Skip to content

Research

  • "ProvIoT: Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security", Kunal Mukherjee, Joshua Wiedemeier, Qi Wang, Junpei Kamimura, John Junghwan Rhee, James Wei, Zhichun Li, Xiao Yu, Lu-An Tang, Jiaping Gui, Kangkook Jee, International Conference on Applied Cryptography and Network Security (ACNS 2024), March 2024
  • "Vulnerability discovery based on source code patch commit mining: A systematic literature review", Fei Zuo and Junghwan Rhee, International Journal of Information Security (IJIS), 2024
  • "ProvSec: Cybersecurity System Provenance Analysis Benchmark Dataset", Madhukar Shrestha, Yonghyun Kim, Jeehyun Oh, Junghwan Rhee, Yung Ryn Choe, Fei Zuo, Myung-Ah Park and Gang Qian in Proceeding of International Journal of Networked and Distributed Computing (IJNDC 2023), November 2023
  • "ProvSec: Cybersecurity System Provenance Analysis Benchmark Dataset", Madhukar Shrestha, Yonghyun Kim, Jeehyun Oh, Junghwan Rhee, Yung Ryn Choe, Fei Zuo, Myung-Ah Park and Gang Qian, to appear in Proceeding of 21st IEEE/ACIS International Conference on Software Engineering, Management and Applications (SERA 2023), Orlando, FL, U.S.A., May 2023
  • "Developing Incident Response-focused Cybersecurity Undergraduate Curricula", Junghwan “John” Rhee, Myungah Park, Fei Zuo, Shuai Zhang, Gang Qian, Goutam Mylavarapu, Hong Sung, Thomas Turner, in Proceedings of the CCSC South Central Conference 2023, Nacogdoches, Texas, U.S.A., March 2023
  • DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing, Seulbae Kim, Major Liu, Junghwan “John” Rhee, Yuseok Jeon, Yonghwi Kwon, Chung Hwan Kim, in Proceedings of the 29th ACM Conference on Computer and Communication Security (CCS 2022), Los Angeles, November 2022
  • ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs Sungwoo Kim, Gisu Yeo, Taegyu Kim, Junghwan “John” Rhee, Yuseok Jeon, Antonio Bianchi, Dongyan Xu, Dave (Jing) Tian, in Proceedings of the 17th ACM ASIA Conference on Computer and Communication Security (ACM ASIACCS 2022), Hybrid Event, May 2022
  • PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications Taegyu Kim, Vireshwar Kumar, Junghwan “John” Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, Dave (Jing) Tian, in Proceedings of the 30th USENIX Security Symposium (SEC 2021), Virtual Event, August 2021
  • SIGL: Securing Software Installations Through Deep Graph Learning Xueyuan Han, Xiao Yu, Thomas Pasquier, Ding Li, Junghwan “John” Rhee, James Mickens, Margo Seltzer, Haifeng Chen, in Proceedings of the 30th USENIX Security Symposium (SEC 2021), Virtual Event, August 2021
  • Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races Omid Setayeshfar, Junghwan "John" Rhee, Chung Hwan Kim, Kyu Hyung Lee. In Proceedings of the 18th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2021), Virtual Event, July 2021
  • Utrack: Enterprise User Tracking Based on OS-Level Audit Logs Yue Li, Zhenyu Wu, Haining Wang, Kun Sun, Zhichun Li, Kangkook Jee, Junghwan Rhee, Haifeng Chen In Proceedings of the 11th ACM Conference on Data and Application Security and Privacy (CODSAPY), April 2021
  • This is Why We Can’t Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion Based Hierarchical Storage Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Dawei Wang, Zhengzhang Chen, Zhichun Li, Junghwan Rhee, Jiaping Gui, Adam Bates In Proceedings of the Annual Computer Security Applications Conference (ACSAC) 2020, December 2020
  • Vessels: Efficient and Scalable Deep Learning Prediction on Trusted Processors Kyungtae Kim, Chung Hwan Kim, Junghwan Rhee, Xiao Yu, Haifeng Chen, Dave (Jing) Tian, Byoungyoung Lee. In Proceedings of the 11th ACM Symposium on Cloud Computing (SOCC 2020), Virtual Event, October 2020
  • Detecting Malware Injection with Program-DNS Behavior Yixin Sun, Kangkook Jee, Suphannee Sivakorn, Zhichun Li, Cristian Lumezanu, Lauri Korts-Pärn, Zhenyu Wu, Junghwan Rhee, Chung Hwan Kim, Mung Chiang, Prateek Mittal, In Proceedings of the IEEE European Symposium on Security and Privacy 2020 (EuroS&P'20), Genova, Italy, September 2020
  • Qi Wang, Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Junghwan Rhee, Zhengzhang Chen, Wei Cheng, Carl A. Gunter, Haifeng Chen, "You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis", In Proceedings of the 29th Network and Distributed System Security Symposium (NDSS'20), San Diego, CA, February 2020
  • Jiaping Gui, Ding Li, Zhengzhang Chen, Junghwan Rhee, Xusheng Xiao, Mu Zhang, Kangkook Jee, Zhichun Li, and Haifeng Chen, "APTrace: A Responsive System for Agile Enterprise Level Causality Analysis", In Proceedings of the 36th IEEE International Conference on Data Engineering (ICDE 2020), Industry and Application Track, Dallas, TX, April 2020
  • Pengyang Wang, Jiaping Gui, Zhengzhang Chen, Junghwan Rhee, Haifeng Chen, Yanjie Fu, "A Generic Edge-Empowered Graph Convolutional Network via Node-Edge Mutual Enhancement" In Proceedings of the Web Conference 2020 (WWW 2020), Taipei, April 2020
  • Taegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, and Dongyan Xu, "RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing", In Proceedings of 28th USENIX Security Symposium (SECURITY 2019), Santa Clara, CA, August 2019 [pdf]
  • Qiang Zeng, Golam Kayas, Emil Mohammed, Lannan Luo, Xiaojiang Du, Junghwan Rhee "HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding", In Proceedings of the 49th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2019), Portland, OR, June 2019 [pdf]
  • Shen Wang, Zhengzhang Chen, Ding Li, Lu-An Tang, Jiangchao Ni, Zhichun Li, Junghwan Rhee, Haifeng Chen, Philip S Yu "Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification", In Proceedings of the SIAM International Conference on Data Mining (SDM19), Calgary, Alberta, Canada, May 2019 [pdf]
  • Yuseok Jeon, Junghwan Rhee, Chung Hwan Kim, Zhichun Li, Mathias Payer, Byungyoung Lee, Zhenyu Wu "PolPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications", In Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (CODASPY 2019), Dallas, TX, March 2019 [pdf]
  • Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Xusheng Xiao, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, Qun Li "NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis", In Proceedings of the 25rd ACM Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, October 2018 [pdf]
  • Yushan Liu, Mu Zhang, Ding Li, Kangkook Jee, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Prateek Mittal, "Towards a Timely Causality Analysis for Enterprise Security", In Proceedings of the 25th Network and Distributed System Security Symposium(NDSS'18), San Diego, CA, February 2018 [pdf]
  • Sungjin Park, Chung Hwan Kim, Junghwan Rhee, Jongjin Won, Taisook Han, Dongyan Xu, "CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality", IEEE Transactions on Dependable and Secure Computing (TDSC), 2018 [pdf]
  • Chung Hwan Kim, Junghwan Rhee, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu, "PerfGuard: Binary-Centric Application Performance Monitoring in Production Environments", In Proceedings of the 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2016), Seattle, WA, November 2016 [pdf]
  • Hongteng Xu, Xia Ning, Hui Zhang, Junghwan Rhee and Guofei Jiang. "PInfer: Learning to Infer Concurrent Request Paths from System Kernel Events", In Proceedings of the 13th IEEE International Conference on Autonomic Computing (ICAC 2016), Würzburg, Germany, July 18-22, 2016 [pdf]
  • Yangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang "Detecting Stack Layout Corruptions with Robust Stack Unwinding", In Proceedings in the 19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2016), Evry, France, September 2016 [pdf]
  • Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang and Guofei Jiang, "High Fidelity Data Reduction for Big Data Security Dependency Analyses", In Proceedings in the 23rd ACM Conference on Computer and Communications Security (CCS 2016), Hofburg Palace, Vienna, Austria October 24-28, 2016 [pdf]
  • Shiqing Ma, Kyuhyung Lee, Chunghwan Kim, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, "Accurate, Low Cost And Instrumentation-free Security Audit Logging For Windows", In Proceedings in Annual Computer Security Applications Conference 2015 (ACSAC 2015), Los Angeles, CA, December, 2015 [pdf]
  • Jun Wang, Zhiyun Qian, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Xia Ning, Peng Liu, Geoff Jiang, "Discover and Tame Long-running Idling Processes in Enterprise Systems", In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), Singapore, April 14, 2015 [pdf]
  • Chung Hwan Kim, Sungjin Park, Junghwan Rhee, Jongjin Won, Taisook Han, Dongyan Xu, "CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality", In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), Short Paper, Singapore, April 14, 2015 [pdf]
  • Junghwan Rhee, Ryan Riley, Zhiqiang Lin, Xuxian Jiang, Dongyan Xu "Data-Centric OS Kernel Malware Characterization", IEEE Transactions on Information Forensics and Security (TIFS), 2014 [pdf] [bib]
  • Daniel J. Dean, Hiep Nguyen, Xiaohui Gu, Hui Zhang , Junghwan Rhee, Nipun Arora, Geoff Jiang, "PerfScope: Practical Online Server Performance Bug Inference in Production Cloud Computing Infrastructures", In Proceedings of 2014 ACM Symposium on Cloud Computing (SOCC 2014), Seattle, WA, November 3, 2014 [pdf]
  • Hui Zhang, Junghwan Rhee, Nipun Arora, Qiang Xu, Cristian Lumezanu, Guofei Jiang, "An Analytics Approach to Traffic Analysis in Network Virtualization", In Proceedings of the 10th International Conference on Network and Service Management (CNSM 2014), Rio de Janeiro, Brazil, November 17, 2014 [pdf]
  • Hui Zhang, Cristian Lumezanu, Junghwan Rhee, Nipun Arora, Qiang Xu, Guofei Jiang, "Enabling Layer 2 Pathlet Tracing through Context Encoding in Software-Defined Networking", In Proceedings of ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN 2014), Chicago, IL, August 22, 2014 [pdf]
  • Chung Hwan Kim, Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Xiangyu Zhang, Dongyan Xu, "IntroPerf: Transparent Context-Sensitive Multi-Layer Performance Inference using System Stack Traces", In Proceedings of the International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS 2014), Austin, Texas, June 2014 (Acceptance rate 16.8%) [pdf] [bibtex]
  • Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Kenji Yoshihira, "Uscope: A Scalable Unified Tracer from Kernel to User Space", In Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS'14), Krakow, Poland, May 2014 (Mini-conference) [pdf] [slides] [bibtex]
  • Hui Zhang, Junghwan Rhee, Nipun Arora, Sahan Gamage, Guofei Jiang, Kenji Yoshihira, Dongyan Xu, "CLUE: System Trace Analytics for Cloud Service Performance Diagnosis", In Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS'14), Krakow, Poland, May 2014 (Special Track)
  • Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Kenji Yoshihira, "Software System Performance Debugging with Kernel Events Feature Guidance", In Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS'14), Krakow, Poland, May 2014 (Short Paper)
  • Qiang Zeng, Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Peng Liu, "Precise and Scalable Calling Context Encoding", In Proceedings of the International Symposium on Code Generation and Optimization 2014 (CGO'14), Orlando, Florida, February 2014 [pdf] [slides] [bib]
  • Hui Lu, Nipun Arora, Hui Zhang, Cristian Lumezanu, Junghwan Rhee, Guofei Jiang, "HybNET: Network Manager for Hybrid Network Infrastructure", In ACM/IFIP/USENIX International Middleware Conference (Middleware'13), Beijing, China, December 2013 (Industry) [pdf]
  • Nipun Arora, Hui Zhang, Junghwan Rhee, Kenji Yoshihira, Geoff Jiang, "iProbe: A Lightweight User-Level Dynamic Instrumentation Framework", In Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering (ASE'13), Silicon Valley, CA, November 2013 (Tool demonstration) [extended-version] [video]
  • Zhiqiang Lin, Junghwan Rhee, Chao Wu, Xiangyu Zhang and Dongyan Xu "Discovering Semantic Data of Interest from Un-mappable Memory with Confidence", In Proceedings of the 19th Network and Distributed System Security Symposium (NDSS'12), San Diego, CA, February 2012 [pdf]
  • Junghwan Rhee, Zhiqiang Lin, Dongyan Xu "Characterizing Kernel Malware Behavior with Kernel Data Access Patterns", In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS'11), Hong Kong, March 2011 (Acceptance Rate 16.1%) [abstract] [pdf] [slides] [bibtex]
  • Paul Ruth, Junghwan Rhee, Dongyan Xu, Sebastien Goasguen, Rick Kennell: "Autonomic Live Adaptation of Virtual Networked Environments in a Multidomain Infrastructure", J. Internet Services and Applications 2(2): 141-154 (2011), July 2011 [pdf]
  • Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, and Xuxian Jiang "SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures", In Proceedings of the 18th Network and Distributed System Security Symposium (NDSS'11), San Diego, CA, February 2011 (Acceptance rate 20.1%) [abstract] [pdf] [bibtex] [demo video]
  • Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, Jinku Li, Deepa Srinivasan, Junghwan Rhee, and Dongyan Xu "DKSM: Subverting Virtual Machine Introspection for Fun and Profit", In Proceedings of the 29th IEEE International Symposium on Reliable Distributed Systems (SRDS'10), New Delhi, India, October 2010 (Acceptance Rate 22.6%) [bibtex]
  • Junghwan Rhee, Ryan Riley, Dongyan Xu, and Xuxian Jiang "Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory", In Proceedings of the 13th International Symposium of Recent Advances in Intrusion Detection (RAID'10) , Ottawa, Canada, September 2010 (Acceptance rate 23.1%) [abstract] [pdf] [slides] [bibtex] [demo video]
  • Junghwan Rhee, Ryan Riley, Xuxian Jiang, and Dongyan Xu "Defeating Dynamic Data Kernel Rootkit Attacks via VMM-based Guest Transparent Monitoring", In Proceedings of the 4th International Conference on Availability, Reliability and Security (ARES'09), March 2009 (Acceptance rate 25%) [abstract] [pdf] [bibtex]
  • Junghwan Rhee, Andrzej Kochut, and Kirk Beaty "DeskBench: Flexible Virtual Desktop Benchmarking Toolkit", Mini-conference, the 11th IFIP/IEEE International Symposium on Integrated Network Management (IM'09), June 2009 [abstract] [pdf] [bibtex]
  • Paul Ruth, Junghwan Rhee, Dongyan Xu, Rick Kennell, and Sebastien Goasguen "Autonomic Live Adaptation of Virtual Computational Environments in a Multi-Domain Infrastructure", In Proceedings of the 3rd IEEE International Conference on Autonomic Computing (ICAC'06), June 2006 (Acceptance rate 21.6%) [abstract] [pdf] [bibtex]
  • Dongyan Xu, Paul Ruth, Junghwan Rhee, Rick Kennell, and Sebastien Goasguen "Short Paper: Autonomic Adaptation of Virtual Distributed Environments in a Multi-Domain Infrastructure", In Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing (HPDC'06), June 2006 (Acceptance rate 14%) [abstract] [pdf] [bibtex]
  • Emmett Witchel, Junghwan Rhee, and Krste Asanović "Mondrix: Memory Isolation for Linux using Mondriaan Memory Protection", In Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP'05), October 2005 (Acceptance rate 13%) [abstract] [pdf] [bibtex]
  • A. Ayers, R. Schooler, A. Agarwal, C. Metcalf, J. Rhee, and E. Witchel "TraceBack: First-Fault Diagnosis by Reconstruction of Distributed Control Flow", In Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation (PLDI'05), Chicago, IL, June 2005 (Acceptance rate 21%) [abstract] [pdf] [bibtex]