Biblio

Export 33 results:
Filters: Author is Taesoo Kim  [Clear All Filters]
2015
Han S, Shen H, Kim T, Krishnamurthy A, Anderson T, Wetherall D.  2015.  MetaSync: File Synchronization Across Multiple Untrusted Storage Services. 2015 USENIX Annual Technical Conference (USENIX ATC 15). :83--95.
Lee B, Song C, Kim T, Lee W.  2015.  Type Casting Verification: Stopping an Emerging Attack Vector. 24th USENIX Security Symposium (USENIX Security 15). :81--96.
2014
Chen H, Kim T, Wang X, Zeldovich N, M. Kaashoek F.  2014.  Identifying Information Disclosure in Web Applications with Retroactive Auditing. 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). :555--569.
2013
Kim T, Zeldovich N.  2013.  Practical and Effective Sandboxing for Non-root Users. 2013 USENIX Annual Technical Conference (USENIX ATC 13). :139--144.
2012
Kim T, Chandra R, Zeldovich N.  2012.  Efficient Patch-based Auditing for Web Application Vulnerabilities. 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12). :193--206.
Kim T, Peinado M, Mainar-Ruiz G.  2012.  STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud. 21st USENIX Security Symposium (USENIX Security 12). :189--204.
2010
Kim T, Wang X, Zeldovich N, M. Kaashoek F.  2010.  Intrusion Recovery Using Selective Re-execution. 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10).
Kim T, Zeldovich N.  2010.  Making Linux Protection Mechanisms Egalitarian with UserFS. 19th USENIX Security Symposium (USENIX Security 10).

Pages