default search action
Byoungyoung Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c51]Gwangmu Lee, Duo Xu, Solmaz Salimi, Byoungyoung Lee, Mathias Payer:
SyzRisk: A Change-Pattern-Based Continuous Kernel Regression Fuzzer. AsiaCCS 2024 - [c50]Juhee Kim, Jinbum Park, Yoochan Lee, Chengyu Song, Taesoo Kim, Byoungyoung Lee:
PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux. CCS 2024: 2919-2933 - [c49]Dae R. Jeong, Yewon Choi, Byoungyoung Lee, Insik Shin, Youngjin Kwon:
OZZ: Identifying Kernel Out-of-Order Concurrency Bugs with In-Vivo Memory Access Reordering. SOSP 2024: 229-248 - [c48]Jaehyun Song, Bumsuk Kim, Minwoo Kwak, Byoungyoung Lee, Euiseong Seo, Jinkyu Jeong:
A Secure, Fast, and Resource-Efficient Serverless Platform with Function REWIND. USENIX ATC 2024: 597-613 - [i3]Juhee Kim, Jinbum Park, Sihyeon Roh, Jaeyoung Chung, Youngjoo Lee, Taesoo Kim, Byoungyoung Lee:
TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution. CoRR abs/2406.08719 (2024) - 2023
- [c47]Dae R. Jeong, Minkyu Jung, Yoochan Lee, Byoungyoung Lee, Insik Shin, Youngjin Kwon:
Diagnosing Kernel Concurrency Failures with AITIA. EuroSys 2023: 94-110 - [c46]Adil Ahmad, Alex Schultz, Byoungyoung Lee, Pedro Fonseca:
An Extensible Orchestration and Protection Framework for Confidential Cloud Computing. OSDI 2023: 173-191 - [c45]Suhwan Song, Byoungyoung Lee:
Metamong: Detecting Render-Update Bugs in Web Browsers through Fuzzing. ESEC/SIGSOFT FSE 2023: 1075-1087 - [c44]Dae R. Jeong, Byoungyoung Lee, Insik Shin, Youngjin Kwon:
SegFuzz: Segmentizing Thread Interleaving to Discover Kernel Concurrency Bugs through Fuzzing. SP 2023: 2104-2121 - [c43]Yoochan Lee, Jinhan Kwak, Junesoo Kang, Yuseok Jeon, Byoungyoung Lee:
Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique. USENIX Security Symposium 2023: 6825-6842 - [c42]Young Min Kim, Byoungyoung Lee:
Extending a Hand to Attackers: Browser Privilege Escalation Attacks via Extensions. USENIX Security Symposium 2023: 7055-7071 - 2022
- [c41]Jaewon Hur, Suhwan Song, Sunwoo Kim, Byoungyoung Lee:
SpecDoctor: Differential Fuzz Testing to Find Transient Execution Vulnerabilities. CCS 2022: 1473-1487 - [c40]Suhwan Song, Jaewon Hur, Sunwoo Kim, Philip Rogers, Byoungyoung Lee:
R2Z2: Detecting Rendering Regressions in Web Browsers through Differential Fuzz Testing. ICSE 2022: 1818-1829 - [c39]Kyungtae Kim, Taegyu Kim, Ertza Warraich, Byoungyoung Lee, Kevin R. B. Butler, Antonio Bianchi, Dave Jing Tian:
FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks. SP 2022: 2212-2229 - [c38]Sunwoo Kim, Young Min Kim, Jaewon Hur, Suhwan Song, Gwangmu Lee, Byoungyoung Lee:
FuzzOrigin: Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing. USENIX Security Symposium 2022: 1008-1023 - [c37]Cheolwoo Myung, Gwangmu Lee, Byoungyoung Lee:
MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar Inference. USENIX Security Symposium 2022: 1257-1274 - [c36]Ju Chen, Wookhyun Han, Mingjun Yin, Haochen Zeng, Chengyu Song, Byoungyoung Lee, Heng Yin, Insik Shin:
SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis. USENIX Security Symposium 2022: 2531-2548 - 2021
- [c35]Adil Ahmad, Sangho Lee, Pedro Fonseca, Byoungyoung Lee:
Kard: lightweight data race detection with per-thread memory protection. ASPLOS 2021: 647-660 - [c34]Adil Ahmad, Juhee Kim, Jaebaek Seo, Insik Shin, Pedro Fonseca, Byoungyoung Lee:
CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs. NDSS 2021 - [c33]Sungmin Lee, Yoonkyo Jung, Jaehyun Lee, Byoungyoung Lee, Ted "Taekyoung" Kwon:
Android Remote Unlocking Service using Synthetic Password: A Hardware Security-preserving Approach. SecDev 2021: 63-70 - [c32]Jaewon Hur, Suhwan Song, Dongup Kwon, Eunjin Baek, Jangwoo Kim, Byoungyoung Lee:
DifuzzRTL: Differential Fuzz Testing to Find CPU Bugs. SP 2021: 1286-1303 - [c31]Arslan Khan, Hyungsub Kim, Byoungyoung Lee, Dongyan Xu, Antonio Bianchi, Dave (Jing) Tian:
M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles. USENIX Security Symposium 2021: 285-302 - [c30]Yoochan Lee, Changwoo Min, Byoungyoung Lee:
ExpRace: Exploiting Kernel Races through Raising Interrupts. USENIX Security Symposium 2021: 2363-2380 - [c29]Gwangmu Lee, Woochul Shim, Byoungyoung Lee:
Constraint-guided Directed Greybox Fuzzing. USENIX Security Symposium 2021: 3559-3576 - 2020
- [j3]Duc Viet Le, Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee, Aniket Kate:
A Tale of Two Trees: One Writes, and Other Reads. Proc. Priv. Enhancing Technol. 2020(2): 519-536 (2020) - [j2]Donghyun Kwon, Jiwon Seo, Yeongpil Cho, Byoungyoung Lee, Yunheung Paek:
PrOS: Light-Weight Privatized Se cure OSes in ARM TrustZone. IEEE Trans. Mob. Comput. 19(6): 1434-1447 (2020) - [c28]Seonghyun Park, Adil Ahmad, Byoungyoung Lee:
BlackMirror: Preventing Wallhacks in 3D Online FPS Games. CCS 2020: 987-1000 - [c27]Hyunyoung Oh, Adil Ahmad, Seonghyun Park, Byoungyoung Lee, Yunheung Paek:
TRUSTORE: Side-Channel Resistant Storage for SGX using Intel Hybrid CPU-FPGA. CCS 2020: 1903-1918 - [c26]Kyungtae Kim, Chung Hwan Kim, Junghwan John Rhee, Xiao Yu, Haifeng Chen, Dave (Jing) Tian, Byoungyoung Lee:
Vessels: efficient and scalable deep learning prediction on trusted processors. SoCC 2020: 462-476 - [c25]Kyungtae Kim, Dae R. Jeong, Chung Hwan Kim, Yeongjin Jang, Insik Shin, Byoungyoung Lee:
HFL: Hybrid Fuzzing on the Linux Kernel. NDSS 2020 - [c24]Suhwan Song, Chengyu Song, Yeongjin Jang, Byoungyoung Lee:
CrFuzz: fuzzing multi-purpose programs through input validation. ESEC/SIGSOFT FSE 2020: 690-700
2010 – 2019
- 2019
- [c23]Yuseok Jeon, Junghwan Rhee, Chung Hwan Kim, Zhichun Li, Mathias Payer, Byoungyoung Lee, Zhenyu Wu:
PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications. CODASPY 2019: 209-220 - [c22]Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, Insik Shin, Byoungyoung Lee:
OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX. NDSS 2019 - [c21]Dae R. Jeong, Kyungtae Kim, Basavesh Shivakumar, Byoungyoung Lee, Insik Shin:
Razzer: Finding Kernel Race Bugs through Fuzzing. IEEE Symposium on Security and Privacy 2019: 754-768 - [c20]Donghyun Kwon, Jangseop Shin, Giyeol Kim, Byoungyoung Lee, Yeongpil Cho, Yunheung Paek:
uXOM: Efficient eXecute-Only Memory on ARM Cortex-M. USENIX Security Symposium 2019: 231-247 - [c19]Mingxue Zhang, Wei Meng, Sangho Lee, Byoungyoung Lee, Xinyu Xing:
All Your Clicks Belong to Me: Investigating Click Interception on the Web. USENIX Security Symposium 2019: 941-957 - [i2]Wookhyun Han, Md. Lutfor Rahman, Yuxuan Chen, Chengyu Song, Byoungyoung Lee, Insik Shin:
SynFuzz: Efficient Concolic Execution via Branch Condition Synthesis. CoRR abs/1905.09532 (2019) - [i1]Duc Viet Le, Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee, Aniket Kate:
A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains. CoRR abs/1909.01531 (2019) - 2018
- [c18]Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, Byoungyoung Lee:
OBLIVIATE: A Data Oblivious Filesystem for Intel SGX. NDSS 2018 - [c17]Wookhyun Han, Byunggill Joe, Byoungyoung Lee, Chengyu Song, Insik Shin:
Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing. NDSS 2018 - [c16]Chung Hwan Kim, Taegyu Kim, Hongjun Choi, Zhongshu Gu, Byoungyoung Lee, Xiangyu Zhang, Dongyan Xu:
Securing Real-Time Microcontroller Systems through Customized Memory View Switching. NDSS 2018 - 2017
- [b1]Byoungyoung Lee:
Protecting computer systems through eliminating or analyzing vulnerabilities. Georgia Institute of Technology, Atlanta, GA, USA, 2017 - [c15]Yuseok Jeon, Priyam Biswas, Scott A. Carr, Byoungyoung Lee, Mathias Payer:
HexType: Efficient Detection of Type Confusion Errors for C++. CCS 2017: 2373-2387 - [c14]Jaebaek Seo, Byoungyoung Lee, Seong Min Kim, Ming-Wei Shih, Insik Shin, Dongsu Han, Taesoo Kim:
SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs. NDSS 2017 - [c13]Su Yong Kim, Sangho Lee, Insu Yun, Wen Xu, Byoungyoung Lee, Youngtae Yun, Taesoo Kim:
CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems. USENIX ATC 2017: 689-701 - 2016
- [j1]Meng Xu, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee, Chenxiong Qian, Sangho Lee, Taesoo Kim:
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques. ACM Comput. Surv. 49(2): 38:1-38:47 (2016) - [c12]Chengyu Song, Byoungyoung Lee, Kangjie Lu, William Harris, Taesoo Kim, Wenke Lee:
Enforcing Kernel Security Invariants with Data Flow Integrity. NDSS 2016 - [c11]Chengyu Song, Hyungon Moon, Monjur Alam, Insu Yun, Byoungyoung Lee, Taesoo Kim, Wenke Lee, Yunheung Paek:
HDFI: Hardware-Assisted Data-Flow Isolation. IEEE Symposium on Security and Privacy 2016: 1-17 - [c10]Sanidhya Kashyap, Changwoo Min, Byoungyoung Lee, Taesoo Kim, Pavel Emelyanov:
Instant OS Updates via Userspace Checkpoint-and-Restart. USENIX ATC 2016: 605-619 - [c9]Wei Meng, Byoungyoung Lee, Xinyu Xing, Wenke Lee:
TrackMeOrNot: Enabling Flexible Control on Web Tracking. WWW 2016: 99-109 - 2015
- [c8]Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee:
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks. CCS 2015: 280-291 - [c7]Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Long Lu, Wenke Lee:
Preventing Use-after-free with Dangling Pointers Nullification. NDSS 2015 - [c6]Changwoo Min, Sanidhya Kashyap, Byoungyoung Lee, Chengyu Song, Taesoo Kim:
Cross-checking semantic correctness: the case of finding file system bugs. SOSP 2015: 361-377 - [c5]Byoungyoung Lee, Chengyu Song, Taesoo Kim, Wenke Lee:
Type Casting Verification: Stopping an Emerging Attack Vector. USENIX Security Symposium 2015: 81-96 - [c4]Xinyu Xing, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci, Wenke Lee:
Understanding Malvertising Through Ad-Injecting Browser Extensions. WWW 2015: 1286-1295 - 2014
- [c3]Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, Wenke Lee:
From Zygote to Morula: Fortifying Weakened ASLR on Android. IEEE Symposium on Security and Privacy 2014: 424-439 - 2011
- [c2]Byoungyoung Lee, Jinoh Oh, Hwanjo Yu, Jong Kim:
Protecting location privacy using location semantics. KDD 2011: 1289-1297 - 2010
- [c1]Byoungyoung Lee, Yuna Kim, Jong Kim:
binOb+: a framework for potent and stealthy binary obfuscation. AsiaCCS 2010: 271-281
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint