Biblio

Export 21 results:
Filters: Author is Kang G. Shin  [Clear All Filters]
2023
Tang BJay, Shin KG.  2023.  Eye-Shield: Real-Time Protection of Mobile Device Screen Information from Shoulder Surfing. 32nd USENIX Security Symposium (USENIX Security 23). :5449--5466.
Ryu J, Lee D, Shin KG, Kang K.  2023.  Fast Application Launch on Personal Computing/Communication Devices. 21st USENIX Conference on File and Storage Technologies (FAST 23). :425--440.
2022
Trippel T, Shin KG, Chernyakhovsky A, Kelly G, Rizzo D, Hicks M.  2022.  Fuzzing Hardware Like Software. 31st USENIX Security Symposium (USENIX Security 22). :3237--3254.
Lee Y, Maruf HAl, Chowdhury M, Cidon A, Shin KG.  2022.  Hydra : Resilient and Highly Available Remote Memory. 20th USENIX Conference on File and Storage Technologies (FAST 22). :181--198.
2019
Gu J, Chowdhury M, Shin KG, Zhu Y, Jeon M, Qian J, Liu H, Guo C.  2019.  Tiresias: A GPU Cluster Manager for Distributed Deep Learning. 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). :485--500.
2017
Gu J, Lee Y, Zhang Y, Chowdhury M, Shin KG.  2017.  Efficient Memory Disaggregation with Infiniswap. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :649--667.
2016
Cho K-T, Shin KG.  2016.  Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. 25th USENIX Security Symposium (USENIX Security 16). :911--927.
Harkous H, Fawaz K, Shin KG, Aberer K.  2016.  PriBots: Conversational Privacy with Chatbots. Twelfth Symposium on Usable Privacy and Security (SOUPS 2016).
Fawaz K, Kim K-H, Shin KG.  2016.  Protecting Privacy of BLE Device Users. 25th USENIX Security Symposium (USENIX Security 16). :1205--1221.
Ju X, Williams D, Jamjoom H, Shin KG.  2016.  Version Traveler: Fast and Memory-Efficient Version Switching in Graph Processing Systems. 2016 USENIX Annual Technical Conference (USENIX ATC 16). :523--536.
2015
Fawaz K, Feng H, Shin KG.  2015.  Anatomization and Protection of Mobile Apps’ Location Privacy Threats. 24th USENIX Security Symposium (USENIX Security 15). :753--768.
Feng H, Fawaz K, Shin KG.  2015.  LinkDroid: Reducing Unregulated Aggregation of App Usage Behaviors. 24th USENIX Security Symposium (USENIX Security 15). :769--783.
2013
Hu X, Shin KG, Bhatkar S, Griffin K.  2013.  MutantX-S: Scalable Malware Clustering Based on Static Features. 2013 USENIX Annual Technical Conference (USENIX ATC 13). :187--198.
Ju X, Soares L, Shin KG, Ryu KDong.  2013.  Towards a Fault-Resilient Cloud Management Stack. 5th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 13).
2011
Joo Y, Ryu J, Park S, Shin KG.  2011.  FAST: Quick Application Launch on Solid-State Drives. 9th USENIX Conference on File and Storage Technologies (FAST 11).
2005
Shin KG, Kotz D, Noble B.  2005.  Opening Remarks. Third International Conference on Mobile Systems, Applications, and Services (MobiSys2005 ).
2003
Huang H, Pillai P, Shin KG.  2003.  Design and Implementation of Power-Aware Virtual Memory. 2003 USENIX Annual Technical Conference (USENIX ATC 03).
2000
Reumann J, Mehra A, Shin KG, Kandlur D.  2000.  Virtual Services: A New Abstraction for Server Consolidation. 2000 USENIX Annual Technical Conference (USENIX ATC 00).