Vigilare: toward snoop-based kernel integrity monitor H Moon, H Lee, J Lee, K Kim, Y Paek, BB Kang Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 138 | 2012 |
Ki-mon arm: A hardware-assisted event-triggered monitoring platform for mutable kernel object H Lee, H Moon, I Heo, D Jang, J Jang, K Kim, Y Paek, BB Kang IEEE Transactions on Dependable and Secure Computing 16 (2), 287-300, 2017 | 126 | 2017 |
Atra: Address translation redirection attack against hardware-based external monitors D Jang, H Lee, M Kim, D Kim, D Kim, BB Kang Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 62 | 2014 |
Lord of the x86 rings: A portable user mode privilege separation architecture on x86 H Lee, C Song, BB Kang Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 39 | 2018 |
Detecting and preventing kernel rootkit attacks with bus snooping H Moon, H Lee, I Heo, K Kim, Y Paek, BB Kang IEEE Transactions on Dependable and Secure Computing 14 (2), 145-157, 2015 | 21 | 2015 |
Did we miss anything?: Towards privacy-preserving decentralized id architecture S Huh, M Shim, J Lee, SS Woo, H Kim, H Lee IEEE Transactions on Dependable and Secure Computing 20 (6), 4881-4898, 2023 | 10 | 2023 |
Confidential machine learning computation in untrusted environments: A systems security perspective KD Duy, T Noh, S Huh, H Lee IEEE Access 9, 168656-168677, 2021 | 10 | 2021 |
A comprehensive analysis of today’s malware and its distribution network: common adversary strategies and implications S Huh, S Cho, J Choi, S Shin, H Lee IEEE Access 10, 49566-49584, 2022 | 7 | 2022 |
Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM Architectures K Dinh Duy, K Cho, T Noh, H Lee Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 6 | 2023 |
Sclerotinia rot of Spergularia marina caused by Sclerotinia sclerotiorum and environmental condition for disease development HK Shim, TH Noh, MY Choi, HJ Lee, DK Lee, CH Paik, HM Kim J Agric Life Sci 44 (2), 46-49, 2013 | 5 | 2013 |
EmuID: Detecting presence of emulation through microarchitectural characteristic on ARM Y Choi, Y Jeong, D Jang, BB Kang, H Lee Computers & Security 113, 102569, 2022 | 4 | 2022 |
Snoop-based kernel integrity monitoring apparatus and method thereof YH Paek, BB Kang, H Moon, H Lee, J Lee, K Kim US Patent 9,542,557, 2017 | 4 | 2017 |
A dynamic per-context verification of kernel address integrity from external monitors H Lee, M Kim, Y Paek, BB Kang Computers & Security 77, 824-837, 2018 | 3 | 2018 |
Harnessing the x86 intermediate rings for intra-process isolation H Lee, C Song, BB Kang IEEE Transactions on Dependable and Secure Computing 20 (4), 3251-3268, 2022 | 2 | 2022 |
Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM Architectures (Extended Version) KD Duy, K Cho, T Noh, H Lee arXiv preprint arXiv:2309.11151, 2023 | 1 | 2023 |
SE-PIM: In-Memory Acceleration of Data-Intensive Confidential Computing KD Duy, H Lee IEEE Transactions on Cloud Computing 11 (3), 2473-2490, 2022 | 1 | 2022 |
On the analysis of byte-granularity heap randomization D Jang, J Kim, H Lee, M Park, Y Jung, M Kim, BB Kang IEEE Transactions on Dependable and Secure Computing 18 (5), 2237-2252, 2019 | 1 | 2019 |
(In) visible Privacy Indicator: Security Analysis of Privacy Indicator on Android Devices Y Choe, H Yu, T Kim, S Lee, H Lee, H Kim Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024 | | 2024 |
GENESIS: A Generalizable, Efficient, and Secure Intra-kernel Privilege Separation S Lee, S Kim, C Song, B Woo, E Ahn, J Lee, Y Jang, J Jang, H Lee, ... Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 1366-1375, 2024 | | 2024 |
{RustSan}: Retrofitting {AddressSanitizer} for Efficient Sanitization of Rust K Cho, J Kim, KD Duy, H Lim, H Lee 33rd USENIX Security Symposium (USENIX Security 24), 3729-3746, 2024 | | 2024 |