Brent ByungHoon Kang

According to our database1, Brent ByungHoon Kang authored at least 49 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
KI-Mon ARM: A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object.
IEEE Trans. Dependable Sec. Comput., 2019

eMotion: An SGX extension for migrating enclaves.
Computers & Security, 2019

SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure.
Computers & Security, 2019

Securing a communication channel for the trusted execution environment.
Computers & Security, 2019

Rethinking anti-emulation techniques for large-scale software deployment.
Computers & Security, 2019

MoHoP: A protocol providing for both mobility management and host privacy.
Computer Networks, 2019

POLaR: Per-Allocation Object Layout Randomization.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Revisiting the ARM Debug Facility for OS Kernel Security.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

In-process Memory Isolation Using Hardware Watchpoint.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2018
PrivateZone: Providing a Private Execution Environment Using ARM TrustZone.
IEEE Trans. Dependable Sec. Comput., 2018

RUMA: On the Analysis of Defenses based on Misaligned Accesses.
CoRR, 2018

Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86.
CoRR, 2018

Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions.
Computers & Security, 2018

A dynamic per-context verification of kernel address integrity from external monitors.
Computers & Security, 2018

Malicious URL protection based on attackers' habitual behavioral analysis.
Computers & Security, 2018

FriSM: Malicious Exploit Kit Detection via Feature-Based String-Similarity Matching.
Proceedings of the Security and Privacy in Communication Networks, 2018

A Reflective Covert Channel Attack Anchored on Trusted Web Services.
Proceedings of the Web Services - ICWS 2018, 2018

Hypernel: a hardware-assisted framework for kernel protection without nested paging.
Proceedings of the 55th Annual Design Automation Conference, 2018

Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping.
IEEE Trans. Dependable Sec. Comput., 2017

Invi-server: Reducing the attack surfaces by making protected server invisible on networks.
Computers & Security, 2017

S-OpenSGX: A system-level platform for exploring SGX enclave-based computing.
Computers & Security, 2017

Hacking in Darkness: Return-oriented Programming against Secure Enclaves.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Vulnerabilities of network OS and mitigation with state-based permission system.
Security and Communication Networks, 2016

On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators.
Computers & Security, 2016

OpenSGX: An Open Platform for SGX Research.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines.
ACM Trans. Design Autom. Electr. Syst., 2015

SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Identifying users with application-specific command streams.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Rosemary: A Robust, Secure, and High-performance Network Operating System.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

ATRA: Address Translation Redirection Attack against Hardware-based External Monitors.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
DoubleGuard: Detecting Intrusions in Multitier Web Applications.
IEEE Trans. Dependable Sec. Comput., 2012

Vigilare: toward snoop-based kernel integrity monitor.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Unpacking Malware.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Spam Detection Using Network-Level Characteristics.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Dynamic Malware Analysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

DNS-Based Botnet Detection.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface
CoRR, 2011

2010
Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure.
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010

2009
Decentralized Peer-to-Peer Botnet Architectures.
Proceedings of the Advances in Information and Intelligent Systems, 2009

The waledac protocol: The how and why.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009

Towards complete node enumeration in a peer-to-peer botnet.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance.
Proceedings of the 22nd Large Installation System Administration Conference, 2008

Tracking Email Reputation for Authenticated Sender Identities.
Proceedings of the CEAS 2008, 2008

2007
Peer-to-Peer Botnets: Overview and Case Study.
Proceedings of the First Workshop on Hot Topics in Understanding Botnets, 2007

RepuScore: Collaborative Reputation Management Framework for Email Infrastructure.
Proceedings of the 21th Large Installation System Administration Conference, 2007

2006
Privilege Messaging: An Authorization Framework over Email Infrastructure.
Proceedings of the 20th Conference on Systems Administration (LISA 2006), 2006

2005
RegColl: Centralized Registry Framework for Infrastructure System Management.
Proceedings of the 19th Conference on Systems Administration (LISA 2005), 2005


  Loading...