Chung Hwan Kim
Title
Cited by
Cited by
Year
Securing Real-Time Microcontroller Systems through Customized Memory View Switching
CH Kim, T Kim, H Choi, Z Gu, B Lee, X Zhang, D Xu
Proceedings of the 25th Network and Distributed Systems Security Symposium …, 2018
632018
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows
S Ma, KH Lee, CH Kim, J Rhee, X Zhang, D Xu
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
562015
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
Proceedings of the 27th USENIX Security Symposium (USENIX Security 2018 …, 2018
472018
J-Force: Forced Execution on JavaScript
K Kim, IL Kim, CH Kim, Y Kwon, Y Zheng, X Zhang, D Xu
Proceedings of the 26th International Conference on World Wide Web (WWW 2017 …, 2017
442017
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing
T Kim, CH Kim, J Rhee, F Fei, Z Tu, G Walkup, X Zhang, X Deng, D Xu
Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), 425-442, 2019
262019
IntroPerf: Transparent Context-Sensitive Multi-Layer Performance Inference using System Stack Traces
CH Kim, J Rhee, H Zhang, N Arora, G Jiang, X Zhang, D Xu
Proceedings of the 2014 ACM international Conference on Measurement and …, 2014
262014
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications
T Kim, CH Kim, H Choi, Y Kwon, B Saltaformaggio, X Zhang, D Xu
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
232017
HFL: Hybrid Fuzzing on the Linux Kernel
K Kim, DR Jeong, CH Kim, Y Jang, I Shin, B Lee
Proceedings of the 2020 Annual Network and Distributed System Security …, 2020
172020
PerfGuard: Binary-Centric Application Performance Monitoring in Production Environments
CH Kim, J Rhee, KH Lee, X Zhang, D Xu
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations …, 2016
112016
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality
CH Kim, S Park, J Rhee, JJ Won, T Han, D Xu
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
72015
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality
S Park, CH Kim, J Rhee, JJ Won, T Han, D Xu
IEEE Transactions on Dependable and Secure Computing (TDSC), 2018
42018
Vessels: efficient and scalable deep learning prediction on trusted processors
K Kim, CH Kim, JJ Rhee, X Yu, H Chen, D Tian, B Lee
Proceedings of the 11th ACM Symposium on Cloud Computing, 462-476, 2020
32020
From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY
T Kim, CH Kim, A Ozen, F Fei, Z Tu, X Zhang, X Deng, DJ Tian, D Xu
Proceedings of the 29th USENIX Security Symposium (USENIX Security 2020 …, 2020
32020
PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications
Y Jeon, J Rhee, CH Kim, Z Li, M Payer, B Lee, Z Wu
Proceedings of the 9th ACM Conference on Data and Application Security and …, 2019
22019
A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security
P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
arXiv, arXiv: 1903.08159, 2019
22019
Progressive Processing of System-Behavioral Query
J Gui, X Xiao, D Li, CH Kim, H Chen
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
12019
Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races
O Setayeshfar, CH Kim, KH Lee
International Conference on Detection of Intrusions and Malware, and …, 2021
2021
Efficient and scalable enclave protection for machine learning programs
CH Kim, J Rhee, X Yu, LA Tang, H Chen, K Kim
US Patent App. 16/816,715, 2021
2021
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications
T Kim, V Kumar, J Rhee, J Chen, K Kim, CH Kim, D Xu, DJ Tian
Proceedings of the 30th USENIX Security Symposium (USENIX Security 2021), 2021
2021
Detecting Malware Injection with Program-DNS Behavior
Y Sun, K Jee, S Sivakorn, Z Li, C Lumezanu, L Korts-Parn, Z Wu, J Rhee, ...
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 552-568, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20