Showing results 1 to 50 of 50
3rdParTEE: Securing Third-Party IoT Services Using the Trusted Execution Environment Jang, Jinsoo; Kang, Brent Byunghoon, IEEE INTERNET OF THINGS JOURNAL, v.9, no.17, pp.15814 - 15826, 2022-09 |
A dynamic per-context verification of kernel address integrity from external monitors Lee, Hojoon; Kim, Minsu; Paek, Yunheung; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.77, pp.824 - 837, 2018-08 |
A reflective covert channel attack anchored on trusted web services Zhu, Feng; Yun, Youngtae; Wei, Jinpeng; Kang, Brent Byunghoon; Wang, Yongzhi; Kim, Daehyeok; Li, Peng; et al, 25th International Conference on Web Services, ICWS 2018 Held as Part of the Services Conference Federation, SCF 2018, pp.84 - 99, Springer Verlag, 2018-06 |
Active authentication using scrolling behaviors El Masri, Alaa; Wechsler, Harry; Likarish, Peter; Grayson, Christopher; Pu, Calton; Al-Arayed, Dalal; Kang, Brent Byunghoon, 6th International Conference on Information and Communication Systems, ICICS 2015, pp.257 - 262, Institute of Electrical and Electronics Engineers Inc., 2015-04 |
Agamotto: Accelerating kernel driver fuzzing with lightweight virtual machine checkpoints Song, Dokyung; Hetzelt, Felicitas; JONGHWAN, KIM; Kang, Brent Byunghoon; Seifert, Jean-Pierre; Franz, Michael, 29th USENIX Security Symposium, pp.2541 - 2557, USENIX Association, 2020-08-12 |
AI-HydRa: Advanced hybrid approach using random forest and deep learning for malware classification Yoo, Suyeon; Kim, Sungjin; Kim, Seungjae; Kang, Brent Byunghoon, INFORMATION SCIENCES, v.546, pp.420 - 435, 2021-02 |
ATRA: Address Translation Redirection Attack against Hardware-based External Monitors Jang, Dae Hee; Lee, Ho Joon; Kim, Min Su; Kim, Dae Hyuk; Kim, Dae Gyeong; Kang, Brent Byunghoon, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2014), ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2014-11-03 |
Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping Moon, Hyungon; Lee, Hojoon; Heo, Ingoo; Kim, Kihwan; Paek, Yunheung; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.14, no.2, pp.145 - 157, 2017-03 |
Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions Manes, Valentin J. M.; Jang, Daehee; Ryu, Chanho; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.74, pp.130 - 143, 2018-05 |
Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors Heo, Ingoo; Jang, Daehee; Moon, Hyungon; Cho, Hansu; Lee, Seungwook; Kang, Brent Byunghoon; Paek, Yunheung, JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, v.15, no.1, pp.48 - 59, 2015-02 |
Electronic device and control method therefor Kang, Brent Byunghoon; Jang, Dae Hee; Jang, Jin Soo; Kim, Dong Uk; Ha, Seung Hyun; Hong, Seok |
ELECTRONIC DEVICE FOR PROTECTING APPLICATION FROM ABNORMAL ENVIRONMENT AND OPERATING METHOD THEREOF Kang, Brent Byunghoon; Park, Minjoon; Lee, Seongman; Jang, Daehee; Jeong, Yunjong; Kwak, Kuenhwan; Kim, Donguk |
eMotion: An SGX extension for migrating enclaves Park, Jaemin; Park, Sungjin; Kang, Brent Byunghoon; Kim, Kwangjo, COMPUTERS & SECURITY, v.80, pp.173 - 185, 2019-01 |
EmuID: Detecting presence of emulation through microarchitectural characteristic on ARM Choi, Yeseul; Jeong, Yunjong; Jang, Daehee; Kang, Brent Byunghoon; Lee, Hojoon, COMPUTERS & SECURITY, v.113, 2022-02 |
EnclaveVPN: Toward Optimized Utilization of Enclave Page Cache and Practical Performance of Data Plane for Security-Enhanced Cloud VPN Park, Jaemin; Kang, Brent Byunghoon, RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses, pp.397 - 411, Association for Computing Machinery, 2023-10-16 |
FriSM: Malicious exploit kit detection via feature-based string-similarity matching Kim, Sungjin; Kang, Brent Byunghoon, 14th International EAI Conference on Security and Privacy in Communication Networks, SecureComm 2018, pp.416 - 432, Springer Verlag, 2018-08 |
Hacking in Darkness: Return-oriented Programming against Secure Enclaves Lee, JaeHyuk; Jang, Jinsoo; Jang, Yeongjin; Kwak, Nohyun; Choi, Yeseul; Choi, Changho; Kim, Taesoo; et al, USENIX Security Symposium 2017, USENIX Association, 2017-08-17 |
Harnessing the x86 Intermediate Rings for Intra-Process Isolation Lee, Hojoon; Song, Chiyun; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.20, no.4, pp.3251 - 3268, 2022-07 |
Hypernel: A hardware-assisted framework for kernel protection without nested paging Kwon, Donghyun; Oh, Kuenwhee; Park, Junmo; Yang, Seungyong; Cho, Yeongpil; Kang, Brent Byunghoon; Paek, Yunheung, 55th Annual Design Automation Conference, DAC 2018, pp.34:1 - 34:6, Institute of Electrical and Electronics Engineers Inc., 2018-06-29 |
Identifying Users with Application-Specific Command Streams Masri, Alaa El; Wechsler, Harry; Likarish, Peter; Kang, Brent Byunghoon, Twelfth Annual International Conference on Privacy, Security and Trust (PST 2014), IEEE, 2014-07-23 |
Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines Heo, Ingoo; Kim, Minsu; Lee, Yongje; Choi, Changho; Lee, Jinyong; Kang, Brent Byunghoon; Paek, Yunheung, ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, v.20, no.4, 2015-09 |
In-process Memory Isolation Using Hardware Watchpoint Jang, Jinsoo; Kang, Brent Byunghoon, 56th ACM/EDAC/IEEE Design Automation Conference (DAC), pp.32:1 - 32:6, ACM Special Interest Group on Design Automation (SIGDA),ACM Special Interest Group on Embedded Systems (SIGBED),IEEE-CEDA, 2019-06 |
Invi-server: Reducing the attack surfaces by making protected server invisible on networks Park, Jaehyun; Noh, Jiseong; Kim, Myung-Chul; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.67, pp.89 - 106, 2017-06 |
KI-Mon ARM: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object Lee, Hojoon; Moon, Hyungon; Heo, Ingoo; Jang, Daehee; Jang, Jinsoo; Kim, Kihwan; Paek, Yunheung; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.16, no.2, pp.287 - 300, 2019-03 |
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object Lee, Ho Joon; Moon, Hyun Gon; Jang, Dae Hee; Kim, Ki Hwan; Lee, Ji Hoon; Paek, Yun Heung; Kang, Brent Byunghoon, USENIX Security Symposium 2013, USENIX, 2013-08-14 |
Lord of the x86 rings: A portable user mode privilege separation architecture on x86 Lee, Hojoon; Song, Chihyun; Kang, Brent Byunghoon, 25th ACM Conference on Computer and Communications Security, CCS 2018, pp.1441 - 1454, Association for Computing Machinery, 2018-10 |
Malicious URL protection based on attackers' habitual behavioral analysis Kim, Sungjin; Kim, Jinbok; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.77, pp.790 - 806, 2018-08 |
MoHoP: A protocol providing for both mobility management and host privacy Park, Jaehyun; Ha, Jaehee; Kang, Brent Byunghoon; Kim, Myung-Chul, COMPUTER NETWORKS, v.148, pp.20 - 33, 2019-01 |
On the Analysis of Byte-Granularity Heap Randomization Jang, Daehee; Kim, Jonghwan; Lee, Hojoon; Park, Minjoon; Jeong, Yunjong; Kim, Minsu; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.18, no.5, pp.2237 - 2252, 2021-09 |
On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators Kim, Yonggon; Kwon, Ohmin; Jang, Jinsoo; Jin, Seongwook; Baek, Hyeongboo; Kang, Brent Byunghoon; Yoon, Hyunsoo, COMPUTERS & SECURITY, v.62, pp.33 - 48, 2016-09 |
OpenSGX: An Open Platform for SGX Research Jain, Prerit; Desai, Soham; Kim, Seong Min; Shih, Ming Wei; Lee, Jae Hyuk; Choi, Chang Ho; Shin, You Jung; et al, The Network and Distributed System Security Symposium 2016, Internet Society, 2016-02-21 |
POLaR: Per-Allocation Object Layout Randomization JONGHWAN, KIM; Daehee, Jang; Jeong, Yunjong; Kang, Brent Byunghoon, 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019, pp.505 - 516, Institute of Electrical and Electronics Engineers Inc., 2019-06-27 |
PrivateZone: Providing a Private Execution Environment using ARM TrustZone Jang, Jinsoo; Choi, Changho; Lee, Jae Hyuk; Kwak, Nohyun; Lee, Seongman; Choi, Yeseul; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.15, no.5, pp.797 - 810, 2018-09 |
Quantitative Server Sizing Model for Performance Satisfaction in Secure U2L Migration Joe, Hun; Kim, Sungjin; Kang, Brent Byunghoon, IEEE ACCESS, v.9, pp.142449 - 142460, 2021-10 |
Rethinking anti-emulation techniques for large-scale software deployment Jang, Daehee; Jeong, Yunjong; LEE, SEONG MAN; Park, Minjoon; Kwak, Kuenhwan; Kim, Donguk; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.83, pp.182 - 200, 2019-06 |
Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection Jang, Jinsoo; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.17, no.5, pp.1000 - 1014, 2018-05 |
Revisiting the ARM Debug Facility for OS Kernel Security Jang, Jinsoo; Kang, Brent Byunghoon, 56th ACM/EDAC/IEEE Design Automation Conference (DAC), ACM Special Interest Group on Design Automation (SIGDA),ACM Special Interest Group on Embedded Systems (SIGBED),IEEE-CEDA, 2019-06 |
Rosemary: A Robust, Secure, and High-performance Network Operating System Shin, Seung Won; Song, Yong Joo; Lee, Tae Kyung; Lee, Sang Ho; Chung, Jae Woong; Phillip, Porras; Vinod, Yegneswaran; et al, 21st ACM Conference on Computer and Communications Security (CCS), ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2014-11-05 |
S-OpenSGX: A System-level Platform for Exploring SGX Enclave-Based Computing Choi, Changho; Kwak, Nohyun; Jang, Jinsoo; Jang, Daehee; Oh, Kuenwhee; Kwag, Kyungsoo; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.70, pp.290 - 306, 2017-09 |
SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout LEE, SEONG MAN; Kang, Hyeonwoo; Jang, Jinsoo; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.19, no.4, pp.2559 - 2575, 2022-07 |
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment Jang, Jin Soo; Kong, Sun June; Kim, Min Su; Kim, Dae Gyeong; Kang, Brent Byunghoon, Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS 2015), Internet Society, 2015-02-08 |
Securing a communication channel for the trusted execution environment Jang, Jinsoo; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.83, pp.79 - 92, 2019-06 |
SelMon: Reinforcing mobile device security with self-protected trust anchor Jang, Jinsoo; Kang, Brent Byunghoon, 18th ACM International Conference on Mobile Systems, Applications, and Services, MobiSys 2020, pp.135 - 147, Association for Computing Machinery, Inc, 2020-06-15 |
SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure Kim, Deokjin; Jang, Daehee; Park, Minjoon; Jeong, Yunjong; Kim, Jonghwan; Choi, Seokjin; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.82, pp.118 - 139, 2019-05 |
SuM: Efficient shadow stack protection on ARM Cortex-M Choi, Wonwoo; Seo, Minjae; Lee, Seongman; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.136, 2024-01 |
System and method for implementing a hidden server Kang, Brent Byunghoon, 2015-01-06 |
Towards scalable and configurable simulation for disaggregated architecture Kim, Daegyeong; Choi, Wonwoo; Lim, Chang-il; Kim, Eunjin; Kim, Geonwoo; Song, Yongho; Lee, Junsu; et al, SIMULATION MODELLING PRACTICE AND THEORY, v.125, 2023-05 |
Value-Based Constraint Control Flow Integrity Jung, Dongjae; 김민수; Jang, Jinsoo; Kang, Brent Byunghoon, IEEE ACCESS, v.8, pp.50531 - 50542, 2020-03 |
Vigilare: Toward Snoop-based Kernel Integrity Monitor Moon, Hyun Gon; Lee, Ho Joon; Lee, Ji Hoon; Kim, Ki Hwan; Paek, Yun Heung; Kang, Brent Byunghoon, 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp.28 - 37, ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2012-10-16 |
Vulnerabilities of network OS and mitigation with state-based permission system Noh, Jiseong; Lee, Seunghyeon; Park, Jaehyun; Shin, Seungwon; Kang, Brent Byunghoon, SECURITY AND COMMUNICATION NETWORKS, v.9, no.13, pp.1971 - 1982, 2016-09 |
Discover