default search action
Kyu Hyung Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c27]Nicolas Nino, Ruibo Lu, Wei Zhou, Kyu Hyung Lee, Ziming Zhao, Le Guan:
Unveiling IoT Security in Reality: A Firmware-Centric Journey. USENIX Security Symposium 2024 - 2023
- [c26]An Chen, Jiho Lee, Basanta Chaulagain, Yonghwi Kwon, Kyu Hyung Lee:
SynthDB: Synthesizing Database via Program Analysis for Security Testing of Web Applications. NDSS 2023 - 2022
- [j3]Omid Setayeshfar, Karthika Subramani, Xingzi Yuan, Raunak Dey, Dezhi Hong, In Kee Kim, Kyu Hyung Lee:
Privacy invasion via smart-home hub in personal area networks. Pervasive Mob. Comput. 85: 101675 (2022) - [c25]Chijung Jung, Doowon Kim, An Chen, Weihang Wang, Yunhui Zheng, Kyu Hyung Lee, Yonghwi Kwon:
Hiding Critical Program Components via Ambiguous Translation. ICSE 2022: 1120-1132 - [c24]Bora Lee, Kyungchan Lim, JiHo Lee, Chijung Jung, Doowon Kim, Kyu Hyung Lee, Haehyun Cho, Yonghwi Kwon:
Dazzle-attack: Anti-Forensic Server-side Attack via Fail-Free Dynamic State Machine. WISA 2022: 204-221 - 2021
- [j2]Omid Setayeshfar, Christian Adkins, Matthew Jones, Kyu Hyung Lee, Prashant Doshi:
GrAALF: Supporting graphical analysis of audit logs for forensics. Softw. Impacts 8: 100068 (2021) - [j1]Hassaan Irshad, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Kyu Hyung Lee, Jignesh M. Patel, Somesh Jha, Yonghwi Kwon, Dongyan Xu, Xiangyu Zhang:
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection. IEEE Trans. Inf. Forensics Secur. 16: 4363-4376 (2021) - [c23]Muhammed AbuOdeh, Christian Adkins, Omid Setayeshfar, Prashant Doshi, Kyu Hyung Lee:
A Novel AI-based Methodology for Identifying Cyber Attacks in Honey Pots. AAAI 2021: 15224-15231 - [c22]Omid Setayeshfar, Junghwan John Rhee, Chung Hwan Kim, Kyu Hyung Lee:
Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races. DIMVA 2021: 215-236 - [c21]Chijung Jung, Doowon Kim, Weihang Wang, Yunhui Zheng, Kyu Hyung Lee, Yonghwi Kwon:
Defeating Program Analysis Techniques via Ambiguous Translation. ASE 2021: 1382-1387 - [c20]Yonghwi Kwon, Weihang Wang, Jinho Jung, Kyu Hyung Lee, Roberto Perdisci:
C^2SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis. NDSS 2021 - [c19]Omid Setayeshfar, Karthika Subramani, Xingzi Yuan, Raunak Dey, Dezhi Hong, Kyu Hyung Lee, In Kee Kim:
ChatterHub: Privacy Invasion via Smart Home Hub. SMARTCOMP 2021: 181-188 - 2020
- [c18]Karthika Subramani, Xingzi Yuan, Omid Setayeshfar, Phani Vadrevu, Kyu Hyung Lee, Roberto Perdisci:
When Push Comes to Ads: Measuring the Rise of (Malicious) Push Advertising. Internet Measurement Conference 2020: 724-737 - [i2]Karthika Subramani, Xingzi Yuan, Omid Setayeshfar, Phani Vadrevu, Kyu Hyung Lee, Roberto Perdisci:
Measuring Abuse in Web Push Advertising. CoRR abs/2002.06448 (2020)
2010 – 2019
- 2019
- [c17]Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, Taesoo Kim:
Fuzzification: Anti-Fuzzing Techniques. USENIX Security Symposium 2019: 1913-1930 - [i1]Omid Setayeshfar, Christian Adkins, Matthew Jones, Kyu Hyung Lee, Prashant Doshi:
GrAALF: Supporting Graphical Analysis of Audit Logs for Forensics. CoRR abs/1909.00902 (2019) - 2018
- [c16]Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran:
MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation. NDSS 2018 - [c15]Bo Li, Phani Vadrevu, Kyu Hyung Lee, Roberto Perdisci:
JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions. NDSS 2018 - [c14]Shiqing Ma, Juan Zhai, Yonghwi Kwon, Kyu Hyung Lee, Xiangyu Zhang, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Dongyan Xu, Somesh Jha:
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking. USENIX ATC 2018: 241-254 - 2017
- [c13]Xingzi Yuan, Omid Setayeshfar, Hongfei Yan, Pranav Panage, Xuetao Wei, Kyu Hyung Lee:
DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging. AsiaCCS 2017: 666-677 - [c12]Yonghwi Kwon, Brendan Saltaformaggio, I Luk Kim, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
Self Destructing Exploit Executions via Input Perturbation. NDSS 2017 - [c11]Phani Vadrevu, Jienan Liu, Bo Li, Babak Rahbarinia, Kyu Hyung Lee, Roberto Perdisci:
Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots. NDSS 2017 - [c10]Shiqing Ma, Juan Zhai, Fei Wang, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning. USENIX Security Symposium 2017: 1111-1128 - 2016
- [c9]Xuetao Wei, Michael Wolf, Lei Guo, Kyu Hyung Lee, Ming-Chun Huang, Nan Niu:
emphaSSL: Towards Emphasis as a Mechanism to Harden Networking Security in Android Apps. GLOBECOM 2016: 1-6 - [c8]Chung Hwan Kim, Junghwan Rhee, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
PerfGuard: binary-centric application performance monitoring in production environments. SIGSOFT FSE 2016: 595-606 - 2015
- [c7]Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu:
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows. ACSAC 2015: 401-410 - 2014
- [b1]Kyu Hyung Lee:
Selective logging for accurate, space efficient forensic analysis and reducible execution replay. Purdue University, USA, 2014 - [c6]Kyu Hyung Lee, Dohyeong Kim, Xiangyu Zhang:
Infrastructure-Free Logging and Replay of Concurrent Execution on Multiple Cores. ECOOP 2014: 232-256 - [c5]Kyu Hyung Lee, Dohyeong Kim, Xiangyu Zhang:
Infrastructure-free logging and replay of concurrent execution on multiple cores. PPoPP 2014: 371-372 - 2013
- [c4]Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
LogGC: garbage collecting audit log. CCS 2013: 1005-1016 - [c3]Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
High Accuracy Attack Provenance via Binary-based Execution Partition. NDSS 2013 - 2011
- [c2]Kyu Hyung Lee, Nick Sumner, Xiangyu Zhang, Patrick Eugster:
Unified debugging of distributed systems with Recon. DSN 2011: 85-96 - [c1]Kyu Hyung Lee, Yunhui Zheng, Nick Sumner, Xiangyu Zhang:
Toward generating reducible replay logs. PLDI 2011: 246-257
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint