Byoungyoung Lee
Byoungyoung Lee
Verified email at snu.ac.kr - Homepage
Title
Cited by
Cited by
Year
SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs
J Seo, B Lee, S Kim, MW Shih, I Shin, Han, T Kim
Proceedings of the 2017 Annual Network and Distributed System Security …, 2017
1492017
Protecting location privacy using location semantics
B Lee, J Oh, H Yu, J Kim
Proceedings of the 17th ACM SIGKDD international conference on Knowledge …, 2011
1282011
ASLR-Guard: Stopping address space leakage for code reuse attacks
K Lu, C Song, B Lee, SP Chung, T Kim, W Lee
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
1222015
Preventing Use-after-free with Dangling Pointers Nullification.
B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee
Proceedings of the 2015 Annual Network and Distributed System Security …, 2015
1102015
Enforcing Kernel Security Invariants with Data Flow Integrity.
C Song, B Lee, K Lu, W Harris, T Kim, W Lee
Proceedings of the 2016 Annual Network and Distributed System Security …, 2016
922016
HDFI: Hardware-assisted data-flow isolation
C Song, H Moon, M Alam, I Yun, B Lee, T Kim, W Lee, Y Paek
2016 IEEE Symposium on Security and Privacy (SP), 1-17, 2016
782016
OBLIVIATE: A Data Oblivious File System for Intel SGX
A Ahmad, K Kim, MI Sarfaraz, B Lee
Proceedings of the 2018 Annual Network and Distributed System Security …, 2018
752018
Understanding malvertising through ad-injecting browser extensions
X Xing, W Meng, B Lee, U Weinsberg, A Sheth, R Perdisci, W Lee
Proceedings of the 24th international conference on world wide web, 1286-1295, 2015
742015
Toward engineering a secure android ecosystem: A survey of existing techniques
M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ...
ACM Computing Surveys (CSUR) 49 (2), 1-47, 2016
722016
From zygote to morula: Fortifying weakened aslr on android
B Lee, L Lu, T Wang, T Kim, W Lee
2014 IEEE Symposium on Security and Privacy, 424-439, 2014
642014
Cross-checking semantic correctness: The case of finding file system bugs
C Min, S Kashyap, B Lee, C Song, T Kim
Proceedings of the 25th Symposium on Operating Systems Principles, 361-377, 2015
632015
Type Casting Verification: Stopping an Emerging Attack Vector
B Lee, C Song, T Kim, W Lee
24th USENIX Security Symposium (USENIX Security 15), 2015
612015
Securing Real-Time Microcontroller Systems through Customized Memory View Switching
CH Kim, T Kim, H Choi, Z Gu, B Lee, X Zhang, D Xu
Proceedings of the 2018 Annual Network and Distributed System Security …, 2018
492018
Hextype: Efficient detection of type confusion errors for c++
Y Jeon, P Biswas, S Carr, B Lee, M Payer
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
352017
Cab-fuzz: Practical concolic testing techniques for {COTS} operating systems
SY Kim, S Lee, I Yun, W Xu, B Lee, Y Yun, T Kim
2017 {USENIX} Annual Technical Conference ({USENIX}{ATC} 17), 689-701, 2017
332017
Razzer: Finding Kernel Race Bugs through Fuzzing
DR Jeong, K Kim, B Shivakumar, B Lee, I Shin
Security and Privacy (SP), 2019 IEEE Symposium on, 2019
312019
Obfuscuro: A commodity obfuscation engine on intel sgx
A Ahmad, B Joe, Y Xiao, Y Zhang, I Shin, B Lee
Network and Distributed System Security Symposium, 2019
252019
Instant {OS} Updates via Userspace Checkpoint-and-Restart
S Kashyap, C Min, B Lee, T Kim, P Emelyanov
2016 {USENIX} Annual Technical Conference ({USENIX}{ATC} 16), 605-619, 2016
202016
binOb+ a framework for potent and stealthy binary obfuscation
B Lee, Y Kim, J Kim
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
202010
Trackmeornot: Enabling flexible control on web tracking
W Meng, B Lee, X Xing, W Lee
Proceedings of the 25th International Conference on World Wide Web, 99-109, 2016
162016
The system can't perform the operation now. Try again later.
Articles 1–20