(2021)
Confidential Machine Learning Computation in Untrusted Environments: A Systems Security Perspective.
IEEE ACCESS.
9,
(2021)
EmuID: Detecting presence of emulation through microarchitectural characteristic on ARM.
COMPUTERS & SECURITY.
113,
102569
(2019)
On the Analysis of Byte-Granularity Heap Randomization.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING.
1,
1
(2018)
A Dynamic Per-context Verification of Kernel Address Integrity from External Monitors.
COMPUTERS & SECURITY.
77
(2017)
KI-Mon ARM: A Hardware- assisted Event-triggered Monitoring Platform for Mutable Kernel Object.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING.
16,
2
(2015)
Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING.
14,
2
학술회의논문
(2023)
Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM Architectures.
ACM Conference on Computer and Communications Security.
덴마크
(2018)
Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86.
ACM Conference on Computer and Communications Security.
캐나다
(2014)
ATRA: Address Translation Redirection Attack Against Hardware-based External Monitors.
ACM Conference on Computer and Communications Security.
미국
(2013)
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object.
USENIX Security Symposium.
미국
(2012)
Vigilare: Toward Snoop-based Kernel Integrity Monitor.
ACM Conference on Computer and Communications Security.
미국