Pres: probabilistic replay with execution sketching on multiprocessors S Park, Y Zhou, W Xiong, Z Yin, R Kaushik, KH Lee, S Lu Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009 | 298 | 2009 |
High Accuracy Attack Provenance via Binary-based Execution Partition. KH Lee, X Zhang, D Xu NDSS 16, 2013 | 239 | 2013 |
Loggc: garbage collecting audit log KH Lee, X Zhang, D Xu Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 178 | 2013 |
{MPI}: Multiple perspective attack investigation with semantic aware execution partitioning S Ma, J Zhai, F Wang, KH Lee, X Zhang, D Xu 26th USENIX Security Symposium (USENIX Security 17), 1111-1128, 2017 | 132 | 2017 |
MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation. Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ... NDSS 2, 4, 2018 | 122 | 2018 |
Dynamic assembly of liquid crystalline graphene oxide gel fibers for ion transport H Park, KH Lee, YB Kim, SB Ambade, SH Noh, W Eom, JY Hwang, ... Science advances 4 (11), eaau2104, 2018 | 102 | 2018 |
Accurate, low cost and instrumentation-free security audit logging for windows S Ma, KH Lee, CH Kim, J Rhee, X Zhang, D Xu Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 97 | 2015 |
{Kernel-Supported}{Cost-Effective} Audit Logging for Causality Tracking S Ma, J Zhai, Y Kwon, KH Lee, X Zhang, G Ciocarlie, A Gehani, ... 2018 USENIX Annual Technical Conference (USENIX ATC 18), 241-254, 2018 | 84 | 2018 |
Fuzzification:{Anti-Fuzzing} techniques J Jung, H Hu, D Solodukhin, D Pagan, KH Lee, T Kim 28th USENIX Security Symposium (USENIX Security 19), 1913-1930, 2019 | 58 | 2019 |
JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions. B Li, P Vadrevu, KH Lee, R Perdisci, J Liu, B Rahbarinia, K Li, ... NDSS 122, 132, 2018 | 58 | 2018 |
Augmenting RAID with an SSD for energy relief HJ Lee, KH Lee, SH Noh Proceedings of the 2008 conference on Power aware computing and systems, 12-12, 2008 | 44 | 2008 |
CISpan: comprehensive incremental mining algorithms of closed sequential patterns for multi-versional software mining D Yuan, K Lee, H Cheng, G Krishna, Z Li, X Ma, Y Zhou, J Han Proceedings of the 2008 SIAM International Conference on Data Mining, 84-95, 2008 | 37 | 2008 |
Trace: Enterprise-wide provenance tracking for real-time apt detection H Irshad, G Ciocarlie, A Gehani, V Yegneswaran, KH Lee, J Patel, S Jha, ... IEEE Transactions on Information Forensics and Security 16, 4363-4376, 2021 | 34 | 2021 |
When push comes to ads: Measuring the rise of (malicious) push advertising K Subramani, X Yuan, O Setayeshfar, P Vadrevu, KH Lee, R Perdisci Proceedings of the ACM Internet Measurement Conference, 724-737, 2020 | 32 | 2020 |
Pfc: Transparent optimization of existing prefetching strategies for multi-level storage systems Z Zhang, K Lee, X Ma, Y Zhou 2008 The 28th International Conference on Distributed Computing Systems, 740-751, 2008 | 30 | 2008 |
Graalf: Supporting graphical analysis of audit logs for forensics O Setayeshfar, C Adkins, M Jones, KH Lee, P Doshi Software Impacts 8, 100068, 2021 | 23 | 2021 |
A2c: Self destructing exploit executions via input perturbation Y Kwon, B Saltaformaggio, IL Kim, KH Lee, X Zhang, D Xu Proceedings of The Network and Distributed System Security Symposium, 2017 | 22 | 2017 |
Toward generating reducible replay logs KH Lee, Y Zheng, N Sumner, X Zhang ACM SIGPLAN Notices 46 (6), 246-257, 2011 | 20 | 2011 |
Write-aware buffer cache management scheme for nonvolatile ram KH Lee, IH Doh, J Choi, D Lee, SH Noh Proceedings of the third conference on IASTED International Conference …, 2007 | 20 | 2007 |
Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots. P Vadrevu, J Liu, B Li, B Rahbarinia, KH Lee, R Perdisci NDSS, 2017 | 19 | 2017 |