발행물

전체 논문

102

41

Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors
Ingoo Heo, Daehee Jang, Hyunggon Moon, Hansu Cho, Seungwook Lee, Brent Byunghoon Kang, Yunheung Paek
Journal of Semiconductor Technology and Science, 1970

42

SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment
Jinsoo Jang, Sunjune Kong, Minsoo Kim, Daegyeong Kim, Brent Byunghoon Kang
22nd Annual Network and Distributed System Security Symposium, NDSS, 2015

43

ATRA: Address Translation Redirection Attack against Hardware-based External Monitors
Daehee Jang, Hojoon Lee, Minsoo Kim, Daehyeok Kim, Daegyeong Kim, Brent Byunghoon Kang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2014

44

Rosemary: A Robust, Secure, and High-performance Network Operating System
Seungwon Shin, Yongsoo Song, Taekyung Lee, Sangho Lee, Jaewoong Chung, Phillip Porras, Vinod Yegneswaran†, Jiseong Noh, Brent Byunghoon Kang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2014

45

KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object
Hojoon Lee, Hyungon Moon, Daehee Jang, Kihwan Kim, Jihoon Lee, Yunheung Paek, Brent Byunghoon Kang
13th USENIX Security Symposium (USENIX Security 2013), 2013

46

Vigilare: Toward Snoop-based Kernel Integrity Monitor.
Hyungon Moon, Hojoon Lee, Jihoon Lee, Kihwan Kim, Yunheung Paek, Brent Byunghoon Kang
Proceedings of the 2012 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2012

47

DoubleGuard: Detecting Intrusions In Multi-tier Web Applications.
M. Le, A. Stavrou, B. Kang
IEEE Transactions on Dependable and Secure Computing, 2012

48

Identifying Users with Application-Specific Command Streams
A. El-Masri, P. Likarish, H. Wechsler, B. Kang
Twelfth Annual International Conference on Privacy, Security and Trust (PST 2014), 2014

49

Developing and Refining Infected-Host Enumeration Methods for Advanced Botnets
C. Nunnery, B. Kang
Telecommunications Review, 2012

50

Entropy-Based Measurement of IP Address Inflation in the Waledac Botnet.
R. Weaver, C. Nunnery, G. Singaraju, B. Kang
CERT FloCon 2011, 1970