default search action
Sangho Lee 0001
Person information
- affiliation: Microsoft Research, Redmond, WA, USA
- affiliation (former): Georgia Institute of Technology, USA
- affiliation (former): POSTECH Pohang, Korea
- not to be confused with: Sangho Lee 0005
Other persons with the same name
- Sangho Lee — disambiguation page
- Sangho Lee 0002 — Electron. Telecommun. Res. Inst. (ETRI), Daejeon, South Korea
- Sangho Lee 0003 — Atto Research Korea, Seoul, South Korea
- Sangho Lee 0004 — Gwangju Institute of Science and Technology (GIST), Gwangju, Korea
- Sangho Lee 0005 — Georgia Institute of Technology, USA
- Sangho Lee 0006 — Korea Institute of Science and Technology Information, Software Research Center, Daejeon, South Korea
- Sangho Lee 0007 — Sungkyunkwan University, Department of Chemistry, Suwon, South Korea (and 1 more)
- Sangho Lee 0008 — Allen Institute for AI (Ai2), Seattle, WA, USA
Other persons with a similar name
- Sang-Ho Lee (aka: Sang Ho Lee) — disambiguation page
- Sang Ho Lee 0001 (aka: Sang-Ho Lee 0001) — Johns Hopkins University, School of Medicine, Baltimore, MD, USA
- Sang Ho Lee 0002 (aka: Sang-Ho Lee 0002) — Chungbuk National University, Department of Computer Science, Chungbuk, Korea
- Sang Ho Lee 0003 (aka: Sang-Ho Lee 0003) — Kyungpook National University, Daegu, South Korea
- Sang Ho Lee 0004 (aka: Sang-Ho Lee 0004) — Soongsil University, Seoul, Korea
- Sang Ho Lee 0005 (aka: Sang-Ho Lee 0005) — Yonsei University, Department of Civil & Environmental Engineering, Seoul, Korea
- Sang Ho Lee 0006 (aka: Sang-Ho Lee 0006) — Kyungsung University, School of Digital Media, Busan Metropolitan City, Korea
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Yechan Bae, Sarbartha Banerjee, Sangho Lee, Marcus Peinado:
Spacelord: Private and Secure Smart Space Sharing. DTRAP 5(2): 14:1-14:27 (2024) - 2023
- [j12]Soyeon Park, Sangho Lee, Taesoo Kim:
Memory Protection Keys: Facts, Key Extension Perspectives, and Discussions. IEEE Secur. Priv. 21(3): 8-15 (2023) - [c34]Zhenghao Hu, Sangho Lee, Marcus Peinado:
Hacksaw: Hardware-Centric Kernel Debloating via Device Inventory and Dependency Analysis. CCS 2023: 1994-2008 - [c33]Sangho Lee:
APRON: Authenticated and Progressive System Image Renovation. USENIX ATC 2023: 275-292 - [c32]Varun Gandhi, Sarbartha Banerjee, Aniket Agrawal, Adil Ahmad, Sangho Lee, Marcus Peinado:
Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability. USENIX Security Symposium 2023: 391-408 - 2022
- [c31]Yechan Bae, Sarbartha Banerjee, Sangho Lee, Marcus Peinado:
Spacelord: Private and Secure Smart Space Sharing. ACSAC 2022: 427-439 - [c30]ChangSeok Oh, Sangho Lee, Chenxiong Qian, Hyungjoon Koo, Wenke Lee:
DeView: Confining Progressive Web Applications by Debloating Web APIs. ACSAC 2022: 881-895 - [c29]Adil Ahmad, Sangho Lee, Marcus Peinado:
HARDLOG: Practical Tamper-Proof System Auditing Using a Novel Audit Device. SP 2022: 1791-1807 - [c28]Fan Sang, Ming-Wei Shih, Sangho Lee, Xiaokuan Zhang, Michael Steiner, Mona Vij, Taesoo Kim:
PRIDWEN: Universally Hardening SGX Programs via Load-Time Synthesis. USENIX ATC 2022: 455-472 - [i4]ChangSeok Oh, Sangho Lee, Wen Xu, Rohan Devang Vora, Taesoo Kim:
Mitigating Low-volume DoS Attacks with Data-driven Resource Accounting. CoRR abs/2205.00056 (2022) - 2021
- [c27]Adil Ahmad, Sangho Lee, Pedro Fonseca, Byoungyoung Lee:
Kard: lightweight data race detection with per-thread memory protection. ASPLOS 2021: 647-660
2010 – 2019
- 2019
- [c26]Meng Xu, Manuel Huber, Zhichuang Sun, Paul England, Marcus Peinado, Sangho Lee, Andrey Marochko, Dennis Mattoon, Rob Spiger, Stefan Thom:
Dominance as a New Trusted Computing Primitive for the Internet of Things. IEEE Symposium on Security and Privacy 2019: 1415-1430 - [c25]Soyeon Park, Sangho Lee, Wen Xu, Hyungon Moon, Taesoo Kim:
libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK). USENIX ATC 2019: 241-254 - [c24]Mingxue Zhang, Wei Meng, Sangho Lee, Byoungyoung Lee, Xinyu Xing:
All Your Clicks Belong to Me: Investigating Click Interception on the Web. USENIX Security Symposium 2019: 941-957 - 2018
- [j11]Beumjin Cho, Sangho Lee, Meng Xu, Sangwoo Ji, Taesoo Kim, Jong Kim:
Prevention of cross-update privacy leaks on android. Comput. Sci. Inf. Syst. 15(1): 111-137 (2018) - [c23]Dinuka Sahabandu, Baicen Xiao, Andrew Clark, Sangho Lee, Wenke Lee, Radha Poovendran:
DIFT Games: Dynamic Information Flow Tracking Games for Advanced Persistent Threats. CDC 2018: 1136-1143 - [c22]Shana Moothedath, Dinuka Sahabandu, Andrew Clark, Sangho Lee, Wenke Lee, Radha Poovendran:
Multi-stage Dynamic Information Flow Tracking Game. GameSec 2018: 80-101 - [c21]Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, Taesoo Kim:
QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. USENIX Security Symposium 2018: 745-761 - [c20]Yang Ji, Sangho Lee, Mattia Fazzini, Joey Allen, Evan Downing, Taesoo Kim, Alessandro Orso, Wenke Lee:
Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking. USENIX Security Symposium 2018: 1705-1722 - [i3]Soyeon Park, Sangho Lee, Wen Xu, Hyungon Moon, Taesoo Kim:
libmpk: Software Abstraction for Intel Memory Protection Keys. CoRR abs/1811.07276 (2018) - 2017
- [c19]Yang Ji, Sangho Lee, Evan Downing, Weiren Wang, Mattia Fazzini, Taesoo Kim, Alessandro Orso, Wenke Lee:
RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking. CCS 2017: 377-390 - [c18]Ming-Wei Shih, Sangho Lee, Taesoo Kim, Marcus Peinado:
T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. NDSS 2017 - [c17]Sanghak Lee, Jiwon Choi, Jihun Kim, Beumjin Cho, Sangho Lee, Hanjun Kim, Jong Kim:
FACT: Functionality-centric Access Control System for IoT Programming Frameworks. SACMAT 2017: 43-54 - [c16]Yeongjin Jang, Jae-Hyuk Lee, Sangho Lee, Taesoo Kim:
SGX-Bomb: Locking Down the Processor via Rowhammer Attack. SysTEX@SOSP 2017: 5:1-5:6 - [c15]Su Yong Kim, Sangho Lee, Insu Yun, Wen Xu, Byoungyoung Lee, Youngtae Yun, Taesoo Kim:
CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems. USENIX ATC 2017: 689-701 - [c14]Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, Marcus Peinado:
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. USENIX Security Symposium 2017: 557-574 - [i2]Sangho Lee, Taesoo Kim:
Leaking Uninitialized Secure Enclave Memory via Structure Padding (Extended Abstract). CoRR abs/1710.09061 (2017) - 2016
- [j10]Sangho Lee, Jong Kim, Yoonho Kim:
Preserving source- and sink-location privacy in sensor networks. Comput. Sci. Inf. Syst. 13(1): 115-130 (2016) - [j9]Meng Xu, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee, Chenxiong Qian, Sangho Lee, Taesoo Kim:
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques. ACM Comput. Surv. 49(2): 38:1-38:47 (2016) - [j8]Jonghyuk Song, Sangho Lee, Jong Kim:
Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata. IEEE Trans. Dependable Secur. Comput. 13(3): 340-354 (2016) - [c13]Hyungsub Kim, Sangho Lee, Jong Kim:
Inferring browser activity and status through remote monitoring of storage usage. ACSAC 2016: 410-421 - [c12]Yeongjin Jang, Sangho Lee, Taesoo Kim:
Breaking Kernel Address Space Layout Randomization with Intel TSX. CCS 2016: 380-392 - [c11]Yang Ji, Sangho Lee, Wenke Lee:
RecProv: Towards Provenance-Aware User Space Record and Replay. IPAW 2016: 3-15 - [i1]Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, Marcus Peinado:
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. CoRR abs/1611.06952 (2016) - 2015
- [c10]Jonghyuk Song, Sangho Lee, Jong Kim:
CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks. CCS 2015: 793-804 - [c9]Sangho Lee, Hyungsub Kim, Jong Kim:
Identifying Cross-origin Resource Status Using Application Cache. NDSS 2015 - 2014
- [j7]Sangho Lee, Jong Kim:
Early filtering of ephemeral malicious accounts on Twitter. Comput. Commun. 54: 48-57 (2014) - [c8]Hyungsub Kim, Sangho Lee, Jong Kim:
Exploring and mitigating privacy threats of HTML5 geolocation API. ACSAC 2014: 306-315 - [c7]Sangho Lee, Youngsok Kim, Jangwoo Kim, Jong Kim:
Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities. IEEE Symposium on Security and Privacy 2014: 19-33 - 2013
- [j6]Sangho Lee, Jong Kim:
Fluxing botnet command and control channels with URL shortening services. Comput. Commun. 36(3): 320-332 (2013) - [j5]Sangho Lee, Jong Kim:
WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream. IEEE Trans. Dependable Secur. Comput. 10(3): 183-195 (2013) - [c6]Hayoung Lee, Taeho Kang, Sangho Lee, Jong Kim, Yoonho Kim:
Punobot: Mobile Botnet Using Push Notification Service in Android. WISA 2013: 124-137 - [c5]Jonghyuk Song, Sangho Lee, Jong Kim:
I know the shortened URLs you clicked on Twitter: inference attack using public click analytics and Twitter metadata. WWW 2013: 1191-1200 - 2012
- [j4]Sangho Lee, Jin Seok Kim, Sung Je Hong, Jong Kim:
Distance Bounding with Delayed Responses. IEEE Commun. Lett. 16(9): 1478-1481 (2012) - [j3]Sangho Lee, Hay-Rim Lee, Seungkwang Lee, Jong Kim:
DRMFS: A file system layer for transparent access semantics of DRM-protected contents. J. Syst. Softw. 85(5): 1058-1066 (2012) - [c4]Sangho Lee, Jong Kim:
WarningBird: Detecting Suspicious URLs in Twitter Stream. NDSS 2012 - 2011
- [c3]Sangho Lee, Jong Kim:
A batch rekeying time decision algorithm for IPTV systems. CCNC 2011: 901-905 - [c2]Jonghyuk Song, Sangho Lee, Jong Kim:
Spam Filtering in Twitter Using Sender-Receiver Relationship. RAID 2011: 301-317 - 2010
- [c1]Sangho Lee, Heejin Park, Jong Kim:
A secure and mutual-profitable DRM interoperability scheme. ISCC 2010: 75-80
2000 – 2009
- 2009
- [j2]Sangho Lee, Jong Kim, Sung Je Hong:
Redistributing time-based rights between consumer devices for content sharing in DRM system. Int. J. Inf. Sec. 8(4): 263-273 (2009) - [j1]Sangho Lee, Jong Kim, Sung Je Hong:
Security weakness of Tseng's fault-tolerant conference-key agreement protocol. J. Syst. Softw. 82(7): 1163-1167 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint