| You are what you do: Hunting stealthy malware via data provenance analysis. Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ... NDSS, 2020 | 327 | 2020 |
| Autonomic live adaptation of virtual computational environments in a multi-domain infrastructure P Ruth, J Rhee, D Xu, R Kennell, S Goasguen 2006 IEEE International Conference on Autonomic Computing, 5-14, 2006 | 282 | 2006 |
| Towards a timely causality analysis for enterprise security. Y Liu, M Zhang, D Li, K Jee, Z Li, Z Wu, J Rhee, P Mittal NDSS 24, 141, 2018 | 276 | 2018 |
| High fidelity data reduction for big data security dependency analyses Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 243 | 2016 |
| Dksm: Subverting virtual machine introspection for fun and profit S Bahram, X Jiang, Z Wang, M Grace, J Li, D Srinivasan, J Rhee, D Xu 2010 29th IEEE symposium on reliable distributed systems, 82-91, 2010 | 238 | 2010 |
| Mondrix: Memory isolation for Linux using Mondriaan memory protection E Witchel, J Rhee, K Asanović Proceedings of the twentieth ACM symposium on Operating systems principles …, 2005 | 184 | 2005 |
| SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures. Z Lin, J Rhee, X Zhang, D Xu, X Jiang Ndss, 2011 | 165 | 2011 |
| Nodemerge: Template based efficient data reduction for big-data causality analysis Y Tang, D Li, Z Li, M Zhang, K Jee, X Xiao, Z Wu, J Rhee, F Xu, Q Li Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 142 | 2018 |
| {RVFuzzer}: Finding input validation bugs in robotic vehicles through {Control-Guided} testing T Kim, CH Kim, J Rhee, F Fei, Z Tu, G Walkup, X Zhang, X Deng, D Xu 28th USENIX Security Symposium (USENIX Security 19), 425-442, 2019 | 130 | 2019 |
| Defeating dynamic data kernel rootkit attacks via vmm-based guest-transparent monitoring J Rhee, R Riley, D Xu, X Jiang 2009 international conference on availability, reliability and security, 74-81, 2009 | 124 | 2009 |
| Accurate, low cost and instrumentation-free security audit logging for windows S Ma, KH Lee, CH Kim, J Rhee, X Zhang, D Xu Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 122 | 2015 |
| Perfscope: Practical online server performance bug inference in production cloud computing infrastructures DJ Dean, H Nguyen, X Gu, H Zhang, J Rhee, N Arora, G Jiang Proceedings of the ACM Symposium on Cloud Computing, 1-13, 2014 | 98 | 2014 |
| Hybrid network management N Arora, H Zhang, C Lumezanu, J Rhee, G Jiang, H Lu US Patent 9,450,823, 2016 | 97 | 2016 |
| Traceback: First fault diagnosis by reconstruction of distributed control flow A Ayers, R Schooler, C Metcalf, A Agarwal, J Rhee, E Witchel Proceedings of the 2005 ACM SIGPLAN conference on Programming language …, 2005 | 95 | 2005 |
| {SIGL}: Securing software installations through deep graph learning X Han, X Yu, T Pasquier, D Li, J Rhee, J Mickens, M Seltzer, H Chen 30th USENIX Security Symposium (USENIX Security 21), 2345-2362, 2021 | 89 | 2021 |
| System and method for transforming legacy desktop environments to a virtualized desktop model KA Beaty, R Bhowmik, A Kochut, J Rhee, HH Shaikh US Patent 8,490,087, 2013 | 81 | 2013 |
| Kernel malware analysis with un-tampered and temporal views of dynamic kernel memory J Rhee, R Riley, D Xu, X Jiang International workshop on recent advances in intrusion detection, 178-197, 2010 | 77 | 2010 |
| Drivefuzz: Discovering autonomous driving bugs through driving quality-guided fuzzing S Kim, M Liu, JJ Rhee, Y Jeon, Y Kwon, CH Kim Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 72 | 2022 |
| Hybnet: Network manager for a hybrid network infrastructure H Lu, N Arora, H Zhang, C Lumezanu, J Rhee, G Jiang Proceedings of the Industrial Track of the 13th ACM/IFIP/USENIX …, 2013 | 70 | 2013 |
| This is why we can’t cache nice things: Lightning-fast threat hunting using suspicion-based hierarchical storage WU Hassan, D Li, K Jee, X Yu, K Zou, D Wang, Z Chen, Z Li, J Rhee, ... Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 47 | 2020 |