• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Kangkook Jee

  • Home
  • Research
  • Teaching
  • Team

Publications

Conference publications

  1. Reassembly is Hard: A Reflection on Challenges and Strategies
  2. H Kim, S Kim, J Lee, K Jee, SK Cha
  3. In Proceedings of Usenix Security Aug. 2023
  4. Back-Propagating System Dependency Impact for Attack Investigation
    P Fang, P Gao, C Liu, E Ayday, K Jee, T Wang, Y Ye, Z Liu, X Xiao
    In Proceedings of Usenix Security Aug. 2022
  5. SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression
    P Fei, Z Li, Z Wang, X Yu, D Li, K Jee
    In Proceedings of Usenix Security Aug. 2021.
  6. UTrack: Enterprise User Tracking Based on OS-Level Audit Logs
    Y Li, Z Wu, H Wang, K Sun, Z Li, K Jee, J Rhee, H Chen
    In Proceedings of DIMVA, May 2021.
  7. This is Why We Can’t Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage
    WU Hassan, D Li, K Jee, X Yu, K Zou, D Wang, Z Chen, Z Li, J Rhee, J Gui, A Bates
    In Proceedings of ACSAC, Dec. 2020.
  8. Detecting Malware Injection with Program-DNS Behavior
    Y Sun, K Jee, S Sivakorn, Z Li, C Lumezanu, L Korts-Parn, Z Wu, J Rhee, C Kim, M Chiang, P Mittal
    In Proceedings of EuroSnP, Sep. 2020.
  9. APTrace: A Responsive System for Agile Enterprise Level Causality Analysis
    J. Gui, D. Li, Z. Chen, J. Rhee, X. Xiao, M. Zhang, K. Jee, Z. Li, and H. Chen
    In Proceedings of ICDE, May 2020.
  10. You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis
    Q. Wang, W. U. Hassan, D. Li, K. Jee, X. Yu, K. Zou, J. Rhee, Z. Chen, W. Cheng, C. A. Gunter, H. Chen, Haifeng
    In Proceedings of NDSS, Feb. 2020.
  11. Countering Malicious Processes with End-point DNS Monitoring
    S. Sivakorn, K. Jee, Y. Sun, L. Kort-Parn, Z. Li, C. Lumezanu, Z. Wu, L. Tang, D. Li
    In Proceedings of NDSS, Feb. 2019.
  12. NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage
    W. U. Hassan, S. Guo, D. Li, Z. Chen, K. Jee, Z. Li, A. Bates
    In Proceedings of NDSS, Nov. 2019.
  13. NodeMerge: Template-Based Efficient Data Reduction For Big-Data Causality Analysis
    Y. Tang, D. Li, Z. Li, M. Zhang, K. Jee, Z. Wu, J. Rhee, X. Xiao, F. Xu, Q. Li
    In Proceedings of CCS, Nov. 2018.
  14. SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
    P. Gao, X. Xiao, D. Li, Z. Li, K. Jee, Z. Wu, C. H. Kim, S. R. Kulkarni, P. Mittal
    In Proceedings of Usenix Security Aug. 2018.
  15. AIQL: Enabling Efficient Attack Investigation from System Monitoring Data
    P. Gao, X. Xiao, Z. Li, K. Jee, F. Xu, S. R. Kulkarni, P. Mittal
    In Proceedings of Usenix ATC, Jul. 2018.
  16. Towards a timely causality analysis for enterprise security
    Y. Liu, M. Zhang, D. Li, K. Jee, Z. Li, Z Wu, J Rhee, P Mittal
    In Proceedings of NDSS, Feb. 2018.
  17. High fidelity data reduction for big data security dependency analyses
    Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang
    In Proceedings of CCS, Nov. 2016.
  18. IntFlow: improving the accuracy of arithmetic error detection using information flow tracking
    M Pomonis, T Petsios, K Jee, M Polychronakis, AD Keromytis
    In Proceedings of ACSAC, Oct. 2014.
  19. ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking
    K. Jee, V. P. Kemerlis, A. D. Keromytis and G. Portokalidis
    In Proceedings of ACM CCS, Nov. 2013.
  20. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems
    V. P. Kemerlis, G. Portokalidis, K. Jee, and A. D. Keromytis
    In Proceedings of VEE, Apr. 2012
  21. A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware
    K. Jee, G. Portokalidis, V. P. Kemerlis, S. Ghosh, D. I. August, and A. D. Keromytis
    In Proceedings of NDSS, Feb. 2012
  22. An Adversarial Evaluation of Network Signaling and Control Mechanisms
    K. Jee, S. Sidiroglou-Douskos, A. Stavrou, and A. D. Keromytis
    In Proceedings of ICISC, Dec. 2010

Demo papers

  1. Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection (Demo paper)
    P. Gao, X. Xiao, D. Li, K. Jee, H. Chen, S. Kulkarni, and P. Mittal
    In Proceedings of ICDE, May 2020.
  2. A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security (Demo paper)
    P.Gao, X.Xiao, Z.Li, K.Jee, F.Xu, S.R.Kulkarni, P.Mittal
    In Proceedings of VLDB, Aug. 2019.

Books

  • AIX Practical performance and tuning guide 
    K. Hayashi, K. Jee, O. Lascu, H. Pienaar, S. Schreitmueller, T. Tarquinio, J. Thompson.
    Published by IBM Press books, ISBN-0738491799 March 2005

Thesis

  • On Efficiency and Accuracy of Data Flow Tracking Systems
    Computer Science Department, Columbia University in the City of New York. 2016

Patents

  1. Host behavior and network analytics based automotive secure gateway
    J Rhee, H Li, HAO Shuai, CH Kim, Z Wu, LI Zhichun, K Jee, L Korts-Parn
    US Patent 10,931,635 on Feb 2021
  2. Automated software safeness categorization with installation lineage and hybrid information sources
    J Rhee, Z Wu, L Korts-Parn, K Jee, LI Zhichun, O Setayeshfar
    US Patent 10,929,539 on Feb 2021
  3. Path-based program lineage inference analysis
    J Rhee, Z Wu, L Korts-Parn, K Jee, LI Zhichun, O Setayeshfar
    US Patent 10,853,487 on Dec 2020
  4. Graphics processing unit accelerated trusted execution environment
    CH Kim, J Rhee, K Jee, LI Zhichun, A Ahmad, H Chen
    US Patent App. 16/787,610 on Aug 2020
  5. Real-time threat alert forensic analysis
    D Li, K Jee, LI Zhichun, Z Chen, X Yu
    US Patent App. 16/781,366 on Aug 2020
  6. Template based data reduction for security related information flow data
    D Li, K Jee, LI Zhichun, M Zhang, Z Wu
    US Patent 10,733,149 on Aug 2020
  7. Confidential machine learning with program compartmentalization
    CH Kim, J Rhee, K Jee, LI Zhichun
    US Patent App. 16/693,710 on Jun 2020
  8. Automated threat alert triage via data provenance
    D Li, K Jee, Z Chen, LI Zhichun, WU Hassan
    US Patent App. 16/507,353 on Aug 2020
  9. Host level detect mechanism for malicious DNS activities
    K Jee, LI Zhichun, G Jiang, L Korts-Parn, Z Wu, Y Sun, J Rhee
    US Patent 10,574,674 on Feb 2020
  10. Automated threat alert triage via data provenance
    D Li, K Jee, Z Chen, LI Zhichun, WU Hassan
    US Patent App. 16/507,353 issued on Dec 2019
  11. Blackbox program privilege flow analysis with inferred program behavior context
    J. Rhee, Y. Jeon, L. I. Zhichun, K. Jee, Z. Wu, and G. Jiang
    US Patent App. 10/505,962, issued on Dec 2019.
  12. User-added-value-based ransomware detection and prevention
    Z. Wu, Y. Li, J. Rhee, K. Jee, Z. Li, J. Kamimura, L. Tang, and Z. Chen
    US Patent App. 16/379,024, issued on Nov 2019.
  13. Fine-grained analysis and prevention of invalid privilege transitions
    J. Rhee, Y. Jeon, Z. Li, K. Jee, Z. Wu, and G. Jiang US Patent App. 15/623,589, issued on Sep 2019.
  14. Extraction and comparison of hybrid program binary features
    J. Rhee, Z. Li, Z. Wu, K. Jee, and G. Jiang
    US Patent App. 15/479,928, issued on May 2019.
  15. Host behavior and network analytics-based automotive secure gateway
    J Rhee, H Li, Hao Shuai, CH Kim, Z Wu, LI Zhichun, K Jee, L Korts-Parn
    US Patent App. 16/146,166, issued on Apr 2019.
  16. Inter-application dependency analysis for improving computer system threat detection
    D Li, K Jee, Z Chen, LA Tang, LI Zhichun
    US Patent App. 16/006,164 issued on Mar 2019.
  17. Path-based program lineage inference analysis
    J Rhee, Z Wu, L Korts-Parn, K Jee, LI Zhichun, O Setayeshfar
    US Patent App. 16/039,993 issued on Feb 2019.
  18. Automated software safeness categorization with installation lineage and hybrid information sources.
    J Rhee, Z Wu, L Korts-Parn, K Jee:, LI Zhichun, O Setayeshfar
    US Patent App. 16/040,086 issued on Feb 2019.
  19. Template-based data reduction for security-related information flow data.
    D Li, K Jee, Z Wu, M Zhang, Z Li.
    US Patent 15/979,512, issued on Nov 2018.
  20. Template based data reduction for commercial data mining.
    D Li,K Jee, Z Wu, M Zhang, Z Li.
    US Patent 15/979,514, issued on Nov 2018.
  21. Blackbox Program Privilege Flow Analysis with Inferred Program Behavior Context.
    J Rhee, Y Jeon, Z LI, K Jee, Z Wu, G Jiang.
    US Patent 15/623,538, issued on Feb 2018.
  22. Fine-Grained Analysis and Prevention of Invalid Privilege Transitions.
    J Rhee, Y Jeon, Z LI, K Jee, Z Wu, G Jiang.
    US Patent 15/623,589, issued on Feb 2018.
  23. Automated BlackBox inference of external origin user behavior.
    Z Wu, J Rhee, Y Jeon, Z Li, K Jee, G Jiang. US Patent 15/652,796, issued on Feb 2018.
  24. Host level detection mechanism for malicious DNS activities.
    K Jee, Z LI, G Jiang, L Korts-Parn, Z Wu, Y Sun, J Rhee. US Patent 15/644,018, issued on Jan 2018.
  25. Extraction and comparison of hybrid program binary features.
    J Rhee, Z Li, Z Wu, K Jee, G Jiang. US Patent 15/479,928, issued on Oct 2017.
  26. High Fidelity Data Reduction for System Dependency Analysis.
    Z Wu, Z Li, J Rhee, F Xu, G Jiang, K Jee, X Xiao, Z Xu. US Patent 15/416,346 issued on Aug 2017
  27. Intrusion Detection Using Efficient System Dependency Analysis.
    Z Wu, Z Li, J Rhee, F Xu, G Jiang, K Jee, X Xiao, Z Xu, J Rhee. US Patent 15/416,462, issued on Aug 2017

Primary Sidebar

Kangkook Jee
(지강국, 池康國, ΚΩΣΤΑΣ)

Assistant Professor
Computer Science
The University of Texas at Dallas

kangkook.jee
[at] utdallas [dot] edu
ECSS 3.226

Education

  • Ph.D. Computer Sciences (2014), Columbia University, NY
  • B.A. Mathematics (2000),
    Korea University, South Korea

© 2022 Kangkook Jee. All Rights Reserved

  • Home
  • Research
  • Teaching
  • Team