Georgia Institute of Technology

General Info

Rank: #4 Worldwide
#4 in US
Number of Papers: 102
Number of Researchers: 91
APA
(average papers per authors):
1.1
Country: USA

Activity Map

Contributors

  • Wenke Lee (52 papers)
  • Taesoo Kim (12 papers)
  • Chengyu Song (11 papers)
  • David Dagon (10 papers)
  • Yeongjin Jang (9 papers)
  • Monirul Sharif (8 papers)
  • Manos Antonakakis (8 papers)
  • Patrick Traynor (8 papers)
  • Simon P. Chung (7 papers)
  • Kangjie Lu (7 papers)
  • Raheem Beyah (7 papers)
  • Tielei Wang (6 papers)
  • Byoungyoung Lee (6 papers)
  • Roberto Perdisci (6 papers)
  • Alexandra Boldyreva (6 papers)
  • Nick Feamster (6 papers)
  • Jonathon Giffin (5 papers)
  • Mustaque Ahamad (5 papers)
  • Xiaojing Liao (5 papers)
  • Long Lu (5 papers)
  • Shouling Ji (4 papers)
  • Prahlad Fogla (4 papers)
  • Terry Nelms (4 papers)
  • Guofei Gu (3 papers)
  • Weiqing Li (3 papers)
  • Wei Meng (3 papers)
  • Ling Liu (3 papers)
  • Brendan Dolan-Gavitt (3 papers)
  • Yacin Nadji (3 papers)
  • Henry Carter (3 papers)
  • Xinyu Xing (3 papers)
  • Christopher Lee (2 papers)
  • Junjie Zhang (2 papers)
  • Andrea Lanzi (2 papers)
  • Abhinav Srivastava (2 papers)
  • David Dewey (2 papers)
  • Jon Giffin (2 papers)
  • Oleg M. Kolesnikov (2 papers)
  • Virendra Kumar (2 papers)
  • Martim Carbone (2 papers)
  • Kapil Singh (2 papers)
  • Insu Yun (2 papers)
  • Mudhakar Srivatsa (2 papers)
  • Santosh Vempala (2 papers)
  • Billy Lau (2 papers)
  • Xiapu Luo (1 papers)
  • Charles Lever (1 papers)
  • Brad Reaves (1 papers)
  • Cong Zheng (1 papers)
  • Bharat Srinivasan (1 papers)
  • Ren Ding (1 papers)
  • Steven Han (1 papers)
  • David Formby (1 papers)
  • Preethi Srinivasan (1 papers)
  • Andrew Leonard (1 papers)
  • Jonathan Rogers (1 papers)
  • Prerit Jain (1 papers)
  • Soham Desai (1 papers)
  • Ming-Wei Shih (1 papers)
  • William R. Harris (1 papers)
  • Jun Li (1 papers)
  • Minho Sung (1 papers)
  • Jun Jim Xu (1 papers)
  • Bryan D. Payne (1 papers)
  • Chaz Lever (1 papers)
  • Monjur Alam (1 papers)
  • Shuang Hao (1 papers)
  • Nadeem Syed (1 papers)
  • Alexander Gray (1 papers)
  • Jun Xu (1 papers)
  • Tongqing Qiu (1 papers)
  • Sam Burnett (1 papers)
  • Dan Doozan (1 papers)
  • Yizheng Chen (1 papers)
  • Ethan Shernan (1 papers)
  • Changwoo Min (1 papers)
  • Xujie Si (1 papers)
  • Mayur Naik (1 papers)
  • Adam O'Neill (1 papers)
  • Anirudh Ramachandran (1 papers)
  • Artem Dinaburg (1 papers)
  • Paul Royal (1 papers)
  • Vijay Balasubramaniyan (1 papers)
  • Aamir Poonawalla (1 papers)
  • Michael T. Hunter (1 papers)
  • Richard Jay Lipton (1 papers)
  • Arunabh Verma (1 papers)
  • Robert Lychev (1 papers)
  • Abhinav Narain (1 papers)
  • Meng Xu (1 papers)
  • Sangho Lee (1 papers)

Papers

"Anomaly Detection Using Call Stack Information"

Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, ... -- Oakland 2003

"Formalizing Sensitivity in Static Analysis for Intrusion Detection"

Wenke Lee, ... -- Oakland 2004

"Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation"

Jun Li, Minho Sung, Jun Jim Xu, ... -- Oakland 2004

"Countering Targeted File Attacks Using LocationGuard"

Mudhakar Srivatsa, Ling Liu, ... -- Usenix 2005

"Securing Publish-Subscribe Overlay Services with EventGuard"

Mudhakar Srivatsa, Ling Liu, ... -- CCS 2005

"Modeling Botnet Propagation Using Time Zones"

David Dagon, Wenke Lee, ... -- NDSS 2006

"Polymorphic Blending Attacks"

Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg M. Kolesnikov, Wenke Lee, ... -- Usenix 2006

"Evading Network Anomaly Detection Systems: Formal Reasoning and Practical Techniques"

Prahlad Fogla, Wenke Lee, ... -- CCS 2006

"Misleading Worm Signature Generators Using Deliberate Noise Injection"

Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul Sharif, ... -- Oakland 2006

"BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation"

Guofei Gu, Wenke Lee, ... -- Usenix 2007

"Filtering Spam with Behavioral Blacklisting"

Anirudh Ramachandran, Nick Feamster, Santosh Vempala, ... -- CCS 2007

"Extended abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos"

Alexandra Boldyreva, Virendra Kumar, ... -- Oakland 2007

"Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing"

Alexandra Boldyreva, Adam O'Neill, ... -- CCS 2007

"BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection"

Wenke Lee, Guofei Gu, Junjie Zhang, ... -- Usenix 2008

"Identity-based Encryption with Efficient Revocation"

Alexandra Boldyreva, Virendra Kumar, ... -- CCS 2008

"Lares: An Architecture for Secure Active Monitoring Using Virtualization"

Wenke Lee, Monirul Sharif, Martim Carbone, Bryan D. Payne, ... -- Oakland 2008

"Ether: Malware Analysis via Hardware Virtualization Extensions"

Artem Dinaburg, Paul Royal, Monirul Sharif, Wenke Lee, ... -- CCS 2008

"Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority"

David Dagon, Christopher Lee, Wenke Lee, ... -- NDSS 2008

"Increased DNS Forgery Resistance Through 0x20-Bit Encoding"

David Dagon, Manos Antonakakis, Wenke Lee, ... -- CCS 2008

"BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic"

Guofei Gu, Junjie Zhang, Wenke Lee, ... -- NDSS 2008

"Preserving Caller Anonymity in Voice-over-IP Networks"

Ling Liu, ... -- Oakland 2008

"Impeding Malware Analysis Using Conditional Code Obfuscation"

Monirul Sharif, Jonathon Giffin, Wenke Lee, ... -- NDSS 2008

"Secure in-VM monitoring using hardware virtualization"

Monirul Sharif, Wenke Lee, ... -- CCS 2009

"Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine"

Nick Feamster, Shuang Hao, Nadeem Syed, Alexander Gray, ... -- Usenix 2009

"On cellular botnets: measuring the impact of malicious devices on a cellular network core"

Patrick Traynor, ... -- CCS 2009

"Mapping kernel objects to enable systematic integrity checking"

Martim Carbone, Long Lu, Wenke Lee, ... -- CCS 2009

"Recursive DNS Architectures and Vulnerability Implications"

David Dagon, Manos Antonakakis, Xiapu Luo, Christopher Lee, Wenke Lee, ... -- NDSS 2009

"Robust signatures for kernel data structures"

Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick Traynor, Jonathon Giffin, ... -- CCS 2009

"Automatic Reverse Engineering of Malware Emulators"

Jonathon Giffin, Wenke Lee, Monirul Sharif, Andrea Lanzi, ... -- Oakland 2009

"xBook: Redesigning Privacy Control in Social Networking Platforms"

Wenke Lee, Kapil Singh, ... -- Usenix 2009

"K-Tracer: A System for Extracting Kernel Malware Behavior"

Andrea Lanzi, Monirul Sharif, Wenke Lee, ... -- NDSS 2009

"Locating Prefix Hijackers using LOCK"

Jun Xu, Tongqing Qiu, ... -- Usenix 2009

"Building a Dynamic Reputation System for DNS"

Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster, ... -- Usenix 2010

"Automatic Generation of Remediation Procedures for Malware Infections"

Jon Giffin, ... -- Usenix 2010

"On the Incoherencies in Web Browser Access Control Policies"

Kapil Singh, Wenke Lee, ... -- Oakland 2010

"Platform-independent programs"

Richard Jay Lipton, ... -- CCS 2010

"Chipping Away at Censorship Firewalls with User-Generated Content"

Sam Burnett, Nick Feamster, Santosh Vempala, ... -- Usenix 2010

"PinDr0p: using single-ended audio features to determine call provenance"

Vijay Balasubramaniyan, Aamir Poonawalla, Mustaque Ahamad, Michael T. Hunter, Patrick Traynor, ... -- CCS 2010

"BLADE: an attack-agnostic approach for preventing drive-by malware infections"

Long Lu, Wenke Lee, ... -- CCS 2010

"HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows"

Wenke Lee, ... -- NDSS 2011

"Detecting Malware Domains at the Upper DNS Hierarchy"

Manos Antonakakis, Wenke Lee, David Dagon, ... -- Usenix 2011

"No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects"

David Dewey, Patrick Traynor, ... -- NDSS 2011

"Efficient Monitoring of Untrusted Kernel-Mode Execution"

Abhinav Srivastava, Jonathon Giffin, ... -- NDSS 2011

"Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection"

Brendan Dolan-Gavitt, Jonathon Giffin, Wenke Lee, ... -- Oakland 2011

"(sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers"

Arunabh Verma, Henry Carter, Patrick Traynor, ... -- CCS 2011

"SURF: Detecting and Measuring Search Poisoning"

Long Lu, Wenke Lee, ... -- CCS 2011

"Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions"

Alexandra Boldyreva, Robert Lychev, ... -- CCS 2012

"CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities"

Long Lu, Wenke Lee, ... -- CCS 2012

"Static detection of C++ vtable escape vulnerabilities in binary code"

David Dewey, Jon Giffin, ... -- NDSS 2012

"From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware"

Manos Antonakakis, Yacin Nadji, Wenke Lee, David Dagon, ... -- Usenix 2012

"Accountable Wiretapping -or- I know they can hear you now"

Patrick Traynor, ... -- NDSS 2012

"Beheading Hydras: Performing Effective Botnet Takedowns"

Yacin Nadji, David Dagon, Wenke Lee, ... -- CCS 2013

"The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers"

Charles Lever, Brad Reaves, Patrick Traynor, Wenke Lee, ... -- NDSS 2013

"ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates"

Terry Nelms, Roberto Perdisci, Mustaque Ahamad, ... -- Usenix 2013

"Tappan Zee (North) Bridge: Mining Memory Accesses for Introspection"

Brendan Dolan-Gavitt, Wenke Lee, ... -- CCS 2013

"Secure Outsourced Garbled Circuit Evaluation for Mobile Devices"

Henry Carter, Patrick Traynor, ... -- Usenix 2013

"Jekyll on iOS: When Benign Apps Become Evil"

Tielei Wang, Kangjie Lu, Long Lu, Simon P. Chung, Wenke Lee, ... -- Usenix 2013

"Intention and Origination: An Inside Look at Large-Scale Bot Queries"

Wenke Lee, ... -- NDSS 2013

"Take This Personally: Pollution Attacks on Personalized Services"

Xinyu Xing, Wei Meng, Dan Doozan, Nick Feamster, Wenke Lee, ... -- Usenix 2013

"Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications"

Yeongjin Jang, Simon P. Chung, Wenke Lee, ... -- NDSS 2014

"ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces"

Terry Nelms, ... -- CCS 2014

"From Zygote to Morula: Fortifying Weakened ASLR on Android"

Byoungyoung Lee, Tielei Wang, Wenke Lee, ... -- Oakland 2014

"A11y Attacks: Exploiting Accessibility in Operating Systems"

Yeongjin Jang, Chengyu Song, Simon P. Chung, Tielei Wang, Wenke Lee, ... -- CCS 2014

"Your Online Interests – Pwned! A Pollution Attack Against Targeted Advertising"

Wei Meng, Xinyu Xing, Wenke Lee, ... -- CCS 2014

"Structural Data De-anonymization: Quantification, Practice, and Implications"

Shouling Ji, Weiqing Li, Raheem Beyah, ... -- CCS 2014

"Mimesis Aegis: A Mimicry Privacy Shield, A System’s Approach to Data Privacy on Public Cloud"

Billy Lau, Simon P. Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva, ... -- Usenix 2014

"Deniable Liaisons"

Abhinav Narain, Nick Feamster, ... -- CCS 2014

"On the Feasibility of Large-Scale Infections of iOS Devices"

Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon P. Chung, Billy Lau, Wenke Lee, ... -- Usenix 2014

"Phoneypot: Data-driven Understanding of Telephony Threats"

Bharat Srinivasan, Mustaque Ahamad, ... -- NDSS 2015

"Preventing Use-after-free with Dangling Pointers Nullification"

Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Wenke Lee, ... -- NDSS 2015

"How Secure and Quick is QUIC? Provable Security and Performance Analyses"

Alexandra Boldyreva, ... -- Oakland 2015

"Exploiting and Protecting Dynamic Code Generation"

Chengyu Song, Tielei Wang, Wenke Lee, ... -- NDSS 2015

"Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations"

Yeongjin Jang, Taesoo Kim, ... -- CCS 2015

"SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization"

Shouling Ji, Weiqing Li, Raheem Beyah, ... -- Usenix 2015

"WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths"

Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad, ... -- Usenix 2015

"Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS X and iOS"

Xiaojing Liao, ... -- CCS 2015

"On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge"

Shouling Ji, Weiqing Li, Raheem Beyah, ... -- NDSS 2015

"ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks"

Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee, ... -- CCS 2015

"SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps"

Kangjie Lu, ... -- Usenix 2015

"Type Casting Verification: Stopping an Emerging Attack Vector"

Byoungyoung Lee, Chengyu Song, Taesoo Kim, Wenke Lee, ... -- Usenix 2015

"VTint: Defending Virtual Function Tables' Integrity"

Chengyu Song, ... -- NDSS 2015

"Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting"

Kangjie Lu, Cong Zheng, Wenke Lee, ... -- NDSS 2015

"UCognito: Private Browsing without Tears"

Meng Xu, Yeongjin Jang, Xinyu Xing, Taesoo Kim, Wenke Lee, ... -- CCS 2015

"Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge"

Ethan Shernan, Henry Carter, ... -- Usenix 2015

"SmartWalk: Enhancing Social Network Security via Adaptive Random Walks"

Shouling Ji, ... -- CCS 2016

"Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service"

Xiaojing Liao, Raheem Beyah, ... -- CCS 2016

"The Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads"

Wei Meng, Ren Ding, Simon P. Chung, Steven Han, Wenke Lee, ... -- NDSS 2016

"Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence"

Xiaojing Liao, Raheem Beyah, ... -- CCS 2016

"Breaking Kernel Address Space Layout Randomization with Intel TSX"

Yeongjin Jang, Sangho Lee, Taesoo Kim, ... -- CCS 2016

"Enforcing Kernel Security Invariants with Data Flow Integrity"

Chengyu Song, Byoungyoung Lee, Kangjie Lu, William R. Harris, Taesoo Kim, Wenke Lee, ... -- NDSS 2016

"FLEXDROID: Enforcing In-App Privilege Separation in Android"

Taesoo Kim, ... -- NDSS 2016

"OpenSGX: An Open Platform for SGX Research"

Prerit Jain, Soham Desai, Ming-Wei Shih, Taesoo Kim, ... -- NDSS 2016

"Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems"

David Formby, Preethi Srinivasan, Andrew Leonard, Jonathan Rogers, Raheem Beyah, ... -- NDSS 2016

"VTrust: Regaining Trust on Virtual Calls"

Chengyu Song, ... -- NDSS 2016

"HDFI: Hardware-Assisted Data-Fow Isolation"

Chengyu Song, Monjur Alam, Insu Yun, Byoungyoung Lee, Taesoo Kim, Wenke Lee, ... -- Oakland 2016

"Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf"

Xiaojing Liao, ... -- Oakland 2016

"Towards Measuring and Mitigating Social Engineering Malware Download Attacks"

Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad, ... -- Usenix 2016

"APISan: Sanitizing API Usages through Semantic Cross-checking"

Insu Yun, Changwoo Min, Xujie Si, Yeongjin Jang, Taesoo Kim, Mayur Naik, ... -- Usenix 2016

"How to Make ASLR Win the Clone Wars: Runtime Re-Randomization"

Kangjie Lu, Wenke Lee, ... -- NDSS 2016

"UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages"

Kangjie Lu, Chengyu Song, Taesoo Kim, Wenke Lee, ... -- CCS 2016

"Domain-Z: 28 Registrations Later"

Chaz Lever, Yacin Nadji, David Dagon, Manos Antonakakis, ... -- Oakland 2016

"Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search"

Xiaojing Liao, Raheem Beyah, ... -- Oakland 2016