Dokyung Song

Orcid: 0000-0002-9371-4701

According to our database1, Dokyung Song authored at least 13 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ERASan: Efficient Rust Address Sanitizer.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
ReUSB: Replay-Guided USB Driver Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
FAM: Featuring Android Malware for Deep Learning-Based Familial Analysis.
IEEE Access, 2022

GuardiaNN: Fast and Secure On-Device Inference in TrustZone Using Embedded SRAM and Cryptographic Hardware.
Proceedings of the Middleware '22: 23rd International Middleware Conference, Quebec, QC, Canada, November 7, 2022

Improving cross-platform binary analysis using representation learning via graph alignment.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

2021
dMVX: Secure and Efficient Multi-Variant Execution in a Distributed Setting.
Proceedings of the EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, 2021

2020
Precise and Efficient Dynamic Analysis of Systems Software.
PhD thesis, 2020

Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints.
Proceedings of the 29th USENIX Security Symposium, 2020

Distributed Heterogeneous N-Variant Execution.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

2019
DMON: A Distributed Heterogeneous N-Variant System.
CoRR, 2019

SoK: Sanitizing for Security.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
PartiSan: Fast and Flexible Sanitization via Run-Time Partitioning.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018


  Loading...