Follow
Chung Hwan Kim
Title
Cited by
Cited by
Year
HFL: Hybrid Fuzzing on the Linux Kernel
K Kim, DR Jeong, CH Kim, Y Jang, I Shin, B Lee
Proceedings of the 2020 Annual Network and Distributed System Security …, 2020
1532020
Securing Real-Time Microcontroller Systems through Customized Memory View Switching
CH Kim, T Kim, H Choi, Z Gu, B Lee, X Zhang, D Xu
Proceedings of the 25th Network and Distributed Systems Security Symposium …, 2018
1422018
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
Proceedings of the 27th USENIX Security Symposium (USENIX Security 2018 …, 2018
1152018
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows
S Ma, KH Lee, CH Kim, J Rhee, X Zhang, D Xu
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
1012015
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing
T Kim, CH Kim, J Rhee, F Fei, Z Tu, G Walkup, X Zhang, X Deng, D Xu
Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), 425-442, 2019
1002019
J-Force: Forced Execution on JavaScript
K Kim, IL Kim, CH Kim, Y Kwon, Y Zheng, X Zhang, D Xu
Proceedings of the 26th International Conference on World Wide Web (WWW 2017 …, 2017
902017
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications
T Kim, CH Kim, H Choi, Y Kwon, B Saltaformaggio, X Zhang, D Xu
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
502017
IntroPerf: Transparent Context-Sensitive Multi-Layer Performance Inference using System Stack Traces
CH Kim, J Rhee, H Zhang, N Arora, G Jiang, X Zhang, D Xu
Proceedings of the 2014 ACM international Conference on Measurement and …, 2014
382014
Vessels: efficient and scalable deep learning prediction on trusted processors
K Kim, CH Kim, JJ Rhee, X Yu, H Chen, D Tian, B Lee
Proceedings of the 11th ACM Symposium on Cloud Computing, 462-476, 2020
342020
DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing
S Kim, M Liu, JJ Rhee, Y Jeon, Y Kwon, CH Kim
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
302022
From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY
T Kim, CH Kim, A Ozen, F Fei, Z Tu, X Zhang, X Deng, DJ Tian, D Xu
Proceedings of the 29th USENIX Security Symposium (USENIX Security 2020 …, 2020
272020
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications
T Kim, V Kumar, J Rhee, J Chen, K Kim, CH Kim, D Xu, DJ Tian
Proceedings of the 30th USENIX Security Symposium (USENIX Security 2021), 2021
232021
Host Behavior and Network Analytics Based Automotive Secure Gateway
J Rhee, H Li, HAO Shuai, CH Kim, Z Wu, LI Zhichun, K Jee, L Korts-Parn
US Patent App. 16/146,166, 2019
182019
PerfGuard: Binary-Centric Application Performance Monitoring in Production Environments
CH Kim, J Rhee, KH Lee, X Zhang, D Xu
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations …, 2016
172016
Confidential Execution of Deep Learning Inference at the Untrusted Edge with ARM TrustZone
MS Islam, M Zamani, CH Kim, L Khan, KW Hamlen
Proceedings of the Thirteenth ACM Conference on Data and Application …, 2023
152023
Detecting Malware Injection with Program-DNS Behavior
Y Sun, K Jee, S Sivakorn, Z Li, C Lumezanu, L Korts-Parn, Z Wu, J Rhee, ...
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 552-568, 2020
152020
Junghwan" John" Rhee, Xiao Yu, Haifeng Chen, Dave Tian, and Byoungyoung Lee. 2020. Vessels: Efficient and scalable deep learning prediction on trusted processors
K Kim, CH Kim
Proceedings of the 11th ACM Symposium on Cloud Computing, 462-476, 0
11
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality
S Park, CH Kim, J Rhee, JJ Won, T Han, D Xu
IEEE Transactions on Dependable and Secure Computing (TDSC), 2018
92018
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality
CH Kim, S Park, J Rhee, JJ Won, T Han, D Xu
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
92015
PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications
Y Jeon, J Rhee, CH Kim, Z Li, M Payer, B Lee, Z Wu
Proceedings of the 9th ACM Conference on Data and Application Security and …, 2019
82019
The system can't perform the operation now. Try again later.
Articles 1–20