Biblio

Export 36 results:
Filters: Author is Taesoo Kim  [Clear All Filters]
2023
Park S, Bastani O, Kim T.  2023.  ACon^2: Adaptive Conformal Consensus for Provable Blockchain Oracles. 32nd USENIX Security Symposium (USENIX Security 23). :3313--3330.
Constable S, Van Bulck J, Cheng X, Xiao Y, Xing C, Alexandrovich I, Kim T, Piessens F, Vij M, Silberstein M.  2023.  AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves. 32nd USENIX Security Symposium (USENIX Security 23). :4051--4068.
Fu Y-F, Lee J, Kim T.  2023.  autofz: Automated Fuzzer Composition at Runtime. 32nd USENIX Security Symposium (USENIX Security 23). :1901--1918.
2022
Park S, Zhou D, Qian Y, Calciu I, Kim T, Kashyap S.  2022.  Application-Informed Kernel Synchronization Primitives. 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). :667--682.
Yoo S, Park J, Kim S, Kim Y, Kim T.  2022.  In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication. 31st USENIX Security Symposium (USENIX Security 22). :89--106.
Sang F, Shih M-W, Lee S, Zhang X, Steiner M, Vij M, Kim T.  2022.  PRIDWEN: Universally Hardening SGX Programs via Load-Time Synthesis. 2022 USENIX Annual Technical Conference (USENIX ATC 22). :455--472.
2021
Yang Y, Kim T, Chun B-G.  2021.  Finding Consensus Bugs in Ethereum via Multi-transaction Differential Fuzzing. 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21). :349--365.
Wickman B, Hu H, Yun I, Jang DH, Lim JW, Kashyap S, Kim T.  2021.  Preventing Use-After-Free Attacks with Fast Forward Allocation. 30th USENIX Security Symposium (USENIX Security 21). :2453--2470.
2020
Yun I, Kapil D, Kim T.  2020.  Automatic Techniques to Systematically Discover New Heap Exploitation Primitives. 29th USENIX Security Symposium (USENIX Security 20). :1111--1128.
2019
Zhao H, Zhang Y, Yang K, Kim T.  2019.  Breaking Turtles All the Way Down: An Exploitation Chain to Break out of VMware ESXi. 13th USENIX Workshop on Offensive Technologies (WOOT 19).
Jung J, Hu H, Solodukhin D, Pagan D, Lee KHyung, Kim T.  2019.  Fuzzification: Anti-Fuzzing Techniques. 28th USENIX Security Symposium (USENIX Security 19). :1913--1930.
Park S, Lee S, Xu W, Moon HG, Kim T.  2019.  libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK). 2019 USENIX Annual Technical Conference (USENIX ATC 19). :241--254.
Qian C, Hu H, Alharthi M, Chung PHo, Kim T, Lee W.  2019.  RAZOR: A Framework for Post-deployment Software Debloating. 28th USENIX Security Symposium (USENIX Security 19). :1733--1750.
2018
Ji Y, Lee S, Fazzini M, Allen J, Downing E, Kim T, Orso A, Lee W.  2018.  Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking. 27th USENIX Security Symposium (USENIX Security 18). :1705--1722.
Yun I, Lee S, Xu M, Jang Y, Kim T.  2018.  QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. 27th USENIX Security Symposium (USENIX Security 18). :745--761.
Kashyap S, Min C, Kim T.  2018.  Scaling Guest OS Critical Sections with eCS. 2018 USENIX Annual Technical Conference (USENIX ATC 18). :159--172.
2017
Xu M, Lu K, Kim T, Lee W.  2017.  Bunshin: Compositing Security Mechanisms through Diversification. 2017 USENIX Annual Technical Conference (USENIX ATC 17). :271--283.
Kim SYong, Lee S, Yun I, Xu W, Lee B, Yun Y, Kim T.  2017.  CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems. 2017 USENIX Annual Technical Conference (USENIX ATC 17). :689--701.
Ding R, Qian C, Song C, Harris B, Kim T, Lee W.  2017.  Efficient Protection of Path-Sensitive Control Security. 26th USENIX Security Symposium (USENIX Security 17). :131--148.
Kim S, Han J, Ha J, Kim T, Han D.  2017.  Enhancing Security and Privacy of Tor's Ecosystem by Using Trusted Execution Environments. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :145--161.
Lee J, Jang J, Jang Y, Kwak N, Choi Y, Choi C, Kim T, Peinado M, Kang BByungHoon.  2017.  Hacking in Darkness: Return-oriented Programming against Secure Enclaves. 26th USENIX Security Symposium (USENIX Security 17). :523--539.
Lee S, Shih M-W, Gera P, Kim T, Kim H, Peinado M.  2017.  Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. 26th USENIX Security Symposium (USENIX Security 17). :557--574.
Xu M, Kim T.  2017.  PlatPal: Detecting Malicious Documents with Platform Diversity. 26th USENIX Security Symposium (USENIX Security 17). :271--287.
Kashyap S, Min C, Kim T.  2017.  Scalable NUMA-aware Blocking Synchronization Primitives. 2017 USENIX Annual Technical Conference (USENIX ATC 17). :603--615.
2016
Yun I, Min C, Si X, Jang Y, Kim T, Naik M.  2016.  APISan: Sanitizing API Usages through Semantic Cross-Checking. 25th USENIX Security Symposium (USENIX Security 16). :363--378.

Pages