Browse "CS-Conference Papers(학술회의논문)" by Author Kang, Brent Byunghoon

Showing results 1 to 19 of 19

1
A reflective covert channel attack anchored on trusted web services

Zhu, Feng; Yun, Youngtae; Wei, Jinpeng; Kang, Brent Byunghoon; Wang, Yongzhi; Kim, Daehyeok; Li, Peng; et al, 25th International Conference on Web Services, ICWS 2018 Held as Part of the Services Conference Federation, SCF 2018, pp.84 - 99, Springer Verlag, 2018-06

2
Active authentication using scrolling behaviors

El Masri, Alaa; Wechsler, Harry; Likarish, Peter; Grayson, Christopher; Pu, Calton; Al-Arayed, Dalal; Kang, Brent Byunghoon, 6th International Conference on Information and Communication Systems, ICICS 2015, pp.257 - 262, Institute of Electrical and Electronics Engineers Inc., 2015-04

3
Agamotto: Accelerating kernel driver fuzzing with lightweight virtual machine checkpoints

Song, Dokyung; Hetzelt, Felicitas; JONGHWAN, KIM; Kang, Brent Byunghoon; Seifert, Jean-Pierre; Franz, Michael, 29th USENIX Security Symposium, pp.2541 - 2557, USENIX Association, 2020-08-12

4
ATRA: Address Translation Redirection Attack against Hardware-based External Monitors

Jang, Dae Hee; Lee, Ho Joon; Kim, Min Su; Kim, Dae Hyuk; Kim, Dae Gyeong; Kang, Brent Byunghoon, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2014), ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2014-11-03

5
EnclaveVPN: Toward Optimized Utilization of Enclave Page Cache and Practical Performance of Data Plane for Security-Enhanced Cloud VPN

Park, Jaemin; Kang, Brent Byunghoon, RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses, pp.397 - 411, Association for Computing Machinery, 2023-10-16

6
FriSM: Malicious exploit kit detection via feature-based string-similarity matching

Kim, Sungjin; Kang, Brent Byunghoon, 14th International EAI Conference on Security and Privacy in Communication Networks, SecureComm 2018, pp.416 - 432, Springer Verlag, 2018-08

7
Hacking in Darkness: Return-oriented Programming against Secure Enclaves

Lee, JaeHyuk; Jang, Jinsoo; Jang, Yeongjin; Kwak, Nohyun; Choi, Yeseul; Choi, Changho; Kim, Taesoo; et al, USENIX Security Symposium 2017, USENIX Association, 2017-08-17

8
Hypernel: A hardware-assisted framework for kernel protection without nested paging

Kwon, Donghyun; Oh, Kuenwhee; Park, Junmo; Yang, Seungyong; Cho, Yeongpil; Kang, Brent Byunghoon; Paek, Yunheung, 55th Annual Design Automation Conference, DAC 2018, pp.34:1 - 34:6, Institute of Electrical and Electronics Engineers Inc., 2018-06-29

9
Identifying Users with Application-Specific Command Streams

Masri, Alaa El; Wechsler, Harry; Likarish, Peter; Kang, Brent Byunghoon, Twelfth Annual International Conference on Privacy, Security and Trust (PST 2014), IEEE, 2014-07-23

10
In-process Memory Isolation Using Hardware Watchpoint

Jang, Jinsoo; Kang, Brent Byunghoon, 56th ACM/EDAC/IEEE Design Automation Conference (DAC), pp.32:1 - 32:6, ACM Special Interest Group on Design Automation (SIGDA),ACM Special Interest Group on Embedded Systems (SIGBED),IEEE-CEDA, 2019-06

11
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object

Lee, Ho Joon; Moon, Hyun Gon; Jang, Dae Hee; Kim, Ki Hwan; Lee, Ji Hoon; Paek, Yun Heung; Kang, Brent Byunghoon, USENIX Security Symposium 2013, USENIX, 2013-08-14

12
Lord of the x86 rings: A portable user mode privilege separation architecture on x86

Lee, Hojoon; Song, Chihyun; Kang, Brent Byunghoon, 25th ACM Conference on Computer and Communications Security, CCS 2018, pp.1441 - 1454, Association for Computing Machinery, 2018-10

13
OpenSGX: An Open Platform for SGX Research

Jain, Prerit; Desai, Soham; Kim, Seong Min; Shih, Ming Wei; Lee, Jae Hyuk; Choi, Chang Ho; Shin, You Jung; et al, The Network and Distributed System Security Symposium 2016, Internet Society, 2016-02-21

14
POLaR: Per-Allocation Object Layout Randomization

JONGHWAN, KIM; Daehee, Jang; Jeong, Yunjong; Kang, Brent Byunghoon, 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019, pp.505 - 516, Institute of Electrical and Electronics Engineers Inc., 2019-06-27

15
Revisiting the ARM Debug Facility for OS Kernel Security

Jang, Jinsoo; Kang, Brent Byunghoon, 56th ACM/EDAC/IEEE Design Automation Conference (DAC), ACM Special Interest Group on Design Automation (SIGDA),ACM Special Interest Group on Embedded Systems (SIGBED),IEEE-CEDA, 2019-06

16
Rosemary: A Robust, Secure, and High-performance Network Operating System

Shin, Seung Won; Song, Yong Joo; Lee, Tae Kyung; Lee, Sang Ho; Chung, Jae Woong; Phillip, Porras; Vinod, Yegneswaran; et al, 21st ACM Conference on Computer and Communications Security (CCS), ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2014-11-05

17
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment

Jang, Jin Soo; Kong, Sun June; Kim, Min Su; Kim, Dae Gyeong; Kang, Brent Byunghoon, Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS 2015), Internet Society, 2015-02-08

18
SelMon: Reinforcing mobile device security with self-protected trust anchor

Jang, Jinsoo; Kang, Brent Byunghoon, 18th ACM International Conference on Mobile Systems, Applications, and Services, MobiSys 2020, pp.135 - 147, Association for Computing Machinery, Inc, 2020-06-15

19
Vigilare: Toward Snoop-based Kernel Integrity Monitor

Moon, Hyun Gon; Lee, Ho Joon; Lee, Ji Hoon; Kim, Ki Hwan; Paek, Yun Heung; Kang, Brent Byunghoon, 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp.28 - 37, ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2012-10-16

Discover

rss_1.0 rss_2.0 atom_1.0