Real-time detection for cache side channel attack using performance counter monitor J Cho, T Kim, S Kim, M Im, T Kim, Y Shin Applied Sciences 10 (3), 984, 2020 | 52 | 2020 |
Thermalbleed: A practical thermal side-channel attack T Kim, Y Shin IEEE Access 10, 25718-25731, 2022 | 21 | 2022 |
Breaking KASLR using memory deduplication in virtualized environments T Kim, T Kim, Y Shin Electronics 10 (17), 2174, 2021 | 10 | 2021 |
Poster: mitigating memory sharing-based side-channel attack by embedding random values in binary for cloud environment T Kim, Y Shin Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 3 | 2020 |
Devious: Device-driven side-channel attacks on the iommu T Kim, H Park, S Lee, S Shin, J Hur, Y Shin 2023 IEEE Symposium on Security and Privacy (SP), 2288-2305, 2023 | 2 | 2023 |
GPU side-channel attacks are everywhere: A survey T Kim, Y Shin 2020 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), 1-4, 2020 | 2 | 2020 |
Method of defending against memory sharing-based side-channel attacks by embedding random value in binaries T Kim, Y Shin US Patent App. 16/903,465, 2021 | 1 | 2021 |
S-ZAC: Hardening Access Control of Service Mesh Using Intel SGX for Zero Trust in Cloud C Han, T Kim, W Lee, Y Shin Electronics 13 (16), 3213, 2024 | | 2024 |
POSTER: On the Feasibility of Inferring SGX Execution through PMU W Lee, T Kim, Y Shin Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024 | | 2024 |
Exploiting Memory Page Management in KSM for Remote Memory Deduplication Attack S Bae, T Kim, W Lee, Y Shin International Conference on Information Security Applications, 244-256, 2023 | | 2023 |
SMTP TLS Reporting 사용 현황에 대한 실증 연구 이석민, 노승일, 김태훈, 신영주 정보과학회 컴퓨팅의 실제 논문지 29 (3), 107-113, 2023 | | 2023 |
Quantitative Analysis on Attack Capacity in Meltdown-Type Attacks S Lee, T Kim, Y Shin International Conference on Information Security Applications, 218-228, 2021 | | 2021 |
Constructing Covert Channel on Intel CPU-iGPU platform T Kim, J Kim, Y Shin 2021 International Conference on Information Networking (ICOIN), 39-42, 2021 | | 2021 |
Breaking KASLR Using Memory Deduplication in Virtualized Environments. Electronics 2021, 10, 2174 T Kim, T Kim, Y Shin s Note: MDPI stays neutral with regard to jurisdictional claims in published …, 2021 | | 2021 |
JMP+ RAND: 바이너리 난수 삽입을 통한메모리 공유 기반 부채널 공격 방어 기법 T Kim, Y Shin 정보처리학회논문지/컴퓨터 및 통신 시스템 제 9 (5), 5, 2020 | | 2020 |
JMP+ RAND: Mitigating Memory Sharing-Based Side-Channel Attack by Embedding Random Values in Binaries T Kim, Y Shin KIPS Transactions on Computer and Communication Systems 9 (5), 101-106, 2020 | | 2020 |
병렬성 극대화를 통한 LEA-GCM 알고리즘 고속 구현 김태훈, 최용락, 신영주 한국정보과학회 학술발표논문집, 2148-2150, 2019 | | 2019 |