Segui
Byoungyoung Lee
Byoungyoung Lee
Email verificata su snu.ac.kr - Home page
Titolo
Citata da
Citata da
Anno
SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs
J Seo, B Lee, S Kim, MW Shih, I Shin, Han, T Kim
Proceedings of the 2017 Annual Network and Distributed System Security …, 2017
2392017
Preventing Use-after-free with Dangling Pointers Nullification.
B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee
Proceedings of the 2015 Annual Network and Distributed System Security …, 2015
2052015
ASLR-Guard: Stopping address space leakage for code reuse attacks
K Lu, C Song, B Lee, SP Chung, T Kim, W Lee
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
1962015
Razzer: Finding Kernel Race Bugs through Fuzzing
DR Jeong, K Kim, B Shivakumar, B Lee, I Shin
Security and Privacy (SP), 2019 IEEE Symposium on, 2019
1772019
OBLIVIATE: A Data Oblivious File System for Intel SGX
A Ahmad, K Kim, MI Sarfaraz, B Lee
Proceedings of the 2018 Annual Network and Distributed System Security …, 2018
1602018
Enforcing Kernel Security Invariants with Data Flow Integrity.
C Song, B Lee, K Lu, W Harris, T Kim, W Lee
Proceedings of the 2016 Annual Network and Distributed System Security …, 2016
1602016
HDFI: Hardware-assisted data-flow isolation
C Song, H Moon, M Alam, I Yun, B Lee, T Kim, W Lee, Y Paek
2016 IEEE Symposium on Security and Privacy (SP), 1-17, 2016
1582016
Protecting location privacy using location semantics
B Lee, J Oh, H Yu, J Kim
Proceedings of the 17th ACM SIGKDD international conference on Knowledge …, 2011
1502011
Cross-checking semantic correctness: The case of finding file system bugs
C Min, S Kashyap, B Lee, C Song, T Kim
Proceedings of the 25th Symposium on Operating Systems Principles, 361-377, 2015
1302015
Understanding malvertising through ad-injecting browser extensions
X Xing, W Meng, B Lee, U Weinsberg, A Sheth, R Perdisci, W Lee
Proceedings of the 24th international conference on world wide web, 1286-1295, 2015
1242015
Securing Real-Time Microcontroller Systems through Customized Memory View Switching
CH Kim, T Kim, H Choi, Z Gu, B Lee, X Zhang, D Xu
Proceedings of the 2018 Annual Network and Distributed System Security …, 2018
1222018
HFL: Hybrid Fuzzing on the Linux Kernel
K Kim, DR Jeong, CH Kim, Y Jang, I Shin, B Lee
NDSS, 2020
1202020
Toward engineering a secure android ecosystem: A survey of existing techniques
M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ...
ACM Computing Surveys (CSUR) 49 (2), 1-47, 2016
1092016
Type Casting Verification: Stopping an Emerging Attack Vector
B Lee, C Song, T Kim, W Lee
24th USENIX Security Symposium (USENIX Security 15), 2015
952015
Obfuscuro: A commodity obfuscation engine on intel sgx
A Ahmad, B Joe, Y Xiao, Y Zhang, I Shin, B Lee
Network and Distributed System Security Symposium, 2019
812019
From zygote to morula: Fortifying weakened aslr on android
B Lee, L Lu, T Wang, T Kim, W Lee
2014 IEEE Symposium on Security and Privacy, 424-439, 2014
792014
Hextype: Efficient detection of type confusion errors for c++
Y Jeon, P Biswas, S Carr, B Lee, M Payer
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
692017
DifuzzRTL: Differential Fuzz Testing to Find CPU Bugs
J Hur, S Song, D Kwon, E Baek, J Kim, B Lee
2021 IEEE Symposium on Security and Privacy (SP), 2021
642021
{CAB-Fuzz}: Practical Concolic Testing Techniques for {COTS} Operating Systems
SY Kim, S Lee, I Yun, W Xu, B Lee, Y Yun, T Kim
2017 USENIX Annual Technical Conference (USENIX ATC 17), 689-701, 2017
632017
Constraint-guided directed greybox fuzzing
G Lee, W Shim, B Lee
30th USENIX Security Symposium (USENIX Security 21), 3559-3576, 2021
622021
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20