What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sangho Lee
Google Scholar
21
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
Subverting the Secure VM by Exploiting PCIe Devices.
Cheolwoo Myung
Sangho Lee
Byoungyoung Lee
2023
conf/ccs
Hacksaw: Hardware-Centric Kernel Debloating via Device Inventory and Dependency Analysis.
Zhenghao Hu
Sangho Lee
Marcus Peinado
2023
conf/uss
Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability.
Varun Gandhi
Sarbartha Banerjee
Aniket Agrawal
Adil Ahmad
Sangho Lee
Marcus Peinado
2022
conf/sp
HARDLOG: Practical Tamper-Proof System Auditing Using a Novel Audit Device.
Adil Ahmad
Sangho Lee
Marcus Peinado
2022
conf/acsac
Spacelord: Private and Secure Smart Space Sharing.
Yechan Bae
Sarbartha Banerjee
Sangho Lee
Marcus Peinado
2022
conf/acsac
DeView: Confining Progressive Web Applications by Debloating Web APIs.
ChangSeok Oh
Sangho Lee
Chenxiong Qian
Hyungjoon Koo
Wenke Lee
2019
conf/uss
All Your Clicks Belong to Me: Investigating Click Interception on the Web.
Mingxue Zhang
Wei Meng
Sangho Lee
Byoungyoung Lee
Xinyu Xing
2019
conf/sp
Dominance as a New Trusted Computing Primitive for the Internet of Things.
Meng Xu
Manuel Huber
Zhichuang Sun
Paul England
Marcus Peinado
Sangho Lee
Andrey Marochko
Dennis Mattoon
Rob Spiger
Stefan Thom
2018
conf/uss
QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.
Insu Yun
Sangho Lee
Meng Xu
Yeongjin Jang
Taesoo Kim
2018
conf/uss
Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.
Yang Ji
Sangho Lee
Mattia Fazzini
Joey Allen
Evan Downing
Taesoo Kim
Alessandro Orso
Wenke Lee
2017
conf/ccs
RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking.
Yang Ji
Sangho Lee
Evan Downing
Weiren Wang
Mattia Fazzini
Taesoo Kim
Alessandro Orso
Wenke Lee
2017
conf/uss
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.
Sangho Lee
Ming-Wei Shih
Prasun Gera
Taesoo Kim
Hyesoon Kim
Marcus Peinado
2017
conf/ndss
T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.
Ming-Wei Shih
Sangho Lee
Taesoo Kim
Marcus Peinado
2016
conf/ccs
Breaking Kernel Address Space Layout Randomization with Intel TSX.
Yeongjin Jang
Sangho Lee
Taesoo Kim
2016
conf/acsac
Inferring browser activity and status through remote monitoring of storage usage.
Hyungsub Kim
Sangho Lee
Jong Kim
2015
conf/ccs
CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks.
Jonghyuk Song
Sangho Lee
Jong Kim
2015
conf/ndss
Identifying Cross-origin Resource Status Using Application Cache.
Sangho Lee
Hyungsub Kim
Jong Kim
2014
conf/sp
Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities.
Sangho Lee
Youngsok Kim
Jangwoo Kim
Jong Kim
2014
conf/acsac
Exploring and mitigating privacy threats of HTML5 geolocation API.
Hyungsub Kim
Sangho Lee
Jong Kim
2013
conf/wisa
Punobot: Mobile Botnet Using Push Notification Service in Android.
Hayoung Lee
Taeho Kang
Sangho Lee
Jong Kim
Yoonho Kim
2012
conf/ndss
WarningBird: Detecting Suspicious URLs in Twitter Stream.
Sangho Lee
Jong Kim
Coauthors
Adil Ahmad
(2)
Alessandro Orso
(2)
Andrey Marochko
(1)
Aniket Agrawal
(1)
Byoungyoung Lee
(2)
ChangSeok Oh
(1)
Chenxiong Qian
(1)
Cheolwoo Myung
(1)
Dennis Mattoon
(1)
Evan Downing
(2)
Hayoung Lee
(1)
Hyesoon Kim
(1)
Hyungjoon Koo
(1)
Hyungsub Kim
(3)
Insu Yun
(1)
Jangwoo Kim
(1)
Joey Allen
(1)
Jong Kim
(7)
Jonghyuk Song
(1)
Manuel Huber
(1)
Marcus Peinado
(7)
Mattia Fazzini
(2)
Meng Xu
(2)
Ming-Wei Shih
(2)
Mingxue Zhang
(1)
Paul England
(1)
Prasun Gera
(1)
Rob Spiger
(1)
Sangho Lee
(21)
Sarbartha Banerjee
(2)
Stefan Thom
(1)
Taeho Kang
(1)
Taesoo Kim
(6)
Varun Gandhi
(1)
Wei Meng
(1)
Weiren Wang
(1)
Wenke Lee
(3)
Xinyu Xing
(1)
Yang Ji
(2)
Yechan Bae
(1)
Yeongjin Jang
(2)
Yoonho Kim
(1)
Youngsok Kim
(1)
Zhenghao Hu
(1)
Zhichuang Sun
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to