Brent B. Kang, Ph.D. - Publications

Affiliations: 
2004 University of California, Berkeley, Berkeley, CA, United States 
Area:
Computer Science

23 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Jang J, Kang BB. Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection Ieee Transactions On Dependable and Secure Computing. 17: 1000-1014. DOI: 10.1109/Tdsc.2018.2840709  0.344
2020 Jung D, Kim M, Jang J, Kang BB. Value-Based Constraint Control Flow Integrity Ieee Access. 8: 50531-50542. DOI: 10.1109/Access.2020.2980026  0.321
2020 Yoo S, Kim S, Kang BB. The Image Game: Exploit Kit Detection Based on Recursive Convolutional Neural Networks Ieee Access. 8: 18808-18821. DOI: 10.1109/Access.2020.2967746  0.311
2019 Lee H, Moon H, Heo I, Jang D, Jang J, Kim K, Paek Y, Kang BB. KI-Mon ARM: A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object Ieee Transactions On Dependable and Secure Computing. 16: 287-300. DOI: 10.1109/Tdsc.2017.2679710  0.395
2019 Jang D, Jeong Y, Lee S, Park M, Kwak K, Kim D, Kang BB. Rethinking anti-emulation techniques for large-scale software deployment Computers & Security. 83: 182-200. DOI: 10.1016/J.Cose.2019.02.005  0.348
2019 Jang J, Kang BB. Securing a communication channel for the trusted execution environment Computers & Security. 83: 79-92. DOI: 10.1016/J.Cose.2019.01.012  0.386
2019 Kim D, Jang D, Park M, Jeong Y, Kim J, Choi S, Kang BB. SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure Computers & Security. 82: 118-139. DOI: 10.1016/J.Cose.2018.12.001  0.355
2019 Park J, Park S, Kang BB, Kim K. eMotion: An SGX extension for migrating enclaves Computers & Security. 80: 173-185. DOI: 10.1016/J.Cose.2018.09.008  0.369
2019 Park J, Ha J, Kang BB, Kim M. MoHoP: A protocol providing for both mobility management and host privacy Computer Networks. 148: 20-33. DOI: 10.1016/J.Comnet.2018.10.014  0.347
2018 Jang J, Choi C, Lee J, Kwak N, Lee S, Choi Y, Kang BB. PrivateZone: Providing a Private Execution Environment Using ARM TrustZone Ieee Transactions On Dependable and Secure Computing. 15: 797-810. DOI: 10.1109/Tdsc.2016.2622261  0.423
2018 Lee H, Kim M, Paek Y, Kang BB. A dynamic per-context verification of kernel address integrity from external monitors Computers & Security. 77: 824-837. DOI: 10.1016/J.Cose.2018.02.013  0.36
2018 Kim S, Kim J, Kang BB. Malicious URL protection based on attackers' habitual behavioral analysis Computers & Security. 77: 790-806. DOI: 10.1016/J.Cose.2018.01.013  0.329
2018 Mans VJM, Jang D, Ryu C, Kang BB. Domain Isolated Kernel Computers & Security. 74: 130-143. DOI: 10.1016/J.Cose.2018.01.009  0.379
2017 Moon H, Lee H, Heo I, Kim K, Paek Y, Kang BB. Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping Ieee Transactions On Dependable and Secure Computing. 14: 145-157. DOI: 10.1109/Tdsc.2015.2443803  0.393
2017 Choi C, Kwak N, Jang JS, Jang D, Oh K, Kwag K, Kang BB. S-OpenSGX: A system-level platform for exploring SGX enclave-based computing Computers & Security. 70: 290-306. DOI: 10.1016/J.Cose.2017.06.006  0.382
2017 Park J, Noh J, Kim M, Kang BB. Invi-server Computers & Security. 67: 89-106. DOI: 10.1016/J.Cose.2017.02.012  0.393
2016 Kim Y, Kwon O, Jang J, Jin S, Baek H, Kang BB, Yoon H. On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators Computers and Security. 62: 33-48. DOI: 10.1016/J.Cose.2016.06.006  0.368
2016 Noh J, Lee S, Park J, Shin S, Kang BB. Vulnerabilities of network OS and mitigation with state-based permission system Security and Communication Networks. 9: 1971-1982. DOI: 10.1002/Sec.1369  0.32
2015 Heo I, Jang D, Moon H, Cho H, Lee S, Kang BB, Paek Y. Efficient kernel integrity monitor design for commodity mobile application processors Journal of Semiconductor Technology and Science. 15: 49-59. DOI: 10.5573/Jsts.2015.15.1.048  0.406
2015 Heo I, Kim M, Lee Y, Choi C, Lee J, Kang BB, Paek Y. Implementing an application-specific instruction-set processor for system-level dynamic program analysis engines Acm Transactions On Design Automation of Electronic Systems. 20. DOI: 10.1145/2746238  0.411
2014 Jang D, Lee H, Kim M, Kim D, Kang BB. ATRA: Address translation redirection attack gainst hardware-based external monitors Proceedings of the Acm Conference On Computer and Communications Security. 167-178. DOI: 10.1145/2660267.2660303  0.355
2012 Moon H, Lee H, Lee J, Kim K, Paek Y, Kang BB. Vigilare: Toward snoop-based kernel integrity monitor Proceedings of the Acm Conference On Computer and Communications Security. 28-37. DOI: 10.1145/2382196.2382202  0.323
2012 Le M, Stavrou A, Kang BB. DoubleGuard: Detecting intrusions in multitier web applications Ieee Transactions On Dependable and Secure Computing. 9: 512-525. DOI: 10.1109/Tdsc.2011.59  0.361
Show low-probability matches.