Showing results 1 to 19 of 19
A reflective covert channel attack anchored on trusted web services Zhu, Feng; Yun, Youngtae; Wei, Jinpeng; Kang, Brent Byunghoon; Wang, Yongzhi; Kim, Daehyeok; Li, Peng; et al, 25th International Conference on Web Services, ICWS 2018 Held as Part of the Services Conference Federation, SCF 2018, pp.84 - 99, Springer Verlag, 2018-06 |
Active authentication using scrolling behaviors El Masri, Alaa; Wechsler, Harry; Likarish, Peter; Grayson, Christopher; Pu, Calton; Al-Arayed, Dalal; Kang, Brent Byunghoon, 6th International Conference on Information and Communication Systems, ICICS 2015, pp.257 - 262, Institute of Electrical and Electronics Engineers Inc., 2015-04 |
Agamotto: Accelerating kernel driver fuzzing with lightweight virtual machine checkpoints Song, Dokyung; Hetzelt, Felicitas; JONGHWAN, KIM; Kang, Brent Byunghoon; Seifert, Jean-Pierre; Franz, Michael, 29th USENIX Security Symposium, pp.2541 - 2557, USENIX Association, 2020-08-12 |
ATRA: Address Translation Redirection Attack against Hardware-based External Monitors Jang, Dae Hee; Lee, Ho Joon; Kim, Min Su; Kim, Dae Hyuk; Kim, Dae Gyeong; Kang, Brent Byunghoon, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2014), ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2014-11-03 |
EnclaveVPN: Toward Optimized Utilization of Enclave Page Cache and Practical Performance of Data Plane for Security-Enhanced Cloud VPN Park, Jaemin; Kang, Brent Byunghoon, RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses, pp.397 - 411, Association for Computing Machinery, 2023-10-16 |
FriSM: Malicious exploit kit detection via feature-based string-similarity matching Kim, Sungjin; Kang, Brent Byunghoon, 14th International EAI Conference on Security and Privacy in Communication Networks, SecureComm 2018, pp.416 - 432, Springer Verlag, 2018-08 |
Hacking in Darkness: Return-oriented Programming against Secure Enclaves Lee, JaeHyuk; Jang, Jinsoo; Jang, Yeongjin; Kwak, Nohyun; Choi, Yeseul; Choi, Changho; Kim, Taesoo; et al, USENIX Security Symposium 2017, USENIX Association, 2017-08-17 |
Hypernel: A hardware-assisted framework for kernel protection without nested paging Kwon, Donghyun; Oh, Kuenwhee; Park, Junmo; Yang, Seungyong; Cho, Yeongpil; Kang, Brent Byunghoon; Paek, Yunheung, 55th Annual Design Automation Conference, DAC 2018, pp.34:1 - 34:6, Institute of Electrical and Electronics Engineers Inc., 2018-06-29 |
Identifying Users with Application-Specific Command Streams Masri, Alaa El; Wechsler, Harry; Likarish, Peter; Kang, Brent Byunghoon, Twelfth Annual International Conference on Privacy, Security and Trust (PST 2014), IEEE, 2014-07-23 |
In-process Memory Isolation Using Hardware Watchpoint Jang, Jinsoo; Kang, Brent Byunghoon, 56th ACM/EDAC/IEEE Design Automation Conference (DAC), pp.32:1 - 32:6, ACM Special Interest Group on Design Automation (SIGDA),ACM Special Interest Group on Embedded Systems (SIGBED),IEEE-CEDA, 2019-06 |
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object Lee, Ho Joon; Moon, Hyun Gon; Jang, Dae Hee; Kim, Ki Hwan; Lee, Ji Hoon; Paek, Yun Heung; Kang, Brent Byunghoon, USENIX Security Symposium 2013, USENIX, 2013-08-14 |
Lord of the x86 rings: A portable user mode privilege separation architecture on x86 Lee, Hojoon; Song, Chihyun; Kang, Brent Byunghoon, 25th ACM Conference on Computer and Communications Security, CCS 2018, pp.1441 - 1454, Association for Computing Machinery, 2018-10 |
OpenSGX: An Open Platform for SGX Research Jain, Prerit; Desai, Soham; Kim, Seong Min; Shih, Ming Wei; Lee, Jae Hyuk; Choi, Chang Ho; Shin, You Jung; et al, The Network and Distributed System Security Symposium 2016, Internet Society, 2016-02-21 |
POLaR: Per-Allocation Object Layout Randomization JONGHWAN, KIM; Daehee, Jang; Jeong, Yunjong; Kang, Brent Byunghoon, 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019, pp.505 - 516, Institute of Electrical and Electronics Engineers Inc., 2019-06-27 |
Revisiting the ARM Debug Facility for OS Kernel Security Jang, Jinsoo; Kang, Brent Byunghoon, 56th ACM/EDAC/IEEE Design Automation Conference (DAC), ACM Special Interest Group on Design Automation (SIGDA),ACM Special Interest Group on Embedded Systems (SIGBED),IEEE-CEDA, 2019-06 |
Rosemary: A Robust, Secure, and High-performance Network Operating System Shin, Seung Won; Song, Yong Joo; Lee, Tae Kyung; Lee, Sang Ho; Chung, Jae Woong; Phillip, Porras; Vinod, Yegneswaran; et al, 21st ACM Conference on Computer and Communications Security (CCS), ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2014-11-05 |
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment Jang, Jin Soo; Kong, Sun June; Kim, Min Su; Kim, Dae Gyeong; Kang, Brent Byunghoon, Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS 2015), Internet Society, 2015-02-08 |
SelMon: Reinforcing mobile device security with self-protected trust anchor Jang, Jinsoo; Kang, Brent Byunghoon, 18th ACM International Conference on Mobile Systems, Applications, and Services, MobiSys 2020, pp.135 - 147, Association for Computing Machinery, Inc, 2020-06-15 |
Vigilare: Toward Snoop-based Kernel Integrity Monitor Moon, Hyun Gon; Lee, Ho Joon; Lee, Ji Hoon; Kim, Ki Hwan; Paek, Yun Heung; Kang, Brent Byunghoon, 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp.28 - 37, ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2012-10-16 |
Discover