关注
Taehun Kim
Taehun Kim
School of Cybersecurity, Korea University
在 korea.ac.kr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Real-time detection for cache side channel attack using performance counter monitor
J Cho, T Kim, S Kim, M Im, T Kim, Y Shin
Applied Sciences 10 (3), 984, 2020
522020
Thermalbleed: A practical thermal side-channel attack
T Kim, Y Shin
IEEE Access 10, 25718-25731, 2022
212022
Breaking KASLR using memory deduplication in virtualized environments
T Kim, T Kim, Y Shin
Electronics 10 (17), 2174, 2021
102021
Poster: mitigating memory sharing-based side-channel attack by embedding random values in binary for cloud environment
T Kim, Y Shin
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
32020
Devious: Device-driven side-channel attacks on the iommu
T Kim, H Park, S Lee, S Shin, J Hur, Y Shin
2023 IEEE Symposium on Security and Privacy (SP), 2288-2305, 2023
22023
GPU side-channel attacks are everywhere: A survey
T Kim, Y Shin
2020 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), 1-4, 2020
22020
Method of defending against memory sharing-based side-channel attacks by embedding random value in binaries
T Kim, Y Shin
US Patent App. 16/903,465, 2021
12021
S-ZAC: Hardening Access Control of Service Mesh Using Intel SGX for Zero Trust in Cloud
C Han, T Kim, W Lee, Y Shin
Electronics 13 (16), 3213, 2024
2024
POSTER: On the Feasibility of Inferring SGX Execution through PMU
W Lee, T Kim, Y Shin
Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024
2024
Exploiting Memory Page Management in KSM for Remote Memory Deduplication Attack
S Bae, T Kim, W Lee, Y Shin
International Conference on Information Security Applications, 244-256, 2023
2023
SMTP TLS Reporting 사용 현황에 대한 실증 연구
이석민, 노승일, 김태훈, 신영주
정보과학회 컴퓨팅의 실제 논문지 29 (3), 107-113, 2023
2023
Quantitative Analysis on Attack Capacity in Meltdown-Type Attacks
S Lee, T Kim, Y Shin
International Conference on Information Security Applications, 218-228, 2021
2021
Constructing Covert Channel on Intel CPU-iGPU platform
T Kim, J Kim, Y Shin
2021 International Conference on Information Networking (ICOIN), 39-42, 2021
2021
Breaking KASLR Using Memory Deduplication in Virtualized Environments. Electronics 2021, 10, 2174
T Kim, T Kim, Y Shin
s Note: MDPI stays neutral with regard to jurisdictional claims in published …, 2021
2021
JMP+ RAND: 바이너리 난수 삽입을 통한메모리 공유 기반 부채널 공격 방어 기법
T Kim, Y Shin
정보처리학회논문지/컴퓨터 및 통신 시스템 제 9 (5), 5, 2020
2020
JMP+ RAND: Mitigating Memory Sharing-Based Side-Channel Attack by Embedding Random Values in Binaries
T Kim, Y Shin
KIPS Transactions on Computer and Communication Systems 9 (5), 101-106, 2020
2020
병렬성 극대화를 통한 LEA-GCM 알고리즘 고속 구현
김태훈, 최용락, 신영주
한국정보과학회 학술발표논문집, 2148-2150, 2019
2019
系统目前无法执行此操作,请稍后再试。
文章 1–17