I'm an Assistant Professor of Computer Science Department at the University of Georgia.
I received my Ph.D in Computer Science at Purdue University.
I was co-advised by Dr. Xiangyu Zhang and
Dr. Dongyan Xu.
I got my Master and B.S in Computer Engineering from Hong-Ik University in Korea,
and and my Master's thesis advisor was Dr. Sam H. Noh.
Cyber security, Software reliability and security; Mobile Security; Program Analysis; Software engineering; Distributed Systems;
I am (always) looking for motivated (graduate and undergraduate) students with solid system and/or security background. If you are interested in working with me, please drop me an email.
|Fuzzification: Anti-Fuzzing Techniques, [to appear]|
|Kernel-Supported Cost-Effective Audit Logging for Causality Tracking, [PDF]|
|MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation, [PDF]|
|MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning, [PDF] Distinguished Paper Award|
|DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging, [PDF]|
|Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots, [PDF]|
|A2C: Self Destructing Exploit Executions via Input Perturbation, [PDF]|
|emphaSSL: Towards Emphasis as a Mechanism to Harden Networking Security in Android Apps, [PDF]|
|SBBox: A Tamper-Resistant Digital Archiving System, [link]|
|PerfGuard: Binary-Centric Application Performance Monitoring in Production Environments, [PDF]|
|Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows, [PDF]|
|Infrastructure-Free Logging and Replay of Concurrent Execution on Multiple Cores, [PDF]|
|LogGC: Garbage Collecting Audit Log, [PDF]|
|High Accuracy Attack Provenance via Binary-Based Execution Partition, [PDF]|
|Unified Debugging of Distributed Systems with Recon, [PDF]|
|Toward Generating Reducible Replay Log, [PDF]|
|PRES: Probabilistic Replay with Execution Sketching on Multiprocessors, [PDF]|
PFC: Transparent Optimization of Existing Prefetching Strategies for Multi-level Storage Systems,
|CISpan: Comprehensive Incremental Mining Algorithms of Closed Sequential Patterns for Multi-Versional Software Mining, [PDF]|
|Augmenting RAID with an SSD for Energy Relief, [PDF]|
|Write-Aware Buffer Cache Management Scheme for Nonvolatile RAM, [PDF]|