kangkook Jee
kangkook Jee
Assistant professor, University of Texas at Dallas
Verified email at - Homepage
Cited by
Cited by
libdft: Practical dynamic data flow tracking for commodity systems
VP Kemerlis, G Portokalidis, K Jee, AD Keromytis
Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution …, 2012
Nodoze: Combatting threat alert fatigue with automated provenance triage
WU Hassan, S Guo, D Li, Z Chen, K Jee, Z Li, A Bates
network and distributed systems security symposium, 2019
Towards a Timely Causality Analysis for Enterprise Security.
Y Liu, M Zhang, D Li, K Jee, Z Li, Z Wu, J Rhee, P Mittal
NDSS, 2018
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ...
NDSS, 2020
High fidelity data reduction for big data security dependency analyses
Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
{SAQL}: A stream-based query system for {Real-Time} abnormal system behavior detection
P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
27th USENIX Security Symposium (USENIX Security 18), 639-656, 2018
ShadowReplica: efficient parallelization of dynamic data flow tracking
K Jee, VP Kemerlis, AD Keromytis, G Portokalidis
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Nodemerge: Template based efficient data reduction for big-data causality analysis
Y Tang, D Li, Z Li, M Zhang, K Jee, X Xiao, Z Wu, J Rhee, F Xu, Q Li
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware.
K Jee, G Portokalidis, VP Kemerlis, S Ghosh, DI August, AD Keromytis
NDSS, 2012
{AIQL}: Enabling efficient attack investigation from system monitoring data
P Gao, X Xiao, Z Li, F Xu, SR Kulkarni, P Mittal
2018 USENIX Annual Technical Conference (USENIX ATC 18), 113-126, 2018
{Back-Propagating} system dependency impact for attack investigation
P Fang, P Gao, C Liu, E Ayday, K Jee, T Wang, YF Ye, Z Liu, X Xiao
31st USENIX Security Symposium (USENIX Security 22), 2461-2478, 2022
{SEAL}: Storage-efficient causality analysis on enterprise logs with query-friendly compression
P Fei, Z Li, Z Wang, X Yu, D Li, K Jee
30th USENIX Security Symposium (USENIX Security 21), 2987-3004, 2021
Template based data reduction for security related information flow data
D Li, K Jee, LI Zhichun, M Zhang, Z Wu
US Patent 10,733,149, 2020
IntFlow: improving the accuracy of arithmetic error detection using information flow tracking
M Pomonis, T Petsios, K Jee, M Polychronakis, AD Keromytis
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
This is why we can’t cache nice things: Lightning-fast threat hunting using suspicion-based hierarchical storage
WU Hassan, D Li, K Jee, X Yu, K Zou, D Wang, Z Chen, Z Li, J Rhee, ...
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
Countering Malicious Processes with Process-DNS Association.
S Sivakorn, K Jee, Y Sun, L Korts-Pärn, Z Li, C Lumezanu, Z Wu, LA Tang, ...
NDSS, 2019
Host behavior and network analytics based automotive secure gateway
J Rhee, H Li, HAO Shuai, CH Kim, Z Wu, LI Zhichun, K Jee, L Korts-Parn
US Patent 10,931,635, 2021
Evolving advanced persistent threat detection using provenance graph and metric learning
G Ayoade, KA Akbar, P Sahoo, Y Gao, A Agarwal, K Jee, L Khan, ...
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
Detecting malware injection with program-dns behavior
Y Sun, K Jee, S Sivakorn, Z Li, C Lumezanu, L Korts-Parn, Z Wu, J Rhee, ...
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 552-568, 2020
Intrusion detection using efficient system dependency analysis
Z Wu, LI Zhichun, J Rhee, F Xu, G Jiang, K Jee, X Xiao, Z Xu
US Patent App. 15/416,462, 2017
The system can't perform the operation now. Try again later.
Articles 1–20