Jinsoo Jang
Jinsoo Jang
Verifierad e-postadress på cnu.ac.kr - Startsida
Titel
Citeras av
Citeras av
År
Hacking in darkness: Return-oriented programming against secure enclaves
J Lee, J Jang, Y Jang, N Kwak, Y Choi, C Choi, T Kim, M Peinado, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 523-539, 2017
812017
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment.
JS Jang, S Kong, M Kim, D Kim, BB Kang
NDSS, 2015
76*2015
Privatezone: Providing a private execution environment using arm trustzone
J Jang, C Choi, J Lee, N Kwak, S Lee, Y Choi, BB Kang
IEEE Transactions on Dependable and Secure Computing 15 (5), 797-810, 2016
202016
On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators
Y Kim, O Kwon, J Jang, S Jin, H Baek, BB Kang, H Yoon
Computers & Security 62, 33-48, 2016
82016
KI-Mon ARM: a hardware-assisted event-triggered monitoring platform for mutable kernel object
H Lee, H Moon, I Heo, D Jang, J Jang, K Kim, Y Paek, BB Kang
IEEE Transactions on Dependable and Secure Computing 16 (2), 287-300, 2017
72017
Retrofitting the partially privileged mode for TEE communication channel protection
J Jang, BB Kang
IEEE Transactions on Dependable and Secure Computing, 2018
62018
Scheduler-based Defense Method against Address Translation Redirection Attack (ATRA)
D Jang, J Jang, D Kim, C Choi, BBH Kang
Journal of the Korea Institute of Information Security & Cryptology 25 (4 …, 2015
22015
S-OpenSGX: A system-level platform for exploring SGX enclave-based computing
C Choi, N Kwak, J Jang, D Jang, K Oh, K Kwag, BB Kang
computers & security 70, 290-306, 2017
12017
SelMon: reinforcing mobile device security with self-protected trust anchor
J Jang, BB Kang
Proceedings of the 18th International Conference on Mobile Systems …, 2020
2020
Value-Based Constraint Control Flow Integrity
D Jung, M Kim, J Jang, BB Kang
IEEE Access 8, 50531-50542, 2020
2020
Revisiting the ARM Debug Facility for OS Kernel Security
J Jang, BB Kang
2019 56th ACM/IEEE Design Automation Conference (DAC), 1-6, 2019
2019
In-process Memory Isolation Using Hardware Watchpoint
J Jang, BB Kang
2019 56th ACM/IEEE Design Automation Conference (DAC), 1-6, 2019
2019
Securing a communication channel for the trusted execution environment
J Jang, BB Kang
Computers & Security 83, 79-92, 2019
2019
Information Security Applications: 19th International Conference, WISA 2018, Jeju Island, Korea, August 23–25, 2018, Revised Selected Papers
BBH Kang, JS Jang
Springer, 2019
2019
메모리 주소 변환 공격에 대한 스케줄러 기반의 방어 방법
장대희, 장진수, 김동욱, 최창호, 강병훈
정보보호학회논문지 25 (4), 873-880, 2015
2015
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–15