Follow
Sangho Lee
Sangho Lee
Researcher of Microsoft Research Redmond
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing
S Lee, MW Shih, P Gera, T Kim, H Kim, M Peinado
26th USENIX Security Symposium (USENIX Security), 2017
5812017
QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing
I Yun, S Lee, M Xu, Y Jang, T Kim
27th USENIX Security Symposium (USENIX Security), 2018
5192018
WarningBird: Detecting Suspicious URLs in Twitter Stream
S Lee, J Kim
2012 Annual Network and Distributed System Security Symposium (NDSS), 2012
504*2012
T-SGX: Eradicating controlled-channel attacks against enclave programs
MW Shih, S Lee, T Kim, M Peinado
2017 Annual Network and Distributed System Security Symposium (NDSS), 2017
4632017
Spam filtering in Twitter using sender-receiver relationship
J Song, S Lee, J Kim
14th International Symposium on Recent Advances in Intrusion Detection (RAID …, 2011
3232011
WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream
S Lee, J Kim
IEEE Transactions on Dependable & Secure Computing 10 (3), 2013
2502013
Breaking Kernel Address Space Layout Randomization with Intel TSX
Y Jang, S Lee, T Kim
23rd ACM SIGSAC Conference on Computer and Communications Security (CCS …, 2016
2262016
SGX-Bomb: Locking Down the Processor via Rowhammer Attack
Y Jang, J Lee, S Lee, T Kim
Proceedings of the 2nd Workshop on System Software for Trusted Execution, 5, 2017
1712017
libmpk: Software Abstraction for Intel Memory Protection Keys (Intel {MPK})
S Park, S Lee, W Xu, H Moon, T Kim
2019 {USENIX} Annual Technical Conference ({USENIX}{ATC} 19), 241-254, 2019
1492019
Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities
S Lee, Y Kim, J Kim, J Kim
35th IEEE Symposium on Security and Privacy (Oakland), 2014
1262014
RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking
Y Ji, S Lee, E Downing, W Wang, M Fazzini, T Kim, A Orso, W Lee
24th ACM SIGSAC Conference on Computer and Communications Security (CCS), 2017
1172017
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques
M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ...
ACM Computing Surveys (CSUR) 49 (2), 38, 2016
1092016
Early filtering of ephemeral malicious accounts on Twitter
S Lee, J Kim
Computer Communications 54, 48-57, 2014
1072014
CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks
J Song, S Lee, J Kim
22nd ACM SIGSAC Conference on Computer and Communications Security (CCS …, 2015
972015
Reducing IPTV channel zapping time based on viewer’s surfing behavior and preference
Y Kim, JK Park, HJ Choi, S Lee, H Park, J Kim, Z Lee, K Ko
2008 IEEE International Symposium on Broadband Multimedia Systems and …, 2008
732008
Dominance as a New Trusted Computing Primitive for the Internet of Things
M Xu, M Huber, Z Sun, P England, M Peinado, S Lee, A Marochko, ...
2019 IEEE Symposium on Security and Privacy (SP), 1415-1430, 2019
632019
CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems
SY Kim, S Lee, I Yun, W Xu, B Lee, Y Yun, T Kim
2017 USENIX Annual Technical Conference (USENIX ATC), 689-701, 2017
632017
FACT: Functionality-centric Access Control System for IoT Programming Frameworks
S Lee, J Choi, J Kim, B Cho, S Lee, H Kim, J Kim
22nd ACM on Symposium on Access Control Models and Technologies, 43-54, 2017
592017
Enabling Refinable Cross-host Attack Investigation with Efficient Data Flow Tagging and Tracking
Y Ji, S Lee, M Fazzini, J Allen, E Downing, T Kim, A Orso, W Lee
27th USENIX Security Symposium (USENIX Security), 2018
582018
Identifying Cross-origin Resource Status Using Application Cache
S Lee, H Kim, J Kim
2015 Annual Network and Distributed System Security Symposium (NDSS), 2015
352015
The system can't perform the operation now. Try again later.
Articles 1–20