Kyungtae Kim
Kyungtae Kim
Verified email at
Cited by
Cited by
OBLIVIATE: A Data Oblivious Filesystem for Intel SGX.
A Ahmad, K Kim, MI Sarfaraz, B Lee
NDSS, 2018
Razzer: Finding kernel race bugs through fuzzing
DR Jeong, K Kim, B Shivakumar, B Lee, I Shin
2019 IEEE Symposium on Security and Privacy (SP), 754-768, 2019
HFL: Hybrid Fuzzing on the Linux Kernel.
K Kim, DR Jeong, CH Kim, Y Jang, I Shin, B Lee
NDSS, 2020
J-force: Forced execution on javascript
K Kim, IL Kim, CH Kim, Y Kwon, Y Zheng, X Zhang, D Xu
Proceedings of the 26th international conference on World Wide Web, 897-906, 2017
Ldx: Causality inference by lightweight dual execution
Y Kwon, D Kim, WN Sumner, K Kim, B Saltaformaggio, X Zhang, D Xu
Proceedings of the Twenty-First International Conference on Architectural …, 2016
Vessels: Efficient and scalable deep learning prediction on trusted processors
K Kim, CH Kim, JJ Rhee, X Yu, H Chen, D Tian, B Lee
Proceedings of the 11th ACM Symposium on Cloud Computing, 462-476, 2020
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications.
T Kim, V Kumar, J Rhee, J Chen, K Kim, CH Kim, D Xu, Dave (Jing) Tian
USENIX Security Symposium, 249-266, 2021
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions.
Y Kwon, F Peng, D Kim, K Kim, X Zhang, D Xu, V Yegneswaran, J Qian
NDSS, 2015
Fuzzusb: Hybrid stateful fuzzing of usb gadget stacks
K Kim, T Kim, E Warraich, B Lee, KRB Butler, A Bianchi, DJ Tian
2022 IEEE Symposium on Security and Privacy (SP), 2212-2229, 2022
The system can't perform the operation now. Try again later.
Articles 1–9