Researcher Page

사진
Kang, Brent Byunghoon (강병훈)
부교수, School of Computing(전산학부)
Research Area
Malicious code, rootkit, Trusted Execution Environment
Co-researchers
    Similar researchers

    Keyword Cloud

    Reload 더보기
    NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) Altmetrics
    1
    Article
    Securing a communication channel for the trusted execution environment

    Jang, Jinsoo; Kang, Brent Byunghoonresearcher, COMPUTERS & SECURITY, v.83, pp.79 - 92, 2019-06

    2
    Article
    Rethinking anti-emulation techniques for large-scale software deployment

    Jang, Daehee; Jeong, Yunjong; Lee, Sungman; et al, COMPUTERS & SECURITY, v.83, pp.182 - 200, 2019-06

    3
    Article
    SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure

    Kim, Deokjin; Jang, Daehee; Park, Minjoon; et al, COMPUTERS & SECURITY, v.82, pp.118 - 139, 2019-05

    4
    Article
    MoHoP: A protocol providing for both mobility management and host privacy

    Park, Jaehyun; Ha, Jaehee; Kang, Brent Byunghoonresearcher; et al, COMPUTER NETWORKS, v.148, pp.20 - 33, 2019-01

    5
    Article
    eMotion: An SGX extension for migrating enclaves

    Park, Jaemin; Park, Sungjin; Kang, Brent Byunghoonresearcher; et al, COMPUTERS & SECURITY, v.80, pp.173 - 185, 2019-01

    6
    Article
    PrivateZone: Providing a Private Execution Environment using ARM TrustZone

    Jang, Jinsoo; Choi, Changho; Lee, Jae Hyuk; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.15, no.5, pp.797 - 810, 2018-09

    7
    Article
    A dynamic per-context verification of kernel address integrity from external monitors

    Lee, Hojoon; Kim, Minsu; Paek, Yunheung; et al, COMPUTERS & SECURITY, v.77, pp.824 - 837, 2018-08

    8
    Article
    Malicious URL protection based on attackers' habitual behavioral analysis

    Kim, Sungjin; Kim, Jinbok; Kang, Brent Byunghoonresearcher, COMPUTERS & SECURITY, v.77, pp.790 - 806, 2018-08

    9
    Article
    불법 커뮤니티를 통한 비트코인 거래 추적 방법에 관한 연구

    정세진; 곽노현; 강병훈researcher, 정보보호학회논문지, v.28, no.3, pp.717 - 727, 2018-06

    10
    Article
    Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions

    Manes, Valentin J. M.; Jang, Daehee; Ryu, Chanho; et al, COMPUTERS & SECURITY, v.74, pp.130 - 143, 2018-05

    11
    Article
    S-OpenSGX: A System-level Platform for Exploring SGX Enclave-Based Computing

    Choi, Changho; Kwak, Nohyun; Jang, Jinsoo; et al, COMPUTERS & SECURITY, v.70, pp.290 - 306, 2017-09

    12
    Article
    Invi-server: Reducing the attack surfaces by making protected server invisible on networks

    Park, Jaehyun; Noh, Jiseong; Kim, Myung-Chulresearcher; et al, COMPUTERS & SECURITY, v.67, pp.89 - 106, 2017-06

    13
    Article
    Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping

    Moon, Hyungon; Lee, Hojoon; Heo, Ingoo; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.14, no.2, pp.145 - 157, 2017-03

    14
    Article
    On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators

    Kim, Yonggon; Kwon, Ohmin; Jang, Jinsoo; et al, COMPUTERS & SECURITY, v.62, pp.33 - 48, 2016-09

    15
    Article
    Vulnerabilities of network OS and mitigation with state-based permission system

    Noh, Jiseong; Lee, Seunghyeon; Park, Jaehyun; et al, SECURITY AND COMMUNICATION NETWORKS, v.9, no.13, pp.1971 - 1982, 2016-09

    16
    Article
    Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines

    Heo, Ingoo; Kim, Minsu; Lee, Yongje; et al, ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, v.20, no.4, 2015-09

    17
    Article
    메모리 주소 변환 공격에 대한 스케줄러 기반의 방어 방법

    장대희; 장진수; 김동욱; et al, 정보보호학회논문지, v.25, no.4, pp.873 - 880, 2015-08

    18
    Article
    Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors

    Heo, Ingoo; Jang, Daehee; Moon, Hyungon; et al, JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, v.15, no.1, pp.48 - 59, 2015-02

    19
    Article
    DoubleGuard: Detecting Intrusions in Multitier Web Applications

    Le, Meixing; Stavrou, Angelos; Kang, Brent ByungHoonresearcher, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.9, no.4, pp.512 - 525, 2012-07

    Load more items
    Loading...

    rss_1.0 rss_2.0 atom_1.0