Seguir
Taesoo Kim
Taesoo Kim
Dirección de correo verificada de gatech.edu - Página principal
Título
Citado por
Citado por
Año
Inferring fine-grained control flow inside {SGX} enclaves with branch shadowing
S Lee, MW Shih, P Gera, T Kim, H Kim, M Peinado
26th USENIX Security Symposium (USENIX Security 17), 557-574, 2017
6612017
{QSYM}: A practical concolic execution engine tailored for hybrid fuzzing
I Yun, S Lee, M Xu, Y Jang, T Kim
27th USENIX Security Symposium (USENIX Security 18), 745-761, 2018
6152018
T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.
MW Shih, S Lee, T Kim, M Peinado
NDSS, 2017
5032017
{STEALTHMEM}:{System-Level} protection against {Cache-Based} side channel attacks in the cloud
T Kim, M Peinado, G Mainar-Ruiz
21st USENIX Security Symposium (USENIX Security 12), 189-204, 2012
4982012
SGX-shield: Enabling address space layout randomization for SGX programs.
J Seo, B Lee, SM Kim, MW Shih, I Shin, D Han, T Kim
NDSS, 2017
2622017
SplitFS: Reducing software overhead in file systems for persistent memory
R Kadekodi, SK Lee, S Kashyap, T Kim, A Kolli, V Chidambaram
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 494-508, 2019
2512019
Hacking in darkness: Return-oriented programming against secure enclaves
J Lee, J Jang, Y Jang, N Kwak, Y Choi, C Choi, T Kim, M Peinado, ...
26th USENIX Security Symposium (USENIX Security 17), 523-539, 2017
2442017
Breaking kernel address space layout randomization with intel tsx
Y Jang, S Lee, T Kim
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2352016
Preventing Use-after-free with Dangling Pointers Nullification.
B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee
NDSS, 2015
2322015
Mosaic: Processing a trillion-edge graph on a single machine
S Maass, C Min, S Kashyap, W Kang, M Kumar, T Kim
Proceedings of the Twelfth European Conference on Computer Systems, 527-543, 2017
2202017
Recipe: Converting concurrent dram indexes to persistent-memory indexes
SK Lee, J Mohan, S Kashyap, T Kim, V Chidambaram
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 462-477, 2019
2192019
SGX-Bomb: Locking down the processor via Rowhammer attack
Y Jang, J Lee, S Lee, T Kim
Proceedings of the 2nd Workshop on System Software for Trusted Execution, 1-6, 2017
2122017
libmpk: Software abstraction for intel memory protection keys (intel {MPK})
S Park, S Lee, W Xu, H Moon, T Kim
2019 USENIX Annual Technical Conference (USENIX ATC 19), 241-254, 2019
2112019
ASLR-Guard: Stopping address space leakage for code reuse attacks
K Lu, C Song, B Lee, SP Chung, T Kim, W Lee
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
2082015
Log2: A {Cost-Aware} logging mechanism for performance diagnosis
R Ding, H Zhou, JG Lou, H Zhang, Q Lin, Q Fu, D Zhang, T Xie
2015 USENIX annual technical conference (USENIX ATC 15), 139-150, 2015
204*2015
HDFI: Hardware-assisted data-flow isolation
C Song, H Moon, M Alam, I Yun, B Lee, T Kim, W Lee, Y Paek
2016 IEEE Symposium on Security and Privacy (SP), 1-17, 2016
1902016
Enforcing Kernel Security Invariants with Data Flow Integrity.
C Song, B Lee, K Lu, W Harris, T Kim, W Lee
NDSS, 2016
1822016
Understanding manycore scalability of file systems
C Min, S Kashyap, S Maass, T Kim
2016 USENIX Annual Technical Conference (USENIX ATC 16), 71-85, 2016
1662016
Intrusion recovery using selective re-execution
T Kim, X Wang, N Zeldovich, MF Kaashoek
9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010
1652010
Designing new operating primitives to improve fuzzing performance
W Xu, S Kashyap, C Min, T Kim
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1612017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20