Researcher Page

사진

Kang, Brent Byunghoon (강병훈) I-5233-2013

Department
School of Computing(전산학부)
Website
http://cysec.kaist.ac.krHomePage
Research Area
Malicious code, rootkit, Trusted Execution Environment

Keyword Cloud

Reload 더보기
1

SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure

Kim, Deokjin; Jang, Daehee; Park, Minjoon; et al, COMPUTERS & SECURITY, v.82, pp.118 - 139, 2019-05

2

MoHoP: A protocol providing for both mobility management and host privacy

Park, Jaehyun; Ha, Jaehee; Kang, Brent Byunghoonresearcher; et al, COMPUTER NETWORKS, v.148, pp.20 - 33, 2019-01

3

eMotion: An SGX extension for migrating enclaves

Park, Jaemin; Park, Sungjin; Kang, Brent Byunghoonresearcher; et al, COMPUTERS & SECURITY, v.80, pp.173 - 185, 2019-01

4

PrivateZone: Providing a Private Execution Environment using ARM TrustZone

Jang, Jinsoo; Choi, Changho; Lee, Jae Hyuk; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.15, no.5, pp.797 - 810, 2018-09

5

A dynamic per-context verification of kernel address integrity from external monitors

Lee, Hojoon; Kim, Minsu; Paek, Yunheung; et al, COMPUTERS & SECURITY, v.77, pp.824 - 837, 2018-08

6

Malicious URL protection based on attackers' habitual behavioral analysis

Kim, Sungjin; Kim, Jinbok; Kang, Brent Byunghoonresearcher, COMPUTERS & SECURITY, v.77, pp.790 - 806, 2018-08

7

불법 커뮤니티를 통한 비트코인 거래 추적 방법에 관한 연구

정세진; 곽노현; 강병훈researcher, 정보보호학회논문지, v.28, no.3, pp.717 - 727, 2018-06

8

Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions

Manes, Valentin J. M.; Jang, Daehee; Ryu, Chanho; et al, COMPUTERS & SECURITY, v.74, pp.130 - 143, 2018-05

9

S-OpenSGX: A System-level Platform for Exploring SGX Enclave-Based Computing

Choi, Changho; Kwak, Nohyun; Jang, Jinsoo; et al, COMPUTERS & SECURITY, v.70, pp.290 - 306, 2017-09

10

Invi-server: Reducing the attack surfaces by making protected server invisible on networks

Park, Jaehyun; Noh, Jiseong; Kim, Myung-Chulresearcher; et al, COMPUTERS & SECURITY, v.67, pp.89 - 106, 2017-06

11

Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping

Moon, Hyungon; Lee, Hojoon; Heo, Ingoo; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.14, no.2, pp.145 - 157, 2017-03

12

Vulnerabilities of network OS and mitigation with state-based permission system

Noh, Jiseong; Lee, Seunghyeon; Park, Jaehyun; et al, SECURITY AND COMMUNICATION NETWORKS, v.9, no.13, pp.1971 - 1982, 2016-09

13

On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators

Kim, Yonggon; Kwon, Ohmin; Jang, Jinsoo; et al, COMPUTERS & SECURITY, v.62, pp.33 - 48, 2016-09

14

Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines

Heo, Ingoo; Kim, Minsu; Lee, Yongje; et al, ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, v.20, no.4, 2015-09

15

메모리 주소 변환 공격에 대한 스케줄러 기반의 방어 방법

장대희; 장진수; 김동욱; et al, 정보보호학회논문지, v.25, no.4, pp.873 - 880, 2015-08

16

Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors

Heo, Ingoo; Jang, Daehee; Moon, Hyungon; et al, JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, v.15, no.1, pp.48 - 59, 2015-02

17

DoubleGuard: Detecting Intrusions in Multitier Web Applications

Le, Meixing; Stavrou, Angelos; Kang, Brent ByungHoonresearcher, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.9, no.4, pp.512 - 525, 2012-07

Load more items
Loading...

rss_1.0 rss_2.0 atom_1.0