Byoungyoung Lee

Orcid: 0000-0001-7746-0572

According to our database1, Byoungyoung Lee authored at least 57 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution.
CoRR, 2024

A Secure, Fast, and Resource-Efficient Serverless Platform with Function REWIND.
Proceedings of the 2024 USENIX Annual Technical Conference, 2024

OZZ: Identifying Kernel Out-of-Order Concurrency Bugs with In-Vivo Memory Access Reordering.
Proceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles, 2024

SyzRisk: A Change-Pattern-Based Continuous Kernel Regression Fuzzer.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique.
Proceedings of the 32nd USENIX Security Symposium, 2023

Extending a Hand to Attackers: Browser Privilege Escalation Attacks via Extensions.
Proceedings of the 32nd USENIX Security Symposium, 2023

SegFuzz: Segmentizing Thread Interleaving to Discover Kernel Concurrency Bugs through Fuzzing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Metamong: Detecting Render-Update Bugs in Web Browsers through Fuzzing.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

An Extensible Orchestration and Protection Framework for Confidential Cloud Computing.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023

Diagnosing Kernel Concurrency Failures with AITIA.
Proceedings of the Eighteenth European Conference on Computer Systems, 2023

2022
MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar Inference.
Proceedings of the 31st USENIX Security Symposium, 2022

FuzzOrigin: Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing.
Proceedings of the 31st USENIX Security Symposium, 2022

SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis.
Proceedings of the 31st USENIX Security Symposium, 2022

FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

R2Z2: Detecting Rendering Regressions in Web Browsers through Differential Fuzz Testing.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

SpecDoctor: Differential Fuzz Testing to Find Transient Execution Vulnerabilities.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Constraint-guided Directed Greybox Fuzzing.
Proceedings of the 30th USENIX Security Symposium, 2021

ExpRace: Exploiting Kernel Races through Raising Interrupts.
Proceedings of the 30th USENIX Security Symposium, 2021

M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles.
Proceedings of the 30th USENIX Security Symposium, 2021

DifuzzRTL: Differential Fuzz Testing to Find CPU Bugs.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Android Remote Unlocking Service using Synthetic Password: A Hardware Security-preserving Approach.
Proceedings of the IEEE Secure Development Conference, 2021

CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Kard: lightweight data race detection with per-thread memory protection.
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021

2020
PrOS: Light-Weight Privatized Se cure OSes in ARM TrustZone.
IEEE Trans. Mob. Comput., 2020

A Tale of Two Trees: One Writes, and Other Reads.
Proc. Priv. Enhancing Technol., 2020

CrFuzz: fuzzing multi-purpose programs through input validation.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

HFL: Hybrid Fuzzing on the Linux Kernel.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Vessels: efficient and scalable deep learning prediction on trusted processors.
Proceedings of the SoCC '20: ACM Symposium on Cloud Computing, 2020

BlackMirror: Preventing Wallhacks in 3D Online FPS Games.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

TRUSTORE: Side-Channel Resistant Storage for SGX using Intel Hybrid CPU-FPGA.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains.
CoRR, 2019

SynFuzz: Efficient Concolic Execution via Branch Condition Synthesis.
CoRR, 2019

All Your Clicks Belong to Me: Investigating Click Interception on the Web.
Proceedings of the 28th USENIX Security Symposium, 2019

uXOM: Efficient eXecute-Only Memory on ARM Cortex-M.
Proceedings of the 28th USENIX Security Symposium, 2019

Razzer: Finding Kernel Race Bugs through Fuzzing.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Securing Real-Time Microcontroller Systems through Customized Memory View Switching.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

OBLIVIATE: A Data Oblivious Filesystem for Intel SGX.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Protecting computer systems through eliminating or analyzing vulnerabilities.
PhD thesis, 2017

CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

HexType: Efficient Detection of Type Confusion Errors for C++.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques.
ACM Comput. Surv., 2016

TrackMeOrNot: Enabling Flexible Control on Web Tracking.
Proceedings of the 25th International Conference on World Wide Web, 2016

Instant OS Updates via Userspace Checkpoint-and-Restart.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

HDFI: Hardware-Assisted Data-Flow Isolation.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Enforcing Kernel Security Invariants with Data Flow Integrity.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Understanding Malvertising Through Ad-Injecting Browser Extensions.
Proceedings of the 24th International Conference on World Wide Web, 2015

Type Casting Verification: Stopping an Emerging Attack Vector.
Proceedings of the 24th USENIX Security Symposium, 2015

Cross-checking semantic correctness: the case of finding file system bugs.
Proceedings of the 25th Symposium on Operating Systems Principles, 2015

Preventing Use-after-free with Dangling Pointers Nullification.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
From Zygote to Morula: Fortifying Weakened ASLR on Android.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

2011
Protecting location privacy using location semantics.
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011

2010
binOb+: a framework for potent and stealthy binary obfuscation.
Proceedings of the 5th ACM Symposium on Information, 2010


  Loading...