Follow
Junghwan "John" Rhee
Title
Cited by
Cited by
Year
Autonomic live adaptation of virtual computational environments in a multi-domain infrastructure
P Ruth, J Rhee, D Xu, R Kennell, S Goasguen
2006 IEEE International Conference on Autonomic Computing, 5-14, 2006
2532006
Dksm: Subverting virtual machine introspection for fun and profit
S Bahram, X Jiang, Z Wang, M Grace, J Li, D Srinivasan, J Rhee, D Xu
2010 29th IEEE symposium on reliable distributed systems, 82-91, 2010
2292010
Mondrix: Memory isolation for Linux using Mondriaan memory protection
E Witchel, J Rhee, K Asanović
Proceedings of the twentieth ACM symposium on Operating systems principles …, 2005
1632005
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Z Lin, J Rhee, X Zhang, D Xu, X Jiang
Ndss, 2011
1482011
Towards a Timely Causality Analysis for Enterprise Security.
Y Liu, M Zhang, D Li, K Jee, Z Li, Z Wu, J Rhee, P Mittal
NDSS, 2018
1392018
High fidelity data reduction for big data security dependency analyses
Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
1282016
Defeating dynamic data kernel rootkit attacks via vmm-based guest-transparent monitoring
J Rhee, R Riley, D Xu, X Jiang
2009 international conference on availability, reliability and security, 74-81, 2009
1222009
Hybrid network management
N Arora, H Zhang, C Lumezanu, J Rhee, G Jiang, H Lu
US Patent 9,450,823, 2016
912016
Perfscope: Practical online server performance bug inference in production cloud computing infrastructures
DJ Dean, H Nguyen, X Gu, H Zhang, J Rhee, N Arora, G Jiang
Proceedings of the ACM Symposium on Cloud Computing, 1-13, 2014
842014
Accurate, low cost and instrumentation-free security audit logging for windows
S Ma, KH Lee, CH Kim, J Rhee, X Zhang, D Xu
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
832015
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ...
NDSS, 2020
822020
System and method for transforming legacy desktop environments to a virtualized desktop model
KA Beaty, R Bhowmik, A Kochut, J Rhee, HH Shaikh
US Patent 8,490,087, 2013
792013
Kernel malware analysis with un-tampered and temporal views of dynamic kernel memory
J Rhee, R Riley, D Xu, X Jiang
Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010
722010
Traceback: First fault diagnosis by reconstruction of distributed control flow
A Ayers, R Schooler, C Metcalf, A Agarwal, J Rhee, E Witchel
Proceedings of the 2005 ACM SIGPLAN conference on Programming language …, 2005
712005
Nodemerge: Template based efficient data reduction for big-data causality analysis
Y Tang, D Li, Z Li, M Zhang, K Jee, X Xiao, Z Wu, J Rhee, F Xu, Q Li
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
662018
Hybnet: Network manager for a hybrid network infrastructure
H Lu, N Arora, H Zhang, C Lumezanu, J Rhee, G Jiang
Proceedings of the Industrial Track of the 13th ACM/IFIP/USENIX …, 2013
622013
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing.
T Kim, CH Kim, J Rhee, F Fei, Z Tu, G Walkup, X Zhang, X Deng, D Xu
USENIX Security Symposium, 425-442, 2019
522019
Enabling layer 2 pathlet tracing through context encoding in software-defined networking
H Zhang, C Lumezanu, J Rhee, N Arora, Q Xu, G Jiang
Proceedings of the third workshop on Hot topics in software defined …, 2014
472014
Dimsum: Discovering semantic data of interest from un-mappable memory with confidence
Z Lin, J Rhee, C Wu, X Zhang, D Xu
Proc. NDSS, 2012
372012
Data-centric OS kernel malware characterization
J Rhee, R Riley, Z Lin, X Jiang, D Xu
IEEE Transactions on Information Forensics and Security 9 (1), 72-87, 2013
342013
The system can't perform the operation now. Try again later.
Articles 1–20