


default search action
Taesoo Kim
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j16]Hyeonjae Jeon, Junghyun Seo, Taesoo Kim, Sungho Son, Jungki Lee, Gyeungho Choi, Yongseob Lim:
RainSD: Rain style diversification module for image synthesis enhancement using feature-level style distribution. Robotics Auton. Syst. 186: 104922 (2025) - 2024
- [j15]Junghyun Seo
, Sungjun Wang
, Hyeonjae Jeon
, Taesoo Kim, Yongsik Jin
, Soon Kwon, Jeseok Kim, Yongseob Lim
:
LuminanceGAN: Controlling the brightness of generated images for various night conditions. Pattern Recognit. Lett. 186: 292-299 (2024) - [c112]Juhee Kim
, Jinbum Park
, Yoochan Lee
, Chengyu Song
, Taesoo Kim
, Byoungyoung Lee
:
PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux. CCS 2024: 2919-2933 - [c111]Honggu Kang, Taesoo Kim, Huigyu Yang, Hyunseung Choo:
Movement Attentive Graph Embedding for Improving Next Point of Access Prediction. IMCOM 2024: 1-3 - [c110]Seungheon Doh, Keunwoo Choi, Daeyong Kwon, Taesoo Kim, Juhan Nam:
Music Discovery Dialogue Generation Using Human Intent Analysis and Large Language Models. ISMIR 2024: 946-953 - [c109]Fan Sang, Jaehyuk Lee, Xiaokuan Zhang, Meng Xu, Scott Constable, Yuan Xiao, Michael Steiner, Mona Vij, Taesoo Kim:
SENSE: Enhancing Microarchitectural Awareness for TEEs via Subscription-Based Notification. NDSS 2024 - [c108]Minjae Lee, Kyungmin Kim, Taesoo Kim, Sangdon Park:
Selective Generation for Controllable Language Models. NeurIPS 2024 - [c107]Kevin Stevens
, Mert Erdemir
, Hang Zhang
, Taesoo Kim
, Paul Pearce
:
BluePrint: Automatic Malware Signature Generation for Internet Scanning. RAID 2024: 197-214 - [c106]Mingyi Liu, Jun Ho Huh, HyungSeok Han, Jaehyuk Lee, Jihae Ahn, Frank Li, Hyoungshick Kim, Taesoo Kim:
I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures. USENIX Security Symposium 2024 - [i27]Hyeonjae Jeon, Junghyun Seo, Taesoo Kim, Sungho Son, Jungki Lee, Gyeungho Choi, Yongseob Lim:
RainSD: Rain Style Diversification Module for Image Synthesis Enhancement using Feature-Level Style Distribution. CoRR abs/2401.00460 (2024) - [i26]Mingyu Guan, Jack W. Stokes, Qinlong Luo, Fuchen Liu, Purvanshi Mehta, Elnaz Nouri, Taesoo Kim:
HetTree: Heterogeneous Tree Graph Neural Network. CoRR abs/2402.13496 (2024) - [i25]Jae-Hyuk Lee, Fan Sang, Taesoo Kim:
Prime+Retouch: When Cache is Locked and Leaked. CoRR abs/2402.15425 (2024) - [i24]Juhee Kim, Jinbum Park, Sihyeon Roh, Jaeyoung Chung, Youngjoo Lee, Taesoo Kim, Byoungyoung Lee:
TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution. CoRR abs/2406.08719 (2024) - [i23]Mingyi Liu, Jun Ho Huh, HyungSeok Han, Jaehyuk Lee, Jihae Ahn, Frank Li, Hyoungshick Kim, Taesoo Kim:
I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures. CoRR abs/2406.15709 (2024) - 2023
- [j14]Hyungjoon Koo
, Soyeon Park
, Daejin Choi
, Taesoo Kim
:
Binary Code Representation With Well-Balanced Instruction Normalization. IEEE Access 11: 29183-29198 (2023) - [j13]Soyeon Park
, Sangho Lee
, Taesoo Kim
:
Memory Protection Keys: Facts, Key Extension Perspectives, and Discussions. IEEE Secur. Priv. 21(3): 8-15 (2023) - [j12]Juhyeng Han
, Insu Yun
, Seongmin Kim
, Taesoo Kim
, Sooel Son
, Dongsu Han
:
Scalable and Secure Virtualization of HSM With ScaleTrust. IEEE/ACM Trans. Netw. 31(4): 1595-1610 (2023) - [c105]Hyeonsoo Lee, Junha Kim, Eunkyung Park, Minjeong Kim, Taesoo Kim, Thijs Kooi:
Enhancing Breast Cancer Risk Prediction by Incorporating Prior Images. MICCAI (5) 2023: 389-398 - [c104]Bokdeuk Jeong, Joonun Jang, Hayoon Yi, Jiin Moon, Junsik Kim, Intae Jeon, Taesoo Kim, WooChul Shim, Yong Ho Hwang:
UTopia: Automatic Generation of Fuzz Driver using Unit Tests. SP 2023: 2676-2692 - [c103]Ali Ahad, Chijung Jung, Ammar Askar, Doowon Kim, Taesoo Kim, Yonghwi Kwon:
Pyfet: Forensically Equivalent Transformation for Python Binary Decompilation. SP 2023: 3296-3313 - [c102]Yu-Fu Fu, Jae-Hyuk Lee, Taesoo Kim:
autofz: Automated Fuzzer Composition at Runtime. USENIX Security Symposium 2023: 1901-1918 - [c101]Sangdon Park, Osbert Bastani, Taesoo Kim:
ACon2: Adaptive Conformal Consensus for Provable Blockchain Oracles. USENIX Security Symposium 2023: 3313-3330 - [c100]Scott Constable, Jo Van Bulck, Xiang Cheng, Yuan Xiao, Cedric Xing, Ilya Alexandrovich, Taesoo Kim, Frank Piessens, Mona Vij, Mark Silberstein:
AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves. USENIX Security Symposium 2023: 4051-4068 - [i22]Yu-Fu Fu, Jae-Hyuk Lee, Taesoo Kim:
autofz: Automated Fuzzer Composition at Runtime. CoRR abs/2302.12879 (2023) - [i21]Hyeonsoo Lee, Junha Kim, Eunkyung Park, Minjeong Kim, Taesoo Kim, Thijs Kooi:
Enhancing Breast Cancer Risk Prediction by Incorporating Prior Images. CoRR abs/2303.15699 (2023) - [i20]Sangdon Park, Taesoo Kim:
PAC Neural Prediction Set Learning to Quantify the Uncertainty of Generative Language Models. CoRR abs/2307.09254 (2023) - [i19]Taesoo Kim, Hyeonjae Jeon, Yongseob Lim:
Challenges of YOLO-Series for Object Detection in Extremely Heavy Rain: CALRA Simulator-based Synthetic Evaluation Dataset. CoRR abs/2312.07976 (2023) - 2022
- [c99]Rajat Gupta
, Lukas Patrick Dresel
, Noah Spahn
, Giovanni Vigna
, Christopher Kruegel
, Taesoo Kim
:
POPKORN: Popping Windows Kernel Drivers At Scale. ACSAC 2022: 854-868 - [c98]Mingyu Guan, Anand Padmanabha Iyer
, Taesoo Kim:
DynaGraph: dynamic graph neural networks at scale. GRADES-NDA@SIGMOD 2022: 6:1-6:10 - [c97]Taesoo Kim, Jiho Chang, Jong Hwan Ko:
ADA-VAD: Unpaired Adversarial Domain Adaptation for Noise-Robust Voice Activity Detection. ICASSP 2022: 7327-7331 - [c96]Gunhee Nam, Taesoo Kim, Sanghyup Lee
, Thijs Kooi:
OOOE: Only-One-Object-Exists Assumption to Find Very Small Objects in Chest Radiographs. AMAI@MICCAI 2022: 139-149 - [c95]Sujin Park, Diyu Zhou, Yuchen Qian, Irina Calciu, Taesoo Kim, Sanidhya Kashyap:
Application-Informed Kernel Synchronization Primitives. OSDI 2022: 667-682 - [c94]Daehee Jang, Ammar Askar, Insu Yun, Stephen Tong, Yiqin Cai, Taesoo Kim:
Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients. RAID 2022: 1-16 - [c93]Seulbae Kim
, Taesoo Kim:
RoboFuzz: fuzzing robotic systems over robot operating system (ROS) for finding correctness bugs. ESEC/SIGSOFT FSE 2022: 447-458 - [c92]Beom Heyn Kim, Taesoo Kim, David Lie:
Modulo: Finding Convergence Failure Bugs in Distributed Systems with Divergence Resync Models. USENIX ATC 2022: 383-398 - [c91]Fan Sang, Ming-Wei Shih, Sangho Lee, Xiaokuan Zhang, Michael Steiner, Mona Vij, Taesoo Kim:
PRIDWEN: Universally Hardening SGX Programs via Load-Time Synthesis. USENIX ATC 2022: 455-472 - [c90]Sungbae Yoo, Jinbum Park, Seolheui Kim, Yeji Kim, Taesoo Kim:
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication. USENIX Security Symposium 2022: 89-106 - [i18]Jusop Choi, Wonseok Choi, William Aiken, Hyoungshick Kim, Jun Ho Huh, Taesoo Kim, Yongdae Kim, Ross J. Anderson:
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild. CoRR abs/2201.08678 (2022) - [i17]ChangSeok Oh, Sangho Lee, Wen Xu, Rohan Devang Vora, Taesoo Kim:
Mitigating Low-volume DoS Attacks with Data-driven Resource Accounting. CoRR abs/2205.00056 (2022) - [i16]Gunhee Nam, Taesoo Kim, Sanghyup Lee, Thijs Kooi:
OOOE: Only-One-Object-Exists Assumption to Find Very Small Objects in Chest Radiographs. CoRR abs/2210.06806 (2022) - [i15]Sangdon Park, Xiang Cheng, Taesoo Kim:
Unsafe's Betrayal: Abusing Unsafe Rust in Binary Reverse Engineering toward Finding Memory-safety Bugs via Machine Learning. CoRR abs/2211.00111 (2022) - [i14]Sangdon Park, Osbert Bastani, Taesoo Kim:
ACon2: Adaptive Conformal Consensus for Provable Blockchain Oracles. CoRR abs/2211.09330 (2022) - 2021
- [j11]Youngjoo Woo
, Taesoo Kim
, Sungin Jung, Euiseong Seo
:
Analysis and Optimization of Persistent Memory Index Structures' Write Amplification. IEEE Access 9: 167687-167698 (2021) - [j10]Hoseok Seol
, Minhye Kim, Taesoo Kim
, Yongdae Kim
, Lee-Sup Kim
:
Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks. IEEE Trans. Computers 70(4): 539-551 (2021) - [j9]Kangjie Lu
, Meng Xu, Chengyu Song
, Taesoo Kim
, Wenke Lee:
Stopping Memory Disclosures via Diversification and Replicated Execution. IEEE Trans. Dependable Secur. Comput. 18(1): 160-173 (2021) - [c89]Hyungjoon Koo
, Soyeon Park, Taesoo Kim:
A Look Back on a Function Identification Problem. ACSAC 2021: 158-168 - [c88]Taesoo Kim, Yejin Seo, Jisoo Lee, Sieun Chae, Jinung An:
Brain to Music: Musical Representation from Stress-Induced EEG. BCI 2021: 1-6 - [c87]Taesoo Kim:
Are we done yet? Our Journey to Fight against Memory-safety Bugs. CCS 2021: 4 - [c86]Insu Yun, Woosun Song, Seunggi Min, Taesoo Kim:
HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators. CCS 2021: 379-392 - [c85]Ren Ding, Yonghae Kim, Fan Sang, Wen Xu, Gururaj Saileshwar, Taesoo Kim:
Hardware Support to Improve Fuzzing Performance and Precision. CCS 2021: 2214-2228 - [c84]Sujin Park, Irina Calciu, Taesoo Kim, Sanidhya Kashyap:
Contextual concurrency control. HotOS 2021: 167-174 - [c83]Jinho Jung, Stephen Tong, Hong Hu, Jungwon Lim, Yonghwi Jin, Taesoo Kim:
WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning. NDSS 2021 - [c82]Youngseok Yang, Taesoo Kim, Byung-Gon Chun:
Finding Consensus Bugs in Ethereum via Multi-transaction Differential Fuzzing. OSDI 2021: 349-365 - [c81]Yechan Bae
, Youngsuk Kim, Ammar Askar, Jungwon Lim, Taesoo Kim:
Rudra: Finding Memory Safety Bugs in Rust at the Ecosystem Scale. SOSP 2021: 84-99 - [c80]Brian Wickman, Hong Hu, Insu Yun, Daehee Jang, Jungwon Lim, Sanidhya Kashyap, Taesoo Kim:
Preventing Use-After-Free Attacks with Fast Forward Allocation. USENIX Security Symposium 2021: 2453-2470 - [i13]Hyungjoon Koo, Soyeon Park, Daejin Choi, Taesoo Kim:
Semantic-aware Binary Code Representation with BERT. CoRR abs/2106.05478 (2021) - [i12]Sungbae Yoo, Jinbum Park, Seolheui Kim, Yeji Kim, Taesoo Kim:
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication. CoRR abs/2112.07213 (2021) - [i11]Jungwon Lim, Yonghwi Jin, Mansour Alharthi, Xiaokuan Zhang, Jinho Jung, Rajat Gupta, Kuilin Li, Daehee Jang, Taesoo Kim:
SOK: On the Analysis of Web Browser Security. CoRR abs/2112.15561 (2021) - 2020
- [j8]Steffen Maass, Mohan Kumar Kumar, Taesoo Kim, Tushar Krishna, Abhishek Bhattacharjee:
ECOTLB: Eventually Consistent TLBs. ACM Trans. Archit. Code Optim. 17(4): 27:1-27:24 (2020) - [j7]Seulbae Kim
, Meng Xu, Sanidhya Kashyap, Jungyeon Yoon, Wen Xu, Taesoo Kim:
Finding Bugs in File Systems with an Extensible Fuzzing Framework. ACM Trans. Storage 16(2): 10:1-10:35 (2020) - [c79]Chenxiong Qian, Hyungjoon Koo
, ChangSeok Oh
, Taesoo Kim, Wenke Lee:
Slimium: Debloating the Chromium Browser with Feature Subsetting. CCS 2020: 461-476 - [c78]Wen Xu, Soyeon Park, Taesoo Kim:
FREEDOM: Engineering a State-of-the-Art DOM Fuzzer. CCS 2020: 971-986 - [c77]Youngjoo Woo, Taesoo Kim, Sungin Jung:
Persistent Memory Needs Lifetime Extension Techniques. ICTC 2020: 1439-1441 - [c76]Ren Ding, Hong Hu, Wen Xu, Taesoo Kim:
DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report. NDSS 2020 - [c75]Soyeon Park, Wen Xu, Insu Yun, Daehee Jang, Taesoo Kim:
Fuzzing JavaScript Engines with Aspect-preserving Mutation. SP 2020: 1629-1642 - [c74]Meng Xu, Sanidhya Kashyap, Hanqing Zhao, Taesoo Kim:
Krace: Data Race Fuzzing for Kernel File Systems. SP 2020: 1643-1660 - [c73]Insu Yun, Dhaval Kapil, Taesoo Kim:
Automatic Techniques to Systematically Discover New Heap Exploitation Primitives. USENIX Security Symposium 2020: 1111-1128 - [e4]Taesoo Kim, Patrick P. C. Lee:
APSys '20: 11th ACM SIGOPS Asia-Pacific Workshop on Systems, Tsukuba, Japan, August 24-25, 2020. ACM 2020, ISBN 978-1-4503-8069-0 [contents]
2010 – 2019
- 2019
- [j6]Jinho Jung, Hong Hu, Joy Arulraj, Taesoo Kim, Woon-Hak Kang:
APOLLO: Automatic Detection and Diagnosis of Performance Regressions in Database Systems. Proc. VLDB Endow. 13(1): 57-70 (2019) - [c72]Juhyeng Han
, Seong-Min Kim
, Taesoo Kim, Dongsu Han
:
Toward scaling hardware security module for emerging cloud services. SysTEX@SOSP 2019: 3:1-3:6 - [c71]Seulbae Kim
, Meng Xu, Sanidhya Kashyap, Jungyeon Yoon, Wen Xu, Taesoo Kim:
Finding semantic bugs in file systems with an extensible fuzzing framework. SOSP 2019: 147-161 - [c70]Se Kwon Lee, Jayashree Mohan, Sanidhya Kashyap, Taesoo Kim, Vijay Chidambaram
:
Recipe: converting concurrent DRAM indexes to persistent-memory indexes. SOSP 2019: 462-477 - [c69]Rohan Kadekodi, Se Kwon Lee, Sanidhya Kashyap, Taesoo Kim, Aasheesh Kolli, Vijay Chidambaram
:
SplitFS: reducing software overhead in file systems for persistent memory. SOSP 2019: 494-508 - [c68]Sanidhya Kashyap, Irina Calciu, Xiaohe Cheng, Changwoo Min, Taesoo Kim:
Scalable and practical locking with shuffling. SOSP 2019: 586-599 - [c67]Wen Xu, Hyungon Moon, Sanidhya Kashyap, Po-Ning Tseng, Taesoo Kim:
Fuzzing File Systems via Two-Dimensional Input Space Exploration. IEEE Symposium on Security and Privacy 2019: 818-834 - [c66]Soyeon Park, Sangho Lee, Wen Xu, Hyungon Moon, Taesoo Kim:
libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK). USENIX ATC 2019: 241-254 - [c65]Chenxiong Qian, Hong Hu, Mansour Alharthi, Simon Pak Ho Chung, Taesoo Kim, Wenke Lee:
RAZOR: A Framework for Post-deployment Software Debloating. USENIX Security Symposium 2019: 1733-1750 - [c64]Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, Taesoo Kim:
Fuzzification: Anti-Fuzzing Techniques. USENIX Security Symposium 2019: 1913-1930 - [c63]Hanqing Zhao, Yanyu Zhang, Kun Yang, Taesoo Kim:
Breaking Turtles All the Way Down: An Exploitation Chain to Break out of VMware ESXi. WOOT @ USENIX Security Symposium 2019 - [i10]Insu Yun, Dhaval Kapil, Taesoo Kim:
Automatic Techniques to Systematically Discover New Heap Exploitation Primitives. CoRR abs/1903.00503 (2019) - [i9]Rohan Kadekodi, Se Kwon Lee, Sanidhya Kashyap, Taesoo Kim, Aasheesh Kolli, Vijay Chidambaram:
SplitFS: Reducing Software Overhead in File Systems for Persistent Memory. CoRR abs/1909.10123 (2019) - [i8]Fan Sang, Daehee Jang, Ming-Wei Shih, Taesoo Kim:
P2FAAS: Toward Privacy-Preserving Fuzzing as a Service. CoRR abs/1909.11164 (2019) - [i7]Se Kwon Lee, Jayashree Mohan, Sanidhya Kashyap, Taesoo Kim, Vijay Chidambaram:
RECIPE : Converting Concurrent DRAM Indexes to Persistent-Memory Indexes. CoRR abs/1909.13670 (2019) - 2018
- [j5]Beumjin Cho, Sangho Lee, Meng Xu, Sangwoo Ji, Taesoo Kim, Jong Kim:
Prevention of cross-update privacy leaks on android. Comput. Sci. Inf. Syst. 15(1): 111-137 (2018) - [j4]Seong-Min Kim
, Juhyeng Han
, Jaehyeong Ha, Taesoo Kim, Dongsu Han
:
SGX-Tor: A Secure and Practical Tor Anonymity Network With SGX Enclaves. IEEE/ACM Trans. Netw. 26(5): 2174-2187 (2018) - [c62]Mohan Kumar, Steffen Maass, Sanidhya Kashyap, Ján Veselý, Zi Yan
, Taesoo Kim, Abhishek Bhattacharjee
, Tushar Krishna:
LATR: Lazy Translation Coherence. ASPLOS 2018: 651-664 - [c61]Hong Hu
, Chenxiong Qian, Carter Yagemann
, Simon Pak Ho Chung, William R. Harris, Taesoo Kim, Wenke Lee:
Enforcing Unique Code Target Property for Control-Flow Integrity. CCS 2018: 1470-1486 - [c60]Sanidhya Kashyap, Changwoo Min, Kangnyeon Kim, Taesoo Kim:
A scalable ordering primitive for multicore machines. EuroSys 2018: 34:1-34:15 - [c59]Changwoo Min, Woon-Hak Kang, Mohan Kumar, Sanidhya Kashyap, Steffen Maass, Heeseung Jo, Taesoo Kim:
Solros: a data-centric operating system architecture for heterogeneous computing. EuroSys 2018: 36:1-36:15 - [c58]Ramneek, Mohan Kumar, Taesoo Kim, Sungin Jung:
mKPAC: Kernel Packet Processing for Manycore Systems. Middleware (Posters) 2018: 15-16 - [c57]Meng Xu, Chenxiong Qian, Kangjie Lu, Michael Backes, Taesoo Kim:
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels. IEEE Symposium on Security and Privacy 2018: 661-678 - [c56]Sanidhya Kashyap, Changwoo Min, Taesoo Kim:
Scaling Guest OS Critical Sections with eCS. USENIX ATC 2018: 159-172 - [c55]Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, Taesoo Kim:
QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. USENIX Security Symposium 2018: 745-761 - [c54]Yang Ji, Sangho Lee, Mattia Fazzini, Joey Allen, Evan Downing, Taesoo Kim, Alessandro Orso, Wenke Lee:
Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking. USENIX Security Symposium 2018: 1705-1722 - [e3]Jong Kim, Gail-Joon Ahn, Seungjoo Kim, Yongdae Kim, Javier López, Taesoo Kim:
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018 [contents] - [e2]Brent ByungHoon Kang, Taesoo Kim:
Information Security Applications - 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10763, Springer 2018, ISBN 978-3-319-93562-1 [contents] - [i6]Ketan Bhardwaj, Ming-Wei Shih, Ada Gavrilovska, Taesoo Kim, Chengyu Song:
SPX: Preserving End-to-End Security for Edge Computing. CoRR abs/1809.09038 (2018) - [i5]Soyeon Park, Sangho Lee, Wen Xu, Hyungon Moon, Taesoo Kim:
libmpk: Software Abstraction for Intel Memory Protection Keys. CoRR abs/1811.07276 (2018) - 2017
- [c53]Heeseung Jo, Woon-Hak Kang, Changwoo Min, Taesoo Kim:
FLsched: A Lockless and Lightweight Approach to OS Scheduler for Xeon Phi. APSys 2017: 8:1-8:8 - [c52]Yang Ji, Sangho Lee, Evan Downing, Weiren Wang, Mattia Fazzini
, Taesoo Kim, Alessandro Orso, Wenke Lee:
RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking. CCS 2017: 377-390 - [c51]Ruian Duan, Ashish Bijlani, Meng Xu, Taesoo Kim, Wenke Lee:
Identifying Open-Source License Violation and 1-day Security Risk at Large Scale. CCS 2017: 2169-2185 - [c50]Wen Xu, Sanidhya Kashyap, Changwoo Min, Taesoo Kim:
Designing New Operating Primitives to Improve Fuzzing Performance. CCS 2017: 2313-2328 - [c49]Taesoo Kim, Zhiqiang Lin, Chia-Che Tsai
:
CCS'17 Tutorial Abstract / SGX Security and Privacy. CCS 2017: 2613-2614 - [c48]Taesoo Kim, Dinghao Wu:
FEAST 2017: The Second Workshop on Forming an Ecosystem Around Software Transformation. CCS 2017: 2633-2634 - [c47]Steffen Maass, Changwoo Min, Sanidhya Kashyap, Woon-Hak Kang, Mohan Kumar, Taesoo Kim:
Mosaic: Processing a Trillion-Edge Graph on a Single Machine. EuroSys 2017: 527-543 - [c46]Jaebaek Seo, Byoungyoung Lee, Seong-Min Kim, Ming-Wei Shih, Insik Shin, Dongsu Han, Taesoo Kim:
SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs. NDSS 2017 - [c45]Ming-Wei Shih, Sangho Lee, Taesoo Kim, Marcus Peinado:
T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. NDSS 2017 - [c44]Seong-Min Kim, Juhyeng Han, Jaehyeong Ha, Taesoo Kim, Dongsu Han:
Enhancing Security and Privacy of Tor's Ecosystem by Using Trusted Execution Environments. NSDI 2017: 145-161 - [c43]Yeongjin Jang, Jae-Hyuk Lee, Sangho Lee, Taesoo Kim:
SGX-Bomb: Locking Down the Processor via Rowhammer Attack. SysTEX@SOSP 2017: 5:1-5:6 - [c42]Meng Xu, Kangjie Lu, Taesoo Kim, Wenke Lee:
Bunshin: Compositing Security Mechanisms through Diversification. USENIX ATC 2017: 271-283 - [c41]Sanidhya Kashyap, Changwoo Min, Taesoo Kim:
Scalable NUMA-aware Blocking Synchronization Primitives. USENIX ATC 2017: 603-615 - [c40]Su Yong Kim, Sangho Lee, Insu Yun, Wen Xu, Byoungyoung Lee, Youngtae Yun, Taesoo Kim:
CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems. USENIX ATC 2017: 689-701 - [c39]Ren Ding, Chenxiong Qian, Chengyu Song, William Harris, Taesoo Kim, Wenke Lee:
Efficient Protection of Path-Sensitive Control Security. USENIX Security Symposium 2017: 131-148 - [c38]Meng Xu, Taesoo Kim:
PlatPal: Detecting Malicious Documents with Platform Diversity. USENIX Security Symposium 2017: 271-287 - [c37]Jae-Hyuk Lee, Jin Soo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, Brent ByungHoon Kang:
Hacking in Darkness: Return-oriented Programming against Secure Enclaves. USENIX Security Symposium 2017: 523-539 - [c36]Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, Marcus Peinado:
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. USENIX Security Symposium 2017: 557-574 - [e1]Taesoo Kim, Cliff Wang, Dinghao Wu:
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, FEAST@CCS 2017, Dallas, TX, USA, November 3, 2017. ACM 2017, ISBN 978-1-4503-5395-3 [contents] - [i4]Meng Xu, Kangjie Lu, Taesoo Kim, Wenke Lee:
Bunshin: Compositing Security Mechanisms through Diversification (with Appendix). CoRR abs/1705.09165 (2017) - [i3]Sangho Lee, Taesoo Kim:
Leaking Uninitialized Secure Enclave Memory via Structure Padding (Extended Abstract). CoRR abs/1710.09061 (2017) - 2016
- [j3]Meng Xu, Chengyu Song
, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee, Chenxiong Qian, Sangho Lee, Taesoo Kim:
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques. ACM Comput. Surv. 49(2): 38:1-38:47 (2016) - [j2]Seungyeop Han, Haichen Shen, Taesoo Kim, Arvind Krishnamurthy, Thomas E. Anderson, David Wetherall:
MetaSync: Coordinating Storage across Multiple File Synchronization Services. IEEE Internet Comput. 20(3): 36-44 (2016) - [j1]Sanidhya Kashyap, Changwoo Min, Taesoo Kim:
Opportunistic Spinlocks: Achieving Virtual Machine Scalability in the Clouds. ACM SIGOPS Oper. Syst. Rev. 50(1): 9-16 (2016) - [c35]Yeongjin Jang, Sangho Lee, Taesoo Kim:
Breaking Kernel Address Space Layout Randomization with Intel TSX. CCS 2016: 380-392 - [c34]Kangjie Lu, Chengyu Song
, Taesoo Kim, Wenke Lee:
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages. CCS 2016: 920-932 - [c33]Ming-Wei Shih, Mohan Kumar, Taesoo Kim, Ada Gavrilovska:
S-NFV: Securing NFV states by using SGX. SDN-NFV@CODASPY 2016: 45-48 - [c32]Ketan Bhardwaj, Ming-Wei Shih, Pragya Agarwal, Ada Gavrilovska, Taesoo Kim, Karsten Schwan:
Fast, Scalable and Secure Onloading of Edge Functions Using AirBox. SEC 2016: 14-27 - [c31]Prerit Jain, Soham Jayesh Desai, Ming-Wei Shih, Taesoo Kim, Seong-Min Kim, Jae-Hyuk Lee, Changho Choi, Youjung Shin, Brent ByungHoon Kang, Dongsu Han:
OpenSGX: An Open Platform for SGX Research. NDSS 2016 - [c30]Jaebaek Seo, Daehyeok Kim, Donghyun Cho, Insik Shin, Taesoo Kim:
FLEXDROID: Enforcing In-App Privilege Separation in Android. NDSS 2016 - [c29]Chengyu Song, Byoungyoung Lee, Kangjie Lu, William Harris, Taesoo Kim, Wenke Lee:
Enforcing Kernel Security Invariants with Data Flow Integrity. NDSS 2016 - [c28]Alexandra Boldyreva, Taesoo Kim, Richard J. Lipton, Bogdan Warinschi:
Provably-Secure Remote Memory Attestation for Heap Overflow Protection. SCN 2016: 83-103 - [c27]Chengyu Song
, Hyungon Moon, Monjur Alam, Insu Yun, Byoungyoung Lee, Taesoo Kim, Wenke Lee, Yunheung Paek:
HDFI: Hardware-Assisted Data-Flow Isolation. IEEE Symposium on Security and Privacy 2016: 1-17 - [c26]Changwoo Min, Sanidhya Kashyap, Steffen Maass, Taesoo Kim:
Understanding Manycore Scalability of File Systems. USENIX ATC 2016: 71-85 - [c25]Sanidhya Kashyap, Changwoo Min, Byoungyoung Lee, Taesoo Kim, Pavel Emelyanov:
Instant OS Updates via Userspace Checkpoint-and-Restart. USENIX ATC 2016: 605-619 - [c24]Insu Yun, Changwoo Min, Xujie Si, Yeongjin Jang, Taesoo Kim, Mayur Naik:
APISan: Sanitizing API Usages through Semantic Cross-Checking. USENIX Security Symposium 2016: 363-378 - [i2]Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, Marcus Peinado:
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. CoRR abs/1611.06952 (2016) - 2015
- [c23]Sanidhya Kashyap, Changwoo Min, Taesoo Kim:
Scalability in the Clouds!: A Myth or Reality? APSys 2015: 5:1-5:7 - [c22]Kangjie Lu, Chengyu Song
, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee:
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks. CCS 2015: 280-291 - [c21]Hongil Kim, Dongkwan Kim, Minhee Kwon, HyungSeok Han, Yeongjin Jang, Dongsu Han
, Taesoo Kim, Yongdae Kim
:
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations. CCS 2015: 328-339 - [c20]Meng Xu, Yeongjin Jang, Xinyu Xing, Taesoo Kim, Wenke Lee:
UCognito: Private Browsing without Tears. CCS 2015: 438-449 - [c19]Taesoo Kim, Sunghwan Kim:
Efficient Transmission of Reversible Data Hiding in Encryption Images by Using Reed-Solomon Codes. FiCloud 2015: 765-769 - [c18]Seong-Min Kim
, Youjung Shin, Jaehyung Ha, Taesoo Kim, Dongsu Han
:
A First Step Towards Leveraging Commodity Trusted Execution Environments for Network Applications. HotNets 2015: 7:1-7:7 - [c17]Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Long Lu, Wenke Lee:
Preventing Use-after-free with Dangling Pointers Nullification. NDSS 2015 - [c16]Changwoo Min, Sanidhya Kashyap, Byoungyoung Lee, Chengyu Song
, Taesoo Kim:
Cross-checking semantic correctness: the case of finding file system bugs. SOSP 2015: 361-377 - [c15]Seungyeop Han, Haichen Shen, Taesoo Kim, Arvind Krishnamurthy, Thomas E. Anderson, David Wetherall:
MetaSync: File Synchronization Across Multiple Untrusted Storage Services. USENIX ATC 2015: 83-95 - [c14]Changwoo Min, Woon-Hak Kang, Taesoo Kim, Sang-Won Lee, Young Ik Eom:
Lightweight Application-Level Crash Consistency on Transactional Flash Storage. USENIX ATC 2015: 221-234 - [c13]Byoungyoung Lee, Chengyu Song, Taesoo Kim, Wenke Lee:
Type Casting Verification: Stopping an Emerging Attack Vector. USENIX Security Symposium 2015: 81-96 - [i1]Alexandra Boldyreva, Taesoo Kim, Richard J. Lipton, Bogdan Warinschi:
Towards Provably-Secure Remote Memory Attestation. IACR Cryptol. ePrint Arch. 2015: 729 (2015) - 2014
- [b1]Taesoo Kim:
Automatic intrusion recovery with system-wide history. Massachusetts Institute of Technology, Cambridge, MA, USA, 2014 - [c12]Haogang Chen, Taesoo Kim, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Identifying Information Disclosure in Web Applications with Retroactive Auditing. OSDI 2014: 555-569 - [c11]Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, Wenke Lee:
From Zygote to Morula: Fortifying Weakened ASLR on Android. IEEE Symposium on Security and Privacy 2014: 424-439 - 2013
- [c10]Haogang Chen, Cody Cutler, Taesoo Kim, Yandong Mao, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Security bugs in embedded interpreters. APSys 2013: 17:1-17:7 - [c9]Taesoo Kim, Ramesh Chandra, Nickolai Zeldovich:
Optimizing unit test execution in large software programs using dependency analysis. APSys 2013: 19:1-19:6 - [c8]Ramesh Chandra, Taesoo Kim, Nickolai Zeldovich:
Asynchronous intrusion recovery for interconnected web services. SOSP 2013: 213-227 - [c7]Taesoo Kim, Nickolai Zeldovich:
Practical and Effective Sandboxing for Non-root Users. USENIX ATC 2013: 139-144 - 2012
- [c6]Taesoo Kim, Ramesh Chandra, Nickolai Zeldovich:
Recovering from intrusions in distributed systems with DARE. APSys 2012: 10 - [c5]Taesoo Kim, Ramesh Chandra, Nickolai Zeldovich:
Efficient Patch-based Auditing for Web Application Vulnerabilities. OSDI 2012: 193-206 - [c4]Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz:
STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud. USENIX Security Symposium 2012: 189-204 - 2011
- [c3]Ramesh Chandra, Taesoo Kim, Meelap Shah, Neha Narula, Nickolai Zeldovich:
Intrusion recovery for database-backed web applications. SOSP 2011: 101-114 - 2010
- [c2]Taesoo Kim, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Intrusion Recovery Using Selective Re-execution. OSDI 2010: 89-104 - [c1]Taesoo Kim, Nickolai Zeldovich:
Making Linux Protection Mechanisms Egalitarian with UserFS. USENIX Security Symposium 2010: 13-28
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-20 01:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint