Browse "School of Computing(전산학부)" by Author Kang, Brent Byunghoon

Showing results 1 to 50 of 50

1
3rdParTEE: Securing Third-Party IoT Services Using the Trusted Execution Environment

Jang, Jinsoo; Kang, Brent Byunghoon, IEEE INTERNET OF THINGS JOURNAL, v.9, no.17, pp.15814 - 15826, 2022-09

2
A dynamic per-context verification of kernel address integrity from external monitors

Lee, Hojoon; Kim, Minsu; Paek, Yunheung; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.77, pp.824 - 837, 2018-08

3
A reflective covert channel attack anchored on trusted web services

Zhu, Feng; Yun, Youngtae; Wei, Jinpeng; Kang, Brent Byunghoon; Wang, Yongzhi; Kim, Daehyeok; Li, Peng; et al, 25th International Conference on Web Services, ICWS 2018 Held as Part of the Services Conference Federation, SCF 2018, pp.84 - 99, Springer Verlag, 2018-06

4
Active authentication using scrolling behaviors

El Masri, Alaa; Wechsler, Harry; Likarish, Peter; Grayson, Christopher; Pu, Calton; Al-Arayed, Dalal; Kang, Brent Byunghoon, 6th International Conference on Information and Communication Systems, ICICS 2015, pp.257 - 262, Institute of Electrical and Electronics Engineers Inc., 2015-04

5
Agamotto: Accelerating kernel driver fuzzing with lightweight virtual machine checkpoints

Song, Dokyung; Hetzelt, Felicitas; JONGHWAN, KIM; Kang, Brent Byunghoon; Seifert, Jean-Pierre; Franz, Michael, 29th USENIX Security Symposium, pp.2541 - 2557, USENIX Association, 2020-08-12

6
AI-HydRa: Advanced hybrid approach using random forest and deep learning for malware classification

Yoo, Suyeon; Kim, Sungjin; Kim, Seungjae; Kang, Brent Byunghoon, INFORMATION SCIENCES, v.546, pp.420 - 435, 2021-02

7
ATRA: Address Translation Redirection Attack against Hardware-based External Monitors

Jang, Dae Hee; Lee, Ho Joon; Kim, Min Su; Kim, Dae Hyuk; Kim, Dae Gyeong; Kang, Brent Byunghoon, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2014), ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2014-11-03

8
Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping

Moon, Hyungon; Lee, Hojoon; Heo, Ingoo; Kim, Kihwan; Paek, Yunheung; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.14, no.2, pp.145 - 157, 2017-03

9
Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions

Manes, Valentin J. M.; Jang, Daehee; Ryu, Chanho; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.74, pp.130 - 143, 2018-05

10
Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors

Heo, Ingoo; Jang, Daehee; Moon, Hyungon; Cho, Hansu; Lee, Seungwook; Kang, Brent Byunghoon; Paek, Yunheung, JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, v.15, no.1, pp.48 - 59, 2015-02

11
Electronic device and control method therefor

Kang, Brent Byunghoon; Jang, Dae Hee; Jang, Jin Soo; Kim, Dong Uk; Ha, Seung Hyun; Hong, Seok

12
ELECTRONIC DEVICE FOR PROTECTING APPLICATION FROM ABNORMAL ENVIRONMENT AND OPERATING METHOD THEREOF

Kang, Brent Byunghoon; Park, Minjoon; Lee, Seongman; Jang, Daehee; Jeong, Yunjong; Kwak, Kuenhwan; Kim, Donguk

13
eMotion: An SGX extension for migrating enclaves

Park, Jaemin; Park, Sungjin; Kang, Brent Byunghoon; Kim, Kwangjo, COMPUTERS & SECURITY, v.80, pp.173 - 185, 2019-01

14
EmuID: Detecting presence of emulation through microarchitectural characteristic on ARM

Choi, Yeseul; Jeong, Yunjong; Jang, Daehee; Kang, Brent Byunghoon; Lee, Hojoon, COMPUTERS & SECURITY, v.113, 2022-02

15
EnclaveVPN: Toward Optimized Utilization of Enclave Page Cache and Practical Performance of Data Plane for Security-Enhanced Cloud VPN

Park, Jaemin; Kang, Brent Byunghoon, RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses, pp.397 - 411, Association for Computing Machinery, 2023-10-16

16
FriSM: Malicious exploit kit detection via feature-based string-similarity matching

Kim, Sungjin; Kang, Brent Byunghoon, 14th International EAI Conference on Security and Privacy in Communication Networks, SecureComm 2018, pp.416 - 432, Springer Verlag, 2018-08

17
Hacking in Darkness: Return-oriented Programming against Secure Enclaves

Lee, JaeHyuk; Jang, Jinsoo; Jang, Yeongjin; Kwak, Nohyun; Choi, Yeseul; Choi, Changho; Kim, Taesoo; et al, USENIX Security Symposium 2017, USENIX Association, 2017-08-17

18
Harnessing the x86 Intermediate Rings for Intra-Process Isolation

Lee, Hojoon; Song, Chiyun; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.20, no.4, pp.3251 - 3268, 2022-07

19
Hypernel: A hardware-assisted framework for kernel protection without nested paging

Kwon, Donghyun; Oh, Kuenwhee; Park, Junmo; Yang, Seungyong; Cho, Yeongpil; Kang, Brent Byunghoon; Paek, Yunheung, 55th Annual Design Automation Conference, DAC 2018, pp.34:1 - 34:6, Institute of Electrical and Electronics Engineers Inc., 2018-06-29

20
Identifying Users with Application-Specific Command Streams

Masri, Alaa El; Wechsler, Harry; Likarish, Peter; Kang, Brent Byunghoon, Twelfth Annual International Conference on Privacy, Security and Trust (PST 2014), IEEE, 2014-07-23

21
Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines

Heo, Ingoo; Kim, Minsu; Lee, Yongje; Choi, Changho; Lee, Jinyong; Kang, Brent Byunghoon; Paek, Yunheung, ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, v.20, no.4, 2015-09

22
In-process Memory Isolation Using Hardware Watchpoint

Jang, Jinsoo; Kang, Brent Byunghoon, 56th ACM/EDAC/IEEE Design Automation Conference (DAC), pp.32:1 - 32:6, ACM Special Interest Group on Design Automation (SIGDA),ACM Special Interest Group on Embedded Systems (SIGBED),IEEE-CEDA, 2019-06

23
Invi-server: Reducing the attack surfaces by making protected server invisible on networks

Park, Jaehyun; Noh, Jiseong; Kim, Myung-Chul; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.67, pp.89 - 106, 2017-06

24
KI-Mon ARM: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object

Lee, Hojoon; Moon, Hyungon; Heo, Ingoo; Jang, Daehee; Jang, Jinsoo; Kim, Kihwan; Paek, Yunheung; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.16, no.2, pp.287 - 300, 2019-03

25
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object

Lee, Ho Joon; Moon, Hyun Gon; Jang, Dae Hee; Kim, Ki Hwan; Lee, Ji Hoon; Paek, Yun Heung; Kang, Brent Byunghoon, USENIX Security Symposium 2013, USENIX, 2013-08-14

26
Lord of the x86 rings: A portable user mode privilege separation architecture on x86

Lee, Hojoon; Song, Chihyun; Kang, Brent Byunghoon, 25th ACM Conference on Computer and Communications Security, CCS 2018, pp.1441 - 1454, Association for Computing Machinery, 2018-10

27
Malicious URL protection based on attackers' habitual behavioral analysis

Kim, Sungjin; Kim, Jinbok; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.77, pp.790 - 806, 2018-08

28
MoHoP: A protocol providing for both mobility management and host privacy

Park, Jaehyun; Ha, Jaehee; Kang, Brent Byunghoon; Kim, Myung-Chul, COMPUTER NETWORKS, v.148, pp.20 - 33, 2019-01

29
On the Analysis of Byte-Granularity Heap Randomization

Jang, Daehee; Kim, Jonghwan; Lee, Hojoon; Park, Minjoon; Jeong, Yunjong; Kim, Minsu; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.18, no.5, pp.2237 - 2252, 2021-09

30
On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators

Kim, Yonggon; Kwon, Ohmin; Jang, Jinsoo; Jin, Seongwook; Baek, Hyeongboo; Kang, Brent Byunghoon; Yoon, Hyunsoo, COMPUTERS & SECURITY, v.62, pp.33 - 48, 2016-09

31
OpenSGX: An Open Platform for SGX Research

Jain, Prerit; Desai, Soham; Kim, Seong Min; Shih, Ming Wei; Lee, Jae Hyuk; Choi, Chang Ho; Shin, You Jung; et al, The Network and Distributed System Security Symposium 2016, Internet Society, 2016-02-21

32
POLaR: Per-Allocation Object Layout Randomization

JONGHWAN, KIM; Daehee, Jang; Jeong, Yunjong; Kang, Brent Byunghoon, 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019, pp.505 - 516, Institute of Electrical and Electronics Engineers Inc., 2019-06-27

33
PrivateZone: Providing a Private Execution Environment using ARM TrustZone

Jang, Jinsoo; Choi, Changho; Lee, Jae Hyuk; Kwak, Nohyun; Lee, Seongman; Choi, Yeseul; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.15, no.5, pp.797 - 810, 2018-09

34
Quantitative Server Sizing Model for Performance Satisfaction in Secure U2L Migration

Joe, Hun; Kim, Sungjin; Kang, Brent Byunghoon, IEEE ACCESS, v.9, pp.142449 - 142460, 2021-10

35
Rethinking anti-emulation techniques for large-scale software deployment

Jang, Daehee; Jeong, Yunjong; LEE, SEONG MAN; Park, Minjoon; Kwak, Kuenhwan; Kim, Donguk; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.83, pp.182 - 200, 2019-06

36
Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection

Jang, Jinsoo; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.17, no.5, pp.1000 - 1014, 2018-05

37
Revisiting the ARM Debug Facility for OS Kernel Security

Jang, Jinsoo; Kang, Brent Byunghoon, 56th ACM/EDAC/IEEE Design Automation Conference (DAC), ACM Special Interest Group on Design Automation (SIGDA),ACM Special Interest Group on Embedded Systems (SIGBED),IEEE-CEDA, 2019-06

38
Rosemary: A Robust, Secure, and High-performance Network Operating System

Shin, Seung Won; Song, Yong Joo; Lee, Tae Kyung; Lee, Sang Ho; Chung, Jae Woong; Phillip, Porras; Vinod, Yegneswaran; et al, 21st ACM Conference on Computer and Communications Security (CCS), ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2014-11-05

39
S-OpenSGX: A System-level Platform for Exploring SGX Enclave-Based Computing

Choi, Changho; Kwak, Nohyun; Jang, Jinsoo; Jang, Daehee; Oh, Kuenwhee; Kwag, Kyungsoo; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.70, pp.290 - 306, 2017-09

40
SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout

LEE, SEONG MAN; Kang, Hyeonwoo; Jang, Jinsoo; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.19, no.4, pp.2559 - 2575, 2022-07

41
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment

Jang, Jin Soo; Kong, Sun June; Kim, Min Su; Kim, Dae Gyeong; Kang, Brent Byunghoon, Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS 2015), Internet Society, 2015-02-08

42
Securing a communication channel for the trusted execution environment

Jang, Jinsoo; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.83, pp.79 - 92, 2019-06

43
SelMon: Reinforcing mobile device security with self-protected trust anchor

Jang, Jinsoo; Kang, Brent Byunghoon, 18th ACM International Conference on Mobile Systems, Applications, and Services, MobiSys 2020, pp.135 - 147, Association for Computing Machinery, Inc, 2020-06-15

44
SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure

Kim, Deokjin; Jang, Daehee; Park, Minjoon; Jeong, Yunjong; Kim, Jonghwan; Choi, Seokjin; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.82, pp.118 - 139, 2019-05

45
SuM: Efficient shadow stack protection on ARM Cortex-M

Choi, Wonwoo; Seo, Minjae; Lee, Seongman; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.136, 2024-01

46
System and method for implementing a hidden server

Kang, Brent Byunghoon, 2015-01-06

47
Towards scalable and configurable simulation for disaggregated architecture

Kim, Daegyeong; Choi, Wonwoo; Lim, Chang-il; Kim, Eunjin; Kim, Geonwoo; Song, Yongho; Lee, Junsu; et al, SIMULATION MODELLING PRACTICE AND THEORY, v.125, 2023-05

48
Value-Based Constraint Control Flow Integrity

Jung, Dongjae; 김민수; Jang, Jinsoo; Kang, Brent Byunghoon, IEEE ACCESS, v.8, pp.50531 - 50542, 2020-03

49
Vigilare: Toward Snoop-based Kernel Integrity Monitor

Moon, Hyun Gon; Lee, Ho Joon; Lee, Ji Hoon; Kim, Ki Hwan; Paek, Yun Heung; Kang, Brent Byunghoon, 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp.28 - 37, ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2012-10-16

50
Vulnerabilities of network OS and mitigation with state-based permission system

Noh, Jiseong; Lee, Seunghyeon; Park, Jaehyun; Shin, Seungwon; Kang, Brent Byunghoon, SECURITY AND COMMUNICATION NETWORKS, v.9, no.13, pp.1971 - 1982, 2016-09

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0