kangkook Jee
kangkook Jee
Email verificata su cs.columbia.edu - Home page
TitoloCitata daAnno
libdft: Practical dynamic data flow tracking for commodity systems
VP Kemerlis, G Portokalidis, K Jee, AD Keromytis
Acm Sigplan Notices 47 (7), 121-132, 2012
1612012
ShadowReplica: efficient parallelization of dynamic data flow tracking
K Jee, VP Kemerlis, AD Keromytis, G Portokalidis
Proceedings of the 2013 ACM SIGSAC conference on Computer & communicationsá…, 2013
492013
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware.
K Jee, G Portokalidis, VP Kemerlis, S Ghosh, DI August, AD Keromytis
NDSS, 2012
452012
High fidelity data reduction for big data security dependency analyses
Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communicationsá…, 2016
422016
Towards a Timely Causality Analysis for Enterprise Security.
Y Liu, M Zhang, D Li, K Jee, Z Li, Z Wu, J Rhee, P Mittal
NDSS, 2018
202018
{SAQL}: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
27th {USENIX} Security Symposium ({USENIX} Security 18), 639-656, 2018
182018
{AIQL}: Enabling Efficient Attack Investigation from System Monitoring Data
P Gao, X Xiao, Z Li, F Xu, SR Kulkarni, P Mittal
2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 113-126, 2018
162018
IntFlow: improving the accuracy of arithmetic error detection using information flow tracking
M Pomonis, T Petsios, K Jee, M Polychronakis, AD Keromytis
Proceedings of the 30th Annual Computer Security Applications Conferenceá…, 2014
142014
NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage.
WU Hassan, S Guo, D Li, Z Chen, K Jee, Z Li, A Bates
NDSS, 2019
82019
Nodemerge: template based efficient data reduction for big-data causality analysis
Y Tang, D Li, Z Li, M Zhang, K Jee, X Xiao, Z Wu, J Rhee, F Xu, Q Li
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communicationsá…, 2018
62018
Intrusion detection using efficient system dependency analysis
Z Wu, LI Zhichun, J Rhee, F Xu, G Jiang, K Jee, X Xiao, Z Xu
US Patent App. 15/416,462, 2017
42017
A query system for efficiently investigating complex attack behaviors for enterprise security
P Gao, X Xiao, Z Li, K Jee, F Xu, SR Kulkarni, P Mittal
Proceedings of the VLDB Endowment 12 (12), 1802-1805, 2019
12019
A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security
P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
arXiv preprint arXiv:1903.08159, 2019
12019
Host level detect mechanism for malicious dns activities
K Jee, LI Zhichun, G Jiang, L Korts-Parn, Z Wu, Y Sun, J Rhee
US Patent App. 15/644,018, 2018
12018
Extraction and comparison of hybrid program binary features
J Rhee, LI Zhichun, Z Wu, K Jee, G Jiang
US Patent App. 15/479,928, 2017
12017
On Efficiency and Accuracy of Data Flow Tracking Systems
K Jee
Columbia University, 2015
12015
Fine-grained analysis and prevention of invalid privilege transitions
J Rhee, J Yuseok, LI Zhichun, K Jee, Z Wu, G Jiang
US Patent 10,402,564, 2019
2019
Host behavior and network analytics based automotive secure gateway
J Rhee, H Li, HAO Shuai, CH Kim, Z Wu, LI Zhichun, K Jee, L Korts-Parn
US Patent App. 16/146,166, 2019
2019
Inter-application dependency analysis for improving computer system threat detection
D Li, K Jee, Z Chen, LA Tang, LI Zhichun
US Patent App. 16/006,164, 2019
2019
Path-based program lineage inference analysis
J Rhee, Z Wu, L Korts-Parn, K Jee, LI Zhichun, O Setayeshfar
US Patent App. 16/039,993, 2019
2019
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20