Brent ByungHoon Kang
Brent ByungHoon Kang
Graduate School of Information Security, KAIST (Korea Advanced Institute of Science and Technology)
Verifierad e-postadress på kaist.ac.kr - Startsida
Titel
Citeras av
Citeras av
År
Peer-to-Peer Botnets: Overview and Case Study.
JB Grizzard, V Sharma, C Nunnery, BBH Kang, D Dagon
HotBots 7 (2007), 2007
5692007
Rosemary: A robust, secure, and high-performance network operating system
S Shin, Y Song, T Lee, S Lee, J Chung, P Porras, V Yegneswaran, J Noh, ...
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
2482014
Vigilare: toward snoop-based kernel integrity monitor
H Moon, H Lee, J Lee, K Kim, Y Paek, BB Kang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
992012
Vigilare: toward snoop-based kernel integrity monitor
BBK Hyungon Moon, Hojoon Lee, Jihoon Lee, Kihwan Kim, Yunheung Paek
Proceedings of the 2012 ACM Conference on Computer and Communications …, 2012
992012
Doubleguard: Detecting intrusions in multitier web applications
M Le, A Stavrou, BBH Kang
IEEE Transactions on dependable and secure computing 9 (4), 512-525, 2011
912011
OpenSGX: An Open Platform for SGX Research.
P Jain, SJ Desai, MW Shih, T Kim, SM Kim, JH Lee, C Choi, Y Shin, ...
NDSS 16, 21-24, 2016
902016
The waledac protocol: The how and why
G Sinclair, C Nunnery, BBH Kang
2009 4th International Conference on Malicious and Unwanted Software …, 2009
842009
Hacking in darkness: Return-oriented programming against secure enclaves
J Lee, J Jang, Y Jang, N Kwak, Y Choi, C Choi, T Kim, M Peinado, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 523-539, 2017
822017
Ki-mon: A hardware-assisted event-triggered monitoring platform for mutable kernel object
H Lee, H Moon, D Jang, K Kim, J Lee, Y Paek, BBH Kang
22nd {USENIX} Security Symposium ({USENIX} Security 13), 511-526, 2013
742013
Towards complete node enumeration in a peer-to-peer botnet
BBH Kang, E Chan-Tin, CP Lee, J Tyra, HJ Kang, C Nunnery, Z Wadler, ...
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
672009
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment.
JS Jang, S Kong, M Kim, D Kim, BB Kang
NDSS, 2015
662015
The hash history approach for reconciling mutual inconsistency
BBH Kang, R Wilensky, J Kubiatowicz
23rd International Conference on Distributed Computing Systems, 2003 …, 2003
572003
Network support for mobile multimedia using a self-adaptive distributed proxy
ZM Mao, HW So, B Kang
Proceedings of the 11th international workshop on Network and operating …, 2001
442001
Atra: Address translation redirection attack against hardware-based external monitors
D Jang, H Lee, M Kim, D Kim, D Kim, BB Kang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
402014
Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure.
C Nunnery, G Sinclair, BBH Kang
LEET, 2010
392010
Privatezone: Providing a private execution environment using arm trustzone
J Jang, C Choi, J Lee, N Kwak, S Lee, Y Choi, BB Kang
IEEE Transactions on Dependable and Secure Computing 15 (5), 797-810, 2016
202016
RepuScore: Collaborative Reputation Management Framework for Email Infrastructure.
G Singaraju, BBH Kang
LISA 7, 243-251, 2007
182007
Vulnerabilities of network OS and mitigation with state‐based permission system
J Noh, S Lee, J Park, S Shin, BB Kang
Security and Communication Networks 9 (13), 1971-1982, 2016
172016
Implementing an application-specific instruction-set processor for system-level dynamic program analysis engines
I Heo, M Kim, Y Lee, C Choi, J Lee, BB Kang, Y Paek
ACM Transactions on Design Automation of Electronic Systems (TODAES) 20 (4 …, 2015
172015
Malicious URL protection based on attackers' habitual behavioral analysis
S Kim, J Kim, BBH Kang
Computers & Security 77, 790-806, 2018
122018
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20