Researcher Page

사진

Kang, Brent Byunghoon (강병훈) I-5233-2013

Department
School of Computing(전산학부)
Co-author
Collaboration Network Collaboration Network
Website
http://cysec.kaist.ac.krHomePage
Research Area
Malicious code, rootkit, Trusted Execution Environment

Keyword Cloud

Reload 더보기
1

Invi-server: Reducing the attack surfaces by making protected server invisible on networks

Park, Jaehyun; Noh, Jiseong; Kim, Myung-Chulresearcher; Kang, Brent ByunghoonresearcherELSEVIER ADVANCED TECHNOLOGYCOMPUTERS & SECURITY, v.67, pp.89 - 106, 2017-06

2

On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators

Kim, Yonggon; Kwon, Ohmin; Jang, Jinsoo; Jin, Seongwook; Baek, Hyeongboo; Kang, Brent Byunghoonresearcher; Yoon, HyunsooresearcherELSEVIER ADVANCED TECHNOLOGYCOMPUTERS & SECURITY, v.62, pp.33 - 48, 2016-09

3

Vulnerabilities of network OS and mitigation with state-based permission system

Noh, Jiseong; Lee, Seunghyeon; Park, Jaehyun; Shin, Seungwonresearcher; Kang, Brent ByunghoonresearcherWILEY-BLACKWELLSECURITY AND COMMUNICATION NETWORKS, v.9, no.13, pp.1971 - 1982, 2016-09

4

Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines

Heo, Ingoo; Kim, Minsu; Lee, Yongje; Choi, Changho; Lee, Jinyong; Kang, Brent Byunghoonresearcher; Paek, YunheungASSOC COMPUTING MACHINERYACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, v.20, no.4, 2015-09

5

메모리 주소 변환 공격에 대한 스케줄러 기반의 방어 방법

장대희; 장진수; 김동욱; 최창호; 강병훈researcher한국정보보호학회정보보호학회논문지, v.25, no.4, pp.873 - 880, 2015-08

6

Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors

Heo, Ingoo; Jang, Daehee; Moon, Hyungon; Cho, Hansu; Lee, Seungwook; Kang, Brent Byunghoonresearcher; Paek, YunheungIEEK PUBLICATION CENTERJOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, v.15, no.1, pp.48 - 59, 2015-02

7

DoubleGuard: Detecting Intrusions in Multitier Web Applications

Le, Meixing; Stavrou, Angelos; Kang, Brent ByungHoonresearcherIEEE COMPUTER SOCIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.9, no.4, pp.512 - 525, 2012-07

Load more items
Loading...

rss_1.0 rss_2.0 atom_1.0