Follow
kangkook Jee
kangkook Jee
Assistant professor, University of Texas at Dallas
Verified email at utdallas.edu - Homepage
Title
Cited by
Cited by
Year
libdft: Practical dynamic data flow tracking for commodity systems
VP Kemerlis, G Portokalidis, K Jee, AD Keromytis
Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution …, 2012
2782012
Nodoze: Combatting threat alert fatigue with automated provenance triage
WU Hassan, S Guo, D Li, Z Chen, K Jee, Z Li, A Bates
network and distributed systems security symposium, 2019
1452019
Towards a Timely Causality Analysis for Enterprise Security.
Y Liu, M Zhang, D Li, K Jee, Z Li, Z Wu, J Rhee, P Mittal
NDSS, 2018
1262018
High fidelity data reduction for big data security dependency analyses
Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
1212016
ShadowReplica: efficient parallelization of dynamic data flow tracking
K Jee, VP Kemerlis, AD Keromytis, G Portokalidis
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
842013
{SAQL}: A stream-based query system for real-time abnormal system behavior detection
P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
27th {USENIX} security symposium ({USENIX} security 18), 639-656, 2018
832018
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware.
K Jee, G Portokalidis, VP Kemerlis, S Ghosh, DI August, AD Keromytis
NDSS, 2012
782012
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ...
NDSS, 2020
662020
{AIQL}: Enabling efficient attack investigation from system monitoring data
P Gao, X Xiao, Z Li, F Xu, SR Kulkarni, P Mittal
2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 113-126, 2018
662018
Nodemerge: Template based efficient data reduction for big-data causality analysis
Y Tang, D Li, Z Li, M Zhang, K Jee, X Xiao, Z Wu, J Rhee, F Xu, Q Li
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
622018
IntFlow: improving the accuracy of arithmetic error detection using information flow tracking
M Pomonis, T Petsios, K Jee, M Polychronakis, AD Keromytis
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
232014
Countering Malicious Processes with Process-DNS Association.
S Sivakorn, K Jee, Y Sun, L Korts-Pärn, Z Li, C Lumezanu, Z Wu, LA Tang, ...
NDSS, 2019
142019
SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression.
P Fei, Z Li, Z Wang, X Yu, D Li, K Jee
USENIX Security Symposium, 2987-3004, 2021
132021
Template based data reduction for security related information flow data
D Li, K Jee, LI Zhichun, M Zhang, Z Wu
US Patent 10,733,149, 2020
112020
Evolving advanced persistent threat detection using provenance graph and metric learning
G Ayoade, KA Akbar, P Sahoo, Y Gao, A Agarwal, K Jee, L Khan, ...
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
92020
Intrusion detection using efficient system dependency analysis
Z Wu, LI Zhichun, J Rhee, F Xu, G Jiang, K Jee, X Xiao, Z Xu
US Patent App. 15/416,462, 2017
92017
{Back-Propagating} System Dependency Impact for Attack Investigation
P Fang, P Gao, C Liu, E Ayday, K Jee, T Wang, YF Ye, Z Liu, X Xiao
31st USENIX Security Symposium (USENIX Security 22), 2461-2478, 2022
82022
Host behavior and network analytics based automotive secure gateway
J Rhee, H Li, HAO Shuai, CH Kim, Z Wu, LI Zhichun, K Jee, L Korts-Parn
US Patent 10,931,635, 2021
82021
This is why we can’t cache nice things: Lightning-fast threat hunting using suspicion-based hierarchical storage
WU Hassan, D Li, K Jee, X Yu, K Zou, D Wang, Z Chen, Z Li, J Rhee, ...
Annual Computer Security Applications Conference, 165-178, 2020
82020
A query system for efficiently investigating complex attack behaviors for enterprise security
P Gao, X Xiao, Z Li, K Jee, F Xu, SR Kulkarni, P Mittal
arXiv preprint arXiv:1810.03464, 2018
82018
The system can't perform the operation now. Try again later.
Articles 1–20