143 results on '"KANG, Brent Byunghoon"'
Search Results
2. SuM: Efficient shadow stack protection on ARM Cortex-M
3. Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints
4. Towards scalable and configurable simulation for disaggregated architecture
5. Rethinking Misalignment to Raise the Bar for Heap Pointer Corruption
6. Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86
7. EmuID: Detecting presence of emulation through microarchitectural characteristic on ARM
8. GENESIS: A Generalizable, Efficient, and Secure Intra-kernel Privilege Separation
9. AI-HydRa: Advanced hybrid approach using random forest and deep learning for malware classification
10. FriSM: Malicious Exploit Kit Detection via Feature-Based String-Similarity Matching
11. A Reflective Covert Channel Attack Anchored on Trusted Web Services
12. Securing a communication channel for the trusted execution environment
13. Rethinking anti-emulation techniques for large-scale software deployment
14. SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure
15. MoHoP: A protocol providing for both mobility management and host privacy
16. eMotion: An SGX extension for migrating enclaves
17. EnclaveVPN: Toward Optimized Utilization of Enclave Page Cache and Practical Performance of Data Plane for Security-Enhanced Cloud VPN
18. A dynamic per-context verification of kernel address integrity from external monitors
19. Malicious URL protection based on attackers' habitual behavioral analysis
20. Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions
21. S-OpenSGX: A system-level platform for exploring SGX enclave-based computing
22. Invi-server: Reducing the attack surfaces by making protected server invisible on networks
23. Impact of Emerging Hardware on Security and Privacy
24. On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators
25. A Reflective Covert Channel Attack Anchored on Trusted Web Services
26. 3rdParTEE: Securing Third-Party IoT Services Using the Trusted Execution Environment
27. Decentralized Peer-to-Peer Botnet Architectures
28. SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout
29. Harnessing the x86 Intermediate Rings for Intra-Process Isolation
30. Harnessing the x86 Intermediate Rings for Intra-Process Isolation
31. Quantitative Server Sizing Model for Performance Satisfaction in Secure U2L Migration
32. Decentralized Peer-to-Peer Botnet Architectures
33. Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection
34. SelMon
35. The Image Game: Exploit Kit Detection Based on Recursive Convolutional Neural Networks
36. Value-Based Constraint Control Flow Integrity
37. Revisiting the ARM Debug Facility for OS Kernel Security
38. In-process Memory Isolation Using Hardware Watchpoint
39. POLaR: Per-Allocation Object Layout Randomization
40. KI-Mon ARM: A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object
41. On the Analysis of Byte-Granularity Heap Randomization
42. On the Analysis of Byte-Granularity Heap Randomization
43. Lord of the x86 Rings
44. PrivateZone: Providing a Private Execution Environment Using ARM TrustZone
45. Hypernel
46. Hypernel: A Hardware-Assisted Framework for Kernel Protection without Nested Paging
47. Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping
48. Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines
49. Scheduler-based Defense Method against Address Translation Redirection Attack (ATRA)
50. Active authentication using scrolling behaviors
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.