Sangho Lee

Orcid: 0000-0002-0412-7768

Affiliations:
  • Microsoft Research, Redmond, WA, USA
  • Georgia Institute of Technology, USA (former)
  • POSTECH Pohang, Korea (former)


According to our database1, Sangho Lee authored at least 49 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Spacelord: Private and Secure Smart Space Sharing.
DTRAP, 2024

2023
Memory Protection Keys: Facts, Key Extension Perspectives, and Discussions.
IEEE Secur. Priv., 2023

Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability.
Proceedings of the 32nd USENIX Security Symposium, 2023

APRON: Authenticated and Progressive System Image Renovation.
Proceedings of the 2023 USENIX Annual Technical Conference, 2023

Hacksaw: Hardware-Centric Kernel Debloating via Device Inventory and Dependency Analysis.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Mitigating Low-volume DoS Attacks with Data-driven Resource Accounting.
CoRR, 2022

PRIDWEN: Universally Hardening SGX Programs via Load-Time Synthesis.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

HARDLOG: Practical Tamper-Proof System Auditing Using a Novel Audit Device.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

DeView: Confining Progressive Web Applications by Debloating Web APIs.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Kard: lightweight data race detection with per-thread memory protection.
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021

2019
All Your Clicks Belong to Me: Investigating Click Interception on the Web.
Proceedings of the 28th USENIX Security Symposium, 2019

libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK).
Proceedings of the 2019 USENIX Annual Technical Conference, 2019

Dominance as a New Trusted Computing Primitive for the Internet of Things.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
libmpk: Software Abstraction for Intel Memory Protection Keys.
CoRR, 2018

Prevention of cross-update privacy leaks on android.
Comput. Sci. Inf. Syst., 2018

QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.
Proceedings of the 27th USENIX Security Symposium, 2018

Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.
Proceedings of the 27th USENIX Security Symposium, 2018

Multi-stage Dynamic Information Flow Tracking Game.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

DIFT Games: Dynamic Information Flow Tracking Games for Advanced Persistent Threats.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

2017
Leaking Uninitialized Secure Enclave Memory via Structure Padding (Extended Abstract).
CoRR, 2017

Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.
Proceedings of the 26th USENIX Security Symposium, 2017

CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

SGX-Bomb: Locking Down the Processor via Rowhammer Attack.
Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, 2017

FACT: Functionality-centric Access Control System for IoT Programming Frameworks.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata.
IEEE Trans. Dependable Secur. Comput., 2016

Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques.
ACM Comput. Surv., 2016

Preserving source- and sink-location privacy in sensor networks.
Comput. Sci. Inf. Syst., 2016

RecProv: Towards Provenance-Aware User Space Record and Replay.
Proceedings of the Provenance and Annotation of Data and Processes, 2016

Breaking Kernel Address Space Layout Randomization with Intel TSX.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Inferring browser activity and status through remote monitoring of storage usage.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Identifying Cross-origin Resource Status Using Application Cache.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Early filtering of ephemeral malicious accounts on Twitter.
Comput. Commun., 2014

Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Exploring and mitigating privacy threats of HTML5 geolocation API.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream.
IEEE Trans. Dependable Secur. Comput., 2013

Fluxing botnet command and control channels with URL shortening services.
Comput. Commun., 2013

I know the shortened URLs you clicked on Twitter: inference attack using public click analytics and Twitter metadata.
Proceedings of the 22nd International World Wide Web Conference, 2013

Punobot: Mobile Botnet Using Push Notification Service in Android.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

2012
DRMFS: A file system layer for transparent access semantics of DRM-protected contents.
J. Syst. Softw., 2012

Distance Bounding with Delayed Responses.
IEEE Commun. Lett., 2012

WarningBird: Detecting Suspicious URLs in Twitter Stream.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Spam Filtering in Twitter Using Sender-Receiver Relationship.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

A batch rekeying time decision algorithm for IPTV systems.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
A secure and mutual-profitable DRM interoperability scheme.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

2009
Security weakness of Tseng's fault-tolerant conference-key agreement protocol.
J. Syst. Softw., 2009

Redistributing time-based rights between consumer devices for content sharing in DRM system.
Int. J. Inf. Sec., 2009


  Loading...