Brent ByungHoon Kang

Orcid: 0000-0001-8984-1006

Affiliations:
  • KAIST, Graduate School of Information Security, Daejeon, South Korea
  • George Mason University, Fairfax, VA, USA (former)
  • University of California at Berkeley, CA, USA (PhD)


According to our database1, Brent ByungHoon Kang authored at least 65 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Optimus: association-based dynamic system call filtering for container attack surface reduction.
J. Cloud Comput., December, 2024

SuM: Efficient shadow stack protection on ARM Cortex-M.
Comput. Secur., January, 2024

2023
Towards scalable and configurable simulation for disaggregated architecture.
Simul. Model. Pract. Theory, May, 2023

Harnessing the x86 Intermediate Rings for Intra-Process Isolation.
IEEE Trans. Dependable Secur. Comput., 2023

Impact of Emerging Hardware on Security and Privacy.
IEEE Secur. Priv., 2023

EnclaveVPN: Toward Optimized Utilization of Enclave Page Cache and Practical Performance of Data Plane for Security-Enhanced Cloud VPN.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

2022
SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout.
IEEE Trans. Dependable Secur. Comput., 2022

3rdParTEE: Securing Third-Party IoT Services Using the Trusted Execution Environment.
IEEE Internet Things J., 2022

EmuID: Detecting presence of emulation through microarchitectural characteristic on ARM.
Comput. Secur., 2022

2021
On the Analysis of Byte-Granularity Heap Randomization.
IEEE Trans. Dependable Secur. Comput., 2021

AI-HydRa: Advanced hybrid approach using random forest and deep learning for malware classification.
Inf. Sci., 2021

Quantitative Server Sizing Model for Performance Satisfaction in Secure U2L Migration.
IEEE Access, 2021

2020
Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection.
IEEE Trans. Dependable Secur. Comput., 2020

The Image Game: Exploit Kit Detection Based on Recursive Convolutional Neural Networks.
IEEE Access, 2020

Value-Based Constraint Control Flow Integrity.
IEEE Access, 2020

Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints.
Proceedings of the 29th USENIX Security Symposium, 2020

SelMon: reinforcing mobile device security with self-protected trust anchor.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

2019
KI-Mon ARM: A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object.
IEEE Trans. Dependable Secur. Comput., 2019

eMotion: An SGX extension for migrating enclaves.
Comput. Secur., 2019

SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure.
Comput. Secur., 2019

Securing a communication channel for the trusted execution environment.
Comput. Secur., 2019

Rethinking anti-emulation techniques for large-scale software deployment.
Comput. Secur., 2019

MoHoP: A protocol providing for both mobility management and host privacy.
Comput. Networks, 2019

POLaR: Per-Allocation Object Layout Randomization.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Revisiting the ARM Debug Facility for OS Kernel Security.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

In-process Memory Isolation Using Hardware Watchpoint.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2018
PrivateZone: Providing a Private Execution Environment Using ARM TrustZone.
IEEE Trans. Dependable Secur. Comput., 2018

RUMA: On the Analysis of Defenses based on Misaligned Accesses.
CoRR, 2018

Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions.
Comput. Secur., 2018

A dynamic per-context verification of kernel address integrity from external monitors.
Comput. Secur., 2018

Malicious URL protection based on attackers' habitual behavioral analysis.
Comput. Secur., 2018

FriSM: Malicious Exploit Kit Detection via Feature-Based String-Similarity Matching.
Proceedings of the Security and Privacy in Communication Networks, 2018

A Reflective Covert Channel Attack Anchored on Trusted Web Services.
Proceedings of the Web Services - ICWS 2018, 2018

Hypernel: a hardware-assisted framework for kernel protection without nested paging.
Proceedings of the 55th Annual Design Automation Conference, 2018

Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping.
IEEE Trans. Dependable Secur. Comput., 2017

Invi-server: Reducing the attack surfaces by making protected server invisible on networks.
Comput. Secur., 2017

S-OpenSGX: A system-level platform for exploring SGX enclave-based computing.
Comput. Secur., 2017

Hacking in Darkness: Return-oriented Programming against Secure Enclaves.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Vulnerabilities of network OS and mitigation with state-based permission system.
Secur. Commun. Networks, 2016

On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators.
Comput. Secur., 2016

OpenSGX: An Open Platform for SGX Research.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines.
ACM Trans. Design Autom. Electr. Syst., 2015

SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Identifying users with application-specific command streams.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Rosemary: A Robust, Secure, and High-performance Network Operating System.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

ATRA: Address Translation Redirection Attack against Hardware-based External Monitors.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
DoubleGuard: Detecting Intrusions in Multitier Web Applications.
IEEE Trans. Dependable Secur. Comput., 2012

Vigilare: toward snoop-based kernel integrity monitor.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Unpacking Malware.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Spam Detection Using Network-Level Characteristics.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Dynamic Malware Analysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

DNS-Based Botnet Detection.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface
CoRR, 2011

2010
Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure.
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010

2009
Decentralized Peer-to-Peer Botnet Architectures.
Proceedings of the Advances in Information and Intelligent Systems, 2009

The waledac protocol: The how and why.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009

Towards complete node enumeration in a peer-to-peer botnet.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance.
Proceedings of the 22nd Large Installation System Administration Conference, 2008

Tracking Email Reputation for Authenticated Sender Identities.
Proceedings of the CEAS 2008, 2008

2007
Peer-to-Peer Botnets: Overview and Case Study.
Proceedings of the First Workshop on Hot Topics in Understanding Botnets, 2007

RepuScore: Collaborative Reputation Management Framework for Email Infrastructure.
Proceedings of the 21th Large Installation System Administration Conference, 2007

2006
Privilege Messaging: An Authorization Framework over Email Infrastructure.
Proceedings of the 20th Conference on Systems Administration (LISA 2006), 2006

2005
RegColl: Centralized Registry Framework for Infrastructure System Management.
Proceedings of the 19th Conference on Systems Administration (LISA 2005), 2005


  Loading...