Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kangkook Jee is active.

Publication


Featured researches published by Kangkook Jee.


virtual execution environments | 2012

libdft: practical dynamic data flow tracking for commodity systems

Vasileios P. Kemerlis; Georgios Portokalidis; Kangkook Jee; Angelos D. Keromytis

Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they propagate during program execution. DFT has been repeatedly implemented by a variety of tools for numerous purposes, including protection from zero-day and cross-site scripting attacks, detection and prevention of information leaks, and for the analysis of legitimate and malicious software. We present libdft, a dynamic DFT framework that unlike previous work is at once fast, reusable, and works with commodity software and hardware. libdft provides an API for building DFT-enabled tools that work on unmodified binaries, running on common operating systems and hardware, thus facilitating research and rapid prototyping. We explore different approaches for implementing the low-level aspects of instruction-level data tracking, introduce a more efficient and 64-bit capable shadow memory, and identify (and avoid) the common pitfalls responsible for the excessive performance overhead of previous studies. We evaluate libdft using real applications with large codebases like the Apache and MySQL servers, and the Firefox web browser. We also use a series of benchmarks and utilities to compare libdft with similar systems. Our results indicate that it performs at least as fast, if not faster, than previous solutions, and to the best of our knowledge, we are the first to evaluate the performance overhead of a fast dynamic DFT implementation in such depth. Finally, libdft is freely available as open source software.


computer and communications security | 2013

ShadowReplica: efficient parallelization of dynamic data flow tracking

Kangkook Jee; Vasileios P. Kemerlis; Angelos D. Keromytis; Georgios Portokalidis

Dynamic data flow tracking (DFT) is a technique broadly used in a variety of security applications that, unfortunately, exhibits poor performance, preventing its adoption in production systems. We present ShadowReplica, a new and efficient approach for accelerating DFT and other shadow memory-based analyses, by decoupling analysis from execution and utilizing spare CPU cores to run them in parallel. Our approach enables us to run a heavyweight technique, like dynamic taint analysis (DTA), twice as fast, while concurrently consuming fewer CPU cycles than when applying it in-line. DFT is run in parallel by a second shadow thread that is spawned for each application thread, and the two communicate using a shared data structure. We avoid the problems suffered by previous approaches, by introducing an off-line application analysis phase that utilizes both static and dynamic analysis methodologies to generate optimized code for decoupling execution and implementing DFT, while it also minimizes the amount of information that needs to be communicated between the two threads. Furthermore, we use a lock-free ring buffer structure and an N-way buffering scheme to efficiently exchange data between threads and maintain high cache-hit rates on multi-core CPUs. Our evaluation shows that ShadowReplica is on average ~2.3× faster than in-line DFT (~2.75× slowdown over native execution) when running the SPEC CPU2006 benchmark, while similar speed ups were observed with command-line utilities and popular server software. Astoundingly, ShadowReplica also reduces the CPU cycles used up to 30%.


annual computer security applications conference | 2014

IntFlow: improving the accuracy of arithmetic error detection using information flow tracking

Marios Pomonis; Theofilos Petsios; Kangkook Jee; Michalis Polychronakis; Angelos D. Keromytis

Integer overflow and underflow, signedness conversion, and other types of arithmetic errors in C/C++ programs are among the most common software flaws that result in exploitable vulnerabilities. Despite significant advances in automating the detection of arithmetic errors, existing tools have not seen widespread adoption mainly due to their increased number of false positives. Developers rely on wrap-around counters, bit shifts, and other language constructs for performance optimizations and code compactness, but those same constructs, along with incorrect assumptions and conditions of undefined behavior, are often the main cause of severe vulnerabilities. Accurate differentiation between legitimate and erroneous uses of arithmetic language intricacies thus remains an open problem. As a step towards addressing this issue, we present IntFlow, an accurate arithmetic error detection tool that combines static information flow tracking and dynamic program analysis. By associating sources of untrusted input with the identified arithmetic errors, IntFlow differentiates between non-critical, possibly developer-intended undefined arithmetic operations, and potentially exploitable arithmetic bugs. IntFlow examines a broad set of integer errors, covering almost all cases of C/C++ undefined behaviors, and achieves high error detection coverage. We evaluated IntFlow using the SPEC benchmarks and a series of real-world applications, and measured its effectiveness in detecting arithmetic error vulnerabilities and reducing false positives. IntFlow successfully detected all real-world vulnerabilities for the tested applications and achieved a reduction of 89% in false positives over standalone static code instrumentation.


computer and communications security | 2018

NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis

Yutao Tang; Ding Li; Zhichun Li; Mu Zhang; Kangkook Jee; Xusheng Xiao; Zhenyu Wu; Junghwan Rhee; Fengyuan Xu; Qun Li

Todays enterprises are exposed to sophisticated attacks, such as Advanced Persistent Threats~(APT) attacks, which usually consist of stealthy multiple steps. To counter these attacks, enterprises often rely on causality analysis on the system activity data collected from a ubiquitous system monitoring to discover the initial penetration point, and from there identify previously unknown attack steps. However, one major challenge for causality analysis is that the ubiquitous system monitoring generates a colossal amount of data and hosting such a huge amount of data is prohibitively expensive. Thus, there is a strong demand for techniques that reduce the storage of data for causality analysis and yet preserve the quality of the causality analysis. To address this problem, in this paper, we propose NodeMerge, a template based data reduction system for online system event storage. Specifically, our approach can directly work on the stream of system dependency data and achieve data reduction on the read-only file events based on their access patterns. It can either reduce the storage cost or improve the performance of causality analysis under the same budget. Only with a reasonable amount of resource for online data reduction, it nearly completely preserves the accuracy for causality analysis. The reduced form of data can be used directly with little overhead. To evaluate our approach, we conducted a set of comprehensive evaluations, which show that for different categories of workloads, our system can reduce the storage capacity of raw system dependency data by as high as 75.7 times, and the storage capacity of the state-of-the-art approach by as high as 32.6 times. Furthermore, the results also demonstrate that our approach keeps all the causality analysis information and has a reasonably small overhead in memory and hard disk.


international conference on information security and cryptology | 2010

An adversarial evaluation of network signaling and control mechanisms

Kangkook Jee; Stelios Sidiroglou-Douskos; Angelos Stavrou; Angelos D. Keromytis

Network signaling and control mechanisms are critical to coordinate such diverse defense capabilities as honeypots and honeynets, host-based defenses, and online patching systems, any one of which might issue an actionable alert and provide security-critical data. Despite considerable work in exploring the trust requirements of such defenses and in addressing the distribution speed of alerts, little work has gone into identifying how the underlying transport systems behave under adversarial scenarios. In this paper, we evaluate the reliability and performance trade-offs for a variety of control channel mechanisms that are suitable for coordinating large-scale collaborative defenses when under attack. Our results show that the performance and reliability characteristics change drastically when one evaluates the systems under attack by a sophisticated and targeted adversary. Based on our evaluation, we explore available design choices to reinforce the reliability of the control channel mechanisms. To that end, we propose ways to construct a control scheme to improve network coverage without imposing additional overhead.


network and distributed system security symposium | 2012

A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware.

Kangkook Jee; Georgios Portokalidis; Vasileios P. Kemerlis; Soumyadeep Ghosh; David I. August; Angelos D. Keromytis


computer and communications security | 2016

High Fidelity Data Reduction for Big Data Security Dependency Analyses

Zhang Xu; Zhenyu Wu; Zhichun Li; Kangkook Jee; Junghwan Rhee; Xusheng Xiao; Fengyuan Xu; Haining Wang; Guofei Jiang


network and distributed system security symposium | 2018

Towards a Timely Causality Analysis for Enterprise Security.

Yushan Liu; Mu Zhang; Ding Li; Kangkook Jee; Zhichun Li; Zhenyu Wu; Junghwan Rhee; Prateek Mittal


usenix security symposium | 2018

SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection.

Peng Gao; Xusheng Xiao; Ding Li; Zhichun Li; Kangkook Jee; Zhenyu Wu; Chung Hwan Kim; Sanjeev R. Kulkarni; Prateek Mittal


usenix annual technical conference | 2018

AIQL: Enabling Efficient Attack Investigation from System Monitoring Data.

Peng Gao; Xusheng Xiao; Zhichun Li; Kangkook Jee; Fengyuan Xu; Sanjeev R. Kulkarni; Prateek Mittal

Collaboration


Dive into the Kangkook Jee's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xusheng Xiao

North Carolina State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Georgios Portokalidis

Stevens Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Peng Gao

Princeton University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge