Processing optimization and functional properties of gelatin from shark (Isurus oxyrinchus) cartilage SM Cho, KS Kwak, DC Park, YS Gu, CI Ji, DH Jang, YB Lee, SB Kim Food hydrocolloids 18 (4), 573-579, 2004 | 317 | 2004 |
Fuzzing javascript engines with aspect-preserving mutation S Park, W Xu, I Yun, D Jang, T Kim 2020 IEEE Symposium on Security and Privacy (SP), 1629-1642, 2020 | 126 | 2020 |
Ki-mon arm: A hardware-assisted event-triggered monitoring platform for mutable kernel object H Lee, H Moon, I Heo, D Jang, J Jang, K Kim, Y Paek, BB Kang IEEE Transactions on Dependable and Secure Computing 16 (2), 287-300, 2017 | 126 | 2017 |
Atra: Address translation redirection attack against hardware-based external monitors D Jang, H Lee, M Kim, D Kim, D Kim, BB Kang Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 62 | 2014 |
Preventing {Use-After-Free} Attacks with Fast Forward Allocation B Wickman, H Hu, I Yun, D Jang, JW Lim, S Kashyap, T Kim 30th USENIX Security Symposium (USENIX Security 21), 2453-2470, 2021 | 46 | 2021 |
SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure D Kim, D Jang, M Park, Y Jeong, J Kim, S Choi, BB Kang computers & security 82, 118-139, 2019 | 26 | 2019 |
Detection enhancement for various deepfake types based on residual noise and manipulation traces J Kang, SK Ji, S Lee, D Jang, JU Hou IEEE Access 10, 69031-69040, 2022 | 20 | 2022 |
Rethinking anti-emulation techniques for large-scale software deployment D Jang, Y Jeong, S Lee, M Park, K Kwak, D Kim, BB Kang computers & security 83, 182-200, 2019 | 19 | 2019 |
Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions VJM Manès, D Jang, C Ryu, BB Kang computers & security 74, 130-143, 2018 | 12 | 2018 |
SoK: On the analysis of web browser security J Lim, Y Jin, M Alharthi, X Zhang, J Jung, R Gupta, K Li, D Jang, T Kim arXiv preprint arXiv:2112.15561, 2021 | 9 | 2021 |
EmuID: Detecting presence of emulation through microarchitectural characteristic on ARM Y Choi, Y Jeong, D Jang, BB Kang, H Lee Computers & Security 113, 102569, 2022 | 4 | 2022 |
Badaslr: Exceptional cases of ASLR aiding exploitation D Jang computers & security 112, 102510, 2022 | 4 | 2022 |
Polar: Per-allocation object layout randomization J Kim, D Jang, Y Jeong, BB Kang 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019 | 4 | 2019 |
S-OpenSGX: A system-level platform for exploring SGX enclave-based computing C Choi, N Kwak, J Jang, D Jang, K Oh, K Kwag, BB Kang computers & security 70, 290-306, 2017 | 4 | 2017 |
Fuzzing@ home: Distributed fuzzing on untrusted heterogeneous clients D Jang, A Askar, I Yun, S Tong, Y Cai, T Kim Proceedings of the 25th International Symposium on Research in Attacks …, 2022 | 3 | 2022 |
Effective memory diversification in legacy systems D Jang, H Yun International journal of electrical and computer engineering systems 14 (3 …, 2023 | 2 | 2023 |
Scheduler-based Defense Method against Address Translation Redirection Attack (ATRA) D Jang, J Jang, D Kim, C Choi, BB Kang Journal of The Korea Institute of Information Security & Cryptology 25 (4 …, 2015 | 2 | 2015 |
Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors I Heo, D Jang, H Moon, H Cho, S Lee, BB Kang, Y Paek JSTS: Journal of Semiconductor Technology and Science 15 (1), 48-59, 2015 | 2 | 2015 |
Fuzzability Testing Framework for Incomplete Firmware Binary J Jang, G Son, H Lee, H Yun, D Kim, S Lee, S Kim, D Jang IEEE Access, 2023 | 1 | 2023 |
On the analysis of byte-granularity heap randomization D Jang, J Kim, H Lee, M Park, Y Jung, M Kim, BB Kang IEEE Transactions on Dependable and Secure Computing 18 (5), 2237-2252, 2019 | 1 | 2019 |