학술논문

2020년

  • Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference

    Valentin J.M. Manès, Soomin Kim, Sang Kil Cha
    International Conference on Software Engineering (ICSE) 2020

  • Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints

    Dokyung Song, Felicitas Hetzelt, Jonghwan Kim, Brent Byunghoon Kang, Jean-Pierre Seifert, and Michael Franz
    20th USENIX Security Symposium

  • Tight Security Bounds for Double-Block Hash-then-Sum MACs

    Seongkwang Kim, Byeonghak Lee, and Jooyoung Lee
    Advances in Cryptology – EUROCRYPT 2020
    https://link.springer.com/chapter/10.1007/978-3-030-45721-1_16

  • HFL: Hybrid Fuzzing on the Linux Kernel

    Kyungtae Kim, Dae R. Jeong, Chung Hwan Kim, Yeongjin Jang, Insik Shin, Byoungyoung Lee
    27th Network & Distributed System Security Symposium
    https://www.ndss-symposium.org/ndss2020/accepted-papers/

  • AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks

    Seungsoo Lee, Seungwon Woo, Jinwoo Kim, Vinod Yegneswaran, Phillip Porras, and Seungwon Shin
    IEEE INFOCOM 2020

  • FUSE: Finding File Upload Bugs via Penetration Testing

    Taekjin Lee, Seongil Wi, Suyoung Lee, Sooel Son
    27th Network & Distributed System Security Symposium
    https://www.ndss-symposium.org/ndss2020/accepted-papers/

  • Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer

    Suyoung Lee, HyungSeok Han, Sang Kil Cha , Sooel Son.
    20th USENIX Security Symposium
    https://leeswimming.com/papers/lee-sec20.pdf

  • SoK: A Minimalist Approach to Formalizing Analog Sensor Security

    Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, and Kevin Fu
    IEEE Symposium on Security and Privacy

2019년

  • TCLP: Enforcing Least Privileges to Prevent Containers from Kernel Vulnerabilities

    Suyeol Lee, Junsik Seo, Jaehyun Nam, and Seungwon Shin
    ACM Conference on Computer and Communications Security (CCS) 2019

  • FLUID: Flexible User Interface Distribution for Ubiquitous Multi-device Interaction

    Sangeun Oh, Ahyeon Kim, Sunjae Lee, Kilho Lee, Dae R. Jeong, Steven Y. Ko, Insik Shin
    Proceedings of the 25th ACM International Conference on Mobile Computing and Networking
    http://cps.kaist.ac.kr/papers/mobicom19-fluid.pdf

  • Grey-box Concolic Testing on Binary Code

    Jaeseung Choi, Joonun Jang, Choongwoo Han, and Sang Kil Cha.
    In Proceedings of the International Conference on Software Engineering
    https://softsec.kaist.ac.kr/~jschoi/data/icse2019.pdf

  • Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE

    Hojoon Yang, Sangwook Bae, Mincheol Son, Hongil Kim, Song Min Kim, and Yongdae Kim
    USENIX Security 2019
    https://www.usenix.org/system/files/sec19-yang-hojoon.pdf

  • Doppelgängers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services

    Changhoon Yoon, Kwanwoo Kim, Yongdae Kim, Seungwon Shin, Sooel Son
    The Web Conference 2019: Security, Privacy, and Trust Research Track (WWW 2019)
    https://drive.google.com/file/d/15QpktkCeJcv1vKzW_K8I6KRYF7j1dZjV/view

  • Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane

    Hongil Kim, Jiho Lee, Eunkyu Lee, and Yongdae Kim
    IEEE Symposium on Security and Privacy 2019
    https://syssec.kaist.ac.kr/pub/2019/kim_sp_2019.pdf

  • Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?

    Yujin Kwon, Hyoungshick Kim, Jinwoo Shin, Yongdae Kim
    IEEE Symposium on Security and Privacy 2019
    https://syssec.kaist.ac.kr/pub/2019/kwon_sp_2019.pdf

  • EVSO: Environment-aware Video Streaming Optimization of Power Consumption

    Kyoungjun Park and Myungchul Kim
    IEEE International Conference on Computer Communications (INFOCOM)
    https://arxiv.org/pdf/1905.06500.pdf

  • CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines

    HS Han, DH Oh, SK Cha
    Proceedings of the Network and Distributed System Security Symposium (NDSS)
    https://daramg.gift/paper/han-ndss2019.pdf

  • Razzer: Finding Kernel Race Bugs through Fuzzing

    Dae R. Jeong, Kyungtae Kim, Basavesh Ammanaghatta Shivakumar, Byoungyoung Lee, Insik Shin
    IEEE Symposium on Security & Privacy (S&P) 2019
    https://lifeasageek.github.io/papers/jeong-razzer.pdf

  • OBFSCURO: A Commodity Obfuscation Engine on Intel SGX

    Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, Insik Shin, Byoungyoung Lee,
    Network and Distributed System Security Symposium (NDSS) 2019
    http://cps.kaist.ac.kr/papers/ndss19-obfuscuro.pdf

  • Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web

    Seunghyeon Lee, Changhoon Yoon, Heedo Kang, Yeonkeun Kim, Yongdae Kim, Dongsu Han, Sooel Son, and Seungwon Shin
    Network and Distributed Systems Security (NDSS) Symposium 2019
    https://www.ndss-symposium.org/wp-content/uploads/2019/02/ndss2019_09-1_Lee_paper.pdf

2018년

  • NEURAL ADAPTIVE CONTENT-AWARE INTERNET VIDEO DELIVERY

    Hyunho Yeo, Youngmok Jung, Jaehong Kim, Jinwoo Shin, Dongsu Han
    USENIX OSDI 2018
    http://ina.kaist.ac.kr/~nas/

  • Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks

    Benoît Cogliati, Yevgeniy Dodis, Jonathan Katz, Jooyoung Lee, John Steinberger, Aishwarya Thiruvengadam,Zhe Zhang
    CRYPTO 2018 (The 38th International Cryptology Conference)
    https://cs.nyu.edu/~dodis/ps/spn.pdf

  • Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing

    Wookhyun Han, Byunggill Joe, Byoungyoung Lee, Chengyu Song, Insik Shin
    Network and Distributed System Security Symposium (NDSS) 2018
    http://cps.kaist.ac.kr/papers/18-MEDS-han.pdf

  • Neural Adaptive Content-aware Internet Video Delivery

    Hyunho Yeo, Youngmok Jung, Jaehong Kim, Jinwoo Shin, Dongsu Han
    USENIX OSDI 2018
    https://www.usenix.org/conference/osdi18/presentation/yeo

  • Barista: An Event-centric NOS Composition Framework for Software-Defined Networks

    Jaehyun Nam, Hyeonseong Jo, Yeonkeun Kim, Phillip Porras, Vinod Yegneswaran, Seungwon Shin
    IEEE Conference on Computer Communications (INFOCOM)
    http://nss.kaist.ac.kr/papers/infocomm2018-nam.pdf

  • GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier

    Byeongdo Hong, Sangwook Bae, and Yongdae Kim
    Network and Distributed Systems Security (NDSS) Symposium 2018
    https://syssec.kaist.ac.kr/pub/2018/hong_ndss_2018.pdf

  • Pride and Prejudice in Progressive Web Apps:Abusing Native App-like Features in Web Applications

    J. Lee, H. Kim, J. Park, I. Shin, S. Son
    ACM Conference on Computer and Communications Security (CCS) 2018
    https://drive.google.com/file/d/1kDc4fnD4eZSuCCYqnw8ghGtm71p4Sq4w/view

  • Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86

    H. Lee, C. Song, Brent Byunghoon Kang
    ACM Conference on Computer and Communications Security (CCS) 2018
    https://cysec.kaist.ac.kr/publications/p1441-lee.pdf

2017년

2016년

2015년

2014년

2013년

2012년