Kyu Hyung Lee
Kyu Hyung Lee
Assistant Professor of Computer Science, University of Georgia
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Pres: probabilistic replay with execution sketching on multiprocessors
S Park, Y Zhou, W Xiong, Z Yin, R Kaushik, KH Lee, S Lu
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
High Accuracy Attack Provenance via Binary-based Execution Partition.
KH Lee, X Zhang, D Xu
NDSS, 2013
LogGC: garbage collecting audit log
KH Lee, X Zhang, D Xu
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
{MPI}: Multiple perspective attack investigation with semantic aware execution partitioning
S Ma, J Zhai, F Wang, KH Lee, X Zhang, D Xu
26th {USENIX} Security Symposium ({USENIX} Security 17), 1111-1128, 2017
Accurate, low cost and instrumentation-free security audit logging for windows
S Ma, KH Lee, CH Kim, J Rhee, X Zhang, D Xu
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
Augmenting RAID with an SSD for energy relief
HJ Lee, KH Lee, SH Noh
Proceedings of the 2008 conference on Power aware computing and systems, 12-12, 2008
MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ...
NDSS, 2018
CISpan: comprehensive incremental mining algorithms of closed sequential patterns for multi-versional software mining
D Yuan, K Lee, H Cheng, G Krishna, Z Li, X Ma, Y Zhou, J Han
Proceedings of the 2008 SIAM International Conference on Data Mining, 84-95, 2008
Dynamic assembly of liquid crystalline graphene oxide gel fibers for ion transport
H Park, KH Lee, YB Kim, SB Ambade, SH Noh, W Eom, JY Hwang, ...
Science advances 4 (11), eaau2104, 2018
Pfc: Transparent optimization of existing prefetching strategies for multi-level storage systems
Z Zhang, K Lee, X Ma, Y Zhou
2008 The 28th International Conference on Distributed Computing Systems, 740-751, 2008
Kernel-supported cost-effective audit logging for causality tracking
S Ma, J Zhai, Y Kwon, KH Lee, X Zhang, G Ciocarlie, A Gehani, ...
2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 241-254, 2018
Write-aware buffer cache management scheme for nonvolatile ram
KH Lee, IH Doh, J Choi, D Lee, SH Noh
Proceedings of Advances in Computer Science and Technology. ACTA Press, 2007
Toward generating reducible replay logs
KH Lee, Y Zheng, N Sumner, X Zhang
ACM SIGPLAN Notices 46 (6), 246-257, 2011
JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions.
B Li, P Vadrevu, KH Lee, R Perdisci, J Liu, B Rahbarinia, K Li, ...
NDSS, 2018
Unified debugging of distributed systems with recon
KH Lee, N Sumner, X Zhang, P Eugster
2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011
A2c: Self destructing exploit executions via input perturbation
Y Kwon, B Saltaformaggio, IL Kim, KH Lee, X Zhang, D Xu
Proceedings of The Network and Distributed System Security Symposium, 2017
Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots.
P Vadrevu, J Liu, B Li, B Rahbarinia, KH Lee, R Perdisci
NDSS, 2017
Fuzzification: Anti-fuzzing techniques
J Jung, H Hu, D Solodukhin, D Pagan, KH Lee, T Kim
28th {USENIX} Security Symposium ({USENIX} Security 19), 1913-1930, 2019
Perfguard: binary-centric application performance monitoring in production environments
CH Kim, J Rhee, KH Lee, X Zhang, D Xu
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
DroidForensics: Accurate reconstruction of Android attacks via multi-layer forensic logging
X Yuan, O Setayeshfar, H Yan, P Panage, X Wei, KH Lee
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20