강병훈 교수 연구실
연구실 정보 수정하기
홈
기본 정보
연구 영역
프로젝트
발행물
구성원
발행물
논문
저서
컨퍼런스
전체 논문
102
필터 설정하기
41
Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors
Ingoo Heo, Daehee Jang, Hyunggon Moon, Hansu Cho, Seungwook Lee, Brent Byunghoon Kang, Yunheung Paek
Journal of Semiconductor Technology and Science, 1970
42
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment
Jinsoo Jang, Sunjune Kong, Minsoo Kim, Daegyeong Kim, Brent Byunghoon Kang
22nd Annual Network and Distributed System Security Symposium, NDSS, 2015
43
ATRA: Address Translation Redirection Attack against Hardware-based External Monitors
Daehee Jang, Hojoon Lee, Minsoo Kim, Daehyeok Kim, Daegyeong Kim, Brent Byunghoon Kang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2014
44
Rosemary: A Robust, Secure, and High-performance Network Operating System
Seungwon Shin, Yongsoo Song, Taekyung Lee, Sangho Lee, Jaewoong Chung, Phillip Porras, Vinod Yegneswaran†, Jiseong Noh, Brent Byunghoon Kang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2014
45
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object
Hojoon Lee, Hyungon Moon, Daehee Jang, Kihwan Kim, Jihoon Lee, Yunheung Paek, Brent Byunghoon Kang
13th USENIX Security Symposium (USENIX Security 2013), 2013
46
Vigilare: Toward Snoop-based Kernel Integrity Monitor.
Hyungon Moon, Hojoon Lee, Jihoon Lee, Kihwan Kim, Yunheung Paek, Brent Byunghoon Kang
Proceedings of the 2012 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2012
47
DoubleGuard: Detecting Intrusions In Multi-tier Web Applications.
M. Le, A. Stavrou, B. Kang
IEEE Transactions on Dependable and Secure Computing, 2012
48
Identifying Users with Application-Specific Command Streams
A. El-Masri, P. Likarish, H. Wechsler, B. Kang
Twelfth Annual International Conference on Privacy, Security and Trust (PST 2014), 2014
49
Developing and Refining Infected-Host Enumeration Methods for Advanced Botnets
C. Nunnery, B. Kang
Telecommunications Review, 2012
50
Entropy-Based Measurement of IP Address Inflation in the Waledac Botnet.
R. Weaver, C. Nunnery, G. Singaraju, B. Kang
CERT FloCon 2011, 1970
1
2
3
4
5
6
7
8
9
10