Junghwan Rhee
Orcid: 0000-0002-4043-9371
According to our database1,
Junghwan Rhee
authored at least 64 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Vulnerability discovery based on source code patch commit mining: a systematic literature review.
Int. J. Inf. Sec., April, 2024
BinSimDB: Benchmark Dataset Construction for Fine-Grained Binary Code Similarity Analysis.
CoRR, 2024
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering Research, 2024
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering Research, 2024
Proceedings of the Applied Cryptography and Network Security, 2024
2023
ProvSec: Open Cybersecurity System Provenance Analysis Benchmark Dataset with Labels.
Int. J. Networked Distributed Comput., December, 2023
Designing a Security System Administration Course for Cybersecurity with a Companion Project.
CoRR, 2023
A Comprehensive Dataset Towards Hands-on Experience Enhancement in a Research-Involved Cybersecurity Program.
Proceedings of the 24th Annual Conference on Information Technology Education, 2023
Commit Message Can Help: Security Patch Detection in Open Source Software via Transformer.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023
2022
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022
DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
2020
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality.
IEEE Trans. Dependable Secur. Comput., 2020
A Generic Edge-Empowered Graph Convolutional Network via Node-Edge Mutual Enhancement.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the SoCC '20: ACM Symposium on Cloud Computing, 2020
This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing.
Proceedings of the 28th USENIX Security Symposium, 2019
Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification.
Proceedings of the 2019 SIAM International Conference on Data Mining, 2019
HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
2018
CoRR, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware.
Proceedings of the Security and Privacy in Communication Networks, 2017
2016
PerfGuard: binary-centric application performance monitoring in production environments.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the 2016 IEEE International Conference on Autonomic Computing, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
IntroPerf: transparent context-sensitive multi-layer performance inference using system stack traces.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014
Enabling layer 2 pathlet tracing through context encoding in software-defined networking.
Proceedings of the third workshop on Hot topics in software defined networking, 2014
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014
Proceedings of the 10th International Conference on Network and Service Management, 2014
PerfScope: Practical Online Server Performance Bug Inference in Production Cloud Computing Infrastructures.
Proceedings of the ACM Symposium on Cloud Computing, 2014
Proceedings of the 12th Annual IEEE/ACM International Symposium on Code Generation and Optimization, 2014
2013
Proceedings of the Industrial Track of the 14th ACM/IFIP/USENIX International Middleware Conference, 2013
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013
2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
2011
Autonomic live adaptation of virtual networked environments in a multidomain infrastructure.
J. Internet Serv. Appl., 2011
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
2009
Proceedings of the Integrated Network Management, 2009
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring.
Proceedings of the The Forth International Conference on Availability, 2009
2006
Autonomic Live Adaptation of Virtual Computational Environments in a Multi-Domain Infrastructure.
Proceedings of the 3rd International Conference on Autonomic Computing, 2006
Autonomic Adaptation of Virtual Distributed Environments in a Multi-Domain Infrastructure.
Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, 2006
2005
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005
Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, 2005