关注
Donghyun Kwon
Donghyun Kwon
在 pusan.ac.kr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Mantis: Automatic performance prediction for smartphone applications
Y Kwon, S Lee, H Yi, D Kwon, S Yang, BG Chun, L Huang, P Maniatis, ...
2013 USENIX Annual Technical Conference (USENIX ATC 13), 297-308, 2013
922013
Techniques to minimize state transfer costs for dynamic execution offloading in mobile cloud computing
S Yang, D Kwon, H Yi, Y Cho, Y Kwon, Y Paek
IEEE Transactions on Mobile Computing 13 (11), 2648-2660, 2014
782014
{Hardware-Assisted}{On-Demand} Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices
Y Cho, J Shin, D Kwon, MJ Ham, Y Kim, Y Paek
2016 USENIX Annual Technical Conference (USENIX ATC 16), 565-578, 2016
642016
Fast dynamic execution offloading for efficient mobile cloud computing
S Yang, Y Kwon, Y Cho, H Yi, D Kwon, J Youn, Y Paek
2013 IEEE International conference on Pervasive computing and communications …, 2013
552013
CRCount: Pointer Invalidation with Reference Counting to Mitigate Use-after-free in Legacy C/C+
J Shin, D Kwon, J Seo, Y Cho, Y Paek
Network and Distributed System Security Symposium (NDSS), 2019
452019
{uXOM}: Efficient {eXecute-Only} Memory on {ARM}{Cortex-M}
D Kwon, J Shin, G Kim, B Lee, Y Cho, Y Paek
28th USENIX Security Symposium (USENIX Security 19), 231-247, 2019
422019
Pros: Light-weight privatized se cure oses in arm trustzone
D Kwon, J Seo, Y Cho, B Lee, Y Paek
IEEE Transactions on Mobile Computing 19 (6), 1434-1447, 2019
302019
Precise execution offloading for applications with dynamic behavior in mobile cloud computing
Y Kwon, H Yi, D Kwon, S Yang, Y Cho, Y Paek
Pervasive and Mobile Computing 27, 58-74, 2016
302016
Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM.
Y Cho, D Kwon, H Yi, Y Paek
Network and Distributed System Security Symposium (NDSS), 2017
252017
Mantis: Efficient predictions of execution time, energy usage, memory usage and network usage on smart mobile devices
Y Kwon, S Lee, H Yi, D Kwon, S Yang, B Chun, L Huang, P Maniatis, ...
IEEE Transactions on Mobile Computing 14 (10), 2059-2072, 2014
202014
RIMI: instruction-level memory isolation for embedded systems on RISC-V
H Kim, J Lee, D Pratama, AM Awaludin, H Kim, D Kwon
Proceedings of the 39th International Conference on Computer-Aided Design, 1-9, 2020
172020
Hypernel: a hardware-assisted framework for kernel protection without nested paging
D Kwon, K Oh, J Park, S Yang, Y Cho, BB Kang, Y Paek
Proceedings of the 55th annual design automation conference, 1-6, 2018
142018
VM-CFI: Control-flow integrity for virtual machine kernel using Intel PT
D Kwon, J Seo, S Baek, G Kim, S Ahn, Y Paek
Computational Science and Its Applications–ICCSA 2018: 18th International …, 2018
112018
Riskim: Toward complete kernel protection with hardware support
D Hwang, M Yang, S Jeon, Y Lee, D Kwon, Y Paek
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 740-745, 2019
92019
Safe and efficient implementation of a security system on ARM using intra-level privilege separation
D Kwon, H Yi, Y Cho, Y Paek
ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-30, 2019
92019
Instruction-level data isolation for the kernel on ARM
Y Cho, D Kwon, Y Paek
Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017
92017
Bratter: An instruction set extension for forward control-flow integrity in RISC-V
S Park, D Kang, J Kang, D Kwon
Sensors 22 (4), 1392, 2022
82022
Optimization techniques to enable execution offloading for 3D video games
D Kwon, S Yang, Y Paek, K Ko
Multimedia Tools and Applications 76, 11347-11360, 2017
82017
DEMIX: Domain-Enforced Memory Isolation for Embedded System
H Kim, HT Larasati, J Park, H Kim, D Kwon
Sensors 23 (7), 3568, 2023
32023
metaSafer: A Technique to detect heap metadata corruption in WebAssembly
S Song, S Park, D Kwon
IEEE Access, 2023
22023
系统目前无法执行此操作,请稍后再试。
文章 1–20