default search action
Junghwan Rhee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Fei Zuo, Junghwan Rhee:
Vulnerability discovery based on source code patch commit mining: a systematic literature review. Int. J. Inf. Sec. 23(2): 1513-1526 (2024) - [c55]Kunal Mukherjee, Joshua Wiedemeier, Qi Wang, Junpei Kamimura, Junghwan John Rhee, James Wei, Zhichun Li, Xiao Yu, Lu-An Tang, Jiaping Gui, Kangkook Jee:
ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security. ACNS (3) 2024: 241-268 - [c54]Xianshan Qu, Fei Zuo, Xiaopeng Li, Junghwan Rhee:
Context Matters: Investigating Its Impact on ChatGPT's Bug Fixing Performance. SERA 2024: 17-23 - [c53]Chijung Jung, Yung Ryn Choe, Junghwan Rhee, Yonghwi Kwon:
Automatic Configurator to Prevent Attacks for Azure Cloud System. SERA 2024: 174-181 - 2023
- [j4]Madhukar Shrestha, Yonghyun Kim, Jeehyun Oh, Junghwan John Rhee, Yung Ryn Choe, Fei Zuo, Myungah Park, Gang Qian:
ProvSec: Open Cybersecurity System Provenance Analysis Benchmark Dataset with Labels. Int. J. Networked Distributed Comput. 11(2): 112-123 (2023) - [c52]Fei Zuo, Junghwan Rhee, Myung-Ah Park, Gang Qian:
PowerGrader: Automating Code Assessment Based on PowerShell for Programming Courses. SERA 2023: 2-7 - [c51]Fei Zuo, Xin Zhang, Yuqi Song, Junghwan Rhee, Jicheng Fu:
Commit Message Can Help: Security Patch Detection in Open Source Software via Transformer. SERA 2023: 345-351 - [c50]Madhukar Shrestha, Yonghyun Kim, Jeehyun Oh, Junghwan Rhee, Yung Ryn Choe, Fei Zuo, Myungah Park, Gang Qian:
ProvSec: Cybersecurity System Provenance Analysis Benchmark Dataset. SERA 2023: 352-357 - [c49]Fei Zuo, Junghwan Rhee, Yonghyun Kim, Jeehyun Oh, Gang Qian:
A Comprehensive Dataset Towards Hands-on Experience Enhancement in a Research-Involved Cybersecurity Program. SIGITE 2023: 118-124 - [i5]Fei Zuo, Junghwan Rhee, Myungah Park, Gang Qian:
Designing a Security System Administration Course for Cybersecurity with a Companion Project. CoRR abs/2309.01839 (2023) - 2022
- [c48]Sungwoo Kim, Gisu Yeo, Taegyu Kim, Junghwan John Rhee, Yuseok Jeon, Antonio Bianchi, Dongyan Xu, Dave (Jing) Tian:
ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs. AsiaCCS 2022: 534-545 - [c47]Seulbae Kim, Major Liu, Junghwan John Rhee, Yuseok Jeon, Yonghwi Kwon, Chung Hwan Kim:
DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing. CCS 2022: 1753-1767 - [c46]Junheng Hao, Lu-An Tang, Yizhou Sun, Zhengzhang Chen, Haifeng Chen, Junghwan Rhee, Zhichuan Li, Wei Wang:
Multi-source Inductive Knowledge Graph Transfer. ECML/PKDD (2) 2022: 155-171 - [e1]Juyeon Jo, Yeong-Tae Song, Lin Deng, Junghwan John Rhee:
20th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2022, Las Vegas, NV, USA, May 25-27, 2022. IEEE 2022, ISBN 978-1-6654-8350-6 [contents] - [i4]Seulbae Kim, Major Liu, Junghwan John Rhee, Yuseok Jeon, Yonghwi Kwon, Chung Hwan Kim:
DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing. CoRR abs/2211.01829 (2022) - 2021
- [c45]Yue Li, Zhenyu Wu, Haining Wang, Kun Sun, Zhichun Li, Kangkook Jee, Junghwan Rhee, Haifeng Chen:
UTrack: Enterprise User Tracking Based on OS-Level Audit Logs. CODASPY 2021: 161-172 - [c44]Omid Setayeshfar, Junghwan John Rhee, Chung Hwan Kim, Kyu Hyung Lee:
Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races. DIMVA 2021: 215-236 - [c43]Taegyu Kim, Vireshwar Kumar, Junghwan Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, Dave (Jing) Tian:
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications. USENIX Security Symposium 2021: 249-266 - [c42]Xueyuan Han, Xiao Yu, Thomas F. J.-M. Pasquier, Ding Li, Junghwan Rhee, James W. Mickens, Margo I. Seltzer, Haifeng Chen:
SIGL: Securing Software Installations Through Deep Graph Learning. USENIX Security Symposium 2021: 2345-2362 - 2020
- [j3]Sungjin Park, Chung Hwan Kim, Junghwan Rhee, Jong-Jin Won, Taisook Han, Dongyan Xu:
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality. IEEE Trans. Dependable Secur. Comput. 17(4): 883-897 (2020) - [c41]Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Dawei Wang, Zhengzhang Chen, Zhichun Li, Junghwan Rhee, Jiaping Gui, Adam Bates:
This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage. ACSAC 2020: 165-178 - [c40]Kyungtae Kim, Chung Hwan Kim, Junghwan John Rhee, Xiao Yu, Haifeng Chen, Dave (Jing) Tian, Byoungyoung Lee:
Vessels: efficient and scalable deep learning prediction on trusted processors. SoCC 2020: 462-476 - [c39]Yixin Sun, Kangkook Jee, Suphannee Sivakorn, Zhichun Li, Cristian Lumezanu, Lauri Korts-Pärn, Zhenyu Wu, Junghwan Rhee, Chung Hwan Kim, Mung Chiang, Prateek Mittal:
Detecting Malware Injection with Program-DNS Behavior. EuroS&P 2020: 552-568 - [c38]Jiaping Gui, Ding Li, Zhengzhang Chen, Junghwan Rhee, Xusheng Xiao, Mu Zhang, Kangkook Jee, Zhichun Li, Haifeng Chen:
APTrace: A Responsive System for Agile Enterprise Level Causality Analysis. ICDE 2020: 1701-1712 - [c37]Qi Wang, Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Junghwan Rhee, Zhengzhang Chen, Wei Cheng, Carl A. Gunter, Haifeng Chen:
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. NDSS 2020 - [c36]Pengyang Wang, Jiaping Gui, Zhengzhang Chen, Junghwan Rhee, Haifeng Chen, Yanjie Fu:
A Generic Edge-Empowered Graph Convolutional Network via Node-Edge Mutual Enhancement. WWW 2020: 2144-2154 - [i3]Xueyuan Han, Xiao Yu, Thomas F. J.-M. Pasquier, Ding Li, Junghwan Rhee, James Mickens, Margo I. Seltzer, Haifeng Chen:
SIGL: Securing Software Installations Through Deep Graph Learning. CoRR abs/2008.11533 (2020)
2010 – 2019
- 2019
- [c35]Yuseok Jeon, Junghwan Rhee, Chung Hwan Kim, Zhichun Li, Mathias Payer, Byoungyoung Lee, Zhenyu Wu:
PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications. CODASPY 2019: 209-220 - [c34]Qiang Zeng, Golam Kayas, Emil Mohammed, Lannan Luo, Xiaojiang Du, Junghwan Rhee:
HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding. DSN 2019: 530-542 - [c33]Shen Wang, Zhengzhang Chen, Ding Li, Zhichun Li, Lu-An Tang, Jingchao Ni, Junghwan Rhee, Haifeng Chen, Philip S. Yu:
Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification. SDM 2019: 693-701 - [c32]Taegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, Dongyan Xu:
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing. USENIX Security Symposium 2019: 425-442 - 2018
- [c31]Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Xusheng Xiao, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, Qun Li:
NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis. CCS 2018: 1324-1337 - [c30]Yushan Liu, Mu Zhang, Ding Li, Kangkook Jee, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Prateek Mittal:
Towards a Timely Causality Analysis for Enterprise Security. NDSS 2018 - [i2]Shen Wang, Zhengzhang Chen, Ding Li, Lu-An Tang, Jingchao Ni, Zhichun Li, Junghwan Rhee, Haifeng Chen, Philip S. Yu:
Deep Program Reidentification: A Graph Neural Network Solution. CoRR abs/1812.04064 (2018) - [i1]Qiang Zeng, Golam Kayas, Emil Mohammed, Lannan Luo, Xiaojiang Du, Junghwan Rhee:
Code-less Patching for Heap Vulnerabilities Using Targeted Calling Context Encoding. CoRR abs/1812.04191 (2018) - 2017
- [c29]Chonghua Wang, Shiqing Ma, Xiangyu Zhang, Junghwan Rhee, Xiaochun Yun, Zhiyu Hao:
A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware. SecureComm 2017: 778-792 - 2016
- [c28]Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, Guofei Jiang:
High Fidelity Data Reduction for Big Data Security Dependency Analyses. CCS 2016: 504-516 - [c27]Hongteng Xu, Xia Ning, Hui Zhang, Junghwan Rhee, Guofei Jiang:
PInfer: Learning to Infer Concurrent Request Paths from System Kernel Events. ICAC 2016: 199-208 - [c26]Yangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang:
Detecting Stack Layout Corruptions with Robust Stack Unwinding. RAID 2016: 71-94 - [c25]Chung Hwan Kim, Junghwan Rhee, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
PerfGuard: binary-centric application performance monitoring in production environments. SIGSOFT FSE 2016: 595-606 - 2015
- [c24]Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu:
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows. ACSAC 2015: 401-410 - [c23]Jun Wang, Zhiyun Qian, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Xia Ning, Peng Liu, Guofei Jiang:
Discover and Tame Long-running Idling Processes in Enterprise Systems. AsiaCCS 2015: 543-554 - [c22]Chung Hwan Kim, Sungjin Park, Junghwan Rhee, Jong-Jin Won, Taisook Han, Dongyan Xu:
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality. AsiaCCS 2015: 651-656 - 2014
- [j2]Junghwan Rhee, Ryan D. Riley, Zhiqiang Lin, Xuxian Jiang, Dongyan Xu:
Data-Centric OS Kernel Malware Characterization. IEEE Trans. Inf. Forensics Secur. 9(1): 72-87 (2014) - [c21]Qiang Zeng, Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Peng Liu:
DeltaPath: Precise and Scalable Calling Context Encoding. CGO 2014: 109 - [c20]Daniel Joseph Dean, Hiep Nguyen, Xiaohui Gu, Hui Zhang, Junghwan Rhee, Nipun Arora, Geoff Jiang:
PerfScope: Practical Online Server Performance Bug Inference in Production Cloud Computing Infrastructures. SoCC 2014: 8:1-8:13 - [c19]Hui Zhang, Junghwan Rhee, Nipun Arora, Qiang Xu, Cristian Lumezanu, Guofei Jiang:
An analytics approach to traffic analysis in network virtualization. CNSM 2014: 316-319 - [c18]Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Kenji Yoshihira:
Software system performance debugging with kernel events feature guidance. NOMS 2014: 1-5 - [c17]Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Kenji Yoshihira:
Uscope: A scalable unified tracer from kernel to user space. NOMS 2014: 1-8 - [c16]Hui Zhang, Junghwan Rhee, Nipun Arora, Sahan Gamage, Guofei Jiang, Kenji Yoshihira, Dongyan Xu:
CLUE: System trace analytics for cloud service performance diagnosis. NOMS 2014: 1-9 - [c15]Hui Zhang, Cristian Lumezanu, Junghwan Rhee, Nipun Arora, Qiang Xu, Guofei Jiang:
Enabling layer 2 pathlet tracing through context encoding in software-defined networking. HotSDN 2014: 169-174 - [c14]Chung Hwan Kim, Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Xiangyu Zhang, Dongyan Xu:
IntroPerf: transparent context-sensitive multi-layer performance inference using system stack traces. SIGMETRICS 2014: 235-247 - 2013
- [c13]Nipun Arora, Hui Zhang, Junghwan Rhee, Kenji Yoshihira, Guofei Jiang:
iProbe: A lightweight user-level dynamic instrumentation tool. ASE 2013: 742-745 - [c12]Hui Lu, Nipun Arora, Hui Zhang, Cristian Lumezanu, Junghwan Rhee, Guofei Jiang:
HybNET: network manager for a hybrid network infrastructure. Middleware (Industry Track) 2013: 6:1-6:6 - 2012
- [c11]Zhiqiang Lin, Junghwan Rhee, Chao Wu, Xiangyu Zhang, Dongyan Xu:
Discovering Semantic Data of Interest from Un-mappable Memory with Confidence. NDSS 2012 - 2011
- [b1]Junghwan Rhee:
Data-centric approaches to kernel malware defense. Purdue University, USA, 2011 - [j1]Paul Ruth, Junghwan Rhee, Dongyan Xu, Sebastien Goasguen, Rick Kennell:
Autonomic live adaptation of virtual networked environments in a multidomain infrastructure. J. Internet Serv. Appl. 2(2): 141-154 (2011) - [c10]Junghwan Rhee, Zhiqiang Lin, Dongyan Xu:
Characterizing kernel malware behavior with kernel data access patterns. AsiaCCS 2011: 207-216 - [c9]Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, Xuxian Jiang:
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures. NDSS 2011 - 2010
- [c8]Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang:
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory. RAID 2010: 178-197 - [c7]Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, Jinku Li, Deepa Srinivasan, Junghwan Rhee, Dongyan Xu:
DKSM: Subverting Virtual Machine Introspection for Fun and Profit. SRDS 2010: 82-91
2000 – 2009
- 2009
- [c6]Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang:
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring. ARES 2009: 74-81 - [c5]Junghwan Rhee, Andrzej Kochut, Kirk A. Beaty:
DeskBench: Flexible virtual desktop benchmarking toolkit. Integrated Network Management 2009: 622-629 - 2006
- [c4]Dongyan Xu, Paul Ruth, Junghwan Rhee, Rick Kennell, Sebastien Goasguen:
Autonomic Adaptation of Virtual Distributed Environments in a Multi-Domain Infrastructure. HPDC 2006: 317-320 - [c3]Paul Ruth, Junghwan Rhee, Dongyan Xu, Rick Kennell, Sebastien Goasguen:
Autonomic Live Adaptation of Virtual Computational Environments in a Multi-Domain Infrastructure. ICAC 2006: 5-14 - 2005
- [c2]Andrew Ayers, Richard Schooler, Chris Metcalf, Anant Agarwal, Junghwan Rhee, Emmett Witchel:
TraceBack: first fault diagnosis by reconstruction of distributed control flow. PLDI 2005: 201-212 - [c1]Emmett Witchel, Junghwan Rhee, Krste Asanovic:
Mondrix: memory isolation for linux using mondriaan memory protection. SOSP 2005: 31-44
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 20:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint