kangkook Jee
kangkook Jee
Assistant professor, University of Texas at Dallas
Bestätigte E-Mail-Adresse bei utdallas.edu - Startseite
Zitiert von
Zitiert von
libdft: Practical dynamic data flow tracking for commodity systems
VP Kemerlis, G Portokalidis, K Jee, AD Keromytis
Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution …, 2012
ShadowReplica: efficient parallelization of dynamic data flow tracking
K Jee, VP Kemerlis, AD Keromytis, G Portokalidis
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
High fidelity data reduction for big data security dependency analyses
Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware.
K Jee, G Portokalidis, VP Kemerlis, S Ghosh, DI August, AD Keromytis
NDSS, 2012
Towards a Timely Causality Analysis for Enterprise Security.
Y Liu, M Zhang, D Li, K Jee, Z Li, Z Wu, J Rhee, P Mittal
NDSS, 2018
Nodoze: Combatting threat alert fatigue with automated provenance triage
WU Hassan, S Guo, D Li, Z Chen, K Jee, Z Li, A Bates
Network and Distributed Systems Security Symposium, 2019
{SAQL}: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
27th {USENIX} Security Symposium ({USENIX} Security 18), 639-656, 2018
{AIQL}: Enabling Efficient Attack Investigation from System Monitoring Data
P Gao, X Xiao, Z Li, F Xu, SR Kulkarni, P Mittal
2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 113-126, 2018
IntFlow: improving the accuracy of arithmetic error detection using information flow tracking
M Pomonis, T Petsios, K Jee, M Polychronakis, AD Keromytis
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
Nodemerge: template based efficient data reduction for big-data causality analysis
Y Tang, D Li, Z Li, M Zhang, K Jee, X Xiao, Z Wu, J Rhee, F Xu, Q Li
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
You are what you do: Hunting stealthy malware via data provenance analysis
Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ...
Symposium on Network and Distributed System Security (NDSS), 2020
Intrusion detection using efficient system dependency analysis
Z Wu, LI Zhichun, J Rhee, F Xu, G Jiang, K Jee, X Xiao, Z Xu
US Patent App. 15/416,462, 2017
Countering Malicious Processes with Process-DNS Association.
S Sivakorn, K Jee, Y Sun, L Korts-Pärn, Z Li, C Lumezanu, Z Wu, LA Tang, ...
NDSS, 2019
Location-enhanced Authentication using the IoT
I Agadakos, P Hallgren, D Damopoulos, A Sabelfeld, G Portokalidis
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Host level detect mechanism for malicious DNS activities
K Jee, LI Zhichun, G Jiang, L Korts-Parn, Z Wu, Y Sun, J Rhee
US Patent 10,574,674, 2020
A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security
P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
arXiv, arXiv: 1903.08159, 2019
A query system for efficiently investigating complex attack behaviors for enterprise security
P Gao, X Xiao, Z Li, K Jee, F Xu, SR Kulkarni, P Mittal
Proceedings of the VLDB Endowment 12 (12), 1802-1805, 2019
Extraction and comparison of hybrid program binary features
J Rhee, LI Zhichun, Z Wu, K Jee, G Jiang
US Patent 10,289,843, 2019
Host behavior and network analytics based automotive secure gateway
J Rhee, H Li, HAO Shuai, CH Kim, Z Wu, LI Zhichun, K Jee, L Korts-Parn
US Patent App. 16/146,166, 2019
On Efficiency and Accuracy of Data Flow Tracking Systems
K Jee
Columbia University, 2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20