Secret: Secure channel between rich execution environment and trusted execution environment. JS Jang, S Kong, M Kim, D Kim, BB Kang NDSS, 1-15, 2015 | 115 | 2015 |
Atra: Address translation redirection attack against hardware-based external monitors D Jang, H Lee, M Kim, D Kim, D Kim, BB Kang Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 58 | 2014 |
Implementing an application-specific instruction-set processor for system-level dynamic program analysis engines I Heo, M Kim, Y Lee, C Choi, J Lee, BB Kang, Y Paek ACM Transactions on Design Automation of Electronic Systems (TODAES) 20 (4 …, 2015 | 19 | 2015 |
Value-based constraint control flow integrity D Jung, M Kim, J Jang, BB Kang IEEE Access 8, 50531-50542, 2020 | 7 | 2020 |
A dynamic per-context verification of kernel address integrity from external monitors H Lee, M Kim, Y Paek, BB Kang Computers & Security 77, 824-837, 2018 | 3 | 2018 |
On the analysis of byte-granularity heap randomization D Jang, J Kim, H Lee, M Park, Y Jung, M Kim, BB Kang IEEE Transactions on Dependable and Secure Computing 18 (5), 2237-2252, 2019 | 1 | 2019 |