Follow
Byoungyoung Lee
Byoungyoung Lee
Verified email at snu.ac.kr - Homepage
Title
Cited by
Cited by
Year
SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs
J Seo, B Lee, S Kim, MW Shih, I Shin, Han, T Kim
Proceedings of the 2017 Annual Network and Distributed System Security …, 2017
2002017
ASLR-Guard: Stopping address space leakage for code reuse attacks
K Lu, C Song, B Lee, SP Chung, T Kim, W Lee
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
1582015
Preventing Use-after-free with Dangling Pointers Nullification.
B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee
Proceedings of the 2015 Annual Network and Distributed System Security …, 2015
1512015
Protecting location privacy using location semantics
B Lee, J Oh, H Yu, J Kim
Proceedings of the 17th ACM SIGKDD international conference on Knowledge …, 2011
1412011
Enforcing Kernel Security Invariants with Data Flow Integrity.
C Song, B Lee, K Lu, W Harris, T Kim, W Lee
Proceedings of the 2016 Annual Network and Distributed System Security …, 2016
1242016
HDFI: Hardware-assisted data-flow isolation
C Song, H Moon, M Alam, I Yun, B Lee, T Kim, W Lee, Y Paek
2016 IEEE Symposium on Security and Privacy (SP), 1-17, 2016
1202016
OBLIVIATE: A Data Oblivious File System for Intel SGX
A Ahmad, K Kim, MI Sarfaraz, B Lee
Proceedings of the 2018 Annual Network and Distributed System Security …, 2018
1172018
Understanding malvertising through ad-injecting browser extensions
X Xing, W Meng, B Lee, U Weinsberg, A Sheth, R Perdisci, W Lee
Proceedings of the 24th international conference on world wide web, 1286-1295, 2015
982015
Cross-checking semantic correctness: The case of finding file system bugs
C Min, S Kashyap, B Lee, C Song, T Kim
Proceedings of the 25th Symposium on Operating Systems Principles, 361-377, 2015
952015
Toward engineering a secure android ecosystem: A survey of existing techniques
M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ...
ACM Computing Surveys (CSUR) 49 (2), 1-47, 2016
892016
Razzer: Finding Kernel Race Bugs through Fuzzing
DR Jeong, K Kim, B Shivakumar, B Lee, I Shin
Security and Privacy (SP), 2019 IEEE Symposium on, 2019
872019
Securing Real-Time Microcontroller Systems through Customized Memory View Switching
CH Kim, T Kim, H Choi, Z Gu, B Lee, X Zhang, D Xu
Proceedings of the 2018 Annual Network and Distributed System Security …, 2018
802018
Type Casting Verification: Stopping an Emerging Attack Vector
B Lee, C Song, T Kim, W Lee
24th USENIX Security Symposium (USENIX Security 15), 2015
782015
From zygote to morula: Fortifying weakened aslr on android
B Lee, L Lu, T Wang, T Kim, W Lee
2014 IEEE Symposium on Security and Privacy, 424-439, 2014
712014
HFL: Hybrid Fuzzing on the Linux Kernel
K Kim, DR Jeong, CH Kim, Y Jang, I Shin, B Lee
NDSS, 2020
502020
Hextype: Efficient detection of type confusion errors for c++
Y Jeon, P Biswas, S Carr, B Lee, M Payer
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
482017
Obfuscuro: A commodity obfuscation engine on intel sgx
A Ahmad, B Joe, Y Xiao, Y Zhang, I Shin, B Lee
Network and Distributed System Security Symposium, 2019
472019
{CAB-Fuzz}: Practical Concolic Testing Techniques for {COTS} Operating Systems
SY Kim, S Lee, I Yun, W Xu, B Lee, Y Yun, T Kim
2017 USENIX Annual Technical Conference (USENIX ATC 17), 689-701, 2017
452017
Instant {OS} Updates via Userspace {Checkpoint-and-Restart}
S Kashyap, C Min, B Lee, T Kim, P Emelyanov
2016 USENIX Annual Technical Conference (USENIX ATC 16), 605-619, 2016
342016
{uXOM}: Efficient {eXecute-Only} Memory on {ARM}{Cortex-M}
D Kwon, J Shin, G Kim, B Lee, Y Cho, Y Paek
28th USENIX Security Symposium (USENIX Security 19), 231-247, 2019
242019
The system can't perform the operation now. Try again later.
Articles 1–20