Biblio

Export 29 results:
Filters: Author is Taesoo Kim  [Clear All Filters]
2021
Wickman B, Hu H, Yun I, Jang DH, Lim JW, Kashyap S, Kim T.  2021.  Preventing Use-After-Free Attacks with Fast Forward Allocation. 30th {USENIX} Security Symposium ({USENIX} Security 21).
2020
Yun I, Kapil D, Kim T.  2020.  Automatic Techniques to Systematically Discover New Heap Exploitation Primitives. 29th {USENIX} Security Symposium ({USENIX} Security 20). :1111--1128.
2019
Zhao H, Zhang Y, Yang K, Kim T.  2019.  Breaking Turtles All the Way Down: An Exploitation Chain to Break out of VMware ESXi. 13th {USENIX} Workshop on Offensive Technologies ({WOOT} 19).
Jung J, Hu H, Solodukhin D, Pagan D, Lee KHyung, Kim T.  2019.  Fuzzification: Anti-Fuzzing Techniques. 28th {USENIX} Security Symposium ({USENIX} Security 19). :1913--1930.
Park S, Lee S, Xu W, Moon HG, Kim T.  2019.  libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK). 2019 {USENIX} Annual Technical Conference ({USENIX} {ATC} 19). :241--254.
Qian C, Hu H, Alharthi M, Chung PHo, Kim T, Lee W.  2019.  RAZOR: A Framework for Post-deployment Software Debloating. 28th {USENIX} Security Symposium ({USENIX} Security 19). :1733--1750.
2018
Ji Y, Lee S, Fazzini M, Allen J, Downing E, Kim T, Orso A, Lee W.  2018.  Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking. 27th {USENIX} Security Symposium ({USENIX} Security 18). :1705--1722.
Yun I, Lee S, Xu M, Jang Y, Kim T.  2018.  QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. 27th {USENIX} Security Symposium ({USENIX} Security 18). :745--761.
Kashyap S, Min C, Kim T.  2018.  Scaling Guest OS Critical Sections with eCS. 2018 {USENIX} Annual Technical Conference ({USENIX} {ATC} 18). :159--172.
2017
Xu M, Lu K, Kim T, Lee W.  2017.  Bunshin: Compositing Security Mechanisms through Diversification. 2017 {USENIX} Annual Technical Conference ({USENIX} {ATC} 17). :271--283.
Kim SYong, Lee S, Yun I, Xu W, Lee B, Yun Y, Kim T.  2017.  CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems. 2017 {USENIX} Annual Technical Conference ({USENIX} {ATC} 17). :689--701.
Ding R, Qian C, Song C, Harris B, Kim T, Lee W.  2017.  Efficient Protection of Path-Sensitive Control Security. 26th {USENIX} Security Symposium ({USENIX} Security 17). :131--148.
Kim S, Han J, Ha J, Kim T, Han D.  2017.  Enhancing Security and Privacy of Tor's Ecosystem by Using Trusted Execution Environments. 14th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 17). :145--161.
Lee J, Jang J, Jang Y, Kwak N, Choi Y, Choi C, Kim T, Peinado M, Kang BByungHoon.  2017.  Hacking in Darkness: Return-oriented Programming against Secure Enclaves. 26th {USENIX} Security Symposium ({USENIX} Security 17). :523--539.
Lee S, Shih M-W, Gera P, Kim T, Kim H, Peinado M.  2017.  Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. 26th {USENIX} Security Symposium ({USENIX} Security 17). :557--574.
Xu M, Kim T.  2017.  PlatPal: Detecting Malicious Documents with Platform Diversity. 26th {USENIX} Security Symposium ({USENIX} Security 17). :271--287.
Kashyap S, Min C, Kim T.  2017.  Scalable NUMA-aware Blocking Synchronization Primitives. 2017 {USENIX} Annual Technical Conference ({USENIX} {ATC} 17). :603--615.
2016
Yun I, Min C, Si X, Jang Y, Kim T, Naik M.  2016.  APISan: Sanitizing API Usages through Semantic Cross-Checking. 25th {USENIX} Security Symposium ({USENIX} Security 16). :363--378.
Kashyap S, Min C, Lee B, Kim T, Emelyanov P.  2016.  Instant OS Updates via Userspace Checkpoint-and-Restart. 2016 {USENIX} Annual Technical Conference ({USENIX} {ATC} 16). :605--619.
Min C, Kashyap S, Maass S, Kim T.  2016.  Understanding Manycore Scalability of File Systems. 2016 {USENIX} Annual Technical Conference ({USENIX} {ATC} 16). :71--85.
2015
Min C, Kang W-H, Kim T, Lee S-W, Eom YIk.  2015.  Lightweight Application-Level Crash Consistency on Transactional Flash Storage. 2015 {USENIX} Annual Technical Conference ({USENIX} {ATC} 15). :221--234.
Han S, Shen H, Kim T, Krishnamurthy A, Anderson T, Wetherall D.  2015.  MetaSync: File Synchronization Across Multiple Untrusted Storage Services. 2015 {USENIX} Annual Technical Conference ({USENIX} {ATC} 15). :83--95.
Lee B, Song C, Kim T, Lee W.  2015.  Type Casting Verification: Stopping an Emerging Attack Vector. 24th {USENIX} Security Symposium ({USENIX} Security 15). :81--96.
2014
Chen H, Kim T, Wang X, Zeldovich N, M. Kaashoek F.  2014.  Identifying Information Disclosure in Web Applications with Retroactive Auditing. 11th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 14). :555--569.
2013
Kim T, Zeldovich N.  2013.  Practical and Effective Sandboxing for Non-root Users. 2013 {USENIX} Annual Technical Conference ({USENIX} {ATC} 13). :139--144.

Pages