| CARVIEW |
Select Language
HTTP/2 200
server: nginx
date: Tue, 30 Dec 2025 23:26:37 GMT
content-type: text/html
last-modified: Tue, 02 Dec 2025 18:55:15 GMT
etag: W/"692f3613-18935"
x-frame-options: SAMEORIGIN
x-content-type-options: nosniff
x-xss-protection: 1; mode=block
strict-transport-security: max-age=15768000
content-encoding: gzip
Taesoo Kim
Taesoo Kim (김태수)
Professor,
School of Cybersecurity and Privacy (SCP) &
School of Computer Science (SCS),
College of Computing,
Georgia Tech
- CV
- https://github.com/tsgates ( ★)
- PGP Key / Keybase
- SSLab / GTS3 / Team Atlanta / r00timentary / LinkedIn
Contacts
S0925, CODA Bldg, Georgia Tech.
756 West Peachtree Street NW
Atlanta, GA 30332-4016
(404) 385-2934
Research Interests
Systems Security, Operating Systems, Programming Languages, and Distributed Systems.
Teaching (all)
Fall 2025: Information Security Lab (CS 4803/6365) Fall 2024: Information Security Lab (CS 4803/6365) Fall 2023: Information Security Lab (CS 6365) Spring 2023: Exploiting Smart Contracts and DeFi (CS 8803) Fall 2020: Information Security Lab (CS 6265 A/O01/OCY) Spring 2020: Design Operating Systems (CS 3210 A) Fall 2019: Information Security Lab (CS 6265 A/O01/OCY) Fall 2018: Information Security Lab (CS 6265 A (8803)) Fall 2017: Information Security Lab (CS 6265 A (8803)) Fall 2016: Information Security Lab (CS 6265 A) Spring 2016: Design Operating Systems (CS 3210 A/GR1) Fall 2015: Information Security Lab (CS 6265 E) Fall 2014: Special Topics: Building Secure Systems (CS 8803 BSS)
Publications (all/26/25/24/23/22/21/20/19/18/17/16/15/...)
-
Detecting Inconsistencies in ARM CCA's Formally Verified Specification (to appear).
Changho Choi, Xiang Cheng, Bokdeuk Jeong, and Taesoo Kim.
In Proceedings of the 31st ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2026),
Pittsburgh, USA, March, 2026. -
Agentic Specification Generator for Move Programs.
[ paper
| slides ]
Yu-Fu Fu, Meng Xu and Taesoo Kim.
In Proceedings of the 40th IEEE/ACM International Conference on Automated Software Engineering (ASE),
Seoul, Korea, Nov 2025. -
ATLANTIS: AI-driven Threat Localization, Analysis, and Triage Intelligence System.
[ paper
| code ]
Taesoo Kim, HyungSeok Han, Soyeon Park, Dae R. Jeong, Dohyeok Kim, Dongkwan Kim, Eunsoo Kim, Jiho Kim, Joshua Wang, Kangsu Kim, Sangwoo Ji, Woosun Song, Hanqing Zhao, Andrew Chin, Gyejin Lee, Kevin Stevens, Mansour Alharthi, Yizhuo Zhai, Cen Zhang, Joonun Jang, Yeongjin Jang, Ammar Askar, Dongju Kim, Fabian Fleischer, Jeongin Cho, Junsik Kim, Kyungjoon Ko, Insu Yun, Sangdon Park, Dowoo Baik, Haein Lee, Hyeon Heo, Minjae Gwon, Minjae Lee, Minwoo Baek, Seunggi Min, Wonyoung Kim, Yonghwi Jin, Younggi Park, Yunjae Choi, Jinho Jung, Gwanhyun Lee, Junyoung Jang, Kyuheon Kim, Yeonghyeon Cha and Youngjoon Kim.
Arxiv,
Oct 2025. -
Principles and Methodologies for Serial Performance Optimization.
[ paper
| slides
| code ]
Sujin Park, Mingyu Guan, Xiang Cheng, and Taesoo Kim.
In Proceedings of the 19th Symposium on Operating Systems Design and Implementation (OSDI 2025),
Boston, MA, July 2025. -
PORTAL: Fast and Secure Device Access with Arm CCA for Modern Arm Mobile System-on-Chips (SoCs).
[ paper
| slides ]
Fan Sang, Jaehyuk Lee, Xiaokuan Zhang, and Taesoo Kim.
In Proceedings of the 46th IEEE Symposium on Security and Privacy (S&P 2025),
San Francisco, CA, May 2025. -
TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution.
[ paper
| slides
| code ]
Juhee Kim, Jinbum Park, Sihyeon Roh, Jaeyoung Chung, Youngjoo Lee, Taesoo Kim, and Byoungyoung Lee.
In Proceedings of the 46th IEEE Symposium on Security and Privacy (S&P 2025),
San Francisco, CA, May 2025. Dark Reading, The Register, Security Week, Low Level Learning, Apple -
RUG: Turbo LLM for Rust Unit Test Generation.
[ paper
| slides
| code ]
Xiang Cheng, Fan Sang, Yizhuo Zhai, Xiaokuan Zhang, and Taesoo Kim.
In Proceedings of the 47th International Conference on Software Engineering (ICSE 2025),
Ottawa, Canada, May 2025. -
RAKIS: Secure Fast I/O Primitives Across Trust Boundaries on Intel SGX.
[ paper
| slides
| code ]
Mansour Alharthi, Fan Sang, Dmitrii Kuvaiskii, Mona Vij, and Taesoo Kim.
In Proceedings of the 20th ACM European Conference on Computer Systems (EuroSys 2025),
Rotterdam, Netherlands, March 2025. -
MALintent: Coverage Guided Intent Fuzzing Framework for Android.
[ paper
| slides
| code ]
Ammar Askar, Fabian Fleischer, Christopher Kruegel, Giovanni Vigna and Taesoo Kim.
In Proceedings of the 2025 Network and Distributed System Security Symposium (NDSS 2025),
San Diego, CA, February 2025. -
Heterogeneous Graph Neural Network on Semantic Tree.
[ paper
| slides
| code ]
Mingyu Guan, Jack W Stokes, Qinlong Luo, Fuchen Liu, Purvanshi Mehta, Elnaz Nouri and Taesoo Kim.
In Proceedings of the 39th Annual AAAI Conference on Artificial Intelligence (AAAI 2025),
Philadelphia, PA, Feb 2025. -
Statically Discover Complex Cross-Entry Use-After-Free Vulnerabilities in the Linux Kernel and Beyond.
[ paper
| slides
| code ]
Hang Zhang, Jangha Kim, Chuhong Yuan, Zhiyun Qian and Taesoo Kim.
In Proceedings of the 2025 Network and Distributed System Security Symposium (NDSS 2025),
San Diego, CA, February 2025. -
Selective Generation for Controllable Language Models.
[ paper
| slides
| code ]
Minjae Lee, Kyungmin Kim, Taesoo Kim, and Sangdon Park.
In Proceedings of the Neural Information Processing Systems (NeurIPS 2024) - Spotlight,
Vancouver, B.C., Canada, Dec 2024. -
PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux.
[ paper
| slides ]
Juhee Kim, Jinbum Park, Yoochan Lee, Chengyu Song, Taesoo Kim, and Byoungyoung Lee.
In Proceedings of the 28th ACM Conference on Computer and Communications Security (CCS 2024),
Salt Lake City, UT, October 2024. -
I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures.
[ paper
| slides ]
Mingyi Liu, Jun Ho Huh, HyungSeok Han, Jaehyuk Lee, Jihae Ahn, Frank Li, Hyoungshick Kim and Taesoo Kim.
In Proceedings of the 33rd USENIX Security Symposium (Security 2024),
Philadelphia, PA, August 2024. The Conversation -
Bypassing ARM's Memory Tagging Extension with a Side-Channel Attack.
[ paper
| slides
| code ]
Juhee Kim, Jinbum Park, Sihyeon Roh, Jaeyoung Chung, Youngjoo Lee, Taesoo Kim, and Byoungyoung Lee.
BlackHat USA 2024,
Las Vegas, NV, August 2024. Dark Reading, The Register, Security Week, Low Level Learning, Apple -
Sense: Enhancing Microarchitectural Awareness for TEEs via Subscription-Based Notification.
[ paper
| slides ]
Fan Sang, Jaehyuk Lee, Xiaokuan Zhang, Meng Xu, Scott Constable, Yuan Xiao, Michael Steiner, Mona Vij, and Taesoo Kim.
In Proceedings of the 2024 Network and Distributed System Security Symposium (NDSS 2024),
San Diego, CA, February 2024. -
AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves.
[ paper
| slides ]
Scott Constable, Jo Van Bulck, Xiang Cheng, Yuan Xiao, Cedric Xing, Ilya Alexandrovich, Taesoo Kim, Frank Piessens, Mona Vij and Mark Silberstein.
In Proceedings of the 31st USENIX Security Symposium (Security 2023),
Anaheim, CA, August 2023. Chips & Salsa Episode 58: AEX-Notify, GT News -
ACon2: Adaptive Conformal Consensus for Provable Blockchain Oracles.
[ paper
| slides
| code ]
Sangdon Park, Osbert Bastani and Taesoo Kim.
In Proceedings of the 31st USENIX Security Symposium (Security 2023),
Anaheim, CA, August 2023. -
autofz: Automated Fuzzer Composition at Runtime.
[ paper
| slides
| code ]
Yu-Fu Fu, Jaehyuk Lee and Taesoo Kim.
In Proceedings of the 31st USENIX Security Symposium (Security 2023),
Anaheim, CA, August 2023. -
Memory Protection Keys: facts, key extension perspectives, and discussions.
[ paper ]
Soyeon Park, Sangho Lee and Taesoo Kim.
IEEE Security & Privacy,
May/June 2023. -
PyFET: Forensically Equivalent Transformation for Python Binary Decompilation.
[ paper
| slides ]
Ali Ahad, Chijung Jung, Ammar Askar, Doowon Kim, Taesoo Kim and Yonghwi Kwon.
In Proceedings of the 44th IEEE Symposium on Security and Privacy (S&P 2023),
San Francisco, CA, May 2023. -
UTOPIA: Automatic Fuzz Driver Generation using Unit Tests.
[ paper
| slides
| code ]
Bokdeuk Jeong, Joonun Jang, Hayoon Yi, Jiin Moon, Junsik Kim, Intae Jeon, Taesoo Kim, WooChul Shim and Yong Ho Hwang.
In Proceedings of the 44th IEEE Symposium on Security and Privacy (S&P 2023),
San Francisco, CA, May 2023. -
POPKORN: Popping Windows Kernel Drivers At Scale.
[ paper
| slides
| code ]
Rajat Gupta, Lukas Dresel, Noah Spahn, Giovanni Vigna, Christopher Kruegel and Taesoo Kim.
In Proceedings of the Annual Computer Security Applications Conference (ACSAC),
Austin, TX, Dec 2022. -
RoboFuzz: Fuzzing Robotic Systems over Robot Operating System (ROS) for Finding Correctness Bugs.
[ paper
| slides
| code ]
Seulbae Kim and Taesoo Kim.
In Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE),
Singapore, November 2022. -
Scalable and Secure Virtualization of HSM With ScaleTrust.
Juhyeng Han, Insu Yun, Seongmin Kim, Taesoo Kim, Sooel Son and Dongsu Han.
IEEE/ACM Transactions on Networking (ToN),
November 2022. -
Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients.
[ paper ]
Daehee Jang, Ammar Askar, Insu Yun, Stephen Tong, Yiqin Cai and Taesoo Kim.
In Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022),
Limassol, Cyprus, October 2022. -
Modulo: Finding Convergence Failure Bugs in Distributed Systems with Divergence Resync Models.
[ paper
| slides ]
Beom Heyn Kim, Taesoo Kim and David Lie.
In Proceedings of the 2022 USENIX Annual Technical Conference (ATC 2022),
Carlsbad, CA, July 2022. -
Pridwen: Universally Hardening SGX Programs via Load-Time Synthesis.
[ paper
| slides
| code ]
Fan Sang, Ming-Wei Shih, Sangho Lee, Xiaokuan Zhang, Michael Steiner, Mona Vij, and Taesoo Kim.
In Proceedings of the 2022 USENIX Annual Technical Conference (ATC 2022),
Carlsbad, CA, July 2022. -
Application-Informed Kernel Synchronization Primitives.
[ paper
| slides
| code ]
Sujin Park, Diyu Zhou, Yuchen Qian, Irina Calciu, Taesoo Kim, and Sanidhya Kashyap.
In Proceedings of the 16th Symposium on Operating Systems Design and Implementation (OSDI 2022),
Carlsbad, CA, July 2022. -
DynaGraph: Dynamic Graph Neural Networks at Scale.
[ paper
| slides ]
Mingyu Guan, Anand Padmanabha Iyer and Taesoo Kim.
Joint Workshop on Graph Data Management Experiences and Systems and Network Data Analytics (GRADES-NDA),
Philadelphia, PA, June 2022. -
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication.
[ paper
| slides
| code ]
Sungbae Yoo, Jinbum Park, Seolheui Kim, Yeji Kim, and Taesoo Kim.
In Proceedings of the 31st USENIX Security Symposium (Security 2022),
Boston, MA, August 2022. -
A Look Back on a Function Identification Problem.
[ paper
| slides ]
Hyungjoon Koo, Soyeon Park, and Taesoo Kim.
In Proceedings of the Annual Computer Security Applications Conference (ACSAC),
Virtual, December 2021. -
Hardware Support to Improve Fuzzing Performance and Precision.
[ paper
| slides
| code ]
Ren Ding, Yonghae Kim, Fan Sang, Wen Xu, Gururaj Saileshwar and Taesoo Kim.
In Proceedings of the 28th ACM Conference on Computer and Communications Security (CCS 2021),
Seoul, South Korea, November 2021. -
HARDSHEAP: An Universal and Extensible Framework for Evaluating Secure Allocators.
[ paper
| slides
| code ]
Insu Yun, Woosun Song, Seunggi Min, and Taesoo Kim.
In Proceedings of the 28th ACM Conference on Computer and Communications Security (CCS 2021),
Seoul, South Korea, November 2021. -
Rudra: Finding Memory Safety Bugs in Rust at the Ecosystem Scale.
[ paper
| slides
| code ]
Yechan Bae, Youngsuk Kim, Ammar Askar, Jungwon Lim and Taesoo Kim.
In Proceedings of the 28th ACM Symposium on Operating Systems Principles (SOSP 2021),
Virtual, October 2021. Distinguished Artifact Award -
Preventing Use-After-Free Attacks with Fast Forward Allocation.
[ paper
| slides
| code ]
Brian Wickman, Hong Hu, Insu Yun, Daehee Jang, JungWon Lim, Sanidhya Kashyap and Taesoo Kim.
In Proceedings of the 30th USENIX Security Symposium (Security 2021),
August, 2021. -
Finding Consensus Bugs in Ethereum via Multi-transaction Differential Fuzzing.
[ paper
| slides
| code ]
Youngseok Yang, Taesoo Kim, and Byung-Gon Chun.
In Proceedings of the 15th Symposium on Operating Systems Design and Implementation (OSDI 2021),
Virtual, July 2021. Coindesk, Yahoo Fiance -
Contextual Concurrency Control.
[ paper
| slides ]
Sujin Park, Irina Calciu, Taesoo Kim and Sanidhya Kashyap.
18th USENIX Workshop on Hot Topics in Operating Systems (HotOS XVIII),
Virtual, May 2021. -
WINNIE: Fuzzing Windows Applications with Harness Synthesis and Fast Cloning.
[ paper
| slides
| code ]
Jinho Jung, Stephen Tong, Hong Hu, Jungwon Lim, Yonghwi Jin, and Taesoo Kim.
In Proceedings of the 2021 Network and Distributed System Security Symposium (NDSS 2021),
San Diego, CA, February 2021. -
Revisiting Function Identification with Machine Learning.
[ paper
| slides ]
Hyungjoon Koo, Soyeon Park, and Taesoo Kim.
In Proceedings of the 1st Machine Learning for Program Aanalysis (MLPA),
Yokohama, Japan, January 2021. -
Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks.
[ paper ]
Hoseok Seol, Minhye Kim, Taesoo Kim, Yongdae Kim, and Lee-Sup Kim.
IEEE Transactions on Computers (ToC), Vol 70, No 4,
April 2021. -
FREEDOM: Engineering a State-of-the-Art DOM Fuzzer.
[ paper
| slides
| code ]
Wen Xu, Soyeon Park, and Taesoo Kim.
In Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS 2020),
Orlando, FL, November 2020. CVE-2019-6212, CVE-2019-8596, CVE-2019-8609, CVE-2019-8720, CVE-2020-9803, CVE-2020-9806, CVE-2020-9807, CVE-2020-9895, CVE-2019-5806, CVE-2019-5817 -
Slimium: Debloating the Chromium Browser with Feature Subsetting.
[ paper
| slides
| code ]
Chenxiong Qian, Hyungjoon Koo, Changseok Oh, Taesoo Kim and Wenke Lee.
In Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS 2020),
Orlando, FL, November 2020. -
APOLLO: Automatic Detection and Diagnosis of Performance Regressions in Database Systems.
[ paper
| slides
| code ]
Jinho Jung, Hong Hu, Joy Arulraj, Taesoo Kim, and Woonhak Kang.
In Proceedings of the 46th International Conference on Very Large Data Bases (VLDB 2020),
Tokyo, Japan, August 2020. -
Automatic Techniques to Systematically Discover New Heap Exploitation Primitives.
[ paper
| slides
| code ]
Insu Yun, Dhaval Kapil, and Taesoo Kim.
In Proceedings of the 29th USENIX Security Symposium (Security 2020),
Boston, MA, August 2020. -
Compromising the macOS kernel through Safari by chaining six vulnerabilities.
[ slides
| code ]
Yonghwi Jin, Jungwon Lim, Insu Yun, and Taesoo Kim.
BlackHat USA 2020,
Las Vegas, NV, August 2020. Pwn2Own, CVE-2020-9850, CVE-2020-9839, CVE-2020-9856, CVE-2020-9801 -
EcoTLB: Eventually Consistent TLBs.
[ paper ]
Steffen Maass, Mohan Kumar, Taesoo Kim, Tushar Krishna and Abhishek Bhattacharjee.
ACM Transactions on Architecture and Code Optimization (TACO '20),
July 2020. -
Finding Bugs in File Systems with an Extensible Fuzzing Framework.
[ paper
| code ]
Seulbae Kim, Meng Xu, Sanidhya Kashyap, Jungyeon Yoon, Wen Xu, and Taesoo Kim.
ACM Transactions on Storage (ToS), 16(10),
May 2020. -
KRACE: Data Race Fuzzing for Kernel File Systems.
[ paper
| slides
| code ]
Meng Xu, Sanidhya Kashyap, Hanqing Zhao and Taesoo Kim.
In Proceedings of the 41st IEEE Symposium on Security and Privacy (S&P 2020),
San Francisco, CA, May 2020. -
Fuzzing JavaScript Engines with Aspect-preserving Mutation.
[ paper
| slides
| code ]
Soyeon Park, Wen Xu, Insu Yun, Daehee Jang and Taesoo Kim.
In Proceedings of the 41st IEEE Symposium on Security and Privacy (S&P 2020),
San Francisco, CA, May 2020. CVE-2020-6382, CVE-2019-13730, CVE-2019-13764, CVE-2019-8811, CVE-2019-8816, … (12 CVEs) -
DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report.
[ paper
| slides
| code ]
Ren Ding, Hong Hu, Wen Xu, and Taesoo Kim.
In Proceedings of the 2020 Network and Distributed System Security Symposium (NDSS 2020),
San Diego, CA, February 2020. -
MLsploit: A Framework for Interactive Experimentation with Adversarial Machine Learning Research.
[ paper
| code ]
Nilaksh Das, Siwei Li, Chanil Jeon, Jinho Jung, Shang-Tse Chen, Carter Yagemann, Evan Downing, Haekyu Park, Evan Yang, Li Chen, Michael Kounavis, Ravi Sahita, David Durham, Scott Buck, Polo Chau, Taesoo Kim and Wenke Lee.
In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2019, Project Showcase),
Anchorage, AK, August 2019. BlackHat Asia/Arsenal -
Finding Semantic Bugs in File Systems with an Extensible Fuzzing Framework.
[ paper
| slides
| code ]
Seulbae Kim, Meng Xu, Sanidhya Kashyap, Jungyeon Yoon, Wen Xu, and Taesoo Kim.
In Proceedings of the 27th ACM Symposium on Operating Systems Principles (SOSP 2019),
Ontario, Canada, October 2019. -
Scalable and Practical Locking With Shuffling.
[ paper
| slides
| code ]
Sanidhya Kashyap, Irina Calciu, Xiaohe Cheng, Changwoo Min, and Taesoo Kim.
In Proceedings of the 27th ACM Symposium on Operating Systems Principles (SOSP 2019),
Ontario, Canada, October 2019. -
RECIPE: Converting Concurrent DRAM Indexes to Persistent-Memory Indexes.
[ paper
| slides
| code ]
Se Kwon Lee, Jayashree Mohan, Sanidhya Kashyap, Taesoo Kim, and Vijay Chidambaram.
In Proceedings of the 27th ACM Symposium on Operating Systems Principles (SOSP 2019),
Ontario, Canada, October 2019. -
SplitFS: Reducing Software Overhead in File Systems for Persistent Memory.
[ paper
| slides
| code ]
Rohan Kadekodi, Se Kwon Lee, Sanidhya Kashyap, Taesoo Kim, Aasheesh Kolli, and Vijay Chidambaram.
In Proceedings of the 27th ACM Symposium on Operating Systems Principles (SOSP 2019),
Ontario, Canada, October 2019. -
Toward Scaling Hardware Security Module for Emerging Cloud Services.
[ paper
| slides ]
Juhyeng Han, Seongmin Kim, Taesoo Kim, and Dongsu Han.
In Proceedings of the 4th Workshop on System Software for Trusted Execution (SysTEX 2019),
Ontario, Canada, October 2019. -
Breaking Turtles All the Way Down: An Exploitation Chain to Break out of VMware ESXi.
[ paper
| slides ]
Hanqing Zhao, Yanyu Zhang, Kun Yang, and Taesoo Kim.
In Proceedings of the 13th USENIX Workshop on Offensive Technologies (WOOT),
Santa Clara, CA, August 2019. CVE-2018-6981, CVE-2018-6982 -
RAZOR: A Framework for Post-deployment Software Debloating.
[ paper
| slides
| code ]
Chenxiong Qian, Hong Hu, Mansour A Alharthi, Pak Ho Chung, Taesoo Kim, and Wenke Lee.
In Proceedings of the 28th USENIX Security Symposium (Security 2019),
Santa Clara, CA, August 2019. -
Fuzzification: Anti-Fuzzing Techniques.
[ paper
| slides
| code ]
Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, and Taesoo Kim.
In Proceedings of the 28th USENIX Security Symposium (Security 2019),
Santa Clara, CA, August 2019. Hacker News -
libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK).
[ paper
| slides
| code ]
Soyeon Park, Sangho Lee, Wen Xu, Hyungon Moon, and Taesoo Kim.
In Proceedings of the 2019 USENIX Annual Technical Conference (ATC 2019),
Renton, WA, July 2019. -
Fuzzing File Systems via Two-Dimensional Input Space Exploration.
[ paper
| slides
| code ]
Wen Xu, Hyungon Moon, Sanidhya Kashyap, Po-Ning Tseng, and Taesoo Kim.
In Proceedings of the 40th IEEE Symposium on Security and Privacy (S&P 2019),
San Francisco, CA, May 2019. CVE-2018-1092, CVE-2018-1093, CVE-2018-1094, CVE-2018-1095, CVE-2018-10840, CVE-2018-10876, CVE-2018-10877, CVE-2018-10878, CVE-2018-10879, CVE-2018-10880, CVE-2018-10881, CVE-2018-10882, CVE-2018-10883, … (32 CVEs) -
Stopping Memory Disclosures via Diversification and Replicated Execution.
[ paper ]
Kangjie Lu, Meng Xu, Chengyu Song, Taesoo Kim, and Wenke Lee.
IEEE Transactions on Dependable and Secure Computing (TDSC),
October 2018. -
Enforcing Unique Code Target Property for Control-Flow Integrity.
[ paper
| slides
| code ]
Hong Hu, Chenxiong Qian, Carter Yagemann, Simon P. Chung, Bill Harris, Taesoo Kim, and Wenke Lee.
In Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS 2018),
Toronto, Canada, October 2018. -
SGX-Tor: A Secure and Practical Tor Anonymity Network With SGX Enclaves.
[ paper
| code ]
Seongmin Kim, Juhyeng Han, Jaehyeong Ha, Taesoo Kim, and Dongsu Han.
IEEE/ACM Transactions on Networking (ToN), Volumn. 26, No. 5, pp. 2174-2187,
October 2018. -
QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.
[ paper
| slides
| code ]
Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, and Taesoo Kim.
In Proceedings of the 27th USENIX Security Symposium (Security 2018),
Baltimore, MD, August 2018. Distinguished Paper Award
CVE-2017-6836, CVE-2017-8891, CVE-2017-12878, CVE-2017-17080, CVE-2017-17081, … -
Efficient Data Flow Tagging and Tracking for Refinable Cross-host Attack Investigation.
[ paper
| slides
| code ]
Yang Ji, Sangho Lee, Mattia Fazzini, Joey Allen, Evan Downing, Taesoo Kim, Alessandro Orso, and Wenke Lee.
In Proceedings of the 27th USENIX Security Symposium (Security 2018),
Baltimore, MD, August 2018. -
Scaling Guest OS Critical Sections with eCS.
[ paper
| slides
| code ]
Sanidhya Kashyap, Changwoo Min, and Taesoo Kim.
In Proceedings of the 2018 USENIX Annual Technical Conference (ATC 2018),
Boston, MA, July 2018. -
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.
[ paper
| slides
| code ]
Meng Xu, Chenxiong Qian, Kangjie Lu, Michael Backes, and Taesoo Kim.
In Proceedings of the 39th IEEE Symposium on Security and Privacy (S&P 2018),
San Francisco, CA, May 2018. CVE-2017-15037 -
A Scalable Ordering Primitive for Multicore Machines.
[ paper
| slides
| code ]
Sanidhya Kashyap, Changwoo Min, Kangnyeon Kim, and Taesoo Kim.
In Proceedings of the 13rd ACM European Conference on Computer Systems (EuroSys 2018),
Porto, Portugal, April, 2018. -
SOLROS: A Data-Centric Operating System Architecture for Heterogeneous Computing.
[ paper
| slides ]
Changwoo Min, Woon-Hak Kang, Mohan Kumar Sanidhya Kashyap, Steffen Maass, Heeseung Jo, and Taesoo Kim.
In Proceedings of the 13rd ACM European Conference on Computer Systems (EuroSys 2018),
Porto, Portugal, April, 2018. -
LATR: Lazy Translation Coherence.
[ paper
| slides
| code ]
Mohan Kumar, Steffen Maass, Sanidhya Kashyap, Jan Vesely, Zi Yan, Taesoo Kim, Abhishek Bhattacharjee, and Tushar Krishna.
In Proceedings of the 23rd ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2018),
Williamsburg, VA, March, 2018. -
Prevention of Cross-update Privacy Leaks on Android.
[ paper ]
Beumjin Cho, Sangho Lee, Meng Xu, Sangwoo Ji, Taesoo Kim, and Jong Kim.
Computer Science and Information Systems 15(1),
January 2018. -
Designing New Operating Primitives to Improve Fuzzing Performance.
[ paper
| slides
| code ]
Wen Xu, Sanidhya Kashyap, Changwoo Min, and Taesoo Kim.
In Proceedings of the 23th ACM Conference on Computer and Communications Security (CCS 2017),
Dallas, TX, October 2017. Mozilla Research -
RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking.
[ paper
| slides
| code ]
Yang Ji, Sangho Lee, Evan Downing, Weiren Wang, Mattia Fazzini, Taesoo Kim, Alex Orso, and Wenke Lee.
In Proceedings of the 23th ACM Conference on Computer and Communications Security (CCS 2017),
Dallas, TX, October 2017. GT News Horizons -
Checking Open-Source License Violation and 1-day Security Risk at Large Scale.
[ paper
| slides
| code ]
Ruian Duan, Ashish Bijlani, Meng Xu, Taesoo Kim, and Wenke Lee.
In Proceedings of the 23th ACM Conference on Computer and Communications Security (CCS 2017),
Dallas, TX, October 2017. -
SGX-Bomb: Locking Down the Processor via Rowhammer Attack.
[ paper
| slides
| code ]
Yeongjin Jang, Jaehyuk Lee, Sangho Lee, and Taesoo Kim.
In Proceedings of the 2nd Workshop on System Software for Trusted Execution (SysTEX 2017),
Shanghai, China, October 2017. Hacker News -
FLSCHED: A Lockless and Lightweight Approach to OS Scheduler for Xeon Phi.
[ paper
| slides ]
Heeseung Jo, Woonhak Kang, Changwoo Min, and Taesoo Kim.
In Proceedings of the 8th Asia-Pacific Workshop on Systems (APSys 2017),
Mumbai, India, September 2017. -
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.
[ paper
| slides
| code ]
Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado.
In Proceedings of the 26th USENIX Security Symposium (Security 2017),
Vancouver, Canada, August 2017. Intel SGX Research -
Hacking in Darkness: Return-oriented Programming against Secure Enclaves.
[ paper
| slides
| code ]
Jaehyuk Lee, Jinsoo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, and Brent B. Kang.
In Proceedings of the 26th USENIX Security Symposium (Security 2017),
Vancouver, Canada, August 2017. Intel SGX Research -
Efficient Protection of Path-Sensitive Control Security.
[ paper
| slides
| code ]
Ren Ding, Chenxiong Qian, Chengyu Song, Bill Harris, Taesoo Kim, and Wenke Lee.
In Proceedings of the 26th USENIX Security Symposium (Security 2017),
Vancouver, Canada, August 2017. -
PlatPal: Detecting Malicious Documents with Platform Diversity.
[ paper
| slides
| code ]
Meng Xu and Taesoo Kim.
In Proceedings of the 26th USENIX Security Symposium (Security 2017),
Vancouver, Canada, August 2017. -
AVPASS: Leaking and Bypassing Antivirus Detection Model Automatically.
[ slides
| code ]
Jinho Jung, Chanil Jeon, Max Wolotsky, Insu Yun, and Taesoo Kim.
BlackHat USA 2017,
Las Vegas, NV, August 2017. DARK Reading 1/2/3, WIRED -
Scalable NUMA-aware Blocking Synchronization Primitives.
[ paper
| slides
| code ]
Sanidhya Kashyap, Changwoo Min, and Taesoo Kim.
In Proceedings of the 2017 USENIX Annual Technical Conference (ATC 2017),
Santa Clara, CA, July 2017. -
CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems.
[ paper
| slides ]
Su Yong Kim, Sangho Lee, Insu Yun, Wen Xu, Byoungyoung Lee, Youngtae Yun, and Taesoo Kim.
In Proceedings of the 2017 USENIX Annual Technical Conference (ATC 2017),
Santa Clara, CA, July 2017. CVE-2015-6098, CVE-2016-0040, CVE-2016-7219 -
Bunshin: Compositing Security Mechanisms through Diversification.
[ paper
| slides
| code ]
Meng Xu, Kangjie Lu, Taesoo Kim, and Wenke Lee.
In Proceedings of the 2017 USENIX Annual Technical Conference (ATC 2017),
Santa Clara, CA, July 2017. -
Mosaic: Processing a Trillion-Edge Graph on a Single Machine.
[ paper
| slides
| code ]
Steffen Maass, Changwoo Min, Sanidhya Kashyap, Woonhak Kang, Mohan Kumar, and Taesoo Kim.
In Proceedings of the 12st ACM European Conference on Computer Systems (EuroSys 2017),
Belgrade, Serbia, April, 2017. Best Student Paper Award
The Next Platform, Hacker News 1/2, GT News, The morning paper -
Enhancing Security and Privacy of Tor's Ecosystem by using Trusted Execution Environments.
[ paper
| slides
| code ]
Seongmin Kim, Juhyeng Han, Jaehyeong Ha, Taesoo Kim, and Dongsu Han.
In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2017),
Boston, MA, March 2017. Intel SGX Research -
SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs.
[ paper
| slides
| code ]
Jaebaek Seo, Byoungyoung Lee, Sungmin Kim, Ming-Wei Shih, Insik Shin, Dongsu Han, and Taesoo Kim.
In Proceedings of the 2017 Network and Distributed System Security Symposium (NDSS 2017),
San Diego, CA, February 2017. Intel SGX Research -
T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.
[ paper
| slides
| code ]
Ming-Wei Shih, Sangho Lee, Taesoo Kim, and Marcus Peinado.
In Proceedings of the 2017 Network and Distributed System Security Symposium (NDSS 2017),
San Diego, CA, February 2017. Intel SGX Research -
Fast, Scalable and Secure Onloading of Edge Functions using AirBox.
[ paper
| slides ]
Ketan Bhardwaj, Ming-Wei Shih, Pragya Agarwal, Ada Gavrilovska, Taesoo Kim, and Karsten Schwan.
In Proceedings of the 1st IEEE/ACM Symposium on Edge Computing (SEC 2017),
Washington, DC, October 2016. Patent: WO2018026841A1 -
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages.
[ paper
| slides
| code ]
Kangjie Lu, Chengyu Song, Taesoo Kim, and Wenke Lee.
In Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS 2016),
Vienna, Austria, October 2016. CVE-2016-5243, CVE-2016-5244, CVE-2016-4569, CVE-2016-4578, CVE-2016-4569, CVE-2016-4485, CVE-2016-4486, CVE-2016-4482, AndroidID-28620568, AndroidID-28619338, AndroidID-28620324, AndroidID-28673002, AndroidID-28672819, AndroidID-28672560, AndroidID-28616963, … -
Breaking Kernel Address Space Layout Randomization with Intel TSX.
[ paper
| slides
| code ]
Yeongjin Jang, Sangho Lee, and Taesoo Kim.
In Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS 2016),
Vienna, Austria, October 2016. Hacker News, LWN, Attacking Windows 10 by IOActive, Google Project Zero, Microsoft -
Provably-Secure Remote Memory Attestation for Heap Overflow Protection.
[ paper ]
Alexandra Boldyreva, Taesoo Kim, Richard J. Lipton, and Bogdan Warinschi.
In Proceedings of the 10th Conference on Security and Cryptography for Networks (SCN 2016),
Amalfi, Italy, August, 2016. -
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques.
[ paper ]
Meng Xu, Chengyu Song, Yang ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee, Chenxiong Qian, Sangho Lee, and Taesoo Kim.
ACM Computing Surveys (CSUR 2016), Volumn 49-2,
August, 2016. -
APISan: Sanitizing API Usages through Semantic Cross-checking.
[ paper
| slides
| code ]
Insu Yun, Changwoo Min, Xujie Si, Yeongjin Jang, Taesoo Kim, and Mayur Naik.
In Proceedings of the 25th USENIX Security Symposium (Security 2016),
Austin, TX, August, 2016. Top 10 Finalists, CSAW16
TGC/News, CVE-2016-5636 -
Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX.
[ paper
| slides
| code ]
Yeongjin Jang, Sangho Lee, and Taesoo Kim.
BlackHat USA 2016,
Las Vegas, NV, August 2016. Hacker News, LWN, Attacking Windows 10 by IOActive, Google Project Zero, Microsoft -
Understanding Manycore Scalability of File Systems.
[ paper
| slides
| code ]
Changwoo Min, Sanidhya Kashyap, Steffen Maass, Woonhak Kang, and Taesoo Kim.
In Proceedings of the 2016 USENIX Annual Technical Conference (ATC 2016),
Denver, CO, June 2016. -
Instant OS Updates via Userspace Checkpoint-and-Restart.
[ paper
| slides ]
Sanidhya Kashyap, Changwoo Min, Byoungyoung Lee, Taesoo Kim, and Pavel Emelyanov.
In Proceedings of the 2016 USENIX Annual Technical Conference (ATC 2016),
Denver, CO, June 2016. Linux Plumbers Conference 2015, CRIU -
HDFI: Hardware-Assisted Data-flow Isolation.
[ paper
| slides
| code ]
Chengyu Song, Hyungon Moon, Monjur Alam, Insu Yun, Byoungyoung Lee, Taesoo Kim, Wenke Lee, and Yunheung Paek.
In Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P 2016),
San Jose, CA, May 2016. -
MetaSync: Coordinating Storage Across Multiple File Synchronization Services.
[ paper
| slides
| code ]
Seungyeop Han, Haichen Shen, Taesoo Kim, Arvind Krishnamurthy, Thomas Anderson, and David Wetherall.
IEEE Internet Computing (IEEE IC 2016),
May/June 2016. -
S-NFV: Securing NFV States by using SGX.
[ paper
| slides
| code ]
Ming-Wei Shih, Mohan Kumar, Taesoo Kim, Ada Gavrilovska.
In Proceedings of the 1st ACM International Workshop on Security in SDN and NFV,
New Orleans, LA, March 2016. Best paper, invited to present at the NFV World Congress
Intel SGX Research -
OpenSGX: An Open Platform for SGX Research.
[ paper
| slides
| code ]
Prerit Jain, Soham Desai, Seongmin Kim, Ming-Wei Shih, JaeHyuk Lee, Changho Choi, Youjung Shin, Taesoo Kim, Brent B. Kang and Dongsu Han.
In Proceedings of the 2016 Network and Distributed System Security Symposium (NDSS 2016),
San Diego, CA, February 2016. Wikipedia: Software Guard Extensions, Intel SGX Research -
Enforcing Kernel Security Invariants with Data Flow Integrity.
[ paper
| slides
| code ]
Chengyu Song, Byoungyoung Lee, Kangjie Lu, William R. Harris, Taesoo Kim and Wenke Lee.
In Proceedings of the 2016 Network and Distributed System Security Symposium (NDSS 2016),
San Diego, CA, February 2016. -
FlexDroid: Enforcing In-App Privilege Separation in Android.
[ paper
| slides ]
Jaebaek Seo, Daehyeok Kim, Donghyun Cho, Taesoo Kim and Insik Shin.
In Proceedings of the 2016 Network and Distributed System Security Symposium (NDSS 2016),
San Diego, CA, February 2016. -
Opportunistic Spinlocks: Achieving Virtual Machine Scalability in the Clouds.
[ paper
| code ]
Sanidhya Kashyap, Changwoo Min, and Taesoo Kim.
ACM SIGOPS Operating Systems Review (OSR), Volumn 50-1,
January 2016. LWN: qspinlock in Linux -
A First Step Towards Leveraging Commodity Trusted Execution Environments for Network Applications.
[ paper
| slides
| code ]
Seongmin Kim, Youjung Shin, Jaehyung Ha, Taesoo Kim, and Dongsu Han.
In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (HotNets 2015),
Philadelphia, PA, November 2015. -
UCognito: Private Browsing without Tears.
[ paper
| slides
| code ]
Meng Xu, Yeongjin Jang, Xinyu Xing, Taesoo Kim, and Wenke Lee.
In Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS 2015),
Denver, CO, October 2015. Observer Innovation -
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks.
[ paper
| slides
| code ]
Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, and Wenke Lee.
In Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS 2015),
Denver, CO, October 2015. Dagstuhl Seminar -
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations.
[ paper
| slides ]
Hongil Kim, Dongkwan Kim, Minhee Kwon, Hyungseok Han, Yeongjin Jang, Dongsu Han, Taesoo Kim, and Yongdae Kim.
In Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS 2015),
Denver, CO, October 2015. Android Security, CERT, Networkworld, Softpedia, pocketnow, VoIPshield, VU#943167, CVE-2015-6614 -
Cross-checking Semantic Correctness: The Case of Finding File System Bugs.
[ paper
| slides
| code ]
Changwoo Min, Sanidhya Kashyap, Byoungyoung Lee, Chengyu Song, and Taesoo Kim.
In Proceedings of the 25th ACM Symposium on Operating Systems Principles (SOSP 2015),
Monterey, CA, October 2015. Bug Report -
Type Casting Verification: Stopping an Emerging Attack Vector.
[ paper
| slides
| code ]
Byoungyoung Lee, Chengyu Song, Taesoo Kim, and Wenke Lee.
In Proceedings of the 24th USENIX Security Symposium (Security 2015),
Washington, DC, August 2015. 2015 Internet Defense Prize ($100k Prize)
Top 10 Finalists, CSAW15
Internet Defense Prize, USENIX Update, Facebook, ZDNet, We Live Security, Science 2.0, hys.org, Scientific Computing, IT Pro Portal, Laboratory Equipment, Gizbot, Science Codex, Business Standard, ECN magazine, The Times of India, CanIndia News, New Indian Express, InfoSec, Social Times, The Register, CTV News, Threat Post, TNW News, The Security Ledger, Georgia Tech News Center, ScienceDaily, Milton Security, ACM TECHNEWS, Gadget 360, SC Magazine, IHS Engineering 360, CVE-2014-1594, … -
Scalability in the Clouds! A Myth or Reality?
[ paper
| slides
| code ]
Sanidhya Kashyap, Changwoo Min, and Taesoo Kim.
In Proceedings of the 6th Asia-Pacific Workshop on Systems (APSys 2015),
Tokyo, Japan, July 2015. Best paper, nominated to Operating Systems Review (OSR)
LWN: qspinlock in Linux -
Lightweight Application-Level Crash Consistency on Transactional Flash Storage.
[ paper
| slides ]
Changwoo Min, Woon-Hak Kang, Taesoo Kim, Sang-Won Lee, and Young Ik Eom.
In Proceedings of the 2015 USENIX Annual Technical Conference (ATC 2015),
Santa Clara, CA, July 2015. -
MetaSync: File Synchronization Across Multiple Untrusted Storage Services.
[ paper
| slides
| code ]
Seungyeop Han, Haichen Shen, Taesoo Kim, Arvind Krishnamurthy, Thomas Anderson, and David Wetherall.
In Proceedings of the 2015 USENIX Annual Technical Conference (ATC 2015),
Santa Clara, CA, July 2015. -
Preventing Use-after-free with Dangling Pointers Nullification.
[ paper
| slides
| code ]
Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Long Lu, and Wenke Lee.
In Proceedings of the 2015 Network and Distributed System Security Symposium (NDSS 2015),
San Diego, CA, February 2015. Best Applied Security Research Paper (CSAW15)
-
RFVP: Rollback-Free Value Prediction with Safe-to-Approximate Loads.
[ paper ]
Amir Yazdanbakhsh, Gennady Pekhimenko, Bradley Thwaites, Hadi Esmaeilzadeh, Taesoo Kim, Onur Mutlu, and Todd C Mowry.
SCS Technical Report GT-CS-15-01, Georgia Institute of Technology,
Atlanta, GA, January 2015. -
Identifying Information Disclosure in Web Applications with Retroactive Auditing.
[ paper
| slides
| code ]
Haogang Chen, Taesoo Kim, Xi Wang, M. Frans Kaashoek, and Nickolai Zeldovich.
In Proceedings of the 11th Symposium on Operating Systems Design and Implementation (OSDI 2014),
Broomfield, CO, October 2014. -
Abusing Performance Optimization Weaknesses to Bypass ASLR.
[ slides ]
Byoungyoung Lee, Yeongjin Jang, Tielei Wang, Chengyu Song, Long Lu, Taesoo Kim, and Wenke Lee.
BlackHat USA 2014,
Las Vegas, NV, August 2014. Phrack, ISS Source, IT Researches, Embedded -
Automatic Intrusion Recovery with System-wide History.
[ paper
| slides ]
Taesoo Kim.
Ph.D. Thesis, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science,
Cambridge, MA, June 2014. -
MetaSync: File Synchronization Across Multiple Untrusted Storage Services.
[ paper
| code ]
Seungyeop Han, Haichen Shen, Taesoon Kim, Arvind Krishnamurthy, Thomas Anderson, and David Wetherall.
Technical Report UW-CSE-14-05-02, University of Washington Computer Science and Engineering,
Seattle, WA, May 2014. -
From Zygote to Morula: Fortifying Weakened ASLR on Android.
[ paper
| slides
| code ]
Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, and Wenke Lee.
In Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P 2014),
San Jose, CA, May 2014. LWN, Copperhead -
Asynchronous Intrusion Recovery for Interconnected Web Services.
[ paper
| slides
| code ]
Ramesh Chandra, Taesoo Kim, and Nickolai Zeldovich.
In Proceedings of the 24th ACM Symposium on Operating Systems Principles (SOSP 2013),
Farmington, PA, November 2013. -
Optimizing Unit Test Execution in Large Software Programs using Dependency Analysis.
[ paper
| slides ]
Taesoo Kim, Ramesh Chandra, and Nickolai Zeldovich.
In Proceedings of the 4th Asia-Pacific Workshop on Systems (APSys 2013),
Singapore, July 2013. -
Security Bugs in Embedded Interpreters.
[ paper
| slides ]
Haogang Chen, Cody Cutler, Taesoo Kim, Yandong Mao, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek.
In Proceedings of the 4th Asia-Pacific Workshop on Systems (APSys 2013),
Singapore, July 2013. -
Practical and Effective Sandboxing for Non-root Users.
[ paper
| slides
| code ]
Taesoo Kim and Nickolai Zeldovich.
In Proceedings of the 2013 USENIX Annual Technical Conference (ATC 2013),
San Jose, CA, June 2013. Hacker News, Wikipedia: seccomp, Coders Grid, AlternativeTo, TorProject -
Efficient Patch-based Auditing for Web Application Vulnerabilities.
[ paper
| slides
| code ]
Taesoo Kim, Ramesh Chandra, and Nickolai Zeldovich.
In Proceedings of the 10th Symposium on Operating Systems Design and Implementation (OSDI 2012),
Hollywood, CA, October 2012. -
System-Level Protection Against Cache-based Side Channel Attacks in the Cloud.
[ paper
| slides ]
Taesoo Kim, Marcus Peinado, and Gloria Mainar-Ruiz.
In Proceedings of the 21st USENIX Security Symposium (Security 2012),
Bellevue, WA, August 2012. -
Recovering from Intrusions in Distributed Systems with Dare.
[ paper
| slides
| code ]
Taesoo Kim, Ramesh Chandra, and Nickolai Zeldovich.
In Proceedings of the 3rd Asia-Pacific Workshop on Systems (APSys 2012),
Seoul, South Korea, July 2012. -
Intrusion Recovery for Database-backed Web Applications.
[ paper
| slides
| code ]
Ramesh Chandra, Taesoo Kim, Meelap Shah, Neha Narula, and Nickolai Zeldovich.
In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP 2011),
Cascais, Portugal, October 2011. -
Intrusion Recovery using Selective Re-execution.
[ paper
| slides
| code ]
Taesoo Kim, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek.
In Proceedings of the 9th Symposium on Operating Systems Design and Implementation (OSDI 2010),
Vancouver, Canada, October 2010. Network World -
Making Linux Protection Mechanisms Egalitarian with UserFS.
[ paper
| slides ]
Taesoo Kim and Nickolai Zeldovich.
In Proceedings of the 19th USENIX Security Symposium (Security 2010),
Washington, DC, August 2010.
Professor,