SelMon: reinforcing mobile device security with self-protected trust anchor
Jinsoo Jang, Brent Byunghoon Kang
MobiSys 20: Proceedings of the 18th International Conference on Mobile Systems, Applications, and Se
https://dl.acm.org/doi/10.1145/3386901.3389023
Boosting Fuzzer Efficiency: An Information Theoretic Perspective
Marcel Böhme, Valentin J.M. Manès, Sang Kil Cha
ESEC/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference
https://dl.acm.org/doi/abs/10.1145/3368089.3409748
Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference
Valentin J.M. Manès, Soomin Kim, Sang Kil Cha
International Conference on Software Engineering (ICSE) 2020
https://2020.icse-conferences.org/details/icse-2020-papers/107/Ankou-Guiding-Grey-box-Fuzzing-towards-Combinatorial-Difference
Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints
Dokyung Song, Felicitas Hetzelt, Jonghwan Kim, Brent Byunghoon Kang, Jean-Pierre Seifert, and Michael Franz
20th USENIX Security Symposium
https://www.usenix.org/conference/usenixsecurity20/presentation/song
Tight Security Bounds for Double-Block Hash-then-Sum MACs
Seongkwang Kim, Byeonghak Lee, and Jooyoung Lee
Advances in Cryptology – EUROCRYPT 2020
https://link.springer.com/chapter/10.1007/978-3-030-45721-1_16
HFL: Hybrid Fuzzing on the Linux Kernel
Kyungtae Kim, Dae R. Jeong, Chung Hwan Kim, Yeongjin Jang, Insik Shin, Byoungyoung Lee
27th Network & Distributed System Security Symposium
https://www.ndss-symposium.org/wp-content/uploads/2020/02/24018-paper.pdf
AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks
Seungsoo Lee, Seungwon Woo, Jinwoo Kim, Vinod Yegneswaran, Phillip Porras, and Seungwon Shin
IEEE INFOCOM 2020
https://ieeexplore.ieee.org/abstract/document/9155378
FUSE: Finding File Upload Bugs via Penetration Testing
Taekjin Lee, Seongil Wi, Suyoung Lee, Sooel Son
27th Network & Distributed System Security Symposium
https://www.ndss-symposium.org/wp-content/uploads/2020/02/23126-paper.pdf
Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer
Suyoung Lee, HyungSeok Han, Sang Kil Cha , Sooel Son.
20th USENIX Security Symposium
https://www.usenix.org/conference/usenixsecurity20/presentation/lee-suyoung
SoK: A Minimalist Approach to Formalizing Analog Sensor Security
Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, and Kevin Fu
IEEE Symposium on Security and Privacy
https://www.computer.org/csdl/proceedings-article/sp/2020/349700a499/1j2LfLSE9P2
TCLP: Enforcing Least Privileges to Prevent Containers from Kernel Vulnerabilities
Suyeol Lee, Junsik Seo, Jaehyun Nam, and Seungwon Shin
ACM Conference on Computer and Communications Security (CCS) 2019
https://dl.acm.org/doi/10.1145/3319535.3363282
FLUID: Flexible User Interface Distribution for Ubiquitous Multi-device Interaction
Sangeun Oh, Ahyeon Kim, Sunjae Lee, Kilho Lee, Dae R. Jeong, Steven Y. Ko, Insik Shin
Proceedings of the 25th ACM International Conference on Mobile Computing and Networking
http://cps.kaist.ac.kr/papers/mobicom19-fluid.pdf
Grey-box Concolic Testing on Binary Code
Jaeseung Choi, Joonun Jang, Choongwoo Han, and Sang Kil Cha.
In Proceedings of the International Conference on Software Engineering
https://softsec.kaist.ac.kr/~jschoi/data/icse2019.pdf
Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE
Hojoon Yang, Sangwook Bae, Mincheol Son, Hongil Kim, Song Min Kim, and Yongdae Kim
USENIX Security 2019
https://www.usenix.org/system/files/sec19-yang-hojoon.pdf
Doppelgängers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services
Changhoon Yoon, Kwanwoo Kim, Yongdae Kim, Seungwon Shin, Sooel Son
The Web Conference 2019: Security, Privacy, and Trust Research Track (WWW 2019)
https://drive.google.com/file/d/15QpktkCeJcv1vKzW_K8I6KRYF7j1dZjV/view
Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane
Hongil Kim, Jiho Lee, Eunkyu Lee, and Yongdae Kim
IEEE Symposium on Security and Privacy 2019
https://syssec.kaist.ac.kr/pub/2019/kim_sp_2019.pdf
Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
Yujin Kwon, Hyoungshick Kim, Jinwoo Shin, Yongdae Kim
IEEE Symposium on Security and Privacy 2019
https://syssec.kaist.ac.kr/pub/2019/kwon_sp_2019.pdf
EVSO: Environment-aware Video Streaming Optimization of Power Consumption
Kyoungjun Park and Myungchul Kim
IEEE International Conference on Computer Communications (INFOCOM)
https://arxiv.org/pdf/1905.06500.pdf
CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines
HS Han, DH Oh, SK Cha
Proceedings of the Network and Distributed System Security Symposium (NDSS)
https://daramg.gift/paper/han-ndss2019.pdf
Razzer: Finding Kernel Race Bugs through Fuzzing
Dae R. Jeong, Kyungtae Kim, Basavesh Ammanaghatta Shivakumar, Byoungyoung Lee, Insik Shin
IEEE Symposium on Security & Privacy (S&P) 2019
https://lifeasageek.github.io/papers/jeong-razzer.pdf
OBFSCURO: A Commodity Obfuscation Engine on Intel SGX
Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, Insik Shin, Byoungyoung Lee,
Network and Distributed System Security Symposium (NDSS) 2019
http://cps.kaist.ac.kr/papers/ndss19-obfuscuro.pdf
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web
Seunghyeon Lee, Changhoon Yoon, Heedo Kang, Yeonkeun Kim, Yongdae Kim, Dongsu Han, Sooel Son, and Seungwon Shin
Network and Distributed Systems Security (NDSS) Symposium 2019
https://www.ndss-symposium.org/wp-content/uploads/2019/02/ndss2019_09-1_Lee_paper.pdf
NEURAL ADAPTIVE CONTENT-AWARE INTERNET VIDEO DELIVERY
Hyunho Yeo, Youngmok Jung, Jaehong Kim, Jinwoo Shin, Dongsu Han
USENIX OSDI 2018
http://ina.kaist.ac.kr/~nas/
Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks
Benoît Cogliati, Yevgeniy Dodis, Jonathan Katz, Jooyoung Lee, John Steinberger, Aishwarya Thiruvengadam,Zhe Zhang
CRYPTO 2018 (The 38th International Cryptology Conference)
https://cs.nyu.edu/~dodis/ps/spn.pdf
Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing
Wookhyun Han, Byunggill Joe, Byoungyoung Lee, Chengyu Song, Insik Shin
Network and Distributed System Security Symposium (NDSS) 2018
http://cps.kaist.ac.kr/papers/18-MEDS-han.pdf
Neural Adaptive Content-aware Internet Video Delivery
Hyunho Yeo, Youngmok Jung, Jaehong Kim, Jinwoo Shin, Dongsu Han
USENIX OSDI 2018
https://www.usenix.org/conference/osdi18/presentation/yeo
Barista: An Event-centric NOS Composition Framework for Software-Defined Networks
Jaehyun Nam, Hyeonseong Jo, Yeonkeun Kim, Phillip Porras, Vinod Yegneswaran, Seungwon Shin
IEEE Conference on Computer Communications (INFOCOM)
http://nss.kaist.ac.kr/papers/infocomm2018-nam.pdf
GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier
Byeongdo Hong, Sangwook Bae, and Yongdae Kim
Network and Distributed Systems Security (NDSS) Symposium 2018
https://syssec.kaist.ac.kr/pub/2018/hong_ndss_2018.pdf
Pride and Prejudice in Progressive Web Apps:Abusing Native App-like Features in Web Applications
J. Lee, H. Kim, J. Park, I. Shin, S. Son
ACM Conference on Computer and Communications Security (CCS) 2018
https://drive.google.com/file/d/1kDc4fnD4eZSuCCYqnw8ghGtm71p4Sq4w/view
Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86
H. Lee, C. Song, Brent Byunghoon Kang
ACM Conference on Computer and Communications Security (CCS) 2018
https://cysec.kaist.ac.kr/publications/p1441-lee.pdf
Credit-Scheduled Delay-Bounded Congestion Control for Datacenters
Inho Cho, Keon Jang, Dongsu Han
ACM SIGCOMM 2017
http://ina.kaist.ac.kr/~dongsuh/paper/cho-sigcomm17.pdf
SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs
Jaebaek Seo, Byoungyoung Lee, Seongmin Kim, Ming-Wei Shih, Insik Shin, Dongsu Han, Taesoo Kim
NDSS 2017
http://ina.kaist.ac.kr/~dongsuh/paper/seo-ndss17.pdf
DELTA: A Security Assessment Framework for Software-Defined Networks
Seungsoo Lee, Changhoon Yoon, Chanhee Lee, Seungwon Shin, Vinod Yegneswaran, Phillip Porras
Network & Distributed System Security Symposium (NDSS)
http://nss.kaist.ac.kr/papers/delta_ndss16.pdf
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Vasserman, and Yongdae Kim
ACM Conference on Computer and Communications Security (CCS) 2017
https://syssec.kaist.ac.kr/pub/2017/kwon_ccs_2017.pdf
Imf: Inferred model-based fuzzer
HS Han, SK Cha
ACM Conference on Computer and Communications Security(CCS) 2017
https://dl.acm.org/citation.cfm?id=3134103
Testing intermediate representations for binary analysis
S Kim, M Faerevaag, M Jung, SI Jung, DY Oh, JH Lee, SK Cha
IEEE/ACM International Conference on Automated Software Engineering (ASE) 2017
http://delivery.acm.org/10.1145/3160000/3155609/ase17-mainp491.pdf?ip=143.248.249.95&id=3155609&acc=ACTIVE%20SERVICE&key=0EC22F8658578FE1%2E7500FBAD1E9579D9%2E4D4702B0C3E38B35%2E4D4702B0C3E38B35&__acm
Hacking in Darkness: Return-oriented Programming against Secure Enclaves
J. Lee, J. Jang, Y. Jang, N. Kwak, Y. Choi, C. Choi, T. Kim, M. Peinado, Brent Byunghoon Kang
USENIX Security 2017
https://cysec.kaist.ac.kr/publications/HackingEnclave.pdf
FlexDroid: Enforcing In-App Privilege Separation in Android
Jaebaek Seo, Daehyeok Kim, Donghyun Cho, Taesoo Kim, Insik Shin,
Network and Distributed System Security Symposium (NDSS) 2016
http://cps.kaist.ac.kr/papers/ndss16-flexdroid.pdf
DFC: Accelerating String Pattern Matching for Network Applications
Byungkwon Choi, Jongwook Chae, Muhammad Jamshed, Kyoungsoo Park, Dongsu Han
USENIX NSDI 2016
http://ina.kaist.ac.kr/~dongsuh/paper/nsdi16-paper-choi.pdf
QoSE:Quality of SEcurity (A network security module using a distributed NFV)
Taejune Park, Yeonkeun Kim, Jaehyun Park, Hyunmin Suh, Byeongdo Hong, Seungwon Shin
IEEE International Conference on Communications (ICC)
http://nss.kaist.ac.kr/papers/QoSE.pdf
PIkit: A New Kernel-Independent Processor-Interconnect Rootkit
Wonjun Song, Hyunwoo Choi, Junhong Kim, Eunsoo Kim, Yongdae Kim, and John Kim
USENIX Security 2016
https://syssec.kaist.ac.kr/pub/2016/song_usenix_sec2016.pdf
OpenSGX: An Open Platform for SGX Research
Prerit Jain, Soham Jayesh Desai, Ming-Wei Shih, Taesoo Kim, Seong Min Kim, Jae-Hyuk Lee, Changho Choi, Youjung Shin, Brent ByungHoon Kang, Dongsu Han
Network and Distributed System Security Symposium (NDSS) 2016
https://cysec.kaist.ac.kr/publications/jain-opensgx.pdf
Accurate Latency-based Congestion Feedback for Datacenters
Changhyun Lee, Chunjong Park, Keon Jang, Sue Moon, Dongsu Han
USENIX ATC 2015
http://ina.kaist.ac.kr/~dongsuh/paper/atc15-paper-lee-changhyun.pdf
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
Hongil Kim, Dongkwan Kim, Minhee Kwon, Hyungseok Han, Yeongjin Jang, Dongsu Han, Taesoo Kim, and Yongdae Kim
ACM Conference on Computer and Communications Security (CCS) 2015
https://syssec.kaist.ac.kr/pub/2015/kim-ccs2015.pdf
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, abd Yongdae Kim
USENIX Security 2015
https://syssec.kaist.ac.kr/pub/2015/son-sec2015.pdf
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment
J. Jang, S. Kong, M. Kim, D. Kim and B. Kang
Network and Distributed System Security Symposium (NDSS) 2015
https://cysec.kaist.ac.kr/publications/NDSS_2015_SeCReT.pdf
mTCP: a Highly Scalable User-level TCP Stack for Multicore Systems
EunYoung Jeong, Shinae Woo, Muhammad Asim Jamshed, Haewon Jeong, Sunghwan Ihm, Dongsu Han, Kyoungsoo Park
USENIX NSDI 2014
http://ina.kaist.ac.kr/~dongsuh/paper/nsdi14-jeong.pdf
Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission
Younghwan Go, Jongil Won, Denis Foo Kune, Eunyoung Jeong, Yongdae Kim, and Kyoungsoo Park
Network and Distributed System Security (NDSS) Symposium 2014
https://syssec.kaist.ac.kr/pub/2014/go_ndss2014.pdf
ATRA: Address Translation Redirection Attack against Hardware-based External Monitors
D. Jang, H. Lee, M. Kim, D. H. Kim, D. G. Kim and B. Kang
ACM Conference on Computer and Communications Security(CCS) 2014
https://cysec.kaist.ac.kr/publications/ACM_CCS_2014_ATRA.pdf
Rosemary: A Robust, Secure, and High-performance Network Operating System
S. Shin, Y. Song, T. Lee, S. Lee, J. Chung, P. Porras, V. Yegneswaran, J. Noh and B. Kang
ACM Conference on Computer and Communications Security(CCS) 2014
https://cysec.kaist.ac.kr/publications/rosemary.pdf
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object
H. Lee, H. Moon, D. Jang, K. Kim, J. Lee, Y. Paek and B. Kang
USENIX Security 2013
https://cysec.kaist.ac.kr/publications/kimon.pdf
Vigilare: Toward Snoop-based Kernel Integrity Monitor
H. Moon, H. Lee, J. Lee, K. Kim, Y. Paek and B. Kang
ACM Conference on Computer and Communications Security(CCS) 2012
https://cysec.kaist.ac.kr/publications/vigilare.pdf