Taesoo Kim
제목
인용
인용
연도
Inferring fine-grained control flow inside {SGX} enclaves with branch shadowing
S Lee, MW Shih, P Gera, T Kim, H Kim, M Peinado
26th {USENIX} security symposium ({USENIX} security 17), 557-574, 2017
3802017
{STEALTHMEM}: System-level protection against cache-based side channel attacks in the cloud
T Kim, M Peinado, G Mainar-Ruiz
21st {USENIX} Security Symposium ({USENIX} Security 12), 189-204, 2012
3632012
T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.
MW Shih, S Lee, T Kim, M Peinado
NDSS, 2017
3332017
{QSYM}: A practical concolic execution engine tailored for hybrid fuzzing
I Yun, S Lee, M Xu, Y Jang, T Kim
27th {USENIX} Security Symposium ({USENIX} Security 18), 745-761, 2018
2212018
SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs.
J Seo, B Lee, SM Kim, MW Shih, I Shin, D Han, T Kim
NDSS, 2017
1732017
Mosaic: Processing a trillion-edge graph on a single machine
S Maass, C Min, S Kashyap, W Kang, M Kumar, T Kim
Proceedings of the Twelfth European Conference on Computer Systems, 527-543, 2017
1482017
Breaking kernel address space layout randomization with intel tsx
Y Jang, S Lee, T Kim
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1442016
ASLR-Guard: Stopping address space leakage for code reuse attacks
K Lu, C Song, B Lee, SP Chung, T Kim, W Lee
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
1362015
Intrusion Recovery Using Selective Re-execution.
T Kim, X Wang, N Zeldovich, MF Kaashoek
OSDI, 89-104, 2010
1332010
Hacking in darkness: Return-oriented programming against secure enclaves
J Lee, J Jang, Y Jang, N Kwak, Y Choi, C Choi, T Kim, M Peinado, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 523-539, 2017
1322017
Preventing Use-after-free with Dangling Pointers Nullification.
B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee
NDSS, 2015
1232015
S-nfv: Securing nfv states by using sgx
MW Shih, M Kumar, T Kim, A Gavrilovska
Proceedings of the 2016 ACM International Workshop on Security in Software …, 2016
1072016
Enforcing Kernel Security Invariants with Data Flow Integrity.
C Song, B Lee, K Lu, W Harris, T Kim, W Lee
NDSS, 2016
1072016
Understanding manycore scalability of file systems
C Min, S Kashyap, S Maass, T Kim
2016 {USENIX} Annual Technical Conference ({USENIX}{ATC} 16), 71-85, 2016
1062016
OpenSGX: An Open Platform for SGX Research.
P Jain, SJ Desai, MW Shih, T Kim, SM Kim, JH Lee, C Choi, Y Shin, ...
NDSS 16, 21-24, 2016
1052016
FLEXDROID: Enforcing In-App Privilege Separation in Android.
J Seo, D Kim, D Cho, I Shin, T Kim
NDSS, 2016
952016
HDFI: Hardware-assisted data-flow isolation
C Song, H Moon, M Alam, I Yun, B Lee, T Kim, W Lee, Y Paek
2016 IEEE Symposium on Security and Privacy (SP), 1-17, 2016
872016
Practical and effective sandboxing for non-root users
T Kim, N Zeldovich
2013 {USENIX} Annual Technical Conference ({USENIX}{ATC} 13), 139-144, 2013
872013
SGX-Bomb: Locking down the processor via Rowhammer attack
Y Jang, J Lee, S Lee, T Kim
Proceedings of the 2nd Workshop on System Software for Trusted Execution, 1-6, 2017
852017
A first step towards leveraging commodity trusted execution environments for network applications
S Kim, Y Shin, J Ha, T Kim, D Han
Proceedings of the 14th ACM Workshop on Hot Topics in Networks, 1-7, 2015
832015
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20