What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Taesoo Kim
Google Scholar
60
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Tiktag: Breaking ARM's Memory Tagging Extension with Speculative Execution.
Juhee Kim
Jinbum Park
Sihyeon Roh
Jaeyoung Chung
Youngjoo Lee
Taesoo Kim
Byoungyoung Lee
2025
conf/sp
Portal: Fast and Secure Device Access with Arm CCA for Modern Arm Mobile System-on-Chips (SoCs).
Fan Sang
Jaehyuk Lee
Xiaokuan Zhang
Taesoo Kim
2025
conf/ndss
Statically Discover Cross-Entry Use-After-Free Vulnerabilities in the Linux Kernel.
Hang Zhang
Jangha Kim
Chuhong Yuan
Zhiyun Qian
Taesoo Kim
2025
conf/ndss
MALintent: Coverage Guided Intent Fuzzing Framework for Android.
Ammar Askar
Fabian Fleischer
Christopher Kruegel
Giovanni Vigna
Taesoo Kim
2025
conf/dsn
SoundBoost: Effective RCA and Attack Detection for UAV via Acoustic Side-Channel.
Haoran Wang
Zheng Yang
Sangdon Park
Yibin Yang
Seulbae Kim
Willian T. Lunardi
Martin Andreoni
Taesoo Kim
Wenke Lee
2024
conf/ccs
PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux.
Juhee Kim
Jinbum Park
Yoochan Lee
Chengyu Song
Taesoo Kim
Byoungyoung Lee
2024
conf/uss
I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures.
Mingyi Liu
Jun Ho Huh
HyungSeok Han
Jaehyuk Lee
Jihae Ahn
Frank Li
Hyoungshick Kim
Taesoo Kim
2024
conf/ndss
SENSE: Enhancing Microarchitectural Awareness for TEEs via Subscription-Based Notification.
Fan Sang
Jaehyuk Lee
Xiaokuan Zhang
Meng Xu
Scott Constable
Yuan Xiao
Michael Steiner
Mona Vij
Taesoo Kim
2023
conf/uss
AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves.
Scott Constable
Jo Van Bulck
Xiang Cheng
Yuan Xiao
Cedric Xing
Ilya Alexandrovich
Taesoo Kim
Frank Piessens
Mona Vij
Mark Silberstein
2023
conf/uss
autofz: Automated Fuzzer Composition at Runtime.
Yu-Fu Fu
Jae-Hyuk Lee
Taesoo Kim
2023
conf/uss
ACon<sup>2</sup>: Adaptive Conformal Consensus for Provable Blockchain Oracles.
Sangdon Park
Osbert Bastani
Taesoo Kim
2023
conf/sp
Pyfet: Forensically Equivalent Transformation for Python Binary Decompilation.
Ali Ahad
Chijung Jung
Ammar Askar
Doowon Kim
Taesoo Kim
Yonghwi Kwon
2023
conf/sp
UTopia: Automatic Generation of Fuzz Driver using Unit Tests.
Bokdeuk Jeong
Joonun Jang
Hayoon Yi
Jiin Moon
Junsik Kim
Intae Jeon
Taesoo Kim
WooChul Shim
Yong Ho Hwang
2022
conf/uss
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication.
Sungbae Yoo
Jinbum Park
Seolheui Kim
Yeji Kim
Taesoo Kim
2022
conf/acsac
POPKORN: Popping Windows Kernel Drivers At Scale.
Rajat Gupta
Lukas Patrick Dresel
Noah Spahn
Giovanni Vigna
Christopher Kruegel
Taesoo Kim
2021
conf/ccs
Are we done yet? Our Journey to Fight against Memory-safety Bugs.
Taesoo Kim
2021
conf/ccs
Hardware Support to Improve Fuzzing Performance and Precision.
Ren Ding
Yonghae Kim
Fan Sang
Wen Xu
Gururaj Saileshwar
Taesoo Kim
2021
conf/ccs
HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators.
Insu Yun
Woosun Song
Seunggi Min
Taesoo Kim
2021
conf/uss
Preventing Use-After-Free Attacks with Fast Forward Allocation.
Brian Wickman
Hong Hu
Insu Yun
Daehee Jang
Jungwon Lim
Sanidhya Kashyap
Taesoo Kim
2021
conf/ndss
WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning.
Jinho Jung
Stephen Tong
Hong Hu
Jungwon Lim
Yonghwi Jin
Taesoo Kim
2021
conf/acsac
A Look Back on a Function Identification Problem.
Hyungjoon Koo
Soyeon Park
Taesoo Kim
2020
conf/ccs
FREEDOM: Engineering a State-of-the-Art DOM Fuzzer.
Wen Xu
Soyeon Park
Taesoo Kim
2020
conf/ccs
Slimium: Debloating the Chromium Browser with Feature Subsetting.
Chenxiong Qian
Hyungjoon Koo
ChangSeok Oh
Taesoo Kim
Wenke Lee
2020
conf/uss
Automatic Techniques to Systematically Discover New Heap Exploitation Primitives.
Insu Yun
Dhaval Kapil
Taesoo Kim
2020
conf/sp
Krace: Data Race Fuzzing for Kernel File Systems.
Meng Xu
Sanidhya Kashyap
Hanqing Zhao
Taesoo Kim
2020
conf/sp
Fuzzing JavaScript Engines with Aspect-preserving Mutation.
Soyeon Park
Wen Xu
Insu Yun
Daehee Jang
Taesoo Kim
2020
conf/ndss
DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report.
Ren Ding
Hong Hu
Wen Xu
Taesoo Kim
2019
conf/uss
RAZOR: A Framework for Post-deployment Software Debloating.
Chenxiong Qian
Hong Hu
Mansour Alharthi
Simon Pak Ho Chung
Taesoo Kim
Wenke Lee
2019
conf/uss
Fuzzification: Anti-Fuzzing Techniques.
Jinho Jung
Hong Hu
David Solodukhin
Daniel Pagan
Kyu Hyung Lee
Taesoo Kim
2019
conf/sp
Fuzzing File Systems via Two-Dimensional Input Space Exploration.
Wen Xu
Hyungon Moon
Sanidhya Kashyap
Po-Ning Tseng
Taesoo Kim
2018
conf/ccs
Enforcing Unique Code Target Property for Control-Flow Integrity.
Hong Hu
Chenxiong Qian
Carter Yagemann
Simon Pak Ho Chung
William R. Harris
Taesoo Kim
Wenke Lee
2018
conf/uss
QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.
Insu Yun
Sangho Lee
Meng Xu
Yeongjin Jang
Taesoo Kim
2018
conf/uss
Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.
Yang Ji
Sangho Lee
Mattia Fazzini
Joey Allen
Evan Downing
Taesoo Kim
Alessandro Orso
Wenke Lee
2018
conf/sp
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.
Meng Xu
Chenxiong Qian
Kangjie Lu
Michael Backes
Taesoo Kim
2017
conf/ccs
Designing New Operating Primitives to Improve Fuzzing Performance.
Wen Xu
Sanidhya Kashyap
Changwoo Min
Taesoo Kim
2017
conf/ccs
RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking.
Yang Ji
Sangho Lee
Evan Downing
Weiren Wang
Mattia Fazzini
Taesoo Kim
Alessandro Orso
Wenke Lee
2017
conf/ccs
Identifying Open-Source License Violation and 1-day Security Risk at Large Scale.
Ruian Duan
Ashish Bijlani
Meng Xu
Taesoo Kim
Wenke Lee
2017
conf/ccs
FEAST 2017: The Second Workshop on Forming an Ecosystem Around Software Transformation.
Taesoo Kim
Dinghao Wu
2017
conf/ccs
CCS'17 Tutorial Abstract / SGX Security and Privacy.
Taesoo Kim
Zhiqiang Lin
Chia-Che Tsai
2017
conf/uss
PlatPal: Detecting Malicious Documents with Platform Diversity.
Meng Xu
Taesoo Kim
2017
conf/uss
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.
Sangho Lee
Ming-Wei Shih
Prasun Gera
Taesoo Kim
Hyesoon Kim
Marcus Peinado
2017
conf/uss
Hacking in Darkness: Return-oriented Programming against Secure Enclaves.
Jae-Hyuk Lee
Jin Soo Jang
Yeongjin Jang
Nohyun Kwak
Yeseul Choi
Changho Choi
Taesoo Kim
Marcus Peinado
Brent ByungHoon Kang
2017
conf/uss
Efficient Protection of Path-Sensitive Control Security.
Ren Ding
Chenxiong Qian
Chengyu Song
William Harris
Taesoo Kim
Wenke Lee
2017
conf/ndss
T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.
Ming-Wei Shih
Sangho Lee
Taesoo Kim
Marcus Peinado
2017
conf/ndss
SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs.
Jaebaek Seo
Byoungyoung Lee
Seong-Min Kim
Ming-Wei Shih
Insik Shin
Dongsu Han
Taesoo Kim
2016
conf/ccs
Breaking Kernel Address Space Layout Randomization with Intel TSX.
Yeongjin Jang
Sangho Lee
Taesoo Kim
2016
conf/ccs
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages.
Kangjie Lu
Chengyu Song
Taesoo Kim
Wenke Lee
2016
conf/uss
APISan: Sanitizing API Usages through Semantic Cross-Checking.
Insu Yun
Changwoo Min
Xujie Si
Yeongjin Jang
Taesoo Kim
Mayur Naik
2016
conf/sp
HDFI: Hardware-Assisted Data-Flow Isolation.
Chengyu Song
Hyungon Moon
Monjur Alam
Insu Yun
Byoungyoung Lee
Taesoo Kim
Wenke Lee
Yunheung Paek
2016
conf/ndss
Enforcing Kernel Security Invariants with Data Flow Integrity.
Chengyu Song
Byoungyoung Lee
Kangjie Lu
William Harris
Taesoo Kim
Wenke Lee
2016
conf/ndss
FLEXDROID: Enforcing In-App Privilege Separation in Android.
Jaebaek Seo
Daehyeok Kim
Donghyun Cho
Insik Shin
Taesoo Kim
2016
conf/ndss
OpenSGX: An Open Platform for SGX Research.
Prerit Jain
Soham Jayesh Desai
Ming-Wei Shih
Taesoo Kim
Seong-Min Kim
Jae-Hyuk Lee
Changho Choi
Youjung Shin
Brent ByungHoon Kang
Dongsu Han
2015
conf/ccs
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations.
Hongil Kim
Dongkwan Kim
Minhee Kwon
HyungSeok Han
Yeongjin Jang
Dongsu Han
Taesoo Kim
Yongdae Kim
2015
conf/ccs
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks.
Kangjie Lu
Chengyu Song
Byoungyoung Lee
Simon P. Chung
Taesoo Kim
Wenke Lee
2015
conf/ccs
UCognito: Private Browsing without Tears.
Meng Xu
Yeongjin Jang
Xinyu Xing
Taesoo Kim
Wenke Lee
2015
conf/uss
Type Casting Verification: Stopping an Emerging Attack Vector.
Byoungyoung Lee
Chengyu Song
Taesoo Kim
Wenke Lee
2015
conf/ndss
Preventing Use-after-free with Dangling Pointers Nullification.
Byoungyoung Lee
Chengyu Song
Yeongjin Jang
Tielei Wang
Taesoo Kim
Long Lu
Wenke Lee
2014
conf/sp
From Zygote to Morula: Fortifying Weakened ASLR on Android.
Byoungyoung Lee
Long Lu
Tielei Wang
Taesoo Kim
Wenke Lee
2012
conf/uss
STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud.
Taesoo Kim
Marcus Peinado
Gloria Mainar-Ruiz
2010
conf/uss
Making Linux Protection Mechanisms Egalitarian with UserFS.
Taesoo Kim
Nickolai Zeldovich
Coauthors
Alessandro Orso
(2)
Ali Ahad
(1)
Ammar Askar
(2)
Ashish Bijlani
(1)
Bokdeuk Jeong
(1)
Brent ByungHoon Kang
(2)
Brian Wickman
(1)
Byoungyoung Lee
(9)
Carter Yagemann
(1)
Cedric Xing
(1)
Changho Choi
(2)
ChangSeok Oh
(1)
Changwoo Min
(2)
Chengyu Song
(8)
Chenxiong Qian
(5)
Chia-Che Tsai
(1)
Chijung Jung
(1)
Christopher Kruegel
(2)
Chuhong Yuan
(1)
DaeHee Jang
(2)
Daehyeok Kim
(1)
Daniel Pagan
(1)
David Solodukhin
(1)
Dhaval Kapil
(1)
Dinghao Wu
(1)
Donghyun Cho
(1)
Dongkwan Kim
(1)
Dongsu Han
(3)
Doowon Kim
(1)
Evan Downing
(2)
Fabian Fleischer
(1)
Fan Sang
(3)
Frank Li
(1)
Frank Piessens
(1)
Giovanni Vigna
(2)
Gloria Mainar-Ruiz
(1)
Gururaj Saileshwar
(1)
Hang Zhang
(1)
Hanqing Zhao
(1)
Haoran Wang
(1)
Hayoon Yi
(1)
Hong Hu
(6)
Hongil Kim
(1)
Hyesoon Kim
(1)
Hyoungshick Kim
(1)
Hyungjoon Koo
(2)
Hyungon Moon
(2)
HyungSeok Han
(2)
Ilya Alexandrovich
(1)
Insik Shin
(2)
Insu Yun
(7)
Intae Jeon
(1)
Jae-Hyuk Lee
(3)
Jaebaek Seo
(2)
Jaehyuk Lee
(3)
Jaeyoung Chung
(1)
Jangha Kim
(1)
Jihae Ahn
(1)
Jiin Moon
(1)
Jin Soo Jang
(1)
Jinbum Park
(3)
Jinho Jung
(2)
Jo Van Bulck
(1)
Joey Allen
(1)
Joonun Jang
(1)
Juhee Kim
(2)
Jun Ho Huh
(1)
Jungwon Lim
(2)
Junsik Kim
(1)
Kangjie Lu
(4)
Kyu Hyung Lee
(1)
Long Lu
(2)
Lukas Patrick Dresel
(1)
Mansour Alharthi
(1)
Marcus Peinado
(4)
Mark Silberstein
(1)
Martin Andreoni
(1)
Mattia Fazzini
(2)
Mayur Naik
(1)
Meng Xu
(6)
Meng Xu
(1)
Michael Backes
(1)
Michael Steiner
(1)
Ming-Wei Shih
(4)
Mingyi Liu
(1)
Minhee Kwon
(1)
Mona Vij
(2)
Monjur Alam
(1)
Nickolai Zeldovich
(1)
Noah Spahn
(1)
Nohyun Kwak
(1)
Osbert Bastani
(1)
Po-Ning Tseng
(1)
Prasun Gera
(1)
Prerit Jain
(1)
Rajat Gupta
(1)
Ren Ding
(3)
Ruian Duan
(1)
Sangdon Park
(1)
Sangdon Park
(1)
Sangho Lee
(6)
Sanidhya Kashyap
(4)
Scott Constable
(2)
Seolheui Kim
(1)
Seong-Min Kim
(2)
Seulbae Kim
(1)
Seunggi Min
(1)
Sihyeon Roh
(1)
Simon P. Chung
(1)
Simon Pak Ho Chung
(2)
Soham Jayesh Desai
(1)
Soyeon Park
(3)
Stephen Tong
(1)
Sungbae Yoo
(1)
Taesoo Kim
(60)
Tielei Wang
(2)
Weiren Wang
(1)
Wen Xu
(6)
Wenke Lee
(16)
William Harris
(2)
William R. Harris
(1)
Willian T. Lunardi
(1)
WooChul Shim
(1)
Woosun Song
(1)
Xiang Cheng
(1)
Xiaokuan Zhang
(2)
Xinyu Xing
(1)
Xujie Si
(1)
Yang Ji
(2)
Yeji Kim
(1)
Yeongjin Jang
(7)
Yeseul Choi
(1)
Yibin Yang
(1)
Yong Ho Hwang
(1)
Yongdae Kim
(1)
Yonghae Kim
(1)
Yonghwi Jin
(1)
Yonghwi Kwon
(1)
Yoochan Lee
(1)
Youjung Shin
(1)
Youngjoo Lee
(1)
Yu-Fu Fu
(1)
Yuan Xiao
(2)
Yunheung Paek
(1)
Zheng Yang
(1)
Zhiqiang Lin
(1)
Zhiyun Qian
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to