Researcher Page


Kang, Brent Byunghoon (강병훈) I-5233-2013

School of Computing(전산학부)
Collaboration Network Collaboration Network
Research Area
Malicious code, rootkit, Trusted Execution Environment

Keyword Cloud

Reload 더보기

Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions

Manes, Valentin J. M.; Jang, Daehee; Ryu, Chanho; Kang, Brent ByunghoonresearcherELSEVIER ADVANCED TECHNOLOGYCOMPUTERS & SECURITY, v.74, pp.130 - 143, 2018-05


S-OpenSGX: A System-level Platform for Exploring SGX Enclave-Based Computing

Choi, Changho; Kwak, Nohyun; Jang, Jinsoo; Jang, Daehee; Oh, Kuenwhee; Kwag, Kyungsoo; Kang, Brent ByunghoonresearcherELSEVIER ADVANCED TECHNOLOGYCOMPUTERS & SECURITY, v.70, pp.290 - 306, 2017-09


Invi-server: Reducing the attack surfaces by making protected server invisible on networks

Park, Jaehyun; Noh, Jiseong; Kim, Myung-Chulresearcher; Kang, Brent ByunghoonresearcherELSEVIER ADVANCED TECHNOLOGYCOMPUTERS & SECURITY, v.67, pp.89 - 106, 2017-06


Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping

Moon, Hyungon; Lee, Hojoon; Heo, Ingoo; Kim, Kihwan; Paek, Yunheung; Kang, Brent ByunghoonresearcherIEEE COMPUTER SOCIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.14, no.2, pp.145 - 157, 2017-03


Vulnerabilities of network OS and mitigation with state-based permission system

Noh, Jiseong; Lee, Seunghyeon; Park, Jaehyun; Shin, Seungwonresearcher; Kang, Brent ByunghoonresearcherWILEY-BLACKWELLSECURITY AND COMMUNICATION NETWORKS, v.9, no.13, pp.1971 - 1982, 2016-09


On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators

Kim, Yonggon; Kwon, Ohmin; Jang, Jinsoo; Jin, Seongwook; Baek, Hyeongboo; Kang, Brent Byunghoonresearcher; Yoon, HyunsooresearcherELSEVIER ADVANCED TECHNOLOGYCOMPUTERS & SECURITY, v.62, pp.33 - 48, 2016-09


Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines

Heo, Ingoo; Kim, Minsu; Lee, Yongje; Choi, Changho; Lee, Jinyong; Kang, Brent Byunghoonresearcher; Paek, YunheungASSOC COMPUTING MACHINERYACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, v.20, no.4, 2015-09


메모리 주소 변환 공격에 대한 스케줄러 기반의 방어 방법

장대희; 장진수; 김동욱; 최창호; 강병훈researcher한국정보보호학회정보보호학회논문지, v.25, no.4, pp.873 - 880, 2015-08


Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors

Heo, Ingoo; Jang, Daehee; Moon, Hyungon; Cho, Hansu; Lee, Seungwook; Kang, Brent Byunghoonresearcher; Paek, YunheungIEEK PUBLICATION CENTERJOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, v.15, no.1, pp.48 - 59, 2015-02


DoubleGuard: Detecting Intrusions in Multitier Web Applications

Le, Meixing; Stavrou, Angelos; Kang, Brent ByungHoonresearcherIEEE COMPUTER SOCIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.9, no.4, pp.512 - 525, 2012-07

Load more items

rss_1.0 rss_2.0 atom_1.0