Sangho Lee
Sangho Lee
Researcher of Microsoft Research Redmond
Verifierad e-postadress på - Startsida
Citeras av
Citeras av
WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream
S Lee, J Kim
IEEE Transactions on Dependable & Secure Computing 10 (3), 2013
WarningBird: Detecting Suspicious URLs in Twitter Stream
S Lee, J Kim
2012 Annual Network and Distributed System Security Symposium (NDSS), 2012
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing
S Lee, MW Shih, P Gera, T Kim, H Kim, M Peinado
26th USENIX Security Symposium (USENIX Security), 2017
Spam filtering in Twitter using sender-receiver relationship
J Song, S Lee, J Kim
14th International Symposium on Recent Advances in Intrusion Detection (RAID …, 2011
T-SGX: Eradicating controlled-channel attacks against enclave programs
MW Shih, S Lee, T Kim, M Peinado
2017 Annual Network and Distributed System Security Symposium (NDSS), 2017
Breaking Kernel Address Space Layout Randomization with Intel TSX
Y Jang, S Lee, T Kim
23rd ACM SIGSAC Conference on Computer and Communications Security (CCS …, 2016
QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing
I Yun, S Lee, M Xu, Y Jang, T Kim
27th USENIX Security Symposium (USENIX Security), 2018
Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities
S Lee, Y Kim, J Kim, J Kim
35th IEEE Symposium on Security and Privacy (Oakland), 2014
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques
M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ...
ACM Computing Surveys (CSUR) 49 (2), 38, 2016
Reducing IPTV channel zapping time based on viewer’s surfing behavior and preference
Y Kim, JK Park, HJ Choi, S Lee, H Park, J Kim, Z Lee, K Ko
2008 IEEE International Symposium on Broadband Multimedia Systems and …, 2008
CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks
J Song, S Lee, J Kim
22nd ACM SIGSAC Conference on Computer and Communications Security (CCS …, 2015
Early filtering of ephemeral malicious accounts on Twitter
S Lee, J Kim
Computer Communications 54, 48-57, 2014
SGX-Bomb: Locking Down the Processor via Rowhammer Attack
Y Jang, J Lee, S Lee, T Kim
Proceedings of the 2nd Workshop on System Software for Trusted Execution, 5, 2017
RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking
Y Ji, S Lee, E Downing, W Wang, M Fazzini, T Kim, A Orso, W Lee
24th ACM SIGSAC Conference on Computer and Communications Security (CCS), 2017
CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems
SY Kim, S Lee, I Yun, W Xu, B Lee, Y Yun, T Kim
2017 USENIX Annual Technical Conference (USENIX ATC), 689-701, 2017
A secure and mutual-profitable DRM interoperability scheme
S Lee, H Park, J Kim
The IEEE symposium on Computers and Communications, 75-80, 2010
libmpk: Software Abstraction for Intel Memory Protection Keys (Intel {MPK})
S Park, S Lee, W Xu, H Moon, T Kim
2019 {USENIX} Annual Technical Conference ({USENIX}{ATC} 19), 241-254, 2019
FACT: Functionality-centric Access Control System for IoT Programming Frameworks
S Lee, J Choi, J Kim, B Cho, S Lee, H Kim, J Kim
22nd ACM on Symposium on Access Control Models and Technologies, 43-54, 2017
Punobot: Mobile Botnet using Push Notification Service in Android
H Lee, T Kang, S Lee, J Kim, Y Kim
International Workshop on Information Security Applications, 2013
Distance Bounding with Delayed Responses
S Lee, JS Kim, SJ Hong, J Kim
IEEE Communications Letters 16 (9), 1478-1481, 2012
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20