Showing results 9 to 19 of 19
Identifying Users with Application-Specific Command Streams Masri, Alaa El; Wechsler, Harry; Likarish, Peter; Kang, Brent Byunghoon, Twelfth Annual International Conference on Privacy, Security and Trust (PST 2014), IEEE, 2014-07-23 |
In-process Memory Isolation Using Hardware Watchpoint Jang, Jinsoo; Kang, Brent Byunghoon, 56th ACM/EDAC/IEEE Design Automation Conference (DAC), pp.32:1 - 32:6, ACM Special Interest Group on Design Automation (SIGDA),ACM Special Interest Group on Embedded Systems (SIGBED),IEEE-CEDA, 2019-06 |
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object Lee, Ho Joon; Moon, Hyun Gon; Jang, Dae Hee; Kim, Ki Hwan; Lee, Ji Hoon; Paek, Yun Heung; Kang, Brent Byunghoon, USENIX Security Symposium 2013, USENIX, 2013-08-14 |
Lord of the x86 rings: A portable user mode privilege separation architecture on x86 Lee, Hojoon; Song, Chihyun; Kang, Brent Byunghoon, 25th ACM Conference on Computer and Communications Security, CCS 2018, pp.1441 - 1454, Association for Computing Machinery, 2018-10 |
OpenSGX: An Open Platform for SGX Research Jain, Prerit; Desai, Soham; Kim, Seong Min; Shih, Ming Wei; Lee, Jae Hyuk; Choi, Chang Ho; Shin, You Jung; et al, The Network and Distributed System Security Symposium 2016, Internet Society, 2016-02-21 |
POLaR: Per-Allocation Object Layout Randomization JONGHWAN, KIM; Daehee, Jang; Jeong, Yunjong; Kang, Brent Byunghoon, 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019, pp.505 - 516, Institute of Electrical and Electronics Engineers Inc., 2019-06-27 |
Revisiting the ARM Debug Facility for OS Kernel Security Jang, Jinsoo; Kang, Brent Byunghoon, 56th ACM/EDAC/IEEE Design Automation Conference (DAC), ACM Special Interest Group on Design Automation (SIGDA),ACM Special Interest Group on Embedded Systems (SIGBED),IEEE-CEDA, 2019-06 |
Rosemary: A Robust, Secure, and High-performance Network Operating System Shin, Seung Won; Song, Yong Joo; Lee, Tae Kyung; Lee, Sang Ho; Chung, Jae Woong; Phillip, Porras; Vinod, Yegneswaran; et al, 21st ACM Conference on Computer and Communications Security (CCS), ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2014-11-05 |
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment Jang, Jin Soo; Kong, Sun June; Kim, Min Su; Kim, Dae Gyeong; Kang, Brent Byunghoon, Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS 2015), Internet Society, 2015-02-08 |
SelMon: Reinforcing mobile device security with self-protected trust anchor Jang, Jinsoo; Kang, Brent Byunghoon, 18th ACM International Conference on Mobile Systems, Applications, and Services, MobiSys 2020, pp.135 - 147, Association for Computing Machinery, Inc, 2020-06-15 |
Vigilare: Toward Snoop-based Kernel Integrity Monitor Moon, Hyun Gon; Lee, Ho Joon; Lee, Ji Hoon; Kim, Ki Hwan; Paek, Yun Heung; Kang, Brent Byunghoon, 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp.28 - 37, ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2012-10-16 |
Discover