Biblio

Export 30 results:
Filters: Author is Taesoo Kim  [Clear All Filters]
2021
Yang Y, Kim T, Chun B-G.  2021.  Finding Consensus Bugs in Ethereum via Multi-transaction Differential Fuzzing. 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21). :349--365.
Wickman B, Hu H, Yun I, Jang DH, Lim JW, Kashyap S, Kim T.  2021.  Preventing Use-After-Free Attacks with Fast Forward Allocation. 30th USENIX Security Symposium (USENIX Security 21). :2453--2470.
2020
Yun I, Kapil D, Kim T.  2020.  Automatic Techniques to Systematically Discover New Heap Exploitation Primitives. 29th USENIX Security Symposium (USENIX Security 20). :1111--1128.
2019
Zhao H, Zhang Y, Yang K, Kim T.  2019.  Breaking Turtles All the Way Down: An Exploitation Chain to Break out of VMware ESXi. 13th USENIX Workshop on Offensive Technologies (WOOT 19).
Jung J, Hu H, Solodukhin D, Pagan D, Lee KHyung, Kim T.  2019.  Fuzzification: Anti-Fuzzing Techniques. 28th USENIX Security Symposium (USENIX Security 19). :1913--1930.
Park S, Lee S, Xu W, Moon HG, Kim T.  2019.  libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK). 2019 USENIX Annual Technical Conference (USENIX ATC 19). :241--254.
Qian C, Hu H, Alharthi M, Chung PHo, Kim T, Lee W.  2019.  RAZOR: A Framework for Post-deployment Software Debloating. 28th USENIX Security Symposium (USENIX Security 19). :1733--1750.
2018
Ji Y, Lee S, Fazzini M, Allen J, Downing E, Kim T, Orso A, Lee W.  2018.  Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking. 27th USENIX Security Symposium (USENIX Security 18). :1705--1722.
Yun I, Lee S, Xu M, Jang Y, Kim T.  2018.  QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. 27th USENIX Security Symposium (USENIX Security 18). :745--761.
Kashyap S, Min C, Kim T.  2018.  Scaling Guest OS Critical Sections with eCS. 2018 USENIX Annual Technical Conference (USENIX ATC 18). :159--172.
2017
Xu M, Lu K, Kim T, Lee W.  2017.  Bunshin: Compositing Security Mechanisms through Diversification. 2017 USENIX Annual Technical Conference (USENIX ATC 17). :271--283.
Kim SYong, Lee S, Yun I, Xu W, Lee B, Yun Y, Kim T.  2017.  CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems. 2017 USENIX Annual Technical Conference (USENIX ATC 17). :689--701.
Ding R, Qian C, Song C, Harris B, Kim T, Lee W.  2017.  Efficient Protection of Path-Sensitive Control Security. 26th USENIX Security Symposium (USENIX Security 17). :131--148.
Kim S, Han J, Ha J, Kim T, Han D.  2017.  Enhancing Security and Privacy of Tor's Ecosystem by Using Trusted Execution Environments. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :145--161.
Lee J, Jang J, Jang Y, Kwak N, Choi Y, Choi C, Kim T, Peinado M, Kang BByungHoon.  2017.  Hacking in Darkness: Return-oriented Programming against Secure Enclaves. 26th USENIX Security Symposium (USENIX Security 17). :523--539.
Lee S, Shih M-W, Gera P, Kim T, Kim H, Peinado M.  2017.  Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. 26th USENIX Security Symposium (USENIX Security 17). :557--574.
Xu M, Kim T.  2017.  PlatPal: Detecting Malicious Documents with Platform Diversity. 26th USENIX Security Symposium (USENIX Security 17). :271--287.
Kashyap S, Min C, Kim T.  2017.  Scalable NUMA-aware Blocking Synchronization Primitives. 2017 USENIX Annual Technical Conference (USENIX ATC 17). :603--615.
2016
Yun I, Min C, Si X, Jang Y, Kim T, Naik M.  2016.  APISan: Sanitizing API Usages through Semantic Cross-Checking. 25th USENIX Security Symposium (USENIX Security 16). :363--378.
Kashyap S, Min C, Lee B, Kim T, Emelyanov P.  2016.  Instant OS Updates via Userspace Checkpoint-and-Restart. 2016 USENIX Annual Technical Conference (USENIX ATC 16). :605--619.
Min C, Kashyap S, Maass S, Kim T.  2016.  Understanding Manycore Scalability of File Systems. 2016 USENIX Annual Technical Conference (USENIX ATC 16). :71--85.
2015
Min C, Kang W-H, Kim T, Lee S-W, Eom YIk.  2015.  Lightweight Application-Level Crash Consistency on Transactional Flash Storage. 2015 USENIX Annual Technical Conference (USENIX ATC 15). :221--234.
Han S, Shen H, Kim T, Krishnamurthy A, Anderson T, Wetherall D.  2015.  MetaSync: File Synchronization Across Multiple Untrusted Storage Services. 2015 USENIX Annual Technical Conference (USENIX ATC 15). :83--95.
Lee B, Song C, Kim T, Lee W.  2015.  Type Casting Verification: Stopping an Emerging Attack Vector. 24th USENIX Security Symposium (USENIX Security 15). :81--96.
2014
Chen H, Kim T, Wang X, Zeldovich N, M. Kaashoek F.  2014.  Identifying Information Disclosure in Web Applications with Retroactive Auditing. 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). :555--569.

Pages