Mantis: Automatic performance prediction for smartphone applications Y Kwon, S Lee, H Yi, D Kwon, S Yang, BG Chun, L Huang, P Maniatis, ... 2013 USENIX Annual Technical Conference (USENIX ATC 13), 297-308, 2013 | 92 | 2013 |
Techniques to minimize state transfer costs for dynamic execution offloading in mobile cloud computing S Yang, D Kwon, H Yi, Y Cho, Y Kwon, Y Paek IEEE Transactions on Mobile Computing 13 (11), 2648-2660, 2014 | 78 | 2014 |
{Hardware-Assisted}{On-Demand} Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices Y Cho, J Shin, D Kwon, MJ Ham, Y Kim, Y Paek 2016 USENIX Annual Technical Conference (USENIX ATC 16), 565-578, 2016 | 64 | 2016 |
Fast dynamic execution offloading for efficient mobile cloud computing S Yang, Y Kwon, Y Cho, H Yi, D Kwon, J Youn, Y Paek 2013 IEEE International conference on Pervasive computing and communications …, 2013 | 55 | 2013 |
CRCount: Pointer Invalidation with Reference Counting to Mitigate Use-after-free in Legacy C/C+ J Shin, D Kwon, J Seo, Y Cho, Y Paek Network and Distributed System Security Symposium (NDSS), 2019 | 45 | 2019 |
{uXOM}: Efficient {eXecute-Only} Memory on {ARM}{Cortex-M} D Kwon, J Shin, G Kim, B Lee, Y Cho, Y Paek 28th USENIX Security Symposium (USENIX Security 19), 231-247, 2019 | 42 | 2019 |
Pros: Light-weight privatized se cure oses in arm trustzone D Kwon, J Seo, Y Cho, B Lee, Y Paek IEEE Transactions on Mobile Computing 19 (6), 1434-1447, 2019 | 30 | 2019 |
Precise execution offloading for applications with dynamic behavior in mobile cloud computing Y Kwon, H Yi, D Kwon, S Yang, Y Cho, Y Paek Pervasive and Mobile Computing 27, 58-74, 2016 | 30 | 2016 |
Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM. Y Cho, D Kwon, H Yi, Y Paek Network and Distributed System Security Symposium (NDSS), 2017 | 25 | 2017 |
Mantis: Efficient predictions of execution time, energy usage, memory usage and network usage on smart mobile devices Y Kwon, S Lee, H Yi, D Kwon, S Yang, B Chun, L Huang, P Maniatis, ... IEEE Transactions on Mobile Computing 14 (10), 2059-2072, 2014 | 20 | 2014 |
RIMI: instruction-level memory isolation for embedded systems on RISC-V H Kim, J Lee, D Pratama, AM Awaludin, H Kim, D Kwon Proceedings of the 39th International Conference on Computer-Aided Design, 1-9, 2020 | 17 | 2020 |
Hypernel: a hardware-assisted framework for kernel protection without nested paging D Kwon, K Oh, J Park, S Yang, Y Cho, BB Kang, Y Paek Proceedings of the 55th annual design automation conference, 1-6, 2018 | 14 | 2018 |
VM-CFI: Control-flow integrity for virtual machine kernel using Intel PT D Kwon, J Seo, S Baek, G Kim, S Ahn, Y Paek Computational Science and Its Applications–ICCSA 2018: 18th International …, 2018 | 11 | 2018 |
Riskim: Toward complete kernel protection with hardware support D Hwang, M Yang, S Jeon, Y Lee, D Kwon, Y Paek 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 740-745, 2019 | 9 | 2019 |
Safe and efficient implementation of a security system on ARM using intra-level privilege separation D Kwon, H Yi, Y Cho, Y Paek ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-30, 2019 | 9 | 2019 |
Instruction-level data isolation for the kernel on ARM Y Cho, D Kwon, Y Paek Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017 | 9 | 2017 |
Bratter: An instruction set extension for forward control-flow integrity in RISC-V S Park, D Kang, J Kang, D Kwon Sensors 22 (4), 1392, 2022 | 8 | 2022 |
Optimization techniques to enable execution offloading for 3D video games D Kwon, S Yang, Y Paek, K Ko Multimedia Tools and Applications 76, 11347-11360, 2017 | 8 | 2017 |
DEMIX: Domain-Enforced Memory Isolation for Embedded System H Kim, HT Larasati, J Park, H Kim, D Kwon Sensors 23 (7), 3568, 2023 | 3 | 2023 |
metaSafer: A Technique to detect heap metadata corruption in WebAssembly S Song, S Park, D Kwon IEEE Access, 2023 | 2 | 2023 |