• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Kangkook Jee

  • Home
  • Research
  • Teaching
  • Team

Research

Dr. Jee’s research interest spans to cover the overall security and safety of various computer systems, which range from microcontroller unit (MCU) devices to general-purpose systems. Traditional system topics such as operating systems, virtualization, and program languages are his main research primitives. With these, Dr. Jee has explored both offensive and defensive aspects of computer systems. 

Recently, his research has extended to behavioral system modeling to counter highly evasive and stealthy attack vectors contrived by the high-profiled attackers. Many of his current research leverages the system provenance that to gain fine-granular, low-level system events within and across multiple systems.

Selected publications (full list)

Papers are listed in chronicle order.

  1. Reassembly is Hard: A Reflection on Challenges and Strategies
    H Kim, S Kim, J Lee, K Jee, SK Cha
    In Proceedings of Usenix Security Aug. 2023
  2. Back-Propagating System Dependency Impact for Attack Investigation
    P Fang, P Gao, C Liu, E Ayday, K Jee, T Wang, Y Ye, Z Liu, X Xiao
    In Proceedings of Usenix Security Aug. 2022
  3. SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression
    P Fei, Z Li, Z Wang, X Yu, D Li, K Jee
    In Proceedings of Usenix Security Aug. 2021
  4. You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis
    Q. Wang, W. U. Hassan, D. Li, K. Jee, X. Yu, K. Zou, J. Rhee, Z. Chen, W. Cheng, C. A. Gunter, H. Chen, Haifeng
    In Proceedings of NDSS, Feb. 2020
  5. Countering Malicious Processes with End-point DNS Monitoring
    S. Sivakorn, K. Jee, Y. Sun, L. Kort-Parn, Z. Li, C. Lumezanu, Z. Wu, L. Tang, D. Li
    In Proceedings of NDSS, Feb. 2019
  6. NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage
    W. U. Hassan, S. Guo, D. Li, Z. Chen, K. Jee, Z. Li, A. Bates
    In Proceedings of NDSS, Nov. 2019
  7. NodeMerge: Template-Based Efficient Data Reduction For Big-Data Causality Analysis
    Y. Tang, D. Li, Z. Li, M. Zhang, K. Jee, Z. Wu, J. Rhee, X. Xiao, F. Xu, Q. Li
    In Proceedings of CCS, Nov. 2018
  8. SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
    P. Gao, X. Xiao, D. Li, Z. Li, K. Jee, Z. Wu, C. H. Kim, S. R. Kulkarni, P. Mittal
    In Proceedings of Usenix Security Aug. 2018
  9. AIQL: Enabling Efficient Attack Investigation from System Monitoring Data
    P. Gao, X. Xiao, Z. Li, K. Jee, F. Xu, S. R. Kulkarni, P. Mittal
    In Proceedings of Usenix ATC, Jul. 2018
  10. Towards a timely causality analysis for enterprise security
    Y. Liu, M. Zhang, D. Li, K. Jee, Z. Li, Z Wu, J Rhee, P Mittal
    In Proceedings of NDSS, Feb. 2018
  11. High fidelity data reduction for big data security dependency analyses
    Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang
    In Proceedings of CCS, Nov. 2016
  12. ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking
    K. Jee, V. P. Kemerlis, A. D. Keromytis and G. Portokalidis
    In Proceedings of ACM CCS, Nov. 2013
  13. A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware
    K. Jee, G. Portokalidis, V. P. Kemerlis, S. Ghosh, D. I. August, and A. D. Keromytis
    In Proceedings of NDSS, Feb. 2012

Primary Sidebar

Kangkook Jee
(지강국, 池康國, ΚΩΣΤΑΣ)

Assistant Professor
Computer Science
The University of Texas at Dallas

kangkook.jee
[at] utdallas [dot] edu
ECSS 3.226

Education

  • Ph.D. Computer Sciences (2014), Columbia University, NY
  • B.A. Mathematics (2000),
    Korea University, South Korea

© 2022 Kangkook Jee. All Rights Reserved

  • Home
  • Research
  • Teaching
  • Team