Publications

Conferences

  • Beom Heyn Kim and David Lie. Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices. In Proceedings of the 2015 IEEE Symposium on Security and Privacy (Oakland 2015). May 2015.
    • Faulty cloud service can mount the consistency attack by tampering the timing and ordering of operations. We devised a real-time consistency verification system that is timely and battery friendly even without a direct trusted communication channel.
  • Mohammad Mannan, Beom Heyn Kim, Afshar Ganjali and David Lie. Unicorn: Two-Factor Attestation for Data Security. 18th ACM Conference on Computer and Communications Security (CCS 2011). October 2011.
    • Unicorn shows how to use Trusted Computing techniques to enable secure computing environment on PC involving two-factor authentication with widely available smart phone devices.
  • Workshop

  • Beom Heyn Kim, Sukwon Oh and David Lie. Consistency Oracles: Towards an Interactive and Flexible Consistency Model Specification. In Proceedings of HotOS ’17, Whistler, BC, Canada, May 08-10, 2017
    • Weak Consistency Models are becoming more and more popular. However, because they are underspecified, both developers of the systems and applications cannot agree on correct consistency behaviors. We propose Consistency Oracles as a more pragmetic instantiation of formal specifications to solve this problem.
  • Beom Heyn Kim, Wei Huang and David Lie. Unity: Secure and Durable Personal Cloud Storage. In Proceedings of the ACM Cloud Computing Security Workshop (CCSW 2012). October 2012
    • Unity is a personal cloud storage system that untrusts the Cloud. The coordination server is on the Cloud but data is only on the user's devices. Unity frees user's data durability and security from the 3rd party service provider.
  • Journal

  • Wei Huang, Afshar Ganjali, Beom Heyn Kim, Sukwon Oh and David Lie. The State of Public Infrastructure-as-a-Service Cloud Security ACM Computing Surveys 47, 4, Article 68 (June 2015), 31 pages.
    • Comprehensive survey on IaaS Cloud Security and the response of academic research to emerging security concerns in IaaS.
  • Thesis

  • Beom Heyn Kim. Automated Virtual Machine Replication and Transparent Machine Switch Support for An Individual Personal Computer User, M.Sc. Thesis, 2011.
    • Virtual Disk can be replicated in a hybrid way of mixing eager push-based replication and lazy on-demand fetch replication, and this allows keeping the consistency of Virtual Disk even with instantaneous device switching causing VM migration.