关注
Kyu Hyung Lee
Kyu Hyung Lee
Assistant Professor of Computer Science, University of Georgia
在 uga.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Pres: probabilistic replay with execution sketching on multiprocessors
S Park, Y Zhou, W Xiong, Z Yin, R Kaushik, KH Lee, S Lu
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
2982009
High Accuracy Attack Provenance via Binary-based Execution Partition.
KH Lee, X Zhang, D Xu
NDSS 16, 2013
2392013
Loggc: garbage collecting audit log
KH Lee, X Zhang, D Xu
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1782013
{MPI}: Multiple perspective attack investigation with semantic aware execution partitioning
S Ma, J Zhai, F Wang, KH Lee, X Zhang, D Xu
26th USENIX Security Symposium (USENIX Security 17), 1111-1128, 2017
1322017
MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ...
NDSS 2, 4, 2018
1222018
Dynamic assembly of liquid crystalline graphene oxide gel fibers for ion transport
H Park, KH Lee, YB Kim, SB Ambade, SH Noh, W Eom, JY Hwang, ...
Science advances 4 (11), eaau2104, 2018
1022018
Accurate, low cost and instrumentation-free security audit logging for windows
S Ma, KH Lee, CH Kim, J Rhee, X Zhang, D Xu
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
972015
{Kernel-Supported}{Cost-Effective} Audit Logging for Causality Tracking
S Ma, J Zhai, Y Kwon, KH Lee, X Zhang, G Ciocarlie, A Gehani, ...
2018 USENIX Annual Technical Conference (USENIX ATC 18), 241-254, 2018
842018
Fuzzification:{Anti-Fuzzing} techniques
J Jung, H Hu, D Solodukhin, D Pagan, KH Lee, T Kim
28th USENIX Security Symposium (USENIX Security 19), 1913-1930, 2019
582019
JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions.
B Li, P Vadrevu, KH Lee, R Perdisci, J Liu, B Rahbarinia, K Li, ...
NDSS 122, 132, 2018
582018
Augmenting RAID with an SSD for energy relief
HJ Lee, KH Lee, SH Noh
Proceedings of the 2008 conference on Power aware computing and systems, 12-12, 2008
442008
CISpan: comprehensive incremental mining algorithms of closed sequential patterns for multi-versional software mining
D Yuan, K Lee, H Cheng, G Krishna, Z Li, X Ma, Y Zhou, J Han
Proceedings of the 2008 SIAM International Conference on Data Mining, 84-95, 2008
372008
Trace: Enterprise-wide provenance tracking for real-time apt detection
H Irshad, G Ciocarlie, A Gehani, V Yegneswaran, KH Lee, J Patel, S Jha, ...
IEEE Transactions on Information Forensics and Security 16, 4363-4376, 2021
342021
When push comes to ads: Measuring the rise of (malicious) push advertising
K Subramani, X Yuan, O Setayeshfar, P Vadrevu, KH Lee, R Perdisci
Proceedings of the ACM Internet Measurement Conference, 724-737, 2020
322020
Pfc: Transparent optimization of existing prefetching strategies for multi-level storage systems
Z Zhang, K Lee, X Ma, Y Zhou
2008 The 28th International Conference on Distributed Computing Systems, 740-751, 2008
302008
Graalf: Supporting graphical analysis of audit logs for forensics
O Setayeshfar, C Adkins, M Jones, KH Lee, P Doshi
Software Impacts 8, 100068, 2021
232021
A2c: Self destructing exploit executions via input perturbation
Y Kwon, B Saltaformaggio, IL Kim, KH Lee, X Zhang, D Xu
Proceedings of The Network and Distributed System Security Symposium, 2017
222017
Toward generating reducible replay logs
KH Lee, Y Zheng, N Sumner, X Zhang
ACM SIGPLAN Notices 46 (6), 246-257, 2011
202011
Write-aware buffer cache management scheme for nonvolatile ram
KH Lee, IH Doh, J Choi, D Lee, SH Noh
Proceedings of the third conference on IASTED International Conference …, 2007
202007
Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots.
P Vadrevu, J Liu, B Li, B Rahbarinia, KH Lee, R Perdisci
NDSS, 2017
192017
系统目前无法执行此操作,请稍后再试。
文章 1–20