Sangho Lee
Sangho Lee
Researcher of Microsoft Research Redmond
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream
S Lee, J Kim
IEEE Transactions on Dependable & Secure Computing 10 (3), 2013
3722013
WarningBird: Detecting Suspicious URLs in Twitter Stream
S Lee, J Kim
2012 Annual Network and Distributed System Security Symposium (NDSS), 2012
372*2012
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing
S Lee, MW Shih, P Gera, T Kim, H Kim, M Peinado
26th USENIX Security Symposium (USENIX Security), 2017
3102017
T-SGX: Eradicating controlled-channel attacks against enclave programs
MW Shih, S Lee, T Kim, M Peinado
2017 Annual Network and Distributed System Security Symposium (NDSS), 2017
2642017
Spam filtering in Twitter using sender-receiver relationship
J Song, S Lee, J Kim
14th International Symposium on Recent Advances in Intrusion Detection (RAID …, 2011
2642011
QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing
I Yun, S Lee, M Xu, Y Jang, T Kim
27th USENIX Security Symposium (USENIX Security), 2018
1362018
Breaking Kernel Address Space Layout Randomization with Intel TSX
Y Jang, S Lee, T Kim
23rd ACM SIGSAC Conference on Computer and Communications Security (CCS …, 2016
1182016
Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities
S Lee, Y Kim, J Kim, J Kim
35th IEEE Symposium on Security and Privacy (Oakland), 2014
722014
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques
M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ...
ACM Computing Surveys (CSUR) 49 (2), 38, 2016
662016
CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks
J Song, S Lee, J Kim
22nd ACM SIGSAC Conference on Computer and Communications Security (CCS …, 2015
642015
Early filtering of ephemeral malicious accounts on Twitter
S Lee, J Kim
Computer Communications 54, 48-57, 2014
622014
Reducing IPTV channel zapping time based on viewer’s surfing behavior and preference
Y Kim, JK Park, HJ Choi, S Lee, H Park, J Kim, Z Lee, K Ko
2008 IEEE International Symposium on Broadband Multimedia Systems and …, 2008
622008
SGX-Bomb: Locking Down the Processor via Rowhammer Attack
Y Jang, J Lee, S Lee, T Kim
Proceedings of the 2nd Workshop on System Software for Trusted Execution, 5, 2017
602017
RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking
Y Ji, S Lee, E Downing, W Wang, M Fazzini, T Kim, A Orso, W Lee
24th ACM SIGSAC Conference on Computer and Communications Security (CCS), 2017
532017
libmpk: Software Abstraction for Intel Memory Protection Keys (Intel {MPK})
S Park, S Lee, W Xu, H Moon, T Kim
2019 {USENIX} Annual Technical Conference ({USENIX}{ATC} 19), 241-254, 2019
332019
CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems
SY Kim, S Lee, I Yun, W Xu, B Lee, Y Yun, T Kim
2017 USENIX Annual Technical Conference (USENIX ATC), 689-701, 2017
322017
FACT: Functionality-centric Access Control System for IoT Programming Frameworks
S Lee, J Choi, J Kim, B Cho, S Lee, H Kim, J Kim
22nd ACM on Symposium on Access Control Models and Technologies, 43-54, 2017
262017
A secure and mutual-profitable DRM interoperability scheme
S Lee, H Park, J Kim
The IEEE symposium on Computers and Communications, 75-80, 2010
252010
Identifying Cross-origin Resource Status Using Application Cache
S Lee, H Kim, J Kim
2015 Annual Network and Distributed System Security Symposium (NDSS), 2015
232015
Punobot: Mobile Botnet using Push Notification Service in Android
H Lee, T Kang, S Lee, J Kim, Y Kim
International Workshop on Information Security Applications, 2013
222013
The system can't perform the operation now. Try again later.
Articles 1–20