Q Lin, Q Fu, D Zhang, T Xie 2015 USENIX annual technical conference (USENIX ATC 15), 139-150, 2015 | 196* | 2015 |
Mosaic: Processing a trillion-edge graph on a single machine S Maass, C Min, S Kashyap, W Kang, M Kumar, T Kim Proceedings of the Twelfth European Conference on Computer Systems, 527-543, 2017 | 183 | 2017 |
SGX-Bomb: Locking down the processor via Rowhammer attack Y Jang, J Lee, S Lee, T Kim Proceedings of the 2nd Workshop on System Software for Trusted Execution, 1-6, 2017 | 181 | 2017 |
HDFI: Hardware-assisted data-flow isolation C Song, H Moon, M Alam, I Yun, B Lee, T Kim, W Lee, Y Paek 2016 IEEE Symposium on Security and Privacy (SP), 1-17, 2016 | 167 | 2016 |
Enforcing Kernel Security Invariants with Data Flow Integrity. C Song, B Lee, K Lu, W Harris, T Kim, W Lee NDSS, 2016 | 166 | 2016 |
libmpk: Software abstraction for intel memory protection keys (intel {MPK}) S Park, S Lee, W Xu, H Moon, T Kim 2019 USENIX Annual Technical Conference (USENIX ATC 19), 241-254, 2019 | 160 | 2019 |
Understanding manycore scalability of file systems C Min, S Kashyap, S Maass, T Kim 2016 USENIX Annual Technical Conference (USENIX ATC 16), 71-85, 2016 | 159 | 2016 |
Intrusion recovery using selective re-execution T Kim, X Wang, N Zeldovich, MF Kaashoek 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010 | 158 | 2010 |
S-nfv: Securing nfv states by using sgx MW Shih, M Kumar, T Kim, A Gavrilovska Proceedings of the 2016 ACM International Workshop on Security in Software …, 2016 | 147 | 2016 |