Researcher Page

사진

Kang, Brent Byunghoon (강병훈) I-5233-2013

Department
School of Computing(전산학부)
Website
http://cysec.kaist.ac.krHomePage
Research Area
Malicious code, rootkit, Trusted Execution Environment

Keyword Cloud

Reload 더보기
1

Securing a communication channel for the trusted execution environment

Jang, Jinsoo; Kang, Brent Byunghoonresearcher, COMPUTERS & SECURITY, v.83, pp.79 - 92, 2019-06

2

Rethinking anti-emulation techniques for large-scale software deployment

Jang, Daehee; Jeong, Yunjong; Lee, Sungman; et al, COMPUTERS & SECURITY, v.83, pp.182 - 200, 2019-06

3

SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure

Kim, Deokjin; Jang, Daehee; Park, Minjoon; et al, COMPUTERS & SECURITY, v.82, pp.118 - 139, 2019-05

4

MoHoP: A protocol providing for both mobility management and host privacy

Park, Jaehyun; Ha, Jaehee; Kang, Brent Byunghoonresearcher; et al, COMPUTER NETWORKS, v.148, pp.20 - 33, 2019-01

5

eMotion: An SGX extension for migrating enclaves

Park, Jaemin; Park, Sungjin; Kang, Brent Byunghoonresearcher; et al, COMPUTERS & SECURITY, v.80, pp.173 - 185, 2019-01

6

PrivateZone: Providing a Private Execution Environment using ARM TrustZone

Jang, Jinsoo; Choi, Changho; Lee, Jae Hyuk; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.15, no.5, pp.797 - 810, 2018-09

7

A dynamic per-context verification of kernel address integrity from external monitors

Lee, Hojoon; Kim, Minsu; Paek, Yunheung; et al, COMPUTERS & SECURITY, v.77, pp.824 - 837, 2018-08

8

Malicious URL protection based on attackers' habitual behavioral analysis

Kim, Sungjin; Kim, Jinbok; Kang, Brent Byunghoonresearcher, COMPUTERS & SECURITY, v.77, pp.790 - 806, 2018-08

9

불법 커뮤니티를 통한 비트코인 거래 추적 방법에 관한 연구

정세진; 곽노현; 강병훈researcher, 정보보호학회논문지, v.28, no.3, pp.717 - 727, 2018-06

10

Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions

Manes, Valentin J. M.; Jang, Daehee; Ryu, Chanho; et al, COMPUTERS & SECURITY, v.74, pp.130 - 143, 2018-05

11

S-OpenSGX: A System-level Platform for Exploring SGX Enclave-Based Computing

Choi, Changho; Kwak, Nohyun; Jang, Jinsoo; et al, COMPUTERS & SECURITY, v.70, pp.290 - 306, 2017-09

12

Invi-server: Reducing the attack surfaces by making protected server invisible on networks

Park, Jaehyun; Noh, Jiseong; Kim, Myung-Chulresearcher; et al, COMPUTERS & SECURITY, v.67, pp.89 - 106, 2017-06

13

Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping

Moon, Hyungon; Lee, Hojoon; Heo, Ingoo; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.14, no.2, pp.145 - 157, 2017-03

14

On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators

Kim, Yonggon; Kwon, Ohmin; Jang, Jinsoo; et al, COMPUTERS & SECURITY, v.62, pp.33 - 48, 2016-09

15

Vulnerabilities of network OS and mitigation with state-based permission system

Noh, Jiseong; Lee, Seunghyeon; Park, Jaehyun; et al, SECURITY AND COMMUNICATION NETWORKS, v.9, no.13, pp.1971 - 1982, 2016-09

16

Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines

Heo, Ingoo; Kim, Minsu; Lee, Yongje; et al, ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, v.20, no.4, 2015-09

17

메모리 주소 변환 공격에 대한 스케줄러 기반의 방어 방법

장대희; 장진수; 김동욱; et al, 정보보호학회논문지, v.25, no.4, pp.873 - 880, 2015-08

18

Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors

Heo, Ingoo; Jang, Daehee; Moon, Hyungon; et al, JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, v.15, no.1, pp.48 - 59, 2015-02

19

DoubleGuard: Detecting Intrusions in Multitier Web Applications

Le, Meixing; Stavrou, Angelos; Kang, Brent ByungHoonresearcher, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.9, no.4, pp.512 - 525, 2012-07

Load more items
Loading...

rss_1.0 rss_2.0 atom_1.0