Researcher Page

Kang, Brent Byunghoon (강병훈)
부교수, School of Computing(전산학부)
Research Area
Malicious code, rootkit, Trusted Execution Environment
    Similar researchers

    Keyword Cloud

    Reload 더보기
    NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
    Value-Based Constraint Control Flow Integrity

    Jung, Dongjae; Kim, Minsu; Jang, Jinsoo; et al, IEEE ACCESS, v.8, pp.50531 - 50542, 2020-03

    Securing a communication channel for the trusted execution environment

    Jang, Jinsoo; Kang, Brent Byunghoonresearcher, COMPUTERS & SECURITY, v.83, pp.79 - 92, 2019-06

    Rethinking anti-emulation techniques for large-scale software deployment

    Jang, Daehee; Jeong, Yunjong; Lee, Sungman; et al, COMPUTERS & SECURITY, v.83, pp.182 - 200, 2019-06

    SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure

    Kim, Deokjin; Jang, Daehee; Park, Minjoon; et al, COMPUTERS & SECURITY, v.82, pp.118 - 139, 2019-05

    KI-Mon ARM: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object

    Lee, Hojoon; Moon, Hyungon; Heo, Ingoo; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.16, no.2, pp.287 - 300, 2019-03

    MoHoP: A protocol providing for both mobility management and host privacy

    Park, Jaehyun; Ha, Jaehee; Kang, Brent Byunghoonresearcher; et al, COMPUTER NETWORKS, v.148, pp.20 - 33, 2019-01

    eMotion: An SGX extension for migrating enclaves

    Park, Jaemin; Park, Sungjin; Kang, Brent Byunghoonresearcher; et al, COMPUTERS & SECURITY, v.80, pp.173 - 185, 2019-01

    PrivateZone: Providing a Private Execution Environment using ARM TrustZone

    Jang, Jinsoo; Choi, Changho; Lee, Jae Hyuk; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.15, no.5, pp.797 - 810, 2018-09

    Malicious URL protection based on attackers' habitual behavioral analysis

    Kim, Sungjin; Kim, Jinbok; Kang, Brent Byunghoonresearcher, COMPUTERS & SECURITY, v.77, pp.790 - 806, 2018-08

    A dynamic per-context verification of kernel address integrity from external monitors

    Lee, Hojoon; Kim, Minsu; Paek, Yunheung; et al, COMPUTERS & SECURITY, v.77, pp.824 - 837, 2018-08

    불법 커뮤니티를 통한 비트코인 거래 추적 방법에 관한 연구

    정세진; 곽노현; 강병훈researcher, 정보보호학회논문지, v.28, no.3, pp.717 - 727, 2018-06

    Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions

    Manes, Valentin J. M.; Jang, Daehee; Ryu, Chanho; et al, COMPUTERS & SECURITY, v.74, pp.130 - 143, 2018-05

    S-OpenSGX: A System-level Platform for Exploring SGX Enclave-Based Computing

    Choi, Changho; Kwak, Nohyun; Jang, Jinsoo; et al, COMPUTERS & SECURITY, v.70, pp.290 - 306, 2017-09

    Invi-server: Reducing the attack surfaces by making protected server invisible on networks

    Park, Jaehyun; Noh, Jiseong; Kim, Myung-Chulresearcher; et al, COMPUTERS & SECURITY, v.67, pp.89 - 106, 2017-06

    Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping

    Moon, Hyungon; Lee, Hojoon; Heo, Ingoo; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.14, no.2, pp.145 - 157, 2017-03

    On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators

    Kim, Yonggon; Kwon, Ohmin; Jang, Jinsoo; et al, COMPUTERS & SECURITY, v.62, pp.33 - 48, 2016-09

    Vulnerabilities of network OS and mitigation with state-based permission system

    Noh, Jiseong; Lee, Seunghyeon; Park, Jaehyun; et al, SECURITY AND COMMUNICATION NETWORKS, v.9, no.13, pp.1971 - 1982, 2016-09

    Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines

    Heo, Ingoo; Kim, Minsu; Lee, Yongje; et al, ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, v.20, no.4, 2015-09

    메모리 주소 변환 공격에 대한 스케줄러 기반의 방어 방법

    장대희; 장진수; 김동욱; et al, 정보보호학회논문지, v.25, no.4, pp.873 - 880, 2015-08

    Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors

    Heo, Ingoo; Jang, Daehee; Moon, Hyungon; et al, JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, v.15, no.1, pp.48 - 59, 2015-02

    Load more items

    rss_1.0 rss_2.0 atom_1.0