OBLIVIATE: A Data Oblivious Filesystem for Intel SGX. A Ahmad, K Kim, MI Sarfaraz, B Lee NDSS, 2018 | 136 | 2018 |
Razzer: Finding kernel race bugs through fuzzing DR Jeong, K Kim, B Shivakumar, B Lee, I Shin 2019 IEEE Symposium on Security and Privacy (SP), 754-768, 2019 | 130 | 2019 |
HFL: Hybrid Fuzzing on the Linux Kernel. K Kim, DR Jeong, CH Kim, Y Jang, I Shin, B Lee NDSS, 2020 | 79 | 2020 |
J-force: Forced execution on javascript K Kim, IL Kim, CH Kim, Y Kwon, Y Zheng, X Zhang, D Xu Proceedings of the 26th international conference on World Wide Web, 897-906, 2017 | 67 | 2017 |
Ldx: Causality inference by lightweight dual execution Y Kwon, D Kim, WN Sumner, K Kim, B Saltaformaggio, X Zhang, D Xu Proceedings of the Twenty-First International Conference on Architectural …, 2016 | 64 | 2016 |
Vessels: Efficient and scalable deep learning prediction on trusted processors K Kim, CH Kim, JJ Rhee, X Yu, H Chen, D Tian, B Lee Proceedings of the 11th ACM Symposium on Cloud Computing, 462-476, 2020 | 15 | 2020 |
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications. T Kim, V Kumar, J Rhee, J Chen, K Kim, CH Kim, D Xu, Dave (Jing) Tian USENIX Security Symposium, 249-266, 2021 | 11 | 2021 |
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions. Y Kwon, F Peng, D Kim, K Kim, X Zhang, D Xu, V Yegneswaran, J Qian NDSS, 2015 | 2 | 2015 |
Fuzzusb: Hybrid stateful fuzzing of usb gadget stacks K Kim, T Kim, E Warraich, B Lee, KRB Butler, A Bianchi, DJ Tian 2022 IEEE Symposium on Security and Privacy (SP), 2212-2229, 2022 | 1 | 2022 |