발행물

전체 논문

102

81

The Image Game: Exploit Kit Detection Based on Recursive Convolutional Neural Networks
Yoo, S[Yoo, Suyeon], Kim, S[Kim, Sungjin], Kang, BB[Kang, Brent Byunghoon
IEEE ACCESS, 2020

82

Rethinking anti-emulation techniques for large-scale software deployment
Jang, D[Jang, Daehee], Jeong, YJ[Jeong, Yunjong], Lee, SM[LEE, SEONG MAN], Park, MJ[Park, Minjoon], Kwak, K[Kwak, Kuenhwan], Kim, D[Kim, Donguk], Kang, BB[Kang, Brent Byunghoon
COMPUTERS & SECURITY, 2019

83

Securing a communication channel for the trusted execution environment
Jang, J[Jang, Jinsoo], Kang, BB[Kang, Brent Byunghoon
COMPUTERS & SECURITY, 2019

84

SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure
Kim, D[Kim, Deokjin], Jang, D[Jang, Daehee], Park, M[Park, Minjoon], Jeong, Y[Jeong, Yunjong], Kim, J[Kim, Jonghwan], Choi, S[Choi, Seokjin], Kang, BB[Kang, Brent Byunghoon
COMPUTERS & SECURITY, 2019

85

KI-Mon ARM: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object
Lee, H[Lee, Hojoon], Moon, H[Moon, Hyungon], Heo, I[Heo, Ingoo], Jang, D[Jang, Daehee], Jang, J[Jang, Jinsoo], Kim, K[Kim, Kihwan], Paek, Y[Paek, Yunheung], Kang, BB[Kang, Brent Byunghoon
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019

86

eMotion: An SGX extension for migrating enclaves
Park, J[Park, Jaemin], Park, S[Park, Sungjin], Kang, BB[Kang, Brent Byunghoon, Kim, K[Kim, Kwangjo]
COMPUTERS & SECURITY, 2019

87

MoHoP: A protocol providing for both mobility management and host privacy
Park, J[Park, Jaehyun], Ha, J[Ha, Jaehee], Kang, BB[Kang, Brent Byunghoon, Kim, MC[Kim, Myung-Chul]
COMPUTER NETWORKS, 2019

88

PrivateZone: Providing a Private Execution Environment using ARM TrustZone
Jang, J[Jang, Jinsoo], Choi, C[Choi, Changho], Lee, JH[Lee, Jae Hyuk], Kwak, N[Kwak, Nohyun], Lee, S[Lee, Seongman], Choi, Y[Choi, Yeseul], Kang, BB[Kang, Brent Byunghoon
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018

89

A dynamic per-context verification of kernel address integrity from external monitors
Lee, H[Lee, Hojoon], Kim, M[Kim, Minsu], Paek, Y[Paek, Yunheung], Kang, BB[Kang, Brent Byunghoon
COMPUTERS & SECURITY, 2018

90

Malicious URL protection based on attackers` habitual behavioral analysis
Kim, S[Kim, Sungjin], Kang, BB[Kang, Brent Byunghoon, Kim, J[Kim, Jinbok]
COMPUTERS & SECURITY, 2018