Obserwuj
Byoungyoung Lee
Byoungyoung Lee
Zweryfikowany adres z snu.ac.kr - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs
J Seo, B Lee, S Kim, MW Shih, I Shin, Han, T Kim
Proceedings of the 2017 Annual Network and Distributed System Security …, 2017
2202017
ASLR-Guard: Stopping address space leakage for code reuse attacks
K Lu, C Song, B Lee, SP Chung, T Kim, W Lee
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
1732015
Preventing Use-after-free with Dangling Pointers Nullification.
B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee
Proceedings of the 2015 Annual Network and Distributed System Security …, 2015
1642015
Enforcing Kernel Security Invariants with Data Flow Integrity.
C Song, B Lee, K Lu, W Harris, T Kim, W Lee
Proceedings of the 2016 Annual Network and Distributed System Security …, 2016
1432016
Protecting location privacy using location semantics
B Lee, J Oh, H Yu, J Kim
Proceedings of the 17th ACM SIGKDD international conference on Knowledge …, 2011
1432011
HDFI: Hardware-assisted data-flow isolation
C Song, H Moon, M Alam, I Yun, B Lee, T Kim, W Lee, Y Paek
2016 IEEE Symposium on Security and Privacy (SP), 1-17, 2016
1342016
OBLIVIATE: A Data Oblivious File System for Intel SGX
A Ahmad, K Kim, MI Sarfaraz, B Lee
Proceedings of the 2018 Annual Network and Distributed System Security …, 2018
1302018
Razzer: Finding Kernel Race Bugs through Fuzzing
DR Jeong, K Kim, B Shivakumar, B Lee, I Shin
Security and Privacy (SP), 2019 IEEE Symposium on, 2019
1102019
Understanding malvertising through ad-injecting browser extensions
X Xing, W Meng, B Lee, U Weinsberg, A Sheth, R Perdisci, W Lee
Proceedings of the 24th international conference on world wide web, 1286-1295, 2015
1072015
Cross-checking semantic correctness: The case of finding file system bugs
C Min, S Kashyap, B Lee, C Song, T Kim
Proceedings of the 25th Symposium on Operating Systems Principles, 361-377, 2015
1052015
Toward engineering a secure android ecosystem: A survey of existing techniques
M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ...
ACM Computing Surveys (CSUR) 49 (2), 1-47, 2016
972016
Securing Real-Time Microcontroller Systems through Customized Memory View Switching
CH Kim, T Kim, H Choi, Z Gu, B Lee, X Zhang, D Xu
Proceedings of the 2018 Annual Network and Distributed System Security …, 2018
842018
Type Casting Verification: Stopping an Emerging Attack Vector
B Lee, C Song, T Kim, W Lee
24th USENIX Security Symposium (USENIX Security 15), 2015
802015
From zygote to morula: Fortifying weakened aslr on android
B Lee, L Lu, T Wang, T Kim, W Lee
2014 IEEE Symposium on Security and Privacy, 424-439, 2014
762014
HFL: Hybrid Fuzzing on the Linux Kernel
K Kim, DR Jeong, CH Kim, Y Jang, I Shin, B Lee
NDSS, 2020
632020
Obfuscuro: A commodity obfuscation engine on intel sgx
A Ahmad, B Joe, Y Xiao, Y Zhang, I Shin, B Lee
Network and Distributed System Security Symposium, 2019
602019
Hextype: Efficient detection of type confusion errors for c++
Y Jeon, P Biswas, S Carr, B Lee, M Payer
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
522017
CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems.
SY Kim, S Lee, I Yun, W Xu, B Lee, Y Yun, T Kim
USENIX Annual Technical Conference, 689-701, 2017
502017
Instant {OS} updates via userspace checkpoint-and-restart
S Kashyap, C Min, B Lee, T Kim, P Emelyanov
2016 {USENIX} Annual Technical Conference ({USENIX}{ATC} 16), 605-619, 2016
362016
uXOM: Efficient eXecute-Only Memory on ARM Cortex-M.
D Kwon, J Shin, G Kim, B Lee, Y Cho, Y Paek
USENIX Security Symposium, 231-247, 2019
252019
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20