Jin Soo Jang

Orcid: 0000-0003-2070-2408

Affiliations:
  • Korea Advanced Institute of Technology, Daejeon, South Korea


According to our database1, Jin Soo Jang authored at least 16 papers between 2001 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
MyTEE: Own the Trusted Execution Environment on Embedded Devices.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout.
IEEE Trans. Dependable Secur. Comput., 2022

3rdParTEE: Securing Third-Party IoT Services Using the Trusted Execution Environment.
IEEE Internet Things J., 2022

2020
Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection.
IEEE Trans. Dependable Secur. Comput., 2020

Value-Based Constraint Control Flow Integrity.
IEEE Access, 2020

SelMon: reinforcing mobile device security with self-protected trust anchor.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

2019
KI-Mon ARM: A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object.
IEEE Trans. Dependable Secur. Comput., 2019

Securing a communication channel for the trusted execution environment.
Comput. Secur., 2019

Revisiting the ARM Debug Facility for OS Kernel Security.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

In-process Memory Isolation Using Hardware Watchpoint.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2018
PrivateZone: Providing a Private Execution Environment Using ARM TrustZone.
IEEE Trans. Dependable Secur. Comput., 2018

2017
S-OpenSGX: A system-level platform for exploring SGX enclave-based computing.
Comput. Secur., 2017

Hacking in Darkness: Return-oriented Programming against Secure Enclaves.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators.
Comput. Secur., 2016

2015
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2001
A Server Framework for Scheduling Multimedia Applications in Open System Environment.
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001


  Loading...