Researcher Page

사진
Kang, Brent Byunghoon (강병훈)
교수, (전산학부)
Research Area
Malicious code, rootkit, Trusted Execution Environment
Co-researchers
    Similar researchers

    Keyword Cloud

    Reload 더보기
    NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
    1
    SuM: Efficient shadow stack protection on ARM Cortex-M

    Choi, Wonwoo; Seo, Minjae; Lee, Seongman; et al, COMPUTERS & SECURITY, v.136, 2024-01

    2
    Towards scalable and configurable simulation for disaggregated architecture

    Kim, Daegyeong; Choi, Wonwoo; Lim, Chang-il; et al, SIMULATION MODELLING PRACTICE AND THEORY, v.125, 2023-05

    3
    Impact of Emerging Hardware on Security and Privacy

    Jaeger, Trent; Kang, Brent ByungHoon; Mentens, Nele; et al, IEEE SECURITY & PRIVACY, v.21, no.3, pp.6 - 7, 2023-05

    4
    3rdParTEE: Securing Third-Party IoT Services Using the Trusted Execution Environment

    Jang, Jinsoo; Kang, Brent Byunghoon, IEEE INTERNET OF THINGS JOURNAL, v.9, no.17, pp.15814 - 15826, 2022-09

    5
    SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout

    LEE, SEONG MAN; Kang, Hyeonwoo; Jang, Jinsoo; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.19, no.4, pp.2559 - 2575, 2022-07

    6
    Harnessing the x86 Intermediate Rings for Intra-Process Isolation

    Lee, Hojoon; Song, Chiyun; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.20, no.4, pp.3251 - 3268, 2022-07

    7
    EmuID: Detecting presence of emulation through microarchitectural characteristic on ARM

    Choi, Yeseul; Jeong, Yunjong; Jang, Daehee; et al, COMPUTERS & SECURITY, v.113, 2022-02

    8
    Quantitative Server Sizing Model for Performance Satisfaction in Secure U2L Migration

    Joe, Hun; Kim, Sungjin; Kang, Brent Byunghoon, IEEE ACCESS, v.9, pp.142449 - 142460, 2021-10

    9
    On the Analysis of Byte-Granularity Heap Randomization

    Jang, Daehee; Kim, Jonghwan; Lee, Hojoon; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.18, no.5, pp.2237 - 2252, 2021-09

    10
    AI-HydRa: Advanced hybrid approach using random forest and deep learning for malware classification

    Yoo, Suyeon; Kim, Sungjin; Kim, Seungjae; et al, INFORMATION SCIENCES, v.546, pp.420 - 435, 2021-02

    11
    Value-Based Constraint Control Flow Integrity

    Jung, Dongjae; 김민수; Jang, Jinsoo; et al, IEEE ACCESS, v.8, pp.50531 - 50542, 2020-03

    12
    Rethinking anti-emulation techniques for large-scale software deployment

    Jang, Daehee; Jeong, Yunjong; LEE, SEONG MAN; et al, COMPUTERS & SECURITY, v.83, pp.182 - 200, 2019-06

    13
    Securing a communication channel for the trusted execution environment

    Jang, Jinsoo; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.83, pp.79 - 92, 2019-06

    14
    SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure

    Kim, Deokjin; Jang, Daehee; Park, Minjoon; et al, COMPUTERS & SECURITY, v.82, pp.118 - 139, 2019-05

    15
    KI-Mon ARM: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object

    Lee, Hojoon; Moon, Hyungon; Heo, Ingoo; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.16, no.2, pp.287 - 300, 2019-03

    16
    MoHoP: A protocol providing for both mobility management and host privacy

    Park, Jaehyun; Ha, Jaehee; Kang, Brent Byunghoon; et al, COMPUTER NETWORKS, v.148, pp.20 - 33, 2019-01

    17
    eMotion: An SGX extension for migrating enclaves

    Park, Jaemin; Park, Sungjin; Kang, Brent Byunghoon; et al, COMPUTERS & SECURITY, v.80, pp.173 - 185, 2019-01

    18
    PrivateZone: Providing a Private Execution Environment using ARM TrustZone

    Jang, Jinsoo; Choi, Changho; Lee, Jae Hyuk; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.15, no.5, pp.797 - 810, 2018-09

    19
    A dynamic per-context verification of kernel address integrity from external monitors

    Lee, Hojoon; Kim, Minsu; Paek, Yunheung; et al, COMPUTERS & SECURITY, v.77, pp.824 - 837, 2018-08

    20
    Malicious URL protection based on attackers' habitual behavioral analysis

    Kim, Sungjin; Kim, Jinbok; Kang, Brent Byunghoon, COMPUTERS & SECURITY, v.77, pp.790 - 806, 2018-08

    Load more items
    Loading...

    rss_1.0 rss_2.0 atom_1.0