BibTeX records: Brent ByungHoon Kang

download as .bib file

@article{DBLP:journals/compsec/ChoiSLK24,
  author       = {Wonwoo Choi and
                  Minjae Seo and
                  Seongman Lee and
                  Brent ByungHoon Kang},
  title        = {SuM: Efficient shadow stack protection on {ARM} Cortex-M},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103568},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103568},
  doi          = {10.1016/J.COSE.2023.103568},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChoiSLK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/YangKN24,
  author       = {Seungyong Yang and
                  Brent ByungHoon Kang and
                  Jaehyun Nam},
  title        = {Optimus: association-based dynamic system call filtering for container
                  attack surface reduction},
  journal      = {J. Cloud Comput.},
  volume       = {13},
  number       = {1},
  pages        = {71},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13677-024-00639-3},
  doi          = {10.1186/S13677-024-00639-3},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcloudc/YangKN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/JaegerKMS23,
  author       = {Trent Jaeger and
                  Brent ByungHoon Kang and
                  Nele Mentens and
                  Cynthia Sturton},
  title        = {Impact of Emerging Hardware on Security and Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {3},
  pages        = {6--7},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3258206},
  doi          = {10.1109/MSEC.2023.3258206},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/JaegerKMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simpra/KimCLKKSLHLK23,
  author       = {Daegyeong Kim and
                  Wonwoo Choi and
                  Chang{-}il Lim and
                  Eunjin Kim and
                  Geonwoo Kim and
                  Yongho Song and
                  Junsu Lee and
                  Youngkwang Han and
                  Hojoon Lee and
                  Brent ByungHoon Kang},
  title        = {Towards scalable and configurable simulation for disaggregated architecture},
  journal      = {Simul. Model. Pract. Theory},
  volume       = {125},
  pages        = {102743},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.simpat.2023.102743},
  doi          = {10.1016/J.SIMPAT.2023.102743},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/simpra/KimCLKKSLHLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LeeSK23,
  author       = {Hojoon Lee and
                  Chihyun Song and
                  Brent ByungHoon Kang},
  title        = {Harnessing the x86 Intermediate Rings for Intra-Process Isolation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {4},
  pages        = {3251--3268},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3192524},
  doi          = {10.1109/TDSC.2022.3192524},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LeeSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ParkK23,
  author       = {Jaemin Park and
                  Brent ByungHoon Kang},
  title        = {EnclaveVPN: Toward Optimized Utilization of Enclave Page Cache and
                  Practical Performance of Data Plane for Security-Enhanced Cloud {VPN}},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {397--411},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607210},
  doi          = {10.1145/3607199.3607210},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ParkK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChoiJJKL22,
  author       = {Yeseul Choi and
                  Yunjong Jeong and
                  DaeHee Jang and
                  Brent ByungHoon Kang and
                  Hojoon Lee},
  title        = {EmuID: Detecting presence of emulation through microarchitectural
                  characteristic on {ARM}},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102569},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102569},
  doi          = {10.1016/J.COSE.2021.102569},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChoiJJKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/JangK22,
  author       = {Jinsoo Jang and
                  Brent ByungHoon Kang},
  title        = {3rdParTEE: Securing Third-Party IoT Services Using the Trusted Execution
                  Environment},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {17},
  pages        = {15814--15826},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3152555},
  doi          = {10.1109/JIOT.2022.3152555},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/JangK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LeeKJK22,
  author       = {Seongman Lee and
                  Hyeonwoo Kang and
                  Jinsoo Jang and
                  Brent ByungHoon Kang},
  title        = {SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing
                  Stack Layout},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {4},
  pages        = {2559--2575},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3063843},
  doi          = {10.1109/TDSC.2021.3063843},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LeeKJK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JoeKK21,
  author       = {Hun Joe and
                  Sungjin Kim and
                  Brent ByungHoon Kang},
  title        = {Quantitative Server Sizing Model for Performance Satisfaction in Secure
                  {U2L} Migration},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {142449--142460},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3119397},
  doi          = {10.1109/ACCESS.2021.3119397},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/JoeKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/YooKKK21,
  author       = {Suyeon Yoo and
                  Sungjin Kim and
                  Seungjae Kim and
                  Brent ByungHoon Kang},
  title        = {AI-HydRa: Advanced hybrid approach using random forest and deep learning
                  for malware classification},
  journal      = {Inf. Sci.},
  volume       = {546},
  pages        = {420--435},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ins.2020.08.082},
  doi          = {10.1016/J.INS.2020.08.082},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/YooKKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JangKLPJKK21,
  author       = {DaeHee Jang and
                  Jonghwan Kim and
                  Hojoon Lee and
                  Minjoon Park and
                  Yunjong Jung and
                  Minsu Kim and
                  Brent ByungHoon Kang},
  title        = {On the Analysis of Byte-Granularity Heap Randomization},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {5},
  pages        = {2237--2252},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2947913},
  doi          = {10.1109/TDSC.2019.2947913},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JangKLPJKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YooKK20,
  author       = {Suyeon Yoo and
                  Sungjin Kim and
                  Brent ByungHoon Kang},
  title        = {The Image Game: Exploit Kit Detection Based on Recursive Convolutional
                  Neural Networks},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {18808--18821},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2967746},
  doi          = {10.1109/ACCESS.2020.2967746},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/YooKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JungKJK20,
  author       = {Dongjae Jung and
                  Minsu Kim and
                  Jinsoo Jang and
                  Brent ByungHoon Kang},
  title        = {Value-Based Constraint Control Flow Integrity},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {50531--50542},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2980026},
  doi          = {10.1109/ACCESS.2020.2980026},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/JungKJK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JangK20,
  author       = {Jinsoo Jang and
                  Brent ByungHoon Kang},
  title        = {Retrofitting the Partially Privileged Mode for {TEE} Communication
                  Channel Protection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {1000--1014},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2840709},
  doi          = {10.1109/TDSC.2018.2840709},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JangK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/JangK20,
  author       = {Jinsoo Jang and
                  Brent ByungHoon Kang},
  editor       = {Eyal de Lara and
                  Iqbal Mohomed and
                  Jason Nieh and
                  Elizabeth M. Belding},
  title        = {SelMon: reinforcing mobile device security with self-protected trust
                  anchor},
  booktitle    = {MobiSys '20: The 18th Annual International Conference on Mobile Systems,
                  Applications, and Services, Toronto, Ontario, Canada, June 15-19,
                  2020},
  pages        = {135--147},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3386901.3389023},
  doi          = {10.1145/3386901.3389023},
  timestamp    = {Tue, 09 Jun 2020 18:55:05 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/JangK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SongHKKSF20,
  author       = {Dokyung Song and
                  Felicitas Hetzelt and
                  Jonghwan Kim and
                  Brent ByungHoon Kang and
                  Jean{-}Pierre Seifert and
                  Michael Franz},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual
                  Machine Checkpoints},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {2541--2557},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/song},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SongHKKSF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ParkHKK19,
  author       = {Jaehyun Park and
                  Jaehee Ha and
                  Brent ByungHoon Kang and
                  Myungchul Kim},
  title        = {MoHoP: {A} protocol providing for both mobility management and host
                  privacy},
  journal      = {Comput. Networks},
  volume       = {148},
  pages        = {20--33},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.comnet.2018.10.014},
  doi          = {10.1016/J.COMNET.2018.10.014},
  timestamp    = {Thu, 05 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ParkHKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ParkPKK19,
  author       = {Jaemin Park and
                  Sungjin Park and
                  Brent ByungHoon Kang and
                  Kwangjo Kim},
  title        = {eMotion: An {SGX} extension for migrating enclaves},
  journal      = {Comput. Secur.},
  volume       = {80},
  pages        = {173--185},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2018.09.008},
  doi          = {10.1016/J.COSE.2018.09.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ParkPKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KimJPJKCK19,
  author       = {Deokjin Kim and
                  DaeHee Jang and
                  Minjoon Park and
                  Yunjong Jeong and
                  Jonghwan Kim and
                  Seokjin Choi and
                  Brent ByungHoon Kang},
  title        = {{SGX-LEGO:} Fine-grained {SGX} controlled-channel attack and its countermeasure},
  journal      = {Comput. Secur.},
  volume       = {82},
  pages        = {118--139},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2018.12.001},
  doi          = {10.1016/J.COSE.2018.12.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KimJPJKCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JangK19,
  author       = {Jinsoo Jang and
                  Brent ByungHoon Kang},
  title        = {Securing a communication channel for the trusted execution environment},
  journal      = {Comput. Secur.},
  volume       = {83},
  pages        = {79--92},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.01.012},
  doi          = {10.1016/J.COSE.2019.01.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JangK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JangJLPKKK19,
  author       = {DaeHee Jang and
                  Yunjong Jeong and
                  Sungman Lee and
                  Minjoon Park and
                  Kuenhwan Kwak and
                  Donguk Kim and
                  Brent ByungHoon Kang},
  title        = {Rethinking anti-emulation techniques for large-scale software deployment},
  journal      = {Comput. Secur.},
  volume       = {83},
  pages        = {182--200},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.02.005},
  doi          = {10.1016/J.COSE.2019.02.005},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JangJLPKKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LeeMHJJKPK19,
  author       = {Hojoon Lee and
                  Hyungon Moon and
                  Ingoo Heo and
                  DaeHee Jang and
                  Jinsoo Jang and
                  Kihwan Kim and
                  Yunheung Paek and
                  Brent ByungHoon Kang},
  title        = {KI-Mon {ARM:} {A} Hardware-Assisted Event-triggered Monitoring Platform
                  for Mutable Kernel Object},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {2},
  pages        = {287--300},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2017.2679710},
  doi          = {10.1109/TDSC.2017.2679710},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LeeMHJJKPK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/JangK19,
  author       = {Jinsoo Jang and
                  Brent ByungHoon Kang},
  title        = {In-process Memory Isolation Using Hardware Watchpoint},
  booktitle    = {Proceedings of the 56th Annual Design Automation Conference 2019,
                  {DAC} 2019, Las Vegas, NV, USA, June 02-06, 2019},
  pages        = {32},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3316781.3317843},
  doi          = {10.1145/3316781.3317843},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/JangK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/JangK19a,
  author       = {Jinsoo Jang and
                  Brent ByungHoon Kang},
  title        = {Revisiting the {ARM} Debug Facility for {OS} Kernel Security},
  booktitle    = {Proceedings of the 56th Annual Design Automation Conference 2019,
                  {DAC} 2019, Las Vegas, NV, USA, June 02-06, 2019},
  pages        = {110},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3316781.3317897},
  doi          = {10.1145/3316781.3317897},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/JangK19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/KimJJK19,
  author       = {Jonghwan Kim and
                  DaeHee Jang and
                  Yunjong Jeong and
                  Brent ByungHoon Kang},
  title        = {POLaR: Per-Allocation Object Layout Randomization},
  booktitle    = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2019, Portland, OR, USA, June 24-27, 2019},
  pages        = {505--516},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSN.2019.00058},
  doi          = {10.1109/DSN.2019.00058},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/KimJJK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2018,
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17982-3},
  doi          = {10.1007/978-3-030-17982-3},
  isbn         = {978-3-030-17981-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ManesJRK18,
  author       = {Valentin J. M. Man{\`{e}}s and
                  DaeHee Jang and
                  Chanho Ryu and
                  Brent ByungHoon Kang},
  title        = {Domain Isolated Kernel: {A} lightweight sandbox for untrusted kernel
                  extensions},
  journal      = {Comput. Secur.},
  volume       = {74},
  pages        = {130--143},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.01.009},
  doi          = {10.1016/J.COSE.2018.01.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ManesJRK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KimKK18,
  author       = {Sungjin Kim and
                  Jinkook Kim and
                  Brent ByungHoon Kang},
  title        = {Malicious {URL} protection based on attackers' habitual behavioral
                  analysis},
  journal      = {Comput. Secur.},
  volume       = {77},
  pages        = {790--806},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.01.013},
  doi          = {10.1016/J.COSE.2018.01.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KimKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeeKPK18,
  author       = {Hojoon Lee and
                  Minsu Kim and
                  Yunheung Paek and
                  Brent ByungHoon Kang},
  title        = {A dynamic per-context verification of kernel address integrity from
                  external monitors},
  journal      = {Comput. Secur.},
  volume       = {77},
  pages        = {824--837},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.02.013},
  doi          = {10.1016/J.COSE.2018.02.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeeKPK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JangCLKLCK18,
  author       = {Jin Soo Jang and
                  Changho Choi and
                  Jae{-}Hyuk Lee and
                  Nohyun Kwak and
                  Seongman Lee and
                  Yeseul Choi and
                  Brent ByungHoon Kang},
  title        = {PrivateZone: Providing a Private Execution Environment Using {ARM}
                  TrustZone},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {5},
  pages        = {797--810},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2622261},
  doi          = {10.1109/TDSC.2016.2622261},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JangCLKLCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeeSK18,
  author       = {Hojoon Lee and
                  Chihyun Song and
                  Brent ByungHoon Kang},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Lord of the x86 Rings: {A} Portable User Mode Privilege Separation
                  Architecture on x86},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1441--1454},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243748},
  doi          = {10.1145/3243734.3243748},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LeeSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/KwonOPYCKP18,
  author       = {Donghyun Kwon and
                  Kuenwhee Oh and
                  Junmo Park and
                  Seungyong Yang and
                  Yeongpil Cho and
                  Brent ByungHoon Kang and
                  Yunheung Paek},
  title        = {Hypernel: a hardware-assisted framework for kernel protection without
                  nested paging},
  booktitle    = {Proceedings of the 55th Annual Design Automation Conference, {DAC}
                  2018, San Francisco, CA, USA, June 24-29, 2018},
  pages        = {34:1--34:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3195970.3196061},
  doi          = {10.1145/3195970.3196061},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/KwonOPYCKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws2/ZhuYWKWKLXW18,
  author       = {Feng Zhu and
                  Youngtae Yun and
                  Jinpeng Wei and
                  Brent ByungHoon Kang and
                  Yongzhi Wang and
                  Daehyeok Kim and
                  Peng Li and
                  He Xu and
                  Ruchuan Wang},
  editor       = {Hai Jin and
                  Qingyang Wang and
                  Liang{-}Jie Zhang},
  title        = {A Reflective Covert Channel Attack Anchored on Trusted Web Services},
  booktitle    = {Web Services - {ICWS} 2018 - 25th International Conference, Held as
                  Part of the Services Conference Federation, {SCF} 2018, Seattle, WA,
                  USA, June 25-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10966},
  pages        = {84--99},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-94289-6\_6},
  doi          = {10.1007/978-3-319-94289-6\_6},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws2/ZhuYWKWKLXW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/KimK18,
  author       = {Sungjin Kim and
                  Brent ByungHoon Kang},
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {FriSM: Malicious Exploit Kit Detection via Feature-Based String-Similarity
                  Matching},
  booktitle    = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {254},
  pages        = {416--432},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01701-9\_23},
  doi          = {10.1007/978-3-030-01701-9\_23},
  timestamp    = {Fri, 11 Jan 2019 16:12:16 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/KimK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2017,
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93563-8},
  doi          = {10.1007/978-3-319-93563-8},
  isbn         = {978-3-319-93562-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-11912,
  author       = {Hojoon Lee and
                  Chihyun Song and
                  Brent ByungHoon Kang},
  title        = {Lord of the x86 Rings: {A} Portable User Mode Privilege Separation
                  Architecture on x86},
  journal      = {CoRR},
  volume       = {abs/1805.11912},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.11912},
  eprinttype    = {arXiv},
  eprint       = {1805.11912},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-11912.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-01023,
  author       = {DaeHee Jang and
                  Jongwhan Kim and
                  Minjoon Park and
                  Yunjong Jung and
                  Minsu Kim and
                  Hojoon Lee and
                  Brent ByungHoon Kang},
  title        = {{RUMA:} On the Analysis of Defenses based on Misaligned Accesses},
  journal      = {CoRR},
  volume       = {abs/1807.01023},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.01023},
  eprinttype    = {arXiv},
  eprint       = {1807.01023},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-01023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ParkNKK17,
  author       = {Jaehyun Park and
                  Jiseong Noh and
                  Myungchul Kim and
                  Brent ByungHoon Kang},
  title        = {Invi-server: Reducing the attack surfaces by making protected server
                  invisible on networks},
  journal      = {Comput. Secur.},
  volume       = {67},
  pages        = {89--106},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2017.02.012},
  doi          = {10.1016/J.COSE.2017.02.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ParkNKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChoiKJJOKK17,
  author       = {Changho Choi and
                  Nohyun Kwak and
                  Jin Soo Jang and
                  DaeHee Jang and
                  Kuenwhee Oh and
                  Kyungsoo Kwag and
                  Brent ByungHoon Kang},
  title        = {S-OpenSGX: {A} system-level platform for exploring {SGX} enclave-based
                  computing},
  journal      = {Comput. Secur.},
  volume       = {70},
  pages        = {290--306},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2017.06.006},
  doi          = {10.1016/J.COSE.2017.06.006},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChoiKJJOKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MoonLHKPK17,
  author       = {Hyungon Moon and
                  Hojoon Lee and
                  Ingoo Heo and
                  Kihwan Kim and
                  Yunheung Paek and
                  Brent ByungHoon Kang},
  title        = {Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {2},
  pages        = {145--157},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2443803},
  doi          = {10.1109/TDSC.2015.2443803},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MoonLHKPK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LeeJJKCCKPK17,
  author       = {Jae{-}Hyuk Lee and
                  Jin Soo Jang and
                  Yeongjin Jang and
                  Nohyun Kwak and
                  Yeseul Choi and
                  Changho Choi and
                  Taesoo Kim and
                  Marcus Peinado and
                  Brent ByungHoon Kang},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Hacking in Darkness: Return-oriented Programming against Secure Enclaves},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {523--539},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/lee-jaehyuk},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LeeJJKCCKPK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KimKJJBKY16,
  author       = {Yonggon Kim and
                  Ohmin Kwon and
                  Jin Soo Jang and
                  Seongwook Jin and
                  Hyeongboo Baek and
                  Brent ByungHoon Kang and
                  Hyunsoo Yoon},
  title        = {On-demand bootstrapping mechanism for isolated cryptographic operations
                  on commodity accelerators},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {33--48},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.06.006},
  doi          = {10.1016/J.COSE.2016.06.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KimKJJBKY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/NohLPSK16,
  author       = {Jiseong Noh and
                  Seunghyeon Lee and
                  Jaehyun Park and
                  Seungwon Shin and
                  Brent ByungHoon Kang},
  title        = {Vulnerabilities of network {OS} and mitigation with state-based permission
                  system},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {13},
  pages        = {1971--1982},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1369},
  doi          = {10.1002/SEC.1369},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/NohLPSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/JainDSKKLCSKH16,
  author       = {Prerit Jain and
                  Soham Jayesh Desai and
                  Ming{-}Wei Shih and
                  Taesoo Kim and
                  Seong Min Kim and
                  Jae{-}Hyuk Lee and
                  Changho Choi and
                  Youjung Shin and
                  Brent ByungHoon Kang and
                  Dongsu Han},
  title        = {OpenSGX: An Open Platform for {SGX} Research},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/opensgx-open-platform-sgx-research.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/JainDSKKLCSKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/todaes/HeoKLCLKP15,
  author       = {Ingoo Heo and
                  Minsu Kim and
                  Yongje Lee and
                  Changho Choi and
                  Jinyong Lee and
                  Brent ByungHoon Kang and
                  Yunheung Paek},
  title        = {Implementing an Application-Specific Instruction-Set Processor for
                  System-Level Dynamic Program Analysis Engines},
  journal      = {{ACM} Trans. Design Autom. Electr. Syst.},
  volume       = {20},
  number       = {4},
  pages        = {53:1--53:32},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746238},
  doi          = {10.1145/2746238},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/todaes/HeoKLCLKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/JangKKKK15,
  author       = {Jin Soo Jang and
                  Sunjune Kong and
                  Minsu Kim and
                  Daegyeong Kim and
                  Brent ByungHoon Kang},
  title        = {SeCReT: Secure Channel between Rich Execution Environment and Trusted
                  Execution Environment},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/secret-secure-channel-between-rich-execution-environment-and-trusted-execution-environment},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/JangKKKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShinSLLCPYNK14,
  author       = {Seungwon Shin and
                  YongJoo Song and
                  Taekyung Lee and
                  Sangho Lee and
                  Jaewoong Chung and
                  Phillip A. Porras and
                  Vinod Yegneswaran and
                  Jiseong Noh and
                  Brent ByungHoon Kang},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Rosemary: {A} Robust, Secure, and High-performance Network Operating
                  System},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {78--89},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660353},
  doi          = {10.1145/2660267.2660353},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShinSLLCPYNK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JangLKKKK14,
  author       = {DaeHee Jang and
                  Hojoon Lee and
                  Minsu Kim and
                  Daehyeok Kim and
                  Daegyeong Kim and
                  Brent ByungHoon Kang},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{ATRA:} Address Translation Redirection Attack against Hardware-based
                  External Monitors},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {167--178},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660303},
  doi          = {10.1145/2660267.2660303},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JangLKKKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/MasriWLK14,
  author       = {Ala'a El Masri and
                  Harry Wechsler and
                  Peter Likarish and
                  Brent ByungHoon Kang},
  editor       = {Ali Miri and
                  Urs Hengartner and
                  Nen{-}Fu Huang and
                  Audun J{\o}sang and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Identifying users with application-specific command streams},
  booktitle    = {2014 Twelfth Annual International Conference on Privacy, Security
                  and Trust, Toronto, ON, Canada, July 23-24, 2014},
  pages        = {232--238},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PST.2014.6890944},
  doi          = {10.1109/PST.2014.6890944},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/MasriWLK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LeeMJKLPK13,
  author       = {Hojoon Lee and
                  Hyungon Moon and
                  DaeHee Jang and
                  Kihwan Kim and
                  Jihoon Lee and
                  Yunheung Paek and
                  Brent ByungHoon Kang},
  editor       = {Samuel T. King},
  title        = {KI-Mon: {A} Hardware-assisted Event-triggered Monitoring Platform
                  for Mutable Kernel Object},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {511--526},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/lee},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LeeMJKLPK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LeSK12,
  author       = {Meixing Le and
                  Angelos Stavrou and
                  Brent ByungHoon Kang},
  title        = {DoubleGuard: Detecting Intrusions in Multitier Web Applications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {512--525},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.59},
  doi          = {10.1109/TDSC.2011.59},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LeSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MoonLLKPK12,
  author       = {Hyungon Moon and
                  Hojoon Lee and
                  Jihoon Lee and
                  Kihwan Kim and
                  Yunheung Paek and
                  Brent ByungHoon Kang},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Vigilare: toward snoop-based kernel integrity monitor},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {28--37},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382202},
  doi          = {10.1145/2382196.2382202},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MoonLLKPK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Kang11,
  author       = {Brent ByungHoon Kang},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {DNS-Based Botnet Detection},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {362--363},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_845},
  doi          = {10.1007/978-1-4419-5906-5\_845},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Kang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/KangS11,
  author       = {Brent ByungHoon Kang and
                  Anurag Srivastava},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Dynamic Malware Analysis},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {367--368},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_846},
  doi          = {10.1007/978-1-4419-5906-5\_846},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/KangS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/KangS11a,
  author       = {Brent ByungHoon Kang and
                  Gautam Singaraju},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Spam Detection Using Network-Level Characteristics},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1231--1232},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_850},
  doi          = {10.1007/978-1-4419-5906-5\_850},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/KangS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/KangS11b,
  author       = {Brent ByungHoon Kang and
                  Greg Sinclair},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Unpacking Malware},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1350--1351},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_851},
  doi          = {10.1007/978-1-4419-5906-5\_851},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/KangS11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1112-2245,
  author       = {DaeHun Nyang and
                  Abedelaziz Mohaisen and
                  Taekyoung Kwon and
                  Brent ByungHoon Kang and
                  Angelos Stavrou},
  title        = {Decryptable to Your Eyes: Visualization of Security Protocols at the
                  User Interface},
  journal      = {CoRR},
  volume       = {abs/1112.2245},
  year         = {2011},
  url          = {http://arxiv.org/abs/1112.2245},
  eprinttype    = {arXiv},
  eprint       = {1112.2245},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1112-2245.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/NunnerySK10,
  author       = {Chris Nunnery and
                  Greg Sinclair and
                  Brent ByungHoon Kang},
  editor       = {Michael D. Bailey},
  title        = {Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster
                  Systems in a Multi-Tier Botnet Infrastructure},
  booktitle    = {3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '10, San Jose, CA, USA, April 27, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/leet-10/tumbling-down-rabbit-hole-exploring-idiosyncrasies-botmaster-systems-multi-tier},
  timestamp    = {Mon, 20 Nov 2023 09:09:49 +0100},
  biburl       = {https://dblp.org/rec/conf/leet/NunnerySK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KangCLTKNWSHDK09,
  author       = {Brent ByungHoon Kang and
                  Eric Chan{-}Tin and
                  Christopher P. Lee and
                  James Tyra and
                  Hun Jeong Kang and
                  Chris Nunnery and
                  Zachariah Wadler and
                  Greg Sinclair and
                  Nicholas Hopper and
                  David Dagon and
                  Yongdae Kim},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {Towards complete node enumeration in a peer-to-peer botnet},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {23--34},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533064},
  doi          = {10.1145/1533057.1533064},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KangCLTKNWSHDK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SinclairNK09,
  author       = {Greg Sinclair and
                  Chris Nunnery and
                  Brent ByungHoon Kang},
  title        = {The waledac protocol: The how and why},
  booktitle    = {4th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009},
  pages        = {69--77},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MALWARE.2009.5403015},
  doi          = {10.1109/MALWARE.2009.5403015},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SinclairNK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/KangN09,
  author       = {Brent ByungHoon Kang and
                  Chris Nunnery},
  editor       = {Zbigniew W. Ras and
                  William Ribarsky},
  title        = {Decentralized Peer-to-Peer Botnet Architectures},
  booktitle    = {Advances in Information and Intelligent Systems},
  series       = {Studies in Computational Intelligence},
  volume       = {251},
  pages        = {251--264},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04141-9\_12},
  doi          = {10.1007/978-3-642-04141-9\_12},
  timestamp    = {Tue, 16 May 2017 14:24:36 +0200},
  biburl       = {https://dblp.org/rec/series/sci/KangN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ceas/SingarajuMK08,
  author       = {Gautam Singaraju and
                  Jeffrey Moss and
                  Brent ByungHoon Kang},
  title        = {Tracking Email Reputation for Authenticated Sender Identities},
  booktitle    = {{CEAS} 2008 - The Fifth Conference on Email and Anti-Spam, 21-22 August
                  2008, Mountain View, California, {USA}},
  year         = {2008},
  url          = {http://www.ceas.cc/2008/papers/ceas2008-paper-33.pdf},
  timestamp    = {Mon, 01 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ceas/SingarajuMK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/SingarajuK08,
  author       = {Gautam Singaraju and
                  Brent ByungHoon Kang},
  editor       = {Mario Obejas},
  title        = {Concord: {A} Secure Mobile Data Authorization Framework for Regulatory
                  Compliance},
  booktitle    = {Proceedings of the 22nd Large Installation System Administration Conference,
                  {LISA} 2008, November 9-14, 2008, San Diego, CA, {USA}},
  pages        = {91--102},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/lisa08/tech/full\_papers/singaraju/singaraju.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/SingarajuK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/SingarajuK07,
  author       = {Gautam Singaraju and
                  Brent ByungHoon Kang},
  editor       = {Paul Anderson},
  title        = {RepuScore: Collaborative Reputation Management Framework for Email
                  Infrastructure},
  booktitle    = {Proceedings of the 21th Large Installation System Administration Conference,
                  {LISA} 2007, Dallas, Texas, USA, November 11-16, 2007},
  pages        = {243--251},
  publisher    = {{USENIX}},
  year         = {2007},
  url          = {http://www.usenix.org/events/lisa07/tech/singaraju.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/SingarajuK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/Grizzard0NKD07,
  author       = {Julian B. Grizzard and
                  Vikram Sharma and
                  Chris Nunnery and
                  Brent ByungHoon Kang and
                  David Dagon},
  editor       = {Niels Provos},
  title        = {Peer-to-Peer Botnets: Overview and Case Study},
  booktitle    = {First Workshop on Hot Topics in Understanding Botnets, HotBots'07,
                  Cambridge, MA, USA, April 10, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/hotbots-07/peer-peer-botnets-overview-and-case-study},
  timestamp    = {Thu, 12 Aug 2021 18:19:16 +0200},
  biburl       = {https://dblp.org/rec/conf/nsdi/Grizzard0NKD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/KangSJ06,
  author       = {Brent ByungHoon Kang and
                  Gautam Singaraju and
                  Sumeet Jain},
  editor       = {William LeFebvre},
  title        = {Privilege Messaging: An Authorization Framework over Email Infrastructure},
  booktitle    = {Proceedings of the 20th Conference on Systems Administration {(LISA}
                  2006), Washington, DC, USA, December 3-8, 2006},
  pages        = {1--16},
  publisher    = {{USENIX}},
  year         = {2006},
  url          = {http://www.usenix.org/events/lisa06/tech/kang.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/KangSJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/KangST05,
  author       = {Brent ByungHoon Kang and
                  Vikram Sharma and
                  Pratik Thanki},
  editor       = {David N. Blank{-}Edelman},
  title        = {RegColl: Centralized Registry Framework for Infrastructure System
                  Management},
  booktitle    = {Proceedings of the 19th Conference on Systems Administration {(LISA}
                  2005), December 4-9, 2005, San Diego, California, {USA}},
  pages        = {73--82},
  publisher    = {{USENIX}},
  year         = {2005},
  url          = {http://www.usenix.org/events/lisa05/tech/kang.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/KangST05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics