What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kyu Hyung Lee
Google Scholar
18
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Racedb: Detecting Request Race Vulnerabilities in Database-Backed Web Applications.
An Chen
Yonghwi Kwon
Kyu Hyung Lee
2024
conf/uss
Unveiling IoT Security in Reality: A Firmware-Centric Journey.
Nicolas Nino
Ruibo Lu
Wei Zhou
Kyu Hyung Lee
Ziming Zhao
Le Guan
2024
conf/acsac
FA-SEAL: Forensically Analyzable Symmetric Encryption for Audit Logs.
Basanta Chaulagain
Kyu Hyung Lee
2023
conf/ndss
SynthDB: Synthesizing Database via Program Analysis for Security Testing of Web Applications.
An Chen
Jiho Lee
Basanta Chaulagain
Yonghwi Kwon
Kyu Hyung Lee
2022
conf/wisa
Dazzle-attack: Anti-Forensic Server-side Attack via Fail-Free Dynamic State Machine.
Bora Lee
Kyungchan Lim
JiHo Lee
Chijung Jung
Doowon Kim
Kyu Hyung Lee
Haehyun Cho
Yonghwi Kwon
2021
journals/tifs
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection.
Hassaan Irshad
Gabriela F. Ciocarlie
Ashish Gehani
Vinod Yegneswaran
Kyu Hyung Lee
Jignesh M. Patel
Somesh Jha
Yonghwi Kwon
Dongyan Xu
Xiangyu Zhang
2021
conf/ndss
C^2SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis.
Yonghwi Kwon
Weihang Wang
Jinho Jung
Kyu Hyung Lee
Roberto Perdisci
2019
conf/uss
Fuzzification: Anti-Fuzzing Techniques.
Jinho Jung
Hong Hu
David Solodukhin
Daniel Pagan
Kyu Hyung Lee
Taesoo Kim
2018
conf/ndss
MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Yonghwi Kwon
Fei Wang
Weihang Wang
Kyu Hyung Lee
Wen-Chuan Lee
Shiqing Ma
Xiangyu Zhang
Dongyan Xu
Somesh Jha
Gabriela F. Ciocarlie
Ashish Gehani
Vinod Yegneswaran
2018
conf/ndss
JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions.
Bo Li
Phani Vadrevu
Kyu Hyung Lee
Roberto Perdisci
2017
conf/ccs
DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging.
Xingzi Yuan
Omid Setayeshfar
Hongfei Yan
Pranav Panage
Xuetao Wei
Kyu Hyung Lee
2017
conf/uss
MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning.
Shiqing Ma
Juan Zhai
Fei Wang
Kyu Hyung Lee
Xiangyu Zhang
Dongyan Xu
2017
conf/ndss
Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots.
Phani Vadrevu
Jienan Liu
Bo Li
Babak Rahbarinia
Kyu Hyung Lee
Roberto Perdisci
2017
conf/ndss
Self Destructing Exploit Executions via Input Perturbation.
Yonghwi Kwon
Brendan Saltaformaggio
I Luk Kim
Kyu Hyung Lee
Xiangyu Zhang
Dongyan Xu
2015
conf/acsac
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows.
Shiqing Ma
Kyu Hyung Lee
Chung Hwan Kim
Junghwan Rhee
Xiangyu Zhang
Dongyan Xu
2013
conf/ccs
LogGC: garbage collecting audit log.
Kyu Hyung Lee
Xiangyu Zhang
Dongyan Xu
2013
conf/ndss
High Accuracy Attack Provenance via Binary-based Execution Partition.
Kyu Hyung Lee
Xiangyu Zhang
Dongyan Xu
2011
conf/dsn
Unified debugging of distributed systems with Recon.
Kyu Hyung Lee
Nick Sumner
Xiangyu Zhang
Patrick Eugster
Coauthors
An Chen
(2)
Ashish Gehani
(2)
Babak Rahbarinia
(1)
Basanta Chaulagain
(2)
Bo Li
(2)
Bora Lee
(1)
Brendan Saltaformaggio
(1)
Chijung Jung
(1)
Chung Hwan Kim
(1)
Daniel Pagan
(1)
David Solodukhin
(1)
Dongyan Xu
(7)
Doowon Kim
(1)
Fei Wang
(2)
Gabriela F. Ciocarlie
(2)
Haehyun Cho
(1)
Hassaan Irshad
(1)
Hong Hu
(1)
Hongfei Yan
(1)
I Luk Kim
(1)
Jienan Liu
(1)
Jignesh M. Patel
(1)
Jiho Lee
(2)
Jinho Jung
(2)
Juan Zhai
(1)
Junghwan Rhee
(1)
Kyu Hyung Lee
(18)
Kyungchan Lim
(1)
Le Guan
(1)
Nick Sumner
(1)
Nicolas Nino
(1)
Omid Setayeshfar
(1)
Patrick Eugster
(1)
Phani Vadrevu
(2)
Pranav Panage
(1)
Roberto Perdisci
(3)
Ruibo Lu
(1)
Shiqing Ma
(3)
Somesh Jha
(2)
Taesoo Kim
(1)
Vinod Yegneswaran
(2)
Wei Zhou
(1)
Weihang Wang
(2)
Wen-Chuan Lee
(1)
Xiangyu Zhang
(8)
Xingzi Yuan
(1)
Xuetao Wei
(1)
Yonghwi Kwon
(7)
Ziming Zhao
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to