• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Kangkook Jee

  • Home
  • Research
  • Teaching
  • Team

Publications

The page presents academic outcomes in various forms, such as conference papers, archived preprints, journal articles, books, and patents.

Conference publications

  1. PyLingual: Toward Perfect Decompilation of Evolving High-Level Languages
    J Wiedemeier, E Tarbet, M Zheng, S Ko, J Ouyang, SK Cha, K Jee
    IEEE Symposium on Security and Privacy (SP) 2025
  2. PyLingual: A Python Decompilation Framework for Evolving Python Versions
    J Wiedemeier, E Tarbet, M Zheng, J Teng, X Liu, M Kim, J Ouyang, SK Cha, K Jee
    BlackHat USA, Aug 2024
  3. ProvIoT: Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security
    K Mukherjee, J D Wiedemeier, Q Wang, J Kamimura, J J Rhee, J Wei, Z Li, X Yu, L Tang, J Gui, K Jee
    International Conference on Applied Cryptography and Network Security (ACNS), Mar 2024
  4. United We Stand, Divided We Fall: Networks to Graph (N2G) Abstraction for Robust Graph Classification under Graph Label Corruption
    Z Zhen, Y Chen, M Kantarcioglu , Y Gel, K Jee
    In Learning on Graphs Conference (LOG), Dec 2023
  5. An Investigation on the Fragility of Graph Neural Networks: The Impact of Node Feature Modification on Graph Classification Accuracy
    C Wang, Y Zhou, K Jee, M Kantarcioglu
    IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Nov 2023
  6. Evading Provenance-Based ML Detectors with Adversarial System Actions
    K Mukherjee, J D Wiedemeier, T Wang, J Wei, M Kim, M Kantarcioglu, K Jee
    In Proceedings of Usenix Security, Aug. 2023
  7. Reassembly is Hard: A Reflection on Challenges and Strategies
    H Kim, S Kim, J Lee, K Jee, SK Cha
    In Proceedings of Usenix Security, Aug. 2023
  8. A Hands-on Oriented Workforce Development Framework for Space Cyber-Infrastructure (CI)
    K Jee, M Lee, O Daescu, M Quevedo-Lopez
    In Proceedings of ISS Research Development Conference (ISSRDC), Aug. 2023
  9. Back-Propagating System Dependency Impact for Attack Investigation
    P Fang, P Gao, C Liu, E Ayday, K Jee, T Wang, Y Ye, Z Liu, X Xiao
    In Proceedings of Usenix Security Aug. 2022
  10. SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression
    P Fei, Z Li, Z Wang, X Yu, D Li, K Jee
    In Proceedings of Usenix Security Aug. 2021.
  11. UTrack: Enterprise User Tracking Based on OS-Level Audit Logs
    Y Li, Z Wu, H Wang, K Sun, Z Li, K Jee, J Rhee, H Chen
    In Proceedings of DIMVA, May 2021.
  12. This is Why We Can’t Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage.
    WU Hassan, D Li, K Jee, X Yu, K Zou, D Wang, Z Chen, Z Li, J Rhee, J Gui, A Bates
    In Proceedings of ACSAC, Dec. 2020.
  13. Detecting Malware Injection with Program-DNS Behavior
    Y Sun, K Jee, S Sivakorn, Z Li, C Lumezanu, L Korts-Parn, Z Wu, J Rhee, C Kim, M Chiang, P Mittal
    In Proceedings of EuroSnP, Sep. 2020.
  14. Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning
    G Ayoade, K Akbar, P Sahoo, Y Gao, A Agarwal, K Jee, L Khan, A Singhal
    IEEE Conference on Communications and Network Security (CNS) 2020
  15. APTrace: A Responsive System for Agile Enterprise Level Causality Analysis
    J Gui, D Li, Z Chen, J Rhee, X Xiao, M Zhang, K Jee, Z Li, and H Chen
    In Proceedings of ICDE, May 2020.
  16. You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis
    Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, CA Gunter, H Chen
    In Proceedings of NDSS, Feb. 2020.
  17. Countering Malicious Processes with End-point DNS Monitoring
    S Sivakorn, K. Jee, Y. Sun, L. Kort-Parn, Z. Li, C. Lumezanu, Z. Wu, L. Tang, D. Li
    In Proceedings of NDSS, Feb. 2019.
  18. NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage
    WU Hassan, S Guo, D Li, Z Chen, K Jee, Z Li, A Bates
    In Proceedings of NDSS, Nov. 2019.
  19. NodeMerge: Template-Based Efficient Data Reduction For Big-Data Causality Analysis
    Y Tang, D Li, Z Li, M Zhang, K Jee, Z Wu, J Rhee, X Xiao, F Xu, Q Li
    In Proceedings of CCS, Nov. 2018.
  20. SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
    P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
    In Proceedings of Usenix Security Aug. 2018.
  21. AIQL: Enabling Efficient Attack Investigation from System Monitoring Data
    P Gao, X Xiao, Z Li, K Jee, F Xu, SR Kulkarni, P Mittal
    In Proceedings of Usenix ATC, Jul. 2018.
  22. Towards a timely causality analysis for enterprise security
    Y Liu, M Zhang, D Li, K Jee, Z Li, Z Wu, J Rhee, P Mittal
    In Proceedings of NDSS, Feb. 2018.
  23. High fidelity data reduction for big data security dependency analyses
    Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang
    In Proceedings of CCS, Nov. 2016.
  24. IntFlow: improving the accuracy of arithmetic error detection using information flow tracking
    M Pomonis, T Petsios, K Jee, M Polychronakis, AD Keromytis
    In Proceedings of ACSAC, Oct. 2014.
  25. ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking
    K. Jee, V. P. Kemerlis, A. D. Keromytis and G. Portokalidis
    In Proceedings of ACM CCS, Nov. 2013.
  26. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems
    V. P. Kemerlis, G. Portokalidis, K. Jee, and A. D. Keromytis
    In Proceedings of VEE, Apr. 2012
  27. A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware
    K. Jee, G. Portokalidis, V. P. Kemerlis, S. Ghosh, D. I. August, and A. D. Keromytis
    In Proceedings of NDSS, Feb. 2012
  28. An Adversarial Evaluation of Network Signaling and Control Mechanisms
    K. Jee, S. Sidiroglou-Douskos, A. Stavrou, and A. D. Keromytis
    In Proceedings of ICISC, Dec. 2010

Journals

  1. Advanced Persistent Threat Detection Using Data Provenance and Metric Learning
    K Akbar, Y Wang, G Ayoade, Y Gao, A. Singhal, L Khan, B Thuraisingham, K Jee
    IEEE Transactions on Dependable and Secure Computing 2022

Archive preprints

  1. Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features
    K Mukherjee, J Wiedemeier, T Wang, M Kim, F Chen, M Kantarcioglu, K Jee
    CoRR/abs/2306.00934 2023

Tutorials

  1. Tutorial: Perfect Decompilation of Python Bytecode with PyLingual
    J Wiedemeier, K Jee
    Co-located with PLDI 2025

Demo papers

  1. Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection (Demo paper)
    P. Gao, X. Xiao, D. Li, K. Jee, H. Chen, S. Kulkarni, and P. Mittal
    In Proceedings of ICDE, May 2020.
  2. A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security (Demo paper)
    P.Gao, X.Xiao, Z.Li, K.Jee, F.Xu, S.R.Kulkarni, P.Mittal
    In Proceedings of VLDB, Aug. 2019.

Books

  • AIX Practical performance and tuning guide 
    K. Hayashi, K. Jee, O. Lascu, H. Pienaar, S. Schreitmueller, T. Tarquinio, J. Thompson.
    Published by IBM Press books, ISBN-0738491799 March 2005

Thesis

  • On Efficiency and Accuracy of Data Flow Tracking Systems
    Computer Science Department, Columbia University in the City of New York. 2016

Patents

  1. Confidential machine learning with program compartmentalization
    CH Kim, J Rhee, K Jee, LI Zhichun
    US Patent 11,423,142
  2. Graphics processing unit accelerated trusted execution environment
    CH Kim, J Rhee, K Jee, LI Zhichun, A Ahmad, H Chen
    US Patent 11,295,008
  3. Real-time threat alert forensic analysis
    D Li, K Jee, LI Zhichun, Z Chen, X Yu
    US Patent 11,275,832
  4. User-added-value-based ransomware detection and prevention
    Z Wu, Y Li, J Rhee, K Jee, Z Li, J Kamimura, LA Tang, Z Chen
    US Patent 11,223,649
  5. Automated threat alert triage via data provenance
    D Li, K Jee, Z Chen, LI Zhichun, WU Hassan
    US Patent 11,194,906
  6. Inter-application dependency analysis for improving computer system threat detection
    D Li, K Jee, Z Chen, LA Tang, LI Zhichun
    US Patent 11,030,308
  7. Template based data reduction for commercial data mining
    D Li, K Jee, LI Zhichun, M Zhang, Z Wu
    US Patent 11,030,157
  8. Host behavior and network analytics based automotive secure gateway
    J Rhee, H Li, HAO Shuai, CH Kim, Z Wu, LI Zhichun, K Jee, L Korts-Parn
    US Patent 10,931,635
  9. Automated software safeness categorization with installation lineage and hybrid information sources
    J Rhee, Z Wu, L Korts-Parn, K Jee, LI Zhichun, O Setayeshfar
    US Patent 10,929,539
  10. Path-based program lineage inference analysis
    J Rhee, Z Wu, L Korts-Parn, K Jee, LI Zhichun, O Setayeshfar
    US Patent 10,853,487
  11. Template based data reduction for security related information flow data
    D Li, K Jee, LI Zhichun, M Zhang, Z Wu
    US Patent 10,733,149
  12. Automated blackbox inference of external origin user behavior
    Z Wu, J Rhee, J Yuseok, LI Zhichun, K Jee, G Jiang
    US Patent 10,572,661
  13. Host level detect mechanism for malicious DNS activities
    K Jee, LI Zhichun, G Jiang, L Korts-Parn, Z Wu, Y Sun, J Rhee
    US Patent 10,574,674
  14. Blackbox program privilege flow analysis with inferred program behavior context
    J Rhee, J Yuseok, LI Zhichun, K Jee, Z Wu, G Jiang
    US Patent 10,505,962
  15. Fine-grained analysis and prevention of invalid privilege transitions
    J Rhee, J Yuseok, LI Zhichun, K Jee, Z Wu, G Jiang
    US Patent 10,402,564
  16. Extraction and comparison of hybrid program binary features
    J Rhee, LI Zhichun, Z Wu, K Jee, G Jiang
    US Patent 10,289,843

Primary Sidebar

Kangkook Jee
(지강국, 池康國, ΚΩΣΤΑΣ)

Assistant Professor
Computer Science
The University of Texas at Dallas

kangkook.jee
[at] utdallas [dot] edu
ECSS 3.226

Education

  • Ph.D. Computer Sciences (2014), Columbia University, NY
  • B.A. Mathematics (2000),
    Korea University, South Korea

© 2025 Kangkook Jee. All Rights Reserved

  • Home
  • Research
  • Teaching
  • Team