Yonghwi Kwon
Yonghwi Kwon
Assistant Professor, University of Virginia
Bestätigte E-Mail-Adresse bei virginia.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Eavesdropping on fine-grained user activities within smartphone apps over encrypted network traffic
B Saltaformaggio, H Choi, K Johnson, Y Kwon, Q Zhang, X Zhang, D Xu, ...
10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16), 2016
522016
MCI: Modeling-based causality inference in audit logging for attack investigation
Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ...
Proceedings of the 25th Network and Distributed System Security Symposium …, 2018
422018
J-force: Forced execution on javascript
K Kim, IL Kim, CH Kim, Y Kwon, Y Zheng, X Zhang, D Xu
Proceedings of the 26th international conference on World Wide Web, 897-906, 2017
422017
LDX: Causality inference by lightweight dual execution
Y Kwon, D Kim, WN Sumner, K Kim, B Saltaformaggio, X Zhang, D Xu
ACM SIGOPS Operating Systems Review 50 (2), 503-515, 2016
362016
Kernel-supported cost-effective audit logging for causality tracking
S Ma, J Zhai, Y Kwon, KH Lee, X Zhang, G Ciocarlie, A Gehani, ...
2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 241-254, 2018
232018
RevARM: A platform-agnostic ARM binary rewriter for security applications
T Kim, CH Kim, H Choi, Y Kwon, B Saltaformaggio, X Zhang, D Xu
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
222017
Apex: automatic programming assignment error explanation
D Kim, Y Kwon, P Liu, IL Kim, DM Perry, X Zhang, G Rodriguez-Rivera
ACM SIGPLAN Notices 51 (10), 311-327, 2016
212016
Probabilistic Disassembly
K Miller, Y Kwon, Y Sun, Z Zhang, X Zhang, Z Lin
The International Conference on Software Engineering (ICSE), 2019
172019
Dual execution for on the fly fine grained execution comparison
D Kim, Y Kwon, WN Sumner, X Zhang, D Xu
ACM SIGARCH Computer Architecture News 43 (1), 325-338, 2015
162015
A2C: Self destructing exploit executions via input perturbation
Y Kwon, B Saltaformaggio, IL Kim, KH Lee, X Zhang, D Xu
Proceedings of NDSS 17, 2017
152017
Webranz: web page randomization for better advertisement delivery and web-bot prevention
W Wang, Y Zheng, X Xing, Y Kwon, X Zhang, P Eugster
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
152016
Cpr: cross platform binary code reuse via platform independent trace program
Y Kwon, W Wang, Y Zheng, X Zhang, D Xu
Proceedings of the 26th ACM SIGSOFT International Symposium on Software …, 2017
62017
Tardis: Rolling back the clock on cms-targeting cyber attacks
RP Kasturi, Y Sun, R Duan, O Alrawi, E Asdar, V Zhu, Y Kwon, ...
2020 IEEE Symposium on Security and Privacy (SP), 1156-1171, 2020
52020
Adbudgetkiller: Online advertising budget draining attack
IL Kim, W Wang, Y Kwon, Y Zheng, Y Aafer, W Meng, X Zhang
Proceedings of the 2018 World Wide Web Conference, 297-307, 2018
52018
PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning
W You, Z Zhang, Y Kwon, Y Aafer, F Peng, Y Shi, C Harmon, X Zhang
2020 IEEE Symposium on Security and Privacy (SP), 1121-1138, 2020
42020
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation
Z Zhang, W You, G Tao, G Wei, Y Kwon, X Zhang
Proceedings of the ACM on Programming Languages 3 (OOPSLA), 1-31, 2019
42019
Lprov: Practical library-aware provenance tracing
F Wang, Y Kwon, S Ma, X Zhang, D Xu
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
42018
PIEtrace: Platform independent executable trace
Y Kwon, X Zhang, D Xu
2013 28th IEEE/ACM International Conference on Automated Software …, 2013
32013
Pad: Programming third-party web advertisement censorship
W Wang, Y Kwon, Y Zheng, Y Aafer, IL Kim, WC Lee, Y Liu, W Meng, ...
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
22017
Cubismo: decloaking server-side malware via cubist program analysis
A Naderi-Afooshteh, Y Kwon, A Nguyen-Tuong, M Bagheri-Marzijarani, ...
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
2019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20