Conference publications
- Reassembly is Hard: A Reflection on Challenges and Strategies
- H Kim, S Kim, J Lee, K Jee, SK Cha
- In Proceedings of Usenix Security Aug. 2023
- Back-Propagating System Dependency Impact for Attack Investigation
P Fang, P Gao, C Liu, E Ayday, K Jee, T Wang, Y Ye, Z Liu, X Xiao
In Proceedings of Usenix Security Aug. 2022 - SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression
P Fei, Z Li, Z Wang, X Yu, D Li, K Jee
In Proceedings of Usenix Security Aug. 2021. - UTrack: Enterprise User Tracking Based on OS-Level Audit Logs
Y Li, Z Wu, H Wang, K Sun, Z Li, K Jee, J Rhee, H Chen
In Proceedings of DIMVA, May 2021. - This is Why We Can’t Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage
WU Hassan, D Li, K Jee, X Yu, K Zou, D Wang, Z Chen, Z Li, J Rhee, J Gui, A Bates
In Proceedings of ACSAC, Dec. 2020. - Detecting Malware Injection with Program-DNS Behavior
Y Sun, K Jee, S Sivakorn, Z Li, C Lumezanu, L Korts-Parn, Z Wu, J Rhee, C Kim, M Chiang, P Mittal
In Proceedings of EuroSnP, Sep. 2020. - APTrace: A Responsive System for Agile Enterprise Level Causality Analysis
J. Gui, D. Li, Z. Chen, J. Rhee, X. Xiao, M. Zhang, K. Jee, Z. Li, and H. Chen
In Proceedings of ICDE, May 2020. - You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis
Q. Wang, W. U. Hassan, D. Li, K. Jee, X. Yu, K. Zou, J. Rhee, Z. Chen, W. Cheng, C. A. Gunter, H. Chen, Haifeng
In Proceedings of NDSS, Feb. 2020. - Countering Malicious Processes with End-point DNS Monitoring
S. Sivakorn, K. Jee, Y. Sun, L. Kort-Parn, Z. Li, C. Lumezanu, Z. Wu, L. Tang, D. Li
In Proceedings of NDSS, Feb. 2019. - NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage
W. U. Hassan, S. Guo, D. Li, Z. Chen, K. Jee, Z. Li, A. Bates
In Proceedings of NDSS, Nov. 2019. - NodeMerge: Template-Based Efficient Data Reduction For Big-Data Causality Analysis
Y. Tang, D. Li, Z. Li, M. Zhang, K. Jee, Z. Wu, J. Rhee, X. Xiao, F. Xu, Q. Li
In Proceedings of CCS, Nov. 2018. - SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
P. Gao, X. Xiao, D. Li, Z. Li, K. Jee, Z. Wu, C. H. Kim, S. R. Kulkarni, P. Mittal
In Proceedings of Usenix Security Aug. 2018. - AIQL: Enabling Efficient Attack Investigation from System Monitoring Data
P. Gao, X. Xiao, Z. Li, K. Jee, F. Xu, S. R. Kulkarni, P. Mittal
In Proceedings of Usenix ATC, Jul. 2018. - Towards a timely causality analysis for enterprise security
Y. Liu, M. Zhang, D. Li, K. Jee, Z. Li, Z Wu, J Rhee, P Mittal
In Proceedings of NDSS, Feb. 2018. - High fidelity data reduction for big data security dependency analyses
Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang
In Proceedings of CCS, Nov. 2016. - IntFlow: improving the accuracy of arithmetic error detection using information flow tracking
M Pomonis, T Petsios, K Jee, M Polychronakis, AD Keromytis
In Proceedings of ACSAC, Oct. 2014. - ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking
K. Jee, V. P. Kemerlis, A. D. Keromytis and G. Portokalidis
In Proceedings of ACM CCS, Nov. 2013. - libdft: Practical Dynamic Data Flow Tracking for Commodity Systems
V. P. Kemerlis, G. Portokalidis, K. Jee, and A. D. Keromytis
In Proceedings of VEE, Apr. 2012 - A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware
K. Jee, G. Portokalidis, V. P. Kemerlis, S. Ghosh, D. I. August, and A. D. Keromytis
In Proceedings of NDSS, Feb. 2012 - An Adversarial Evaluation of Network Signaling and Control Mechanisms
K. Jee, S. Sidiroglou-Douskos, A. Stavrou, and A. D. Keromytis
In Proceedings of ICISC, Dec. 2010
Demo papers
- Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection (Demo paper)
P. Gao, X. Xiao, D. Li, K. Jee, H. Chen, S. Kulkarni, and P. Mittal
In Proceedings of ICDE, May 2020. - A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security (Demo paper)
P.Gao, X.Xiao, Z.Li, K.Jee, F.Xu, S.R.Kulkarni, P.Mittal
In Proceedings of VLDB, Aug. 2019.
Books
- AIX Practical performance and tuning guide
K. Hayashi, K. Jee, O. Lascu, H. Pienaar, S. Schreitmueller, T. Tarquinio, J. Thompson.
Published by IBM Press books, ISBN-0738491799 March 2005
Thesis
- On Efficiency and Accuracy of Data Flow Tracking Systems
Computer Science Department, Columbia University in the City of New York. 2016
Patents
- Host behavior and network analytics based automotive secure gateway
J Rhee, H Li, HAO Shuai, CH Kim, Z Wu, LI Zhichun, K Jee, L Korts-Parn
US Patent 10,931,635 on Feb 2021 - Automated software safeness categorization with installation lineage and hybrid information sources
J Rhee, Z Wu, L Korts-Parn, K Jee, LI Zhichun, O Setayeshfar
US Patent 10,929,539 on Feb 2021 - Path-based program lineage inference analysis
J Rhee, Z Wu, L Korts-Parn, K Jee, LI Zhichun, O Setayeshfar
US Patent 10,853,487 on Dec 2020 - Graphics processing unit accelerated trusted execution environment
CH Kim, J Rhee, K Jee, LI Zhichun, A Ahmad, H Chen
US Patent App. 16/787,610 on Aug 2020 - Real-time threat alert forensic analysis
D Li, K Jee, LI Zhichun, Z Chen, X Yu
US Patent App. 16/781,366 on Aug 2020 - Template based data reduction for security related information flow data
D Li, K Jee, LI Zhichun, M Zhang, Z Wu
US Patent 10,733,149 on Aug 2020 - Confidential machine learning with program compartmentalization
CH Kim, J Rhee, K Jee, LI Zhichun
US Patent App. 16/693,710 on Jun 2020 - Automated threat alert triage via data provenance
D Li, K Jee, Z Chen, LI Zhichun, WU Hassan
US Patent App. 16/507,353 on Aug 2020 - Host level detect mechanism for malicious DNS activities
K Jee, LI Zhichun, G Jiang, L Korts-Parn, Z Wu, Y Sun, J Rhee
US Patent 10,574,674 on Feb 2020 - Automated threat alert triage via data provenance
D Li, K Jee, Z Chen, LI Zhichun, WU Hassan
US Patent App. 16/507,353 issued on Dec 2019 - Blackbox program privilege flow analysis with inferred program behavior context
J. Rhee, Y. Jeon, L. I. Zhichun, K. Jee, Z. Wu, and G. Jiang
US Patent App. 10/505,962, issued on Dec 2019. - User-added-value-based ransomware detection and prevention
Z. Wu, Y. Li, J. Rhee, K. Jee, Z. Li, J. Kamimura, L. Tang, and Z. Chen
US Patent App. 16/379,024, issued on Nov 2019. - Fine-grained analysis and prevention of invalid privilege transitions
J. Rhee, Y. Jeon, Z. Li, K. Jee, Z. Wu, and G. Jiang US Patent App. 15/623,589, issued on Sep 2019. - Extraction and comparison of hybrid program binary features
J. Rhee, Z. Li, Z. Wu, K. Jee, and G. Jiang
US Patent App. 15/479,928, issued on May 2019. - Host behavior and network analytics-based automotive secure gateway
J Rhee, H Li, Hao Shuai, CH Kim, Z Wu, LI Zhichun, K Jee, L Korts-Parn
US Patent App. 16/146,166, issued on Apr 2019. - Inter-application dependency analysis for improving computer system threat detection
D Li, K Jee, Z Chen, LA Tang, LI Zhichun
US Patent App. 16/006,164 issued on Mar 2019. - Path-based program lineage inference analysis
J Rhee, Z Wu, L Korts-Parn, K Jee, LI Zhichun, O Setayeshfar
US Patent App. 16/039,993 issued on Feb 2019. - Automated software safeness categorization with installation lineage and hybrid information sources.
J Rhee, Z Wu, L Korts-Parn, K Jee:, LI Zhichun, O Setayeshfar
US Patent App. 16/040,086 issued on Feb 2019. - Template-based data reduction for security-related information flow data.
D Li, K Jee, Z Wu, M Zhang, Z Li.
US Patent 15/979,512, issued on Nov 2018. - Template based data reduction for commercial data mining.
D Li,K Jee, Z Wu, M Zhang, Z Li.
US Patent 15/979,514, issued on Nov 2018. - Blackbox Program Privilege Flow Analysis with Inferred Program Behavior Context.
J Rhee, Y Jeon, Z LI, K Jee, Z Wu, G Jiang.
US Patent 15/623,538, issued on Feb 2018. - Fine-Grained Analysis and Prevention of Invalid Privilege Transitions.
J Rhee, Y Jeon, Z LI, K Jee, Z Wu, G Jiang.
US Patent 15/623,589, issued on Feb 2018. - Automated BlackBox inference of external origin user behavior.
Z Wu, J Rhee, Y Jeon, Z Li, K Jee, G Jiang. US Patent 15/652,796, issued on Feb 2018. - Host level detection mechanism for malicious DNS activities.
K Jee, Z LI, G Jiang, L Korts-Parn, Z Wu, Y Sun, J Rhee. US Patent 15/644,018, issued on Jan 2018. - Extraction and comparison of hybrid program binary features.
J Rhee, Z Li, Z Wu, K Jee, G Jiang. US Patent 15/479,928, issued on Oct 2017. - High Fidelity Data Reduction for System Dependency Analysis.
Z Wu, Z Li, J Rhee, F Xu, G Jiang, K Jee, X Xiao, Z Xu. US Patent 15/416,346 issued on Aug 2017 - Intrusion Detection Using Efficient System Dependency Analysis.
Z Wu, Z Li, J Rhee, F Xu, G Jiang, K Jee, X Xiao, Z Xu, J Rhee. US Patent 15/416,462, issued on Aug 2017