kangkook Jee
kangkook Jee
Assistant professor, University of Texas at Dallas
Verified email at utdallas.edu - Homepage
Title
Cited by
Cited by
Year
libdft: Practical dynamic data flow tracking for commodity systems
VP Kemerlis, G Portokalidis, K Jee, AD Keromytis
Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution …, 2012
2182012
High fidelity data reduction for big data security dependency analyses
Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
742016
ShadowReplica: efficient parallelization of dynamic data flow tracking
K Jee, VP Kemerlis, AD Keromytis, G Portokalidis
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
692013
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware.
K Jee, G Portokalidis, VP Kemerlis, S Ghosh, DI August, AD Keromytis
NDSS, 2012
622012
Nodoze: Combatting threat alert fatigue with automated provenance triage
WU Hassan, S Guo, D Li, Z Chen, K Jee, Z Li, A Bates
Network and Distributed Systems Security Symposium, 2019
612019
Towards a Timely Causality Analysis for Enterprise Security.
Y Liu, M Zhang, D Li, K Jee, Z Li, Z Wu, J Rhee, P Mittal
NDSS, 2018
592018
{SAQL}: A stream-based query system for real-time abnormal system behavior detection
P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
27th {USENIX} Security Symposium ({USENIX} Security 18), 639-656, 2018
452018
{AIQL}: Enabling efficient attack investigation from system monitoring data
P Gao, X Xiao, Z Li, F Xu, SR Kulkarni, P Mittal
2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 113-126, 2018
342018
Nodemerge: Template based efficient data reduction for big-data causality analysis
Y Tang, D Li, Z Li, M Zhang, K Jee, X Xiao, Z Wu, J Rhee, F Xu, Q Li
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
252018
IntFlow: improving the accuracy of arithmetic error detection using information flow tracking
M Pomonis, T Petsios, K Jee, M Polychronakis, AD Keromytis
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
212014
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ...
NDSS, 2020
182020
Countering Malicious Processes with Process-DNS Association.
S Sivakorn, K Jee, Y Sun, L Korts-Pärn, Z Li, C Lumezanu, Z Wu, LA Tang, ...
NDSS, 2019
102019
Intrusion detection using efficient system dependency analysis
Z Wu, LI Zhichun, J Rhee, F Xu, G Jiang, K Jee, X Xiao, Z Xu
US Patent App. 15/416,462, 2017
62017
A query system for efficiently investigating complex attack behaviors for enterprise security
P Gao, X Xiao, Z Li, K Jee, F Xu, SR Kulkarni, P Mittal
arXiv preprint arXiv:1810.03464, 2018
52018
Querying streaming system monitoring data for enterprise system anomaly detection
P Gao, X Xiao, D Li, K Jee, H Chen, SR Kulkarni, P Mittal
2020 IEEE 36th International Conference on Data Engineering (ICDE), 1774-1777, 2020
42020
User-added-value-based ransomware detection and prevention
Z Wu, Y Li, J Rhee, K Jee, Z Li, J Kamimura, LA Tang, Z Chen
US Patent App. 16/379,024, 2019
32019
Host level detect mechanism for malicious DNS activities
K Jee, LI Zhichun, G Jiang, L Korts-Parn, Z Wu, Y Sun, J Rhee
US Patent 10,574,674, 2020
22020
A stream-based query system for efficiently detecting abnormal system behaviors for enterprise security
P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
arXiv preprint arXiv:1903.08159, 2019
22019
{SEAL}: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression
P Fei, Z Li, Z Wang, X Yu, D Li, K Jee
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
12021
This is Why We Can’t Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage
WU Hassan, D Li, K Jee, X Yu, K Zou, D Wang, Z Chen, Z Li, J Rhee, ...
Annual Computer Security Applications Conference, 165-178, 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–20