Georgia Institute of Technology

General Info

Rank: #3 Worldwide
#3 in US
Papers: 220
Number of Researchers: 214
APA
(average papers per authors):
1.0
Country: USA

Activity Map

Contributors

  • Wenke Lee (77 papers)
  • Taesoo Kim (39 papers)
  • Raheem Beyah (21 papers)
  • Manos Antonakakis (18 papers)
  • Simon Pak Ho Chung (16 papers)
  • Chengyu Song (11 papers)
  • David Dagon (10 papers)
  • Yeongjin Jang (10 papers)
  • Brendan Saltaformaggio (10 papers)
  • Monirul Sharif (8 papers)
  • Patrick Traynor (8 papers)
  • Kangjie Lu (8 papers)
  • Mustaque Ahamad (8 papers)
  • Omar Alrawi (8 papers)
  • Jonathon T. Giffin (7 papers)
  • Wen Xu (7 papers)
  • Roberto Perdisci (7 papers)
  • Alexandra Boldyreva (7 papers)
  • Chenxiong Qian (7 papers)
  • Meng Xu (7 papers)
  • Tielei Wang (6 papers)
  • Byoungyoung Lee (6 papers)
  • Ling Liu (6 papers)
  • Sangho Lee (6 papers)
  • Hong Hu (6 papers)
  • Ranjita Pai Kasturi (6 papers)
  • Insu Yun (6 papers)
  • Xiaojing Liao (6 papers)
  • Nick Feamster (6 papers)
  • Ruian Duan (5 papers)
  • Vladimir Kolesnikov (5 papers)
  • Daniel Genkin (5 papers)
  • Long Lu (5 papers)
  • Paul Pearce (5 papers)
  • Charles Lever (4 papers)
  • Shouling Ji (4 papers)
  • Ren Ding (4 papers)
  • Ming-Wei Shih (4 papers)
  • Prahlad Fogla (4 papers)
  • Chaz Lever (4 papers)
  • Yacin Nadji (4 papers)
  • Terry Nelms (4 papers)
  • Carter Yagemann (4 papers)
  • Frank Li (4 papers)
  • Guofei Gu (3 papers)
  • Weiqing Li (3 papers)
  • Wei Meng (3 papers)
  • Lei Yu (3 papers)
  • Yang Ji (3 papers)
  • Tohid Shekari (3 papers)
  • Jinho Jung (3 papers)
  • Brendan Dolan-Gavitt (3 papers)
  • Sanidhya Kashyap (3 papers)
  • David Heath (3 papers)
  • Henry Carter (3 papers)
  • Xinyu Xing (3 papers)
  • Yizheng Chen (3 papers)
  • Evan Downing (3 papers)
  • Joey Allen (3 papers)
  • Christopher Lee (2 papers)
  • Junjie Zhang (2 papers)
  • Andrea Lanzi (2 papers)
  • Abhinav Srivastava (2 papers)
  • David Dewey (2 papers)
  • Calton Pu (2 papers)
  • Erkam Uzun (2 papers)
  • Ashish Bijlani (2 papers)
  • Moses Ike (2 papers)
  • Christian Bayens (2 papers)
  • Athanasios Kountouras (2 papers)
  • Panagiotis Kintis (2 papers)
  • Sizhuang Liang (2 papers)
  • Binbin Zhao (2 papers)
  • Oleg M. Kolesnikov (2 papers)
  • Virendra Kumar (2 papers)
  • Martim Carbone (2 papers)
  • Kapil Singh (2 papers)
  • Monjur Alam (2 papers)
  • Mehmet Emre Gursoy (2 papers)
  • Stacey Truex (2 papers)
  • David Devecsery (2 papers)
  • Soyeon Park (2 papers)
  • Daehee Jang (2 papers)
  • Yiting Sun (2 papers)
  • Ehsan Asdar (2 papers)
  • Le Song (2 papers)
  • Yongheng Chen (2 papers)
  • Sauvik Das (2 papers)
  • Mudhakar Srivatsa (2 papers)
  • Santosh Vempala (2 papers)
  • Changwoo Min (2 papers)
  • Moinuddin K. Qureshi (2 papers)
  • Mattia Fazzini (2 papers)
  • Alessandro Orso (2 papers)
  • Bill Harris (2 papers)
  • ChangSeok Oh (2 papers)
  • Zheng Yang (2 papers)
  • Matthew Landen (2 papers)
  • Yisroel Mirsky (2 papers)
  • Jonathan Fuller (2 papers)
  • Gururaj Saileshwar (2 papers)
  • Feng Xiao (2 papers)
  • Billy Lau (2 papers)
  • Xiapu Luo (1 papers)
  • Brad Reaves (1 papers)
  • Cong Zheng (1 papers)
  • Bharat Srinivasan (1 papers)
  • Steven Han (1 papers)
  • David Formby (1 papers)
  • Preethi Srinivasan (1 papers)
  • Andrew Leonard (1 papers)
  • Jonathan Rogers (1 papers)
  • Prerit Jain (1 papers)
  • Soham Desai (1 papers)
  • William R. Harris (1 papers)
  • Irfan Essa (1 papers)
  • Sharbani Pandit (1 papers)
  • Morris Cohen (1 papers)
  • Lukas Graber (1 papers)
  • Ryan Elder (1 papers)
  • Athanasios Avgetidis (1 papers)
  • Thomas Papastergiou (1 papers)
  • Stephen Tong (1 papers)
  • Jungwon Lim (1 papers)
  • Yonghwi Jin (1 papers)
  • Jun Li (1 papers)
  • Minho Sung (1 papers)
  • Jun Jim Xu (1 papers)
  • Bryan D. Payne (1 papers)
  • Khaled Saab (1 papers)
  • Po-Ning Tseng (1 papers)
  • Hanqing Zhao (1 papers)
  • Victor Zhu (1 papers)
  • Binghong Chen (1 papers)
  • Yibin Yang (1 papers)
  • Yuxi Wu (1 papers)
  • W. Keith Edwards (1 papers)
  • Jason Kim (1 papers)
  • Adam O'Neill (1 papers)
  • Anirudh Ramachandran (1 papers)
  • Artem Dinaburg (1 papers)
  • Paul Royal (1 papers)
  • Vijay Balasubramaniyan (1 papers)
  • Aamir Poonawalla (1 papers)
  • Michael T. Hunter (1 papers)
  • Richard Jay Lipton (1 papers)
  • Arunabh Verma (1 papers)
  • Robert Lychev (1 papers)
  • Abhinav Narain (1 papers)
  • Eric Crockett (1 papers)
  • Jian Huang (1 papers)
  • Rosa Romero-Gomez (1 papers)
  • Weiren Wang (1 papers)
  • Wenqi Wei (1 papers)
  • HyungJoon Koo (1 papers)
  • Raghav Bhat (1 papers)
  • Harsh Grover (1 papers)
  • Andrew Chang (1 papers)
  • Amit Sikder (1 papers)
  • Haichuan Xu (1 papers)
  • Berat Arik (1 papers)
  • Vivek Verma (1 papers)
  • Yonghae Kim (1 papers)
  • Fan Sang (1 papers)
  • Celine Irvene (1 papers)
  • Miuyin Yong Wong (1 papers)
  • Douglas M. Blough (1 papers)
  • Sena Sahin (1 papers)
  • Seulbae Kim (1 papers)
  • Kevin Sam Tharayil (1 papers)
  • Angelos D. Keromytis (1 papers)
  • Grant Williams (1 papers)
  • Shuang Hao (1 papers)
  • Nadeem Syed (1 papers)
  • Alexander Gray (1 papers)
  • Jun Xu (1 papers)
  • Tongqing Qiu (1 papers)
  • Sam Burnett (1 papers)
  • Dan Doozan (1 papers)
  • Ethan Shernan (1 papers)
  • Xujie Si (1 papers)
  • Mayur Naik (1 papers)
  • Prasun Gera (1 papers)
  • Hyesoon Kim (1 papers)
  • Haider Adnan Khan (1 papers)
  • Moumita Dey (1 papers)
  • Nishith Sinha (1 papers)
  • Robert Callan (1 papers)
  • Alenka Zajic (1 papers)
  • Milos Prvulovic (1 papers)
  • Mansour Alharthi (1 papers)
  • Pak Ho Chung (1 papers)
  • David Solodukhin (1 papers)
  • Daniel Pagan (1 papers)
  • JungWon Lim (1 papers)
  • Wanrong Zhang (1 papers)
  • Guangliang Yang (1 papers)
  • Kyuhong Park (1 papers)
  • Kevin Valakuzhy (1 papers)
  • Matthew Pruett (1 papers)
  • Srimanta Barua (1 papers)
  • Taleb Hirani (1 papers)
  • Brennan Hill (1 papers)
  • Eyitemi Moju-Igbene (1 papers)
  • Hanan Abdi (1 papers)
  • Alan Lu (1 papers)
  • Usmann Khan (1 papers)
  • Alberto Dainotti (1 papers)
  • Omar Chabklo (1 papers)
  • Andres Rodriguez (1 papers)
  • Jeman Park (1 papers)
  • Saman Zonouz (1 papers)
  • Qinge Xie (1 papers)
  • Abhishek Bhaskar (1 papers)

Papers

"Anomaly Detection Using Call Stack Information"

Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, ... -- Oakland 2003

"Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation"

Jun Li, Minho Sung, Jun Jim Xu, ... -- Oakland 2004

"Formalizing Sensitivity in Static Analysis for Intrusion Detection"

Wenke Lee, ... -- Oakland 2004

"Securing Publish-Subscribe Overlay Services with EventGuard"

Mudhakar Srivatsa, Ling Liu, ... -- CCS 2005

"Countering Targeted File Attacks Using LocationGuard"

Mudhakar Srivatsa, Ling Liu, ... -- Usenix 2005

"Modeling Botnet Propagation Using Time Zones"

David Dagon, Wenke Lee, ... -- NDSS 2006

"Misleading Worm Signature Generators Using Deliberate Noise Injection"

Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul Sharif, ... -- Oakland 2006

"Evading Network Anomaly Detection Systems: Formal Reasoning and Practical Techniques"

Prahlad Fogla, Wenke Lee, ... -- CCS 2006

"Polymorphic Blending Attacks"

Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg M. Kolesnikov, Wenke Lee, ... -- Usenix 2006

"Extended abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos"

Alexandra Boldyreva, Virendra Kumar, ... -- Oakland 2007

"Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing"

Alexandra Boldyreva, Adam O'Neill, ... -- CCS 2007

"Filtering Spam with Behavioral Blacklisting"

Anirudh Ramachandran, Nick Feamster, Santosh Vempala, ... -- CCS 2007

"BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation"

Guofei Gu, Wenke Lee, ... -- Usenix 2007

"Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority"

David Dagon, Christopher Lee, Wenke Lee, ... -- NDSS 2008

"BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic"

Guofei Gu, Junjie Zhang, Wenke Lee, ... -- NDSS 2008

"Impeding Malware Analysis Using Conditional Code Obfuscation"

Monirul Sharif, Jonathon T. Giffin, Wenke Lee, ... -- NDSS 2008

"Preserving Caller Anonymity in Voice-over-IP Networks"

Ling Liu, ... -- Oakland 2008

"Lares: An Architecture for Secure Active Monitoring Using Virtualization"

Wenke Lee, Monirul Sharif, Martim Carbone, Bryan D. Payne, ... -- Oakland 2008

"Identity-based Encryption with Efficient Revocation"

Alexandra Boldyreva, Virendra Kumar, ... -- CCS 2008

"Increased DNS Forgery Resistance Through 0x20-Bit Encoding"

David Dagon, Manos Antonakakis, Wenke Lee, ... -- CCS 2008

"Ether: Malware Analysis via Hardware Virtualization Extensions"

Artem Dinaburg, Paul Royal, Monirul Sharif, Wenke Lee, ... -- CCS 2008

"BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection"

Wenke Lee, Guofei Gu, Junjie Zhang, ... -- Usenix 2008

"K-Tracer: A System for Extracting Kernel Malware Behavior"

Andrea Lanzi, Monirul Sharif, Wenke Lee, ... -- NDSS 2009

"Recursive DNS Architectures and Vulnerability Implications"

David Dagon, Manos Antonakakis, Xiapu Luo, Christopher Lee, Wenke Lee, ... -- NDSS 2009

"Automatic Reverse Engineering of Malware Emulators"

Jonathon T. Giffin, Wenke Lee, Monirul Sharif, Andrea Lanzi, ... -- Oakland 2009

"On cellular botnets: measuring the impact of malicious devices on a cellular network core"

Patrick Traynor, ... -- CCS 2009

"Secure in-VM monitoring using hardware virtualization"

Monirul Sharif, Wenke Lee, ... -- CCS 2009

"Mapping kernel objects to enable systematic integrity checking"

Martim Carbone, Long Lu, Wenke Lee, ... -- CCS 2009

"Robust signatures for kernel data structures"

Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick Traynor, Jonathon T. Giffin, ... -- CCS 2009

"Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine"

Nick Feamster, Shuang Hao, Nadeem Syed, Alexander Gray, ... -- Usenix 2009

"Locating Prefix Hijackers using LOCK"

Jun Xu, Tongqing Qiu, ... -- Usenix 2009

"xBook: Redesigning Privacy Control in Social Networking Platforms"

Wenke Lee, Kapil Singh, ... -- Usenix 2009

"On the Incoherencies in Web Browser Access Control Policies"

Kapil Singh, Wenke Lee, ... -- Oakland 2010

"PinDr0p: using single-ended audio features to determine call provenance"

Vijay Balasubramaniyan, Aamir Poonawalla, Mustaque Ahamad, Michael T. Hunter, Patrick Traynor, ... -- CCS 2010

"BLADE: an attack-agnostic approach for preventing drive-by malware infections"

Long Lu, Wenke Lee, ... -- CCS 2010

"Platform-independent programs"

Richard Jay Lipton, ... -- CCS 2010

"Building a Dynamic Reputation System for DNS"

Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster, ... -- Usenix 2010

"Automatic Generation of Remediation Procedures for Malware Infections"

Jonathon T. Giffin, ... -- Usenix 2010

"Chipping Away at Censorship Firewalls with User-Generated Content"

Sam Burnett, Nick Feamster, Santosh Vempala, ... -- Usenix 2010

"Efficient Monitoring of Untrusted Kernel-Mode Execution"

Abhinav Srivastava, Jonathon T. Giffin, ... -- NDSS 2011

"No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects"

David Dewey, Patrick Traynor, ... -- NDSS 2011

"HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows"

Wenke Lee, ... -- NDSS 2011

"Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection"

Brendan Dolan-Gavitt, Jonathon T. Giffin, Wenke Lee, ... -- Oakland 2011

"SURF: Detecting and Measuring Search Poisoning"

Long Lu, Wenke Lee, ... -- CCS 2011

"(sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers"

Arunabh Verma, Henry Carter, Patrick Traynor, ... -- CCS 2011

"Detecting Malware Domains at the Upper DNS Hierarchy"

Manos Antonakakis, Wenke Lee, David Dagon, ... -- Usenix 2011

"Accountable Wiretapping -or- I know they can hear you now"

Patrick Traynor, ... -- NDSS 2012

"Static detection of C++ vtable escape vulnerabilities in binary code"

David Dewey, Jonathon T. Giffin, ... -- NDSS 2012

"Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions"

Alexandra Boldyreva, Robert Lychev, ... -- CCS 2012

"CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities"

Long Lu, Wenke Lee, ... -- CCS 2012

"From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware"

Manos Antonakakis, Yacin Nadji, Wenke Lee, David Dagon, ... -- Usenix 2012

"The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers"

Charles Lever, Brad Reaves, Patrick Traynor, Wenke Lee, ... -- NDSS 2013

"Intention and Origination: An Inside Look at Large-Scale Bot Queries"

Wenke Lee, ... -- NDSS 2013

"Tappan Zee (North) Bridge: Mining Memory Accesses for Introspection"

Brendan Dolan-Gavitt, Wenke Lee, ... -- CCS 2013

"Beheading Hydras: Performing Effective Botnet Takedowns"

Yacin Nadji, David Dagon, Wenke Lee, ... -- CCS 2013

"Secure Outsourced Garbled Circuit Evaluation for Mobile Devices"

Henry Carter, Patrick Traynor, ... -- Usenix 2013

"Jekyll on iOS: When Benign Apps Become Evil"

Tielei Wang, Kangjie Lu, Long Lu, Simon Pak Ho Chung, Wenke Lee, ... -- Usenix 2013

"ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates"

Terry Nelms, Roberto Perdisci, Mustaque Ahamad, ... -- Usenix 2013

"Take This Personally: Pollution Attacks on Personalized Services"

Xinyu Xing, Wei Meng, Dan Doozan, Nick Feamster, Wenke Lee, ... -- Usenix 2013

"Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications"

Yeongjin Jang, Simon Pak Ho Chung, Wenke Lee, ... -- NDSS 2014

"From Zygote to Morula: Fortifying Weakened ASLR on Android"

Byoungyoung Lee, Tielei Wang, Wenke Lee, ... -- Oakland 2014

"ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces"

Terry Nelms, ... -- CCS 2014

"Structural Data De-anonymization: Quantification, Practice, and Implications"

Shouling Ji, Weiqing Li, Raheem Beyah, ... -- CCS 2014

"Your Online Interests - Pwned! A Pollution Attack Against Targeted Advertising"

Wei Meng, Xinyu Xing, Wenke Lee, ... -- CCS 2014

"Deniable Liaisons"

Abhinav Narain, Nick Feamster, ... -- CCS 2014

"A11y Attacks: Exploiting Accessibility in Operating Systems"

Yeongjin Jang, Chengyu Song, Simon Pak Ho Chung, Tielei Wang, Wenke Lee, ... -- CCS 2014

"Mimesis Aegis: A Mimicry Privacy Shield, A System's Approach to Data Privacy on Public Cloud"

Billy Lau, Simon Pak Ho Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva, ... -- Usenix 2014

"On the Feasibility of Large-Scale Infections of iOS Devices"

Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Pak Ho Chung, Billy Lau, Wenke Lee, ... -- Usenix 2014

"Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting"

Kangjie Lu, Cong Zheng, Wenke Lee, ... -- NDSS 2015

"Exploiting and Protecting Dynamic Code Generation"

Chengyu Song, Tielei Wang, Wenke Lee, ... -- NDSS 2015

"On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge"

Shouling Ji, Weiqing Li, Raheem Beyah, ... -- NDSS 2015

"Phoneypot: Data-driven Understanding of Telephony Threats"

Bharat Srinivasan, Mustaque Ahamad, ... -- NDSS 2015

"Preventing Use-after-free with Dangling Pointers Nullification"

Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Wenke Lee, ... -- NDSS 2015

"VTint: Defending Virtual Function Tables' Integrity"

Chengyu Song, ... -- NDSS 2015

"How Secure and Quick is QUIC? Provable Security and Performance Analyses"

Alexandra Boldyreva, ... -- Oakland 2015

"Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS X and iOS"

Xiaojing Liao, ... -- CCS 2015

"ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks"

Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon Pak Ho Chung, Taesoo Kim, Wenke Lee, ... -- CCS 2015

"UCognito: Private Browsing without Tears"

Meng Xu, Yeongjin Jang, Xinyu Xing, Taesoo Kim, Wenke Lee, ... -- CCS 2015

"Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations"

Yeongjin Jang, Taesoo Kim, ... -- CCS 2015

"Type Casting Verification: Stopping an Emerging Attack Vector"

Byoungyoung Lee, Chengyu Song, Taesoo Kim, Wenke Lee, ... -- Usenix 2015

"SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization"

Shouling Ji, Weiqing Li, Raheem Beyah, ... -- Usenix 2015

"Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge"

Ethan Shernan, Henry Carter, ... -- Usenix 2015

"SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps"

Kangjie Lu, ... -- Usenix 2015

"WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths"

Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad, ... -- Usenix 2015

"The Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads"

Wei Meng, Ren Ding, Simon Pak Ho Chung, Steven Han, Wenke Lee, ... -- NDSS 2016

"VTrust: Regaining Trust on Virtual Calls"

Chengyu Song, ... -- NDSS 2016

"Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems"

David Formby, Preethi Srinivasan, Andrew Leonard, Jonathan Rogers, Raheem Beyah, ... -- NDSS 2016

"OpenSGX: An Open Platform for SGX Research"

Prerit Jain, Soham Desai, Ming-Wei Shih, Taesoo Kim, ... -- NDSS 2016

"How to Make ASLR Win the Clone Wars: Runtime Re-Randomization"

Kangjie Lu, Wenke Lee, ... -- NDSS 2016

"Enforcing Kernel Security Invariants with Data Flow Integrity"

Chengyu Song, Byoungyoung Lee, Kangjie Lu, William R. Harris, Taesoo Kim, Wenke Lee, ... -- NDSS 2016

"FLEXDROID: Enforcing In-App Privilege Separation in Android"

Taesoo Kim, ... -- NDSS 2016

"Domain-Z: 28 Registrations Later"

Chaz Lever, Yacin Nadji, David Dagon, Manos Antonakakis, ... -- Oakland 2016

"HDFI: Hardware-Assisted Data-Fow Isolation"

Chengyu Song, Monjur Alam, Insu Yun, Byoungyoung Lee, Taesoo Kim, Wenke Lee, ... -- Oakland 2016

"Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search"

Xiaojing Liao, Raheem Beyah, ... -- Oakland 2016

"Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf"

Xiaojing Liao, ... -- Oakland 2016

"Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence"

Xiaojing Liao, Raheem Beyah, ... -- CCS 2016

"SmartWalk: Enhancing Social Network Security via Adaptive Random Walks"

Shouling Ji, ... -- CCS 2016

"Breaking Kernel Address Space Layout Randomization with Intel TSX"

Yeongjin Jang, Sangho Lee, Taesoo Kim, ... -- CCS 2016

"Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service"

Xiaojing Liao, Raheem Beyah, ... -- CCS 2016

"UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages"

Kangjie Lu, Chengyu Song, Taesoo Kim, Wenke Lee, ... -- CCS 2016

"Λ○λ: Functional Lattice Cryptography"

Eric Crockett, ... -- CCS 2016

"Towards Measuring and Mitigating Social Engineering Malware Download Attacks"

Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad, ... -- Usenix 2016

"APISan: Sanitizing API Usages through Semantic Cross-checking"

Insu Yun, Changwoo Min, Xujie Si, Yeongjin Jang, Taesoo Kim, Mayur Naik, ... -- Usenix 2016

"Dynamic Differential Location Privacy with Personalized Error Bounds"

Lei Yu, Ling Liu, Calton Pu, ... -- NDSS 2017

"SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs"

Ming-Wei Shih, Taesoo Kim, ... -- NDSS 2017

"T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs"

Ming-Wei Shih, Sangho Lee, Taesoo Kim, ... -- NDSS 2017

"Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis"

Mustaque Ahamad, ... -- NDSS 2017

"Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying"

Kangjie Lu, Wenke Lee, ... -- NDSS 2017

"A Lustrum of Malware Network Communication: Evolution and Insights"

Chaz Lever, Manos Antonakakis, ... -- Oakland 2017

"Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop"

Chenxiong Qian, Simon Pak Ho Chung, Wenke Lee, ... -- Oakland 2017

"Protecting Bare-metal Embedded Systems with Privilege Overlays"

Khaled Saab, ... -- Oakland 2017

"Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks"

Xiaojing Liao, Raheem Beyah, ... -- Oakland 2017

"Checking Open-Source License Violation and 1-day Security Risk at Large Scale"

Ruian Duan, Ashish Bijlani, Meng Xu, Taesoo Kim, Wenke Lee, ... -- CCS 2017

"Designing New Operating Primitives to Improve Fuzzing Performance"

Wen Xu, Sanidhya Kashyap, Changwoo Min, Taesoo Kim, ... -- CCS 2017

"FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware"

Jian Huang, Moinuddin K. Qureshi, ... -- CCS 2017

"Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse"

Panagiotis Kintis, Charles Lever, Yizheng Chen, Rosa Romero-Gomez, Manos Antonakakis, ... -- CCS 2017

"Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection"

Le Song, ... -- CCS 2017

"Practical Attacks Against Graph-based Clustering"

Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Manos Antonakakis, ... -- CCS 2017

"RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking"

Yang Ji, Sangho Lee, Evan Downing, Weiren Wang, Mattia Fazzini, Taesoo Kim, Alessandro Orso, Wenke Lee, ... -- CCS 2017

"Efficient Protection of Path-Sensitive Control Security"

Ren Ding, Chenxiong Qian, Bill Harris, Taesoo Kim, Wenke Lee, ... -- Usenix 2017

"PlatPal: Detecting Malicious Documents with Platform Diversity"

Meng Xu, Taesoo Kim, ... -- Usenix 2017

"Hacking in Darkness: Return-oriented Programming against Secure Enclaves"

Yeongjin Jang, Taesoo Kim, ... -- Usenix 2017

"Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing"

Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, ... -- Usenix 2017

"Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed"

Wen Xu, ... -- Usenix 2017

"Understanding the Mirai Botnet"

Manos Antonakakis, Chaz Lever, ... -- Usenix 2017

"See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing"

Christian Bayens, Raheem Beyah, ... -- Usenix 2017

"rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System."

Erkam Uzun, Simon Pak Ho Chung, Irfan Essa, Wenke Lee, ... -- NDSS 2018

"Broken Fingers: On the Usage of the Fingerprint API in Android."

Simon Pak Ho Chung, Wenke Lee, ... -- NDSS 2018

"Towards Measuring the Effectiveness of Telephony Blacklists."

Sharbani Pandit, Mustaque Ahamad, ... -- NDSS 2018

"Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images."

Brendan Saltaformaggio, ... -- NDSS 2018

"Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations."

Raheem Beyah, ... -- NDSS 2018

"Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels"

Meng Xu, Chenxiong Qian, Taesoo Kim, ... -- Oakland 2018

"Utility-aware synthesis of differentially private and attack-resilient location traces"

Mehmet Emre Gursoy, Ling Liu, Stacey Truex, Lei Yu, Wenqi Wei, ... -- CCS 2018

"ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android"

Simon Pak Ho Chung, Wenke Lee, ... -- CCS 2018

"Enforcing Unique Code Target Property for Control-Flow Integrity"

Hong Hu, Chenxiong Qian, Carter Yagemann, Simon Pak Ho Chung, Bill Harris, Taesoo Kim, Wenke Lee, ... -- CCS 2018

"Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures"

Vladimir Kolesnikov, ... -- CCS 2018

"Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks"

Chenxiong Qian, Wenke Lee, ... -- Usenix 2018

"One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA"

Monjur Alam, Haider Adnan Khan, Moumita Dey, Nishith Sinha, Robert Callan, Alenka Zajic, Milos Prvulovic, ... -- Usenix 2018

"QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing"

Insu Yun, Sangho Lee, Meng Xu, Taesoo Kim, ... -- Usenix 2018

"Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking"

Yang Ji, Sangho Lee, Mattia Fazzini, Joey Allen, Evan Downing, Taesoo Kim, Alessandro Orso, Wenke Lee, ... -- Usenix 2018

"Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries"

Ruian Duan, Ashish Bijlani, Yang Ji, Omar Alrawi, Moses Ike, Brendan Saltaformaggio, Wenke Lee, ... -- NDSS 2019

"RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid"

Tohid Shekari, Christian Bayens, Morris Cohen, Lukas Graber, Raheem Beyah, ... -- NDSS 2019

"Differentially Private Model Publishing For Deep Learning"

Lei Yu, Ling Liu, Calton Pu, Mehmet Emre Gursoy, Stacey Truex, ... -- Oakland 2019

"Dominance as a New Trusted Computing Primitive for the Internet of Things"

Meng Xu, ... -- Oakland 2019

"Fuzzing File Systems via Two-Dimensional Input Space Exploration"

Wen Xu, Sanidhya Kashyap, Po-Ning Tseng, Taesoo Kim, ... -- Oakland 2019

"Iodine: Fast Dynamic Taint Tracking Using Rollback-free Optimistic Hybrid Analysis"

David Devecsery, ... -- Oakland 2019

"SoK: Security Evaluation of Home-Based IoT Deployment"

Omar Alrawi, Chaz Lever, Manos Antonakakis, ... -- Oakland 2019

"SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security"

Manos Antonakakis, ... -- Oakland 2019

"Where Does It Go? Refining Indirect-Call Targets with Multi-Layer Type Analysis"

Hong Hu, ... -- CCS 2019

"The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends"

Omar Alrawi, Ruian Duan, Ranjita Pai Kasturi, Brendan Saltaformaggio, ... -- Usenix 2019

"Reading the Tea leaves: A Comparative Analysis of Threat Intelligence"

Paul Pearce, ... -- Usenix 2019

"RAZOR: A Framework for Post-deployment Software Debloating"

Chenxiong Qian, Hong Hu, Mansour Alharthi, Pak Ho Chung, Taesoo Kim, Wenke Lee, ... -- Usenix 2019

"Fuzzification : Anti-Fuzzing Techniques"

Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Taesoo Kim, ... -- Usenix 2019

"MOPT: Optimized Mutation Scheduling for Fuzzers"

Raheem Beyah, ... -- Usenix 2019

"DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report"

Ren Ding, Hong Hu, Wen Xu, Taesoo Kim, ... -- NDSS 2020

"Fuzzing JavaScript Engines with Aspect-preserving Mutation"

Soyeon Park, Wen Xu, Insu Yun, Daehee Jang, Taesoo Kim, ... -- Oakland 2020

"Krace: Data Race Fuzzing for Kernel File Systems"

Meng Xu, Sanidhya Kashyap, Hanqing Zhao, Taesoo Kim, ... -- Oakland 2020

"TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks"

Ranjita Pai Kasturi, Yiting Sun, Ruian Duan, Omar Alrawi, Ehsan Asdar, Victor Zhu, Brendan Saltaformaggio, ... -- Oakland 2020

"Text Captcha Is Dead? A Large Scale Deployment and Empirical Study"

Raheem Beyah, ... -- CCS 2020

"SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback"

Yongheng Chen, Hong Hu, Wenke Lee, ... -- CCS 2020

"FREEDOM: Engineering a State-of-the-Art DOM Fuzzer"

Wen Xu, Soyeon Park, Taesoo Kim, ... -- CCS 2020

"Slimium: Debloating the Chromium Browser with Feature Subsetting"

Chenxiong Qian, HyungJoon Koo, ChangSeok Oh, Taesoo Kim, Wenke Lee, ... -- CCS 2020

"A 2.1 KHz Zero-Knowledge Processor with BubbleRAM"

David Heath, Vladimir Kolesnikov, ... -- CCS 2020

"Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System"

Joey Allen, Zheng Yang, Matthew Landen, Raghav Bhat, Harsh Grover, Andrew Chang, Wenke Lee, ... -- CCS 2020

"Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks"

Yisroel Mirsky, ... -- CCS 2020

"Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern Web"

Frank Li, ... -- Usenix 2020

"DELF: Safeguarding deletion correctness in Online Social Networks"

Paul Pearce, ... -- Usenix 2020

"Automatic Techniques to Systematically Discover New Heap Exploitation Primitives"

Insu Yun, Taesoo Kim, ... -- Usenix 2020

"C$^2$SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis"

Jinho Jung, Roberto Perdisci, ... -- NDSS 2021

"Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages"

Ruian Duan, Omar Alrawi, Ranjita Pai Kasturi, Ryan Elder, Brendan Saltaformaggio, Wenke Lee, ... -- NDSS 2021

"Understanding the Growth and Security Considerations of ECS"

Athanasios Kountouras, Panagiotis Kintis, Athanasios Avgetidis, Thomas Papastergiou, Charles Lever, Manos Antonakakis, ... -- NDSS 2021

"WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning"

Jinho Jung, Stephen Tong, Jungwon Lim, Yonghwi Jin, Taesoo Kim, ... -- NDSS 2021

"ARBITRAR : User-Guided API Misuse Detection"

Binghong Chen, Le Song, ... -- Oakland 2021

"One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation"

Yongheng Chen, Wenke Lee, ... -- Oakland 2021

"Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached ORAM for ANSI C Programs"

David Heath, Yibin Yang, David Devecsery, Vladimir Kolesnikov, ... -- Oakland 2021

"C3PO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration"

Jonathan Fuller, Ranjita Pai Kasturi, Amit Sikder, Haichuan Xu, Berat Arik, Vivek Verma, Ehsan Asdar, Brendan Saltaformaggio, ... -- CCS 2021

"Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks"

Raheem Beyah, ... -- CCS 2021

"Hardware Support to Improve Fuzzing Performance and Precision"

Ren Ding, Yonghae Kim, Fan Sang, Wen Xu, Gururaj Saileshwar, Taesoo Kim, ... -- CCS 2021

"MaMIoT: Manipulation of Energy Market Leveraging High Wattage IoT Botnets"

Tohid Shekari, Celine Irvene, Raheem Beyah, ... -- CCS 2021

"Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis"

Carter Yagemann, Simon Pak Ho Chung, Brendan Saltaformaggio, Wenke Lee, ... -- CCS 2021

"HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators"

Taesoo Kim, ... -- CCS 2021

"Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks"

Carter Yagemann, Simon Pak Ho Chung, Wenke Lee, ... -- CCS 2021

"An Inside Look into the Practice of Malware Analysis"

Miuyin Yong Wong, Matthew Landen, Manos Antonakakis, Douglas M. Blough, Mustaque Ahamad, ... -- CCS 2021

"One Hot Garbling"

David Heath, Vladimir Kolesnikov, ... -- CCS 2021

"Don't Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password"

Sena Sahin, Frank Li, ... -- CCS 2021

"Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search"

Erkam Uzun, Simon Pak Ho Chung, Vladimir Kolesnikov, Alexandra Boldyreva, Wenke Lee, ... -- Usenix 2021

"MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design"

Gururaj Saileshwar, Moinuddin K. Qureshi, ... -- Usenix 2021

"ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems"

Carter Yagemann, Simon Pak Ho Chung, Brendan Saltaformaggio, Wenke Lee, ... -- Usenix 2021

"Preventing Use-After-Free Attacks with Fast Forward Allocation"

Insu Yun, Daehee Jang, JungWon Lim, Taesoo Kim, ... -- Usenix 2021

"Leakage of Dataset Properties in Multi-Party Machine Learning"

Wanrong Zhang, ... -- Usenix 2021

"UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers"

Sizhuang Liang, Raheem Beyah, ... -- Usenix 2021

"Abusing Hidden Properties to Attack the Node.js Ecosystem"

Feng Xiao, Guangliang Yang, Wenke Lee, ... -- Usenix 2021

"DeepReflect: Discovering Malicious Functionality through Binary Reconstruction"

Evan Downing, Yisroel Mirsky, Kyuhong Park, Wenke Lee, ... -- Usenix 2021

"The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle"

Omar Alrawi, Charles Lever, Kevin Valakuzhy, Manos Antonakakis, ... -- Usenix 2021

"Forecasting Malware Capabilities From Cyber Attack Memory Images"

Omar Alrawi, Moses Ike, Matthew Pruett, Ranjita Pai Kasturi, Srimanta Barua, Taleb Hirani, Brennan Hill, Brendan Saltaformaggio, ... -- Usenix 2021

"Deep Entity Classification: Abusive Account Detection for Online Social Networks"

Frank Li, Paul Pearce, ... -- Usenix 2021

"MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols"

Binbin Zhao, Raheem Beyah, ... -- Usenix 2021

"What's in a Name? Exploring CA Certificate Control"

Manos Antonakakis, ... -- Usenix 2021

"Hiding My Real Self! Protecting 3D Printer Intellectual Property Against Optical Side-Channel Attacks"

Sizhuang Liang, Raheem Beyah, ... -- NDSS 2022

"EMS: History-Driven Mutation for Coverage-based Fuzzing"

Binbin Zhao, Raheem Beyah, ... -- NDSS 2022

"SoK: Social Cybersecurity"

Yuxi Wu, W. Keith Edwards, Sauvik Das, ... -- Oakland 2022

"SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks"

Daniel Genkin, ... -- Oakland 2022

"Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution"

Jason Kim, Daniel Genkin, ... -- Oakland 2022

"Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings"

Raheem Beyah, ... -- Oakland 2022

"DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing"

Seulbae Kim, ... -- CCS 2022

"Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware Detection"

Omar Alrawi, ... -- CCS 2022

"HammerScope: Observing DRAM Power Consumption Using Rowhammer"

Kevin Sam Tharayil, Daniel Genkin, Angelos D. Keromytis, ... -- CCS 2022

"Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem"

Feng Xiao, Zheng Yang, Joey Allen, Grant Williams, Wenke Lee, ... -- CCS 2022

"When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer"

Daniel Genkin, ... -- CCS 2022

"Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement"

ChangSeok Oh, Paul Pearce, ... -- CCS 2022

""How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design Jams"

Eyitemi Moju-Igbene, Hanan Abdi, Alan Lu, Sauvik Das, ... -- Usenix 2022

"PrivGuard: Privacy Regulation Compliance Made Easier"

Usmann Khan, ... -- Usenix 2022

"Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope"

Alberto Dainotti, ... -- Usenix 2022

"Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces"

Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio, ... -- Usenix 2022

"Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring"

Saman Zonouz, ... -- Usenix 2022

"Lend Me Your Ear: Passive Remote Physical Side Channels on PCs"

Daniel Genkin, ... -- Usenix 2022

"Building an Open, Robust, and Stable Voting-Based Domain Top List"

Qinge Xie, Frank Li, ... -- Usenix 2022

"Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement"

Abhishek Bhaskar, Paul Pearce, ... -- Usenix 2022

"In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication"

Taesoo Kim, ... -- Usenix 2022

"MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses"

Tohid Shekari, Raheem Beyah, ... -- Usenix 2022