


Остановите войну!
for scientists:
Taesoo Kim
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [c91]Mingyu Guan, Anand Padmanabha Iyer, Taesoo Kim:
DynaGraph: dynamic graph neural networks at scale. GRADES-NDA@SIGMOD 2022: 6:1-6:10 - [c90]Taesoo Kim, Jiho Chang, Jong Hwan Ko:
ADA-VAD: Unpaired Adversarial Domain Adaptation for Noise-Robust Voice Activity Detection. ICASSP 2022: 7327-7331 - [i15]Jusop Choi, Wonseok Choi, William Aiken, Hyoungshick Kim, Jun Ho Huh, Taesoo Kim, Yongdae Kim, Ross J. Anderson:
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild. CoRR abs/2201.08678 (2022) - [i14]ChangSeok Oh, Sangho Lee, Wen Xu, Rohan Devang Vora, Taesoo Kim:
Mitigating Low-volume DoS Attacks with Data-driven Resource Accounting. CoRR abs/2205.00056 (2022) - 2021
- [j11]Youngjoo Woo
, Taesoo Kim
, Sungin Jung, Euiseong Seo
:
Analysis and Optimization of Persistent Memory Index Structures' Write Amplification. IEEE Access 9: 167687-167698 (2021) - [j10]Hoseok Seol
, Minhye Kim, Taesoo Kim
, Yongdae Kim
, Lee-Sup Kim
:
Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks. IEEE Trans. Computers 70(4): 539-551 (2021) - [j9]Kangjie Lu
, Meng Xu, Chengyu Song
, Taesoo Kim
, Wenke Lee:
Stopping Memory Disclosures via Diversification and Replicated Execution. IEEE Trans. Dependable Secur. Comput. 18(1): 160-173 (2021) - [c89]Hyungjoon Koo, Soyeon Park, Taesoo Kim:
A Look Back on a Function Identification Problem. ACSAC 2021: 158-168 - [c88]Taesoo Kim, Yejin Seo, Jisoo Lee, Sieun Chae, Jinung An:
Brain to Music: Musical Representation from Stress-Induced EEG. BCI 2021: 1-6 - [c87]Taesoo Kim:
Are we done yet? Our Journey to Fight against Memory-safety Bugs. CCS 2021: 4 - [c86]Insu Yun, Woosun Song, Seunggi Min, Taesoo Kim:
HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators. CCS 2021: 379-392 - [c85]Ren Ding, Yonghae Kim, Fan Sang, Wen Xu, Gururaj Saileshwar, Taesoo Kim:
Hardware Support to Improve Fuzzing Performance and Precision. CCS 2021: 2214-2228 - [c84]Sujin Park, Irina Calciu, Taesoo Kim, Sanidhya Kashyap:
Contextual concurrency control. HotOS 2021: 167-174 - [c83]Jinho Jung, Stephen Tong, Hong Hu, Jungwon Lim, Yonghwi Jin, Taesoo Kim:
WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning. NDSS 2021 - [c82]Youngseok Yang, Taesoo Kim, Byung-Gon Chun:
Finding Consensus Bugs in Ethereum via Multi-transaction Differential Fuzzing. OSDI 2021: 349-365 - [c81]Yechan Bae, Youngsuk Kim, Ammar Askar, Jungwon Lim, Taesoo Kim:
Rudra: Finding Memory Safety Bugs in Rust at the Ecosystem Scale. SOSP 2021: 84-99 - [c80]Brian Wickman, Hong Hu, Insu Yun, Daehee Jang, Jungwon Lim, Sanidhya Kashyap, Taesoo Kim:
Preventing Use-After-Free Attacks with Fast Forward Allocation. USENIX Security Symposium 2021: 2453-2470 - [i13]Hyungjoon Koo, Soyeon Park, Daejin Choi, Taesoo Kim:
Semantic-aware Binary Code Representation with BERT. CoRR abs/2106.05478 (2021) - [i12]Sungbae Yoo, Jinbum Park, Seolheui Kim, Yeji Kim, Taesoo Kim:
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication. CoRR abs/2112.07213 (2021) - [i11]Jungwon Lim, Yonghwi Jin, Mansour Alharthi, Xiaokuan Zhang, Jinho Jung, Rajat Gupta, Kuilin Li, Daehee Jang, Taesoo Kim:
SOK: On the Analysis of Web Browser Security. CoRR abs/2112.15561 (2021) - 2020
- [j8]Steffen Maass, Mohan Kumar Kumar, Taesoo Kim, Tushar Krishna, Abhishek Bhattacharjee:
ECOTLB: Eventually Consistent TLBs. ACM Trans. Archit. Code Optim. 17(4): 27:1-27:24 (2020) - [j7]Seulbae Kim
, Meng Xu, Sanidhya Kashyap, Jungyeon Yoon, Wen Xu, Taesoo Kim:
Finding Bugs in File Systems with an Extensible Fuzzing Framework. ACM Trans. Storage 16(2): 10:1-10:35 (2020) - [c79]Chenxiong Qian, Hyungjoon Koo, ChangSeok Oh, Taesoo Kim, Wenke Lee:
Slimium: Debloating the Chromium Browser with Feature Subsetting. CCS 2020: 461-476 - [c78]Wen Xu, Soyeon Park, Taesoo Kim:
FREEDOM: Engineering a State-of-the-Art DOM Fuzzer. CCS 2020: 971-986 - [c77]Youngjoo Woo, Taesoo Kim, Sungin Jung:
Persistent Memory Needs Lifetime Extension Techniques. ICTC 2020: 1439-1441 - [c76]Ren Ding, Hong Hu, Wen Xu, Taesoo Kim:
DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report. NDSS 2020 - [c75]Soyeon Park, Wen Xu, Insu Yun, Daehee Jang, Taesoo Kim:
Fuzzing JavaScript Engines with Aspect-preserving Mutation. IEEE Symposium on Security and Privacy 2020: 1629-1642 - [c74]Meng Xu, Sanidhya Kashyap, Hanqing Zhao, Taesoo Kim:
Krace: Data Race Fuzzing for Kernel File Systems. IEEE Symposium on Security and Privacy 2020: 1643-1660 - [c73]Insu Yun, Dhaval Kapil, Taesoo Kim:
Automatic Techniques to Systematically Discover New Heap Exploitation Primitives. USENIX Security Symposium 2020: 1111-1128 - [e4]Taesoo Kim, Patrick P. C. Lee:
APSys '20: 11th ACM SIGOPS Asia-Pacific Workshop on Systems, Tsukuba, Japan, August 24-25, 2020. ACM 2020, ISBN 978-1-4503-8069-0 [contents]
2010 – 2019
- 2019
- [j6]Jinho Jung, Hong Hu, Joy Arulraj, Taesoo Kim, Woon-Hak Kang:
APOLLO: Automatic Detection and Diagnosis of Performance Regressions in Database Systems. Proc. VLDB Endow. 13(1): 57-70 (2019) - [c72]Juhyeng Han, Seong Min Kim, Taesoo Kim, Dongsu Han
:
Toward scaling hardware security module for emerging cloud services. SysTEX@SOSP 2019: 3:1-3:6 - [c71]Seulbae Kim, Meng Xu, Sanidhya Kashyap, Jungyeon Yoon, Wen Xu, Taesoo Kim:
Finding semantic bugs in file systems with an extensible fuzzing framework. SOSP 2019: 147-161 - [c70]Se Kwon Lee, Jayashree Mohan, Sanidhya Kashyap, Taesoo Kim, Vijay Chidambaram
:
Recipe: converting concurrent DRAM indexes to persistent-memory indexes. SOSP 2019: 462-477 - [c69]Rohan Kadekodi, Se Kwon Lee, Sanidhya Kashyap, Taesoo Kim, Aasheesh Kolli, Vijay Chidambaram
:
SplitFS: reducing software overhead in file systems for persistent memory. SOSP 2019: 494-508 - [c68]Sanidhya Kashyap, Irina Calciu, Xiaohe Cheng, Changwoo Min, Taesoo Kim:
Scalable and practical locking with shuffling. SOSP 2019: 586-599 - [c67]Wen Xu, Hyungon Moon, Sanidhya Kashyap, Po-Ning Tseng, Taesoo Kim:
Fuzzing File Systems via Two-Dimensional Input Space Exploration. IEEE Symposium on Security and Privacy 2019: 818-834 - [c66]Soyeon Park, Sangho Lee, Wen Xu, Hyungon Moon, Taesoo Kim:
libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK). USENIX Annual Technical Conference 2019: 241-254 - [c65]Chenxiong Qian, Hong Hu, Mansour Alharthi, Simon Pak Ho Chung, Taesoo Kim, Wenke Lee:
RAZOR: A Framework for Post-deployment Software Debloating. USENIX Security Symposium 2019: 1733-1750 - [c64]Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, Taesoo Kim:
Fuzzification: Anti-Fuzzing Techniques. USENIX Security Symposium 2019: 1913-1930 - [c63]Hanqing Zhao, Yanyu Zhang, Kun Yang, Taesoo Kim:
Breaking Turtles All the Way Down: An Exploitation Chain to Break out of VMware ESXi. WOOT @ USENIX Security Symposium 2019 - [i10]Insu Yun, Dhaval Kapil, Taesoo Kim:
Automatic Techniques to Systematically Discover New Heap Exploitation Primitives. CoRR abs/1903.00503 (2019) - [i9]Rohan Kadekodi, Se Kwon Lee, Sanidhya Kashyap, Taesoo Kim, Aasheesh Kolli, Vijay Chidambaram:
SplitFS: Reducing Software Overhead in File Systems for Persistent Memory. CoRR abs/1909.10123 (2019) - [i8]Fan Sang, Daehee Jang, Ming-Wei Shih, Taesoo Kim:
P2FAAS: Toward Privacy-Preserving Fuzzing as a Service. CoRR abs/1909.11164 (2019) - [i7]Se Kwon Lee, Jayashree Mohan, Sanidhya Kashyap, Taesoo Kim, Vijay Chidambaram:
RECIPE : Converting Concurrent DRAM Indexes to Persistent-Memory Indexes. CoRR abs/1909.13670 (2019) - 2018
- [j5]Beumjin Cho, Sangho Lee, Meng Xu, Sangwoo Ji, Taesoo Kim, Jong Kim:
Prevention of cross-update privacy leaks on android. Comput. Sci. Inf. Syst. 15(1): 111-137 (2018) - [j4]Seong Min Kim
, Juhyeng Han, Jaehyeong Ha, Taesoo Kim, Dongsu Han
:
SGX-Tor: A Secure and Practical Tor Anonymity Network With SGX Enclaves. IEEE/ACM Trans. Netw. 26(5): 2174-2187 (2018) - [c62]Mohan Kumar, Steffen Maass, Sanidhya Kashyap, Ján Veselý, Zi Yan
, Taesoo Kim, Abhishek Bhattacharjee
, Tushar Krishna:
LATR: Lazy Translation Coherence. ASPLOS 2018: 651-664 - [c61]Hong Hu
, Chenxiong Qian, Carter Yagemann, Simon Pak Ho Chung, William R. Harris, Taesoo Kim, Wenke Lee:
Enforcing Unique Code Target Property for Control-Flow Integrity. CCS 2018: 1470-1486 - [c60]Sanidhya Kashyap, Changwoo Min, Kangnyeon Kim, Taesoo Kim:
A scalable ordering primitive for multicore machines. EuroSys 2018: 34:1-34:15 - [c59]Changwoo Min, Woon-Hak Kang, Mohan Kumar, Sanidhya Kashyap, Steffen Maass, Heeseung Jo, Taesoo Kim:
Solros: a data-centric operating system architecture for heterogeneous computing. EuroSys 2018: 36:1-36:15 - [c58]Ramneek, Mohan Kumar, Taesoo Kim, Sungin Jung:
mKPAC: Kernel Packet Processing for Manycore Systems. Middleware (Posters) 2018: 15-16 - [c57]Meng Xu, Chenxiong Qian, Kangjie Lu, Michael Backes, Taesoo Kim:
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels. IEEE Symposium on Security and Privacy 2018: 661-678 - [c56]Sanidhya Kashyap, Changwoo Min, Taesoo Kim:
Scaling Guest OS Critical Sections with eCS. USENIX Annual Technical Conference 2018: 159-172 - [c55]Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, Taesoo Kim:
QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. USENIX Security Symposium 2018: 745-761 - [c54]Yang Ji, Sangho Lee, Mattia Fazzini, Joey Allen, Evan Downing, Taesoo Kim, Alessandro Orso, Wenke Lee:
Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking. USENIX Security Symposium 2018: 1705-1722 - [e3]Jong Kim, Gail-Joon Ahn, Seungjoo Kim, Yongdae Kim, Javier López, Taesoo Kim:
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018 [contents] - [e2]Brent ByungHoon Kang, Taesoo Kim:
Information Security Applications - 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10763, Springer 2018, ISBN 978-3-319-93562-1 [contents] - [i6]Ketan Bhardwaj, Ming-Wei Shih, Ada Gavrilovska, Taesoo Kim, Chengyu Song:
SPX: Preserving End-to-End Security for Edge Computing. CoRR abs/1809.09038 (2018) - [i5]Soyeon Park, Sangho Lee, Wen Xu, Hyungon Moon, Taesoo Kim:
libmpk: Software Abstraction for Intel Memory Protection Keys. CoRR abs/1811.07276 (2018) - 2017
- [c53]Heeseung Jo, Woon-Hak Kang, Changwoo Min, Taesoo Kim:
FLsched: A Lockless and Lightweight Approach to OS Scheduler for Xeon Phi. APSys 2017: 8:1-8:8 - [c52]Yang Ji, Sangho Lee, Evan Downing, Weiren Wang, Mattia Fazzini
, Taesoo Kim, Alessandro Orso, Wenke Lee:
RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking. CCS 2017: 377-390 - [c51]Ruian Duan, Ashish Bijlani, Meng Xu, Taesoo Kim, Wenke Lee:
Identifying Open-Source License Violation and 1-day Security Risk at Large Scale. CCS 2017: 2169-2185 - [c50]Wen Xu, Sanidhya Kashyap, Changwoo Min, Taesoo Kim:
Designing New Operating Primitives to Improve Fuzzing Performance. CCS 2017: 2313-2328 - [c49]Taesoo Kim, Zhiqiang Lin, Chia-che Tsai
:
CCS'17 Tutorial Abstract / SGX Security and Privacy. CCS 2017: 2613-2614 - [c48]Taesoo Kim, Dinghao Wu:
FEAST 2017: The Second Workshop on Forming an Ecosystem Around Software Transformation. CCS 2017: 2633-2634 - [c47]Steffen Maass, Changwoo Min, Sanidhya Kashyap, Woon-Hak Kang, Mohan Kumar, Taesoo Kim:
Mosaic: Processing a Trillion-Edge Graph on a Single Machine. EuroSys 2017: 527-543 - [c46]Jaebaek Seo, Byoungyoung Lee, Seong Min Kim, Ming-Wei Shih, Insik Shin, Dongsu Han, Taesoo Kim:
SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs. NDSS 2017 - [c45]Ming-Wei Shih, Sangho Lee, Taesoo Kim, Marcus Peinado:
T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. NDSS 2017 - [c44]Seong Min Kim, Juhyeng Han, Jaehyeong Ha, Taesoo Kim, Dongsu Han:
Enhancing Security and Privacy of Tor's Ecosystem by Using Trusted Execution Environments. NSDI 2017: 145-161 - [c43]Yeongjin Jang, Jae-Hyuk Lee, Sangho Lee, Taesoo Kim:
SGX-Bomb: Locking Down the Processor via Rowhammer Attack. SysTEX@SOSP 2017: 5:1-5:6 - [c42]Meng Xu, Kangjie Lu, Taesoo Kim, Wenke Lee:
Bunshin: Compositing Security Mechanisms through Diversification. USENIX Annual Technical Conference 2017: 271-283 - [c41]Sanidhya Kashyap, Changwoo Min, Taesoo Kim:
Scalable NUMA-aware Blocking Synchronization Primitives. USENIX Annual Technical Conference 2017: 603-615 - [c40]Su Yong Kim, Sangho Lee, Insu Yun, Wen Xu, Byoungyoung Lee, Youngtae Yun, Taesoo Kim:
CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems. USENIX Annual Technical Conference 2017: 689-701 - [c39]Ren Ding, Chenxiong Qian, Chengyu Song, William Harris, Taesoo Kim, Wenke Lee:
Efficient Protection of Path-Sensitive Control Security. USENIX Security Symposium 2017: 131-148 - [c38]Meng Xu, Taesoo Kim:
PlatPal: Detecting Malicious Documents with Platform Diversity. USENIX Security Symposium 2017: 271-287 - [c37]Jae-Hyuk Lee, Jin Soo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, Brent ByungHoon Kang:
Hacking in Darkness: Return-oriented Programming against Secure Enclaves. USENIX Security Symposium 2017: 523-539 - [c36]Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, Marcus Peinado:
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. USENIX Security Symposium 2017: 557-574 - [e1]Taesoo Kim, Cliff Wang, Dinghao Wu:
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, FEAST@CCS 2017, Dallas, TX, USA, November 3, 2017. ACM 2017, ISBN 978-1-4503-5395-3 [contents] - [i4]Meng Xu, Kangjie Lu, Taesoo Kim, Wenke Lee:
Bunshin: Compositing Security Mechanisms through Diversification (with Appendix). CoRR abs/1705.09165 (2017) - [i3]Sangho Lee, Taesoo Kim:
Leaking Uninitialized Secure Enclave Memory via Structure Padding (Extended Abstract). CoRR abs/1710.09061 (2017) - 2016
- [j3]Meng Xu, Chengyu Song
, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee, Chenxiong Qian, Sangho Lee, Taesoo Kim:
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques. ACM Comput. Surv. 49(2): 38:1-38:47 (2016) - [j2]Seungyeop Han, Haichen Shen, Taesoo Kim, Arvind Krishnamurthy, Thomas E. Anderson, David Wetherall:
MetaSync: Coordinating Storage across Multiple File Synchronization Services. IEEE Internet Comput. 20(3): 36-44 (2016) - [j1]Sanidhya Kashyap, Changwoo Min, Taesoo Kim:
Opportunistic Spinlocks: Achieving Virtual Machine Scalability in the Clouds. ACM SIGOPS Oper. Syst. Rev. 50(1): 9-16 (2016) - [c35]Yeongjin Jang, Sangho Lee, Taesoo Kim:
Breaking Kernel Address Space Layout Randomization with Intel TSX. CCS 2016: 380-392 - [c34]Kangjie Lu, Chengyu Song
, Taesoo Kim, Wenke Lee:
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages. CCS 2016: 920-932 - [c33]Ming-Wei Shih, Mohan Kumar, Taesoo Kim, Ada Gavrilovska:
S-NFV: Securing NFV states by using SGX. SDN-NFV@CODASPY 2016: 45-48 - [c32]Ketan Bhardwaj, Ming-Wei Shih, Pragya Agarwal, Ada Gavrilovska, Taesoo Kim, Karsten Schwan:
Fast, Scalable and Secure Onloading of Edge Functions Using AirBox. SEC 2016: 14-27 - [c31]Prerit Jain, Soham Jayesh Desai, Ming-Wei Shih, Taesoo Kim, Seong Min Kim, Jae-Hyuk Lee, Changho Choi, Youjung Shin, Brent ByungHoon Kang, Dongsu Han:
OpenSGX: An Open Platform for SGX Research. NDSS 2016 - [c30]Jaebaek Seo, Daehyeok Kim, Donghyun Cho, Insik Shin, Taesoo Kim:
FLEXDROID: Enforcing In-App Privilege Separation in Android. NDSS 2016 - [c29]Chengyu Song, Byoungyoung Lee, Kangjie Lu, William Harris, Taesoo Kim, Wenke Lee:
Enforcing Kernel Security Invariants with Data Flow Integrity. NDSS 2016 - [c28]Alexandra Boldyreva, Taesoo Kim, Richard J. Lipton, Bogdan Warinschi:
Provably-Secure Remote Memory Attestation for Heap Overflow Protection. SCN 2016: 83-103 - [c27]Chengyu Song
, Hyungon Moon, Monjur Alam, Insu Yun, Byoungyoung Lee, Taesoo Kim, Wenke Lee, Yunheung Paek:
HDFI: Hardware-Assisted Data-Flow Isolation. IEEE Symposium on Security and Privacy 2016: 1-17 - [c26]Changwoo Min, Sanidhya Kashyap, Steffen Maass, Taesoo Kim:
Understanding Manycore Scalability of File Systems. USENIX Annual Technical Conference 2016: 71-85 - [c25]Sanidhya Kashyap, Changwoo Min, Byoungyoung Lee, Taesoo Kim, Pavel Emelyanov:
Instant OS Updates via Userspace Checkpoint-and-Restart. USENIX Annual Technical Conference 2016: 605-619 - [c24]Insu Yun, Changwoo Min, Xujie Si, Yeongjin Jang, Taesoo Kim, Mayur Naik:
APISan: Sanitizing API Usages through Semantic Cross-Checking. USENIX Security Symposium 2016: 363-378 - [i2]Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, Marcus Peinado:
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. CoRR abs/1611.06952 (2016) - 2015
- [c23]Sanidhya Kashyap, Changwoo Min, Taesoo Kim:
Scalability in the Clouds!: A Myth or Reality? APSys 2015: 5:1-5:7 - [c22]Kangjie Lu, Chengyu Song
, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee:
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks. CCS 2015: 280-291 - [c21]Hongil Kim, Dongkwan Kim, Minhee Kwon, HyungSeok Han, Yeongjin Jang, Dongsu Han
, Taesoo Kim, Yongdae Kim:
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations. CCS 2015: 328-339 - [c20]Meng Xu, Yeongjin Jang, Xinyu Xing, Taesoo Kim, Wenke Lee:
UCognito: Private Browsing without Tears. CCS 2015: 438-449 - [c19]Taesoo Kim, Sunghwan Kim:
Efficient Transmission of Reversible Data Hiding in Encryption Images by Using Reed-Solomon Codes. FiCloud 2015: 765-769 - [c18]Seong Min Kim, Youjung Shin, Jaehyung Ha, Taesoo Kim, Dongsu Han
:
A First Step Towards Leveraging Commodity Trusted Execution Environments for Network Applications. HotNets 2015: 7:1-7:7 - [c17]Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Long Lu, Wenke Lee:
Preventing Use-after-free with Dangling Pointers Nullification. NDSS 2015 - [c16]Changwoo Min, Sanidhya Kashyap, Byoungyoung Lee, Chengyu Song
, Taesoo Kim:
Cross-checking semantic correctness: the case of finding file system bugs. SOSP 2015: 361-377 - [c15]Seungyeop Han, Haichen Shen, Taesoo Kim, Arvind Krishnamurthy, Thomas E. Anderson, David Wetherall:
MetaSync: File Synchronization Across Multiple Untrusted Storage Services. USENIX Annual Technical Conference 2015: 83-95 - [c14]Changwoo Min, Woon-Hak Kang, Taesoo Kim, Sang-Won Lee, Young Ik Eom:
Lightweight Application-Level Crash Consistency on Transactional Flash Storage. USENIX Annual Technical Conference 2015: 221-234 - [c13]Byoungyoung Lee, Chengyu Song, Taesoo Kim, Wenke Lee:
Type Casting Verification: Stopping an Emerging Attack Vector. USENIX Security Symposium 2015: 81-96 - [i1]Alexandra Boldyreva, Taesoo Kim, Richard J. Lipton, Bogdan Warinschi:
Towards Provably-Secure Remote Memory Attestation. IACR Cryptol. ePrint Arch. 2015: 729 (2015) - 2014
- [b1]Taesoo Kim:
Automatic intrusion recovery with system-wide history. Massachusetts Institute of Technology, Cambridge, MA, USA, 2014 - [c12]Haogang Chen, Taesoo Kim, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Identifying Information Disclosure in Web Applications with Retroactive Auditing. OSDI 2014: 555-569 - [c11]Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, Wenke Lee:
From Zygote to Morula: Fortifying Weakened ASLR on Android. IEEE Symposium on Security and Privacy 2014: 424-439 - 2013
- [c10]Haogang Chen, Cody Cutler, Taesoo Kim, Yandong Mao, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Security bugs in embedded interpreters. APSys 2013: 17:1-17:7 - [c9]Taesoo Kim, Ramesh Chandra, Nickolai Zeldovich:
Optimizing unit test execution in large software programs using dependency analysis. APSys 2013: 19:1-19:6 - [c8]Ramesh Chandra, Taesoo Kim, Nickolai Zeldovich:
Asynchronous intrusion recovery for interconnected web services. SOSP 2013: 213-227 - [c7]Taesoo Kim, Nickolai Zeldovich:
Practical and Effective Sandboxing for Non-root Users. USENIX Annual Technical Conference 2013: 139-144 - 2012
- [c6]Taesoo Kim, Ramesh Chandra, Nickolai Zeldovich:
Recovering from intrusions in distributed systems with DARE. APSys 2012: 10 - [c5]Taesoo Kim, Ramesh Chandra, Nickolai Zeldovich:
Efficient Patch-based Auditing for Web Application Vulnerabilities. OSDI 2012: 193-206 - [c4]Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz:
STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud. USENIX Security Symposium 2012: 189-204 - 2011
- [c3]Ramesh Chandra, Taesoo Kim, Meelap Shah, Neha Narula, Nickolai Zeldovich:
Intrusion recovery for database-backed web applications. SOSP 2011: 101-114 - 2010
- [c2]Taesoo Kim, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Intrusion Recovery Using Selective Re-execution. OSDI 2010: 89-104 - [c1]Taesoo Kim, Nickolai Zeldovich:
Making Linux Protection Mechanisms Egalitarian with UserFS. USENIX Security Symposium 2010: 13-28