Year |
Citation |
Score |
2020 |
Jang J, Kang BB. Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection Ieee Transactions On Dependable and Secure Computing. 17: 1000-1014. DOI: 10.1109/Tdsc.2018.2840709 |
0.344 |
|
2020 |
Jung D, Kim M, Jang J, Kang BB. Value-Based Constraint Control Flow Integrity Ieee Access. 8: 50531-50542. DOI: 10.1109/Access.2020.2980026 |
0.321 |
|
2020 |
Yoo S, Kim S, Kang BB. The Image Game: Exploit Kit Detection Based on Recursive Convolutional Neural Networks Ieee Access. 8: 18808-18821. DOI: 10.1109/Access.2020.2967746 |
0.311 |
|
2019 |
Lee H, Moon H, Heo I, Jang D, Jang J, Kim K, Paek Y, Kang BB. KI-Mon ARM: A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object Ieee Transactions On Dependable and Secure Computing. 16: 287-300. DOI: 10.1109/Tdsc.2017.2679710 |
0.395 |
|
2019 |
Jang D, Jeong Y, Lee S, Park M, Kwak K, Kim D, Kang BB. Rethinking anti-emulation techniques for large-scale software deployment Computers & Security. 83: 182-200. DOI: 10.1016/J.Cose.2019.02.005 |
0.348 |
|
2019 |
Jang J, Kang BB. Securing a communication channel for the trusted execution environment Computers & Security. 83: 79-92. DOI: 10.1016/J.Cose.2019.01.012 |
0.386 |
|
2019 |
Kim D, Jang D, Park M, Jeong Y, Kim J, Choi S, Kang BB. SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure Computers & Security. 82: 118-139. DOI: 10.1016/J.Cose.2018.12.001 |
0.355 |
|
2019 |
Park J, Park S, Kang BB, Kim K. eMotion: An SGX extension for migrating enclaves Computers & Security. 80: 173-185. DOI: 10.1016/J.Cose.2018.09.008 |
0.369 |
|
2019 |
Park J, Ha J, Kang BB, Kim M. MoHoP: A protocol providing for both mobility management and host privacy Computer Networks. 148: 20-33. DOI: 10.1016/J.Comnet.2018.10.014 |
0.347 |
|
2018 |
Jang J, Choi C, Lee J, Kwak N, Lee S, Choi Y, Kang BB. PrivateZone: Providing a Private Execution Environment Using ARM TrustZone Ieee Transactions On Dependable and Secure Computing. 15: 797-810. DOI: 10.1109/Tdsc.2016.2622261 |
0.423 |
|
2018 |
Lee H, Kim M, Paek Y, Kang BB. A dynamic per-context verification of kernel address integrity from external monitors Computers & Security. 77: 824-837. DOI: 10.1016/J.Cose.2018.02.013 |
0.36 |
|
2018 |
Kim S, Kim J, Kang BB. Malicious URL protection based on attackers' habitual behavioral analysis Computers & Security. 77: 790-806. DOI: 10.1016/J.Cose.2018.01.013 |
0.329 |
|
2018 |
Mans VJM, Jang D, Ryu C, Kang BB. Domain Isolated Kernel Computers & Security. 74: 130-143. DOI: 10.1016/J.Cose.2018.01.009 |
0.379 |
|
2017 |
Moon H, Lee H, Heo I, Kim K, Paek Y, Kang BB. Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping Ieee Transactions On Dependable and Secure Computing. 14: 145-157. DOI: 10.1109/Tdsc.2015.2443803 |
0.393 |
|
2017 |
Choi C, Kwak N, Jang JS, Jang D, Oh K, Kwag K, Kang BB. S-OpenSGX: A system-level platform for exploring SGX enclave-based computing Computers & Security. 70: 290-306. DOI: 10.1016/J.Cose.2017.06.006 |
0.382 |
|
2017 |
Park J, Noh J, Kim M, Kang BB. Invi-server Computers & Security. 67: 89-106. DOI: 10.1016/J.Cose.2017.02.012 |
0.393 |
|
2016 |
Kim Y, Kwon O, Jang J, Jin S, Baek H, Kang BB, Yoon H. On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators Computers and Security. 62: 33-48. DOI: 10.1016/J.Cose.2016.06.006 |
0.368 |
|
2016 |
Noh J, Lee S, Park J, Shin S, Kang BB. Vulnerabilities of network OS and mitigation with state-based permission system Security and Communication Networks. 9: 1971-1982. DOI: 10.1002/Sec.1369 |
0.32 |
|
2015 |
Heo I, Jang D, Moon H, Cho H, Lee S, Kang BB, Paek Y. Efficient kernel integrity monitor design for commodity mobile application processors Journal of Semiconductor Technology and Science. 15: 49-59. DOI: 10.5573/Jsts.2015.15.1.048 |
0.406 |
|
2015 |
Heo I, Kim M, Lee Y, Choi C, Lee J, Kang BB, Paek Y. Implementing an application-specific instruction-set processor for system-level dynamic program analysis engines Acm Transactions On Design Automation of Electronic Systems. 20. DOI: 10.1145/2746238 |
0.411 |
|
2014 |
Jang D, Lee H, Kim M, Kim D, Kang BB. ATRA: Address translation redirection attack gainst hardware-based external monitors Proceedings of the Acm Conference On Computer and Communications Security. 167-178. DOI: 10.1145/2660267.2660303 |
0.355 |
|
2012 |
Moon H, Lee H, Lee J, Kim K, Paek Y, Kang BB. Vigilare: Toward snoop-based kernel integrity monitor Proceedings of the Acm Conference On Computer and Communications Security. 28-37. DOI: 10.1145/2382196.2382202 |
0.323 |
|
2012 |
Le M, Stavrou A, Kang BB. DoubleGuard: Detecting intrusions in multitier web applications Ieee Transactions On Dependable and Secure Computing. 9: 512-525. DOI: 10.1109/Tdsc.2011.59 |
0.361 |
|
Show low-probability matches. |