Follow
Kyu Hyung Lee
Kyu Hyung Lee
Assistant Professor of Computer Science, University of Georgia
Verified email at uga.edu - Homepage
Title
Cited by
Cited by
Year
Pres: probabilistic replay with execution sketching on multiprocessors
S Park, Y Zhou, W Xiong, Z Yin, R Kaushik, KH Lee, S Lu
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
2812009
High Accuracy Attack Provenance via Binary-based Execution Partition.
KH Lee, X Zhang, D Xu
NDSS 16, 2013
1852013
LogGC: garbage collecting audit log
KH Lee, X Zhang, D Xu
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1222013
{MPI}: Multiple perspective attack investigation with semantic aware execution partitioning
S Ma, J Zhai, F Wang, KH Lee, X Zhang, D Xu
26th USENIX Security Symposium (USENIX Security 17), 1111-1128, 2017
932017
MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ...
NDSS 2, 4, 2018
712018
Accurate, low cost and instrumentation-free security audit logging for windows
S Ma, KH Lee, CH Kim, J Rhee, X Zhang, D Xu
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
712015
Dynamic assembly of liquid crystalline graphene oxide gel fibers for ion transport
H Park, KH Lee, YB Kim, SB Ambade, SH Noh, W Eom, JY Hwang, ...
Science advances 4 (11), eaau2104, 2018
682018
{Kernel-Supported}{Cost-Effective} Audit Logging for Causality Tracking
S Ma, J Zhai, Y Kwon, KH Lee, X Zhang, G Ciocarlie, A Gehani, ...
2018 USENIX Annual Technical Conference (USENIX ATC 18), 241-254, 2018
462018
Augmenting RAID with an SSD for energy relief
HJ Lee, KH Lee, SH Noh
Proceedings of the 2008 conference on Power aware computing and systems, 12-12, 2008
432008
CISpan: comprehensive incremental mining algorithms of closed sequential patterns for multi-versional software mining
D Yuan, K Lee, H Cheng, G Krishna, Z Li, X Ma, Y Zhou, J Han
Proceedings of the 2008 SIAM International Conference on Data Mining, 84-95, 2008
362008
JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions.
B Li, P Vadrevu, KH Lee, R Perdisci, J Liu, B Rahbarinia, K Li, ...
NDSS, 2018
322018
Pfc: Transparent optimization of existing prefetching strategies for multi-level storage systems
Z Zhang, K Lee, X Ma, Y Zhou
2008 The 28th International Conference on Distributed Computing Systems, 740-751, 2008
312008
Fuzzification:{Anti-Fuzzing} Techniques
J Jung, H Hu, D Solodukhin, D Pagan, KH Lee, T Kim
28th USENIX Security Symposium (USENIX Security 19), 1913-1930, 2019
292019
Toward generating reducible replay logs
KH Lee, Y Zheng, N Sumner, X Zhang
ACM SIGPLAN Notices 46 (6), 246-257, 2011
202011
Write-aware buffer cache management scheme for nonvolatile ram
KH Lee, IH Doh, J Choi, D Lee, SH Noh
Proceedings of Advances in Computer Science and Technology. ACTA Press, 2007
202007
A2c: Self destructing exploit executions via input perturbation
Y Kwon, B Saltaformaggio, IL Kim, KH Lee, X Zhang, D Xu
Proceedings of The Network and Distributed System Security Symposium, 2017
192017
Unified debugging of distributed systems with recon
KH Lee, N Sumner, X Zhang, P Eugster
2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011
172011
Perfguard: binary-centric application performance monitoring in production environments
CH Kim, J Rhee, KH Lee, X Zhang, D Xu
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
152016
When push comes to ads: Measuring the rise of (malicious) push advertising
K Subramani, X Yuan, O Setayeshfar, P Vadrevu, KH Lee, R Perdisci
Proceedings of the ACM Internet Measurement Conference, 724-737, 2020
142020
Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots.
P Vadrevu, J Liu, B Li, B Rahbarinia, KH Lee, R Perdisci
NDSS, 2017
132017
The system can't perform the operation now. Try again later.
Articles 1–20