Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Brent ByungHoon Kang
@article{DBLP:journals/compsec/ChoiSLK24, author = {Wonwoo Choi and Minjae Seo and Seongman Lee and Brent ByungHoon Kang}, title = {SuM: Efficient shadow stack protection on {ARM} Cortex-M}, journal = {Comput. Secur.}, volume = {136}, pages = {103568}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103568}, doi = {10.1016/J.COSE.2023.103568}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChoiSLK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/YangKN24, author = {Seungyong Yang and Brent ByungHoon Kang and Jaehyun Nam}, title = {Optimus: association-based dynamic system call filtering for container attack surface reduction}, journal = {J. Cloud Comput.}, volume = {13}, number = {1}, pages = {71}, year = {2024}, url = {https://doi.org/10.1186/s13677-024-00639-3}, doi = {10.1186/S13677-024-00639-3}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcloudc/YangKN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/JaegerKMS23, author = {Trent Jaeger and Brent ByungHoon Kang and Nele Mentens and Cynthia Sturton}, title = {Impact of Emerging Hardware on Security and Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {3}, pages = {6--7}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3258206}, doi = {10.1109/MSEC.2023.3258206}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/JaegerKMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simpra/KimCLKKSLHLK23, author = {Daegyeong Kim and Wonwoo Choi and Chang{-}il Lim and Eunjin Kim and Geonwoo Kim and Yongho Song and Junsu Lee and Youngkwang Han and Hojoon Lee and Brent ByungHoon Kang}, title = {Towards scalable and configurable simulation for disaggregated architecture}, journal = {Simul. Model. Pract. Theory}, volume = {125}, pages = {102743}, year = {2023}, url = {https://doi.org/10.1016/j.simpat.2023.102743}, doi = {10.1016/J.SIMPAT.2023.102743}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/simpra/KimCLKKSLHLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LeeSK23, author = {Hojoon Lee and Chihyun Song and Brent ByungHoon Kang}, title = {Harnessing the x86 Intermediate Rings for Intra-Process Isolation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {4}, pages = {3251--3268}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3192524}, doi = {10.1109/TDSC.2022.3192524}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LeeSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ParkK23, author = {Jaemin Park and Brent ByungHoon Kang}, title = {EnclaveVPN: Toward Optimized Utilization of Enclave Page Cache and Practical Performance of Data Plane for Security-Enhanced Cloud {VPN}}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {397--411}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607210}, doi = {10.1145/3607199.3607210}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ParkK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChoiJJKL22, author = {Yeseul Choi and Yunjong Jeong and DaeHee Jang and Brent ByungHoon Kang and Hojoon Lee}, title = {EmuID: Detecting presence of emulation through microarchitectural characteristic on {ARM}}, journal = {Comput. Secur.}, volume = {113}, pages = {102569}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102569}, doi = {10.1016/J.COSE.2021.102569}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChoiJJKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/JangK22, author = {Jinsoo Jang and Brent ByungHoon Kang}, title = {3rdParTEE: Securing Third-Party IoT Services Using the Trusted Execution Environment}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {17}, pages = {15814--15826}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3152555}, doi = {10.1109/JIOT.2022.3152555}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/JangK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LeeKJK22, author = {Seongman Lee and Hyeonwoo Kang and Jinsoo Jang and Brent ByungHoon Kang}, title = {SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {4}, pages = {2559--2575}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3063843}, doi = {10.1109/TDSC.2021.3063843}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LeeKJK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JoeKK21, author = {Hun Joe and Sungjin Kim and Brent ByungHoon Kang}, title = {Quantitative Server Sizing Model for Performance Satisfaction in Secure {U2L} Migration}, journal = {{IEEE} Access}, volume = {9}, pages = {142449--142460}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3119397}, doi = {10.1109/ACCESS.2021.3119397}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/JoeKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/YooKKK21, author = {Suyeon Yoo and Sungjin Kim and Seungjae Kim and Brent ByungHoon Kang}, title = {AI-HydRa: Advanced hybrid approach using random forest and deep learning for malware classification}, journal = {Inf. Sci.}, volume = {546}, pages = {420--435}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2020.08.082}, doi = {10.1016/J.INS.2020.08.082}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/YooKKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JangKLPJKK21, author = {DaeHee Jang and Jonghwan Kim and Hojoon Lee and Minjoon Park and Yunjong Jung and Minsu Kim and Brent ByungHoon Kang}, title = {On the Analysis of Byte-Granularity Heap Randomization}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {5}, pages = {2237--2252}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2947913}, doi = {10.1109/TDSC.2019.2947913}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JangKLPJKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YooKK20, author = {Suyeon Yoo and Sungjin Kim and Brent ByungHoon Kang}, title = {The Image Game: Exploit Kit Detection Based on Recursive Convolutional Neural Networks}, journal = {{IEEE} Access}, volume = {8}, pages = {18808--18821}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2967746}, doi = {10.1109/ACCESS.2020.2967746}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/YooKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JungKJK20, author = {Dongjae Jung and Minsu Kim and Jinsoo Jang and Brent ByungHoon Kang}, title = {Value-Based Constraint Control Flow Integrity}, journal = {{IEEE} Access}, volume = {8}, pages = {50531--50542}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2980026}, doi = {10.1109/ACCESS.2020.2980026}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/JungKJK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JangK20, author = {Jinsoo Jang and Brent ByungHoon Kang}, title = {Retrofitting the Partially Privileged Mode for {TEE} Communication Channel Protection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {1000--1014}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2840709}, doi = {10.1109/TDSC.2018.2840709}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JangK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/JangK20, author = {Jinsoo Jang and Brent ByungHoon Kang}, editor = {Eyal de Lara and Iqbal Mohomed and Jason Nieh and Elizabeth M. Belding}, title = {SelMon: reinforcing mobile device security with self-protected trust anchor}, booktitle = {MobiSys '20: The 18th Annual International Conference on Mobile Systems, Applications, and Services, Toronto, Ontario, Canada, June 15-19, 2020}, pages = {135--147}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3386901.3389023}, doi = {10.1145/3386901.3389023}, timestamp = {Tue, 09 Jun 2020 18:55:05 +0200}, biburl = {https://dblp.org/rec/conf/mobisys/JangK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SongHKKSF20, author = {Dokyung Song and Felicitas Hetzelt and Jonghwan Kim and Brent ByungHoon Kang and Jean{-}Pierre Seifert and Michael Franz}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {2541--2557}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/song}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/SongHKKSF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ParkHKK19, author = {Jaehyun Park and Jaehee Ha and Brent ByungHoon Kang and Myungchul Kim}, title = {MoHoP: {A} protocol providing for both mobility management and host privacy}, journal = {Comput. Networks}, volume = {148}, pages = {20--33}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2018.10.014}, doi = {10.1016/J.COMNET.2018.10.014}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ParkHKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ParkPKK19, author = {Jaemin Park and Sungjin Park and Brent ByungHoon Kang and Kwangjo Kim}, title = {eMotion: An {SGX} extension for migrating enclaves}, journal = {Comput. Secur.}, volume = {80}, pages = {173--185}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2018.09.008}, doi = {10.1016/J.COSE.2018.09.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ParkPKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KimJPJKCK19, author = {Deokjin Kim and DaeHee Jang and Minjoon Park and Yunjong Jeong and Jonghwan Kim and Seokjin Choi and Brent ByungHoon Kang}, title = {{SGX-LEGO:} Fine-grained {SGX} controlled-channel attack and its countermeasure}, journal = {Comput. Secur.}, volume = {82}, pages = {118--139}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2018.12.001}, doi = {10.1016/J.COSE.2018.12.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KimJPJKCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JangK19, author = {Jinsoo Jang and Brent ByungHoon Kang}, title = {Securing a communication channel for the trusted execution environment}, journal = {Comput. Secur.}, volume = {83}, pages = {79--92}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.01.012}, doi = {10.1016/J.COSE.2019.01.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JangK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JangJLPKKK19, author = {DaeHee Jang and Yunjong Jeong and Sungman Lee and Minjoon Park and Kuenhwan Kwak and Donguk Kim and Brent ByungHoon Kang}, title = {Rethinking anti-emulation techniques for large-scale software deployment}, journal = {Comput. Secur.}, volume = {83}, pages = {182--200}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.02.005}, doi = {10.1016/J.COSE.2019.02.005}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JangJLPKKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LeeMHJJKPK19, author = {Hojoon Lee and Hyungon Moon and Ingoo Heo and DaeHee Jang and Jinsoo Jang and Kihwan Kim and Yunheung Paek and Brent ByungHoon Kang}, title = {KI-Mon {ARM:} {A} Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {2}, pages = {287--300}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2679710}, doi = {10.1109/TDSC.2017.2679710}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LeeMHJJKPK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/JangK19, author = {Jinsoo Jang and Brent ByungHoon Kang}, title = {In-process Memory Isolation Using Hardware Watchpoint}, booktitle = {Proceedings of the 56th Annual Design Automation Conference 2019, {DAC} 2019, Las Vegas, NV, USA, June 02-06, 2019}, pages = {32}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3316781.3317843}, doi = {10.1145/3316781.3317843}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dac/JangK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/JangK19a, author = {Jinsoo Jang and Brent ByungHoon Kang}, title = {Revisiting the {ARM} Debug Facility for {OS} Kernel Security}, booktitle = {Proceedings of the 56th Annual Design Automation Conference 2019, {DAC} 2019, Las Vegas, NV, USA, June 02-06, 2019}, pages = {110}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3316781.3317897}, doi = {10.1145/3316781.3317897}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dac/JangK19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/KimJJK19, author = {Jonghwan Kim and DaeHee Jang and Yunjong Jeong and Brent ByungHoon Kang}, title = {POLaR: Per-Allocation Object Layout Randomization}, booktitle = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2019, Portland, OR, USA, June 24-27, 2019}, pages = {505--516}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSN.2019.00058}, doi = {10.1109/DSN.2019.00058}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/dsn/KimJJK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2018, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17982-3}, doi = {10.1007/978-3-030-17982-3}, isbn = {978-3-030-17981-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ManesJRK18, author = {Valentin J. M. Man{\`{e}}s and DaeHee Jang and Chanho Ryu and Brent ByungHoon Kang}, title = {Domain Isolated Kernel: {A} lightweight sandbox for untrusted kernel extensions}, journal = {Comput. Secur.}, volume = {74}, pages = {130--143}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.01.009}, doi = {10.1016/J.COSE.2018.01.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ManesJRK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KimKK18, author = {Sungjin Kim and Jinkook Kim and Brent ByungHoon Kang}, title = {Malicious {URL} protection based on attackers' habitual behavioral analysis}, journal = {Comput. Secur.}, volume = {77}, pages = {790--806}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.01.013}, doi = {10.1016/J.COSE.2018.01.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KimKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeeKPK18, author = {Hojoon Lee and Minsu Kim and Yunheung Paek and Brent ByungHoon Kang}, title = {A dynamic per-context verification of kernel address integrity from external monitors}, journal = {Comput. Secur.}, volume = {77}, pages = {824--837}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.02.013}, doi = {10.1016/J.COSE.2018.02.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeeKPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JangCLKLCK18, author = {Jin Soo Jang and Changho Choi and Jae{-}Hyuk Lee and Nohyun Kwak and Seongman Lee and Yeseul Choi and Brent ByungHoon Kang}, title = {PrivateZone: Providing a Private Execution Environment Using {ARM} TrustZone}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {797--810}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2622261}, doi = {10.1109/TDSC.2016.2622261}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JangCLKLCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeeSK18, author = {Hojoon Lee and Chihyun Song and Brent ByungHoon Kang}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Lord of the x86 Rings: {A} Portable User Mode Privilege Separation Architecture on x86}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1441--1454}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243748}, doi = {10.1145/3243734.3243748}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LeeSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/KwonOPYCKP18, author = {Donghyun Kwon and Kuenwhee Oh and Junmo Park and Seungyong Yang and Yeongpil Cho and Brent ByungHoon Kang and Yunheung Paek}, title = {Hypernel: a hardware-assisted framework for kernel protection without nested paging}, booktitle = {Proceedings of the 55th Annual Design Automation Conference, {DAC} 2018, San Francisco, CA, USA, June 24-29, 2018}, pages = {34:1--34:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3195970.3196061}, doi = {10.1145/3195970.3196061}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/dac/KwonOPYCKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws2/ZhuYWKWKLXW18, author = {Feng Zhu and Youngtae Yun and Jinpeng Wei and Brent ByungHoon Kang and Yongzhi Wang and Daehyeok Kim and Peng Li and He Xu and Ruchuan Wang}, editor = {Hai Jin and Qingyang Wang and Liang{-}Jie Zhang}, title = {A Reflective Covert Channel Attack Anchored on Trusted Web Services}, booktitle = {Web Services - {ICWS} 2018 - 25th International Conference, Held as Part of the Services Conference Federation, {SCF} 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10966}, pages = {84--99}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-94289-6\_6}, doi = {10.1007/978-3-319-94289-6\_6}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws2/ZhuYWKWKLXW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/KimK18, author = {Sungjin Kim and Brent ByungHoon Kang}, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {FriSM: Malicious Exploit Kit Detection via Feature-Based String-Similarity Matching}, booktitle = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {254}, pages = {416--432}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01701-9\_23}, doi = {10.1007/978-3-030-01701-9\_23}, timestamp = {Fri, 11 Jan 2019 16:12:16 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/KimK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2017, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93563-8}, doi = {10.1007/978-3-319-93563-8}, isbn = {978-3-319-93562-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-11912, author = {Hojoon Lee and Chihyun Song and Brent ByungHoon Kang}, title = {Lord of the x86 Rings: {A} Portable User Mode Privilege Separation Architecture on x86}, journal = {CoRR}, volume = {abs/1805.11912}, year = {2018}, url = {http://arxiv.org/abs/1805.11912}, eprinttype = {arXiv}, eprint = {1805.11912}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-11912.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-01023, author = {DaeHee Jang and Jongwhan Kim and Minjoon Park and Yunjong Jung and Minsu Kim and Hojoon Lee and Brent ByungHoon Kang}, title = {{RUMA:} On the Analysis of Defenses based on Misaligned Accesses}, journal = {CoRR}, volume = {abs/1807.01023}, year = {2018}, url = {http://arxiv.org/abs/1807.01023}, eprinttype = {arXiv}, eprint = {1807.01023}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-01023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ParkNKK17, author = {Jaehyun Park and Jiseong Noh and Myungchul Kim and Brent ByungHoon Kang}, title = {Invi-server: Reducing the attack surfaces by making protected server invisible on networks}, journal = {Comput. Secur.}, volume = {67}, pages = {89--106}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2017.02.012}, doi = {10.1016/J.COSE.2017.02.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ParkNKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChoiKJJOKK17, author = {Changho Choi and Nohyun Kwak and Jin Soo Jang and DaeHee Jang and Kuenwhee Oh and Kyungsoo Kwag and Brent ByungHoon Kang}, title = {S-OpenSGX: {A} system-level platform for exploring {SGX} enclave-based computing}, journal = {Comput. Secur.}, volume = {70}, pages = {290--306}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2017.06.006}, doi = {10.1016/J.COSE.2017.06.006}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChoiKJJOKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MoonLHKPK17, author = {Hyungon Moon and Hojoon Lee and Ingoo Heo and Kihwan Kim and Yunheung Paek and Brent ByungHoon Kang}, title = {Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {145--157}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2443803}, doi = {10.1109/TDSC.2015.2443803}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MoonLHKPK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LeeJJKCCKPK17, author = {Jae{-}Hyuk Lee and Jin Soo Jang and Yeongjin Jang and Nohyun Kwak and Yeseul Choi and Changho Choi and Taesoo Kim and Marcus Peinado and Brent ByungHoon Kang}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Hacking in Darkness: Return-oriented Programming against Secure Enclaves}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {523--539}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/lee-jaehyuk}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/LeeJJKCCKPK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KimKJJBKY16, author = {Yonggon Kim and Ohmin Kwon and Jin Soo Jang and Seongwook Jin and Hyeongboo Baek and Brent ByungHoon Kang and Hyunsoo Yoon}, title = {On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators}, journal = {Comput. Secur.}, volume = {62}, pages = {33--48}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.06.006}, doi = {10.1016/J.COSE.2016.06.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KimKJJBKY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/NohLPSK16, author = {Jiseong Noh and Seunghyeon Lee and Jaehyun Park and Seungwon Shin and Brent ByungHoon Kang}, title = {Vulnerabilities of network {OS} and mitigation with state-based permission system}, journal = {Secur. Commun. Networks}, volume = {9}, number = {13}, pages = {1971--1982}, year = {2016}, url = {https://doi.org/10.1002/sec.1369}, doi = {10.1002/SEC.1369}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/NohLPSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/JainDSKKLCSKH16, author = {Prerit Jain and Soham Jayesh Desai and Ming{-}Wei Shih and Taesoo Kim and Seong Min Kim and Jae{-}Hyuk Lee and Changho Choi and Youjung Shin and Brent ByungHoon Kang and Dongsu Han}, title = {OpenSGX: An Open Platform for {SGX} Research}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/opensgx-open-platform-sgx-research.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/JainDSKKLCSKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/todaes/HeoKLCLKP15, author = {Ingoo Heo and Minsu Kim and Yongje Lee and Changho Choi and Jinyong Lee and Brent ByungHoon Kang and Yunheung Paek}, title = {Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines}, journal = {{ACM} Trans. Design Autom. Electr. Syst.}, volume = {20}, number = {4}, pages = {53:1--53:32}, year = {2015}, url = {https://doi.org/10.1145/2746238}, doi = {10.1145/2746238}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/todaes/HeoKLCLKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/JangKKKK15, author = {Jin Soo Jang and Sunjune Kong and Minsu Kim and Daegyeong Kim and Brent ByungHoon Kang}, title = {SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/secret-secure-channel-between-rich-execution-environment-and-trusted-execution-environment}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/JangKKKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShinSLLCPYNK14, author = {Seungwon Shin and YongJoo Song and Taekyung Lee and Sangho Lee and Jaewoong Chung and Phillip A. Porras and Vinod Yegneswaran and Jiseong Noh and Brent ByungHoon Kang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Rosemary: {A} Robust, Secure, and High-performance Network Operating System}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {78--89}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660353}, doi = {10.1145/2660267.2660353}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShinSLLCPYNK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JangLKKKK14, author = {DaeHee Jang and Hojoon Lee and Minsu Kim and Daehyeok Kim and Daegyeong Kim and Brent ByungHoon Kang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{ATRA:} Address Translation Redirection Attack against Hardware-based External Monitors}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {167--178}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660303}, doi = {10.1145/2660267.2660303}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JangLKKKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/MasriWLK14, author = {Ala'a El Masri and Harry Wechsler and Peter Likarish and Brent ByungHoon Kang}, editor = {Ali Miri and Urs Hengartner and Nen{-}Fu Huang and Audun J{\o}sang and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Identifying users with application-specific command streams}, booktitle = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, pages = {232--238}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PST.2014.6890944}, doi = {10.1109/PST.2014.6890944}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/MasriWLK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LeeMJKLPK13, author = {Hojoon Lee and Hyungon Moon and DaeHee Jang and Kihwan Kim and Jihoon Lee and Yunheung Paek and Brent ByungHoon Kang}, editor = {Samuel T. King}, title = {KI-Mon: {A} Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {511--526}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/lee}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LeeMJKLPK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LeSK12, author = {Meixing Le and Angelos Stavrou and Brent ByungHoon Kang}, title = {DoubleGuard: Detecting Intrusions in Multitier Web Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {512--525}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.59}, doi = {10.1109/TDSC.2011.59}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LeSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MoonLLKPK12, author = {Hyungon Moon and Hojoon Lee and Jihoon Lee and Kihwan Kim and Yunheung Paek and Brent ByungHoon Kang}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Vigilare: toward snoop-based kernel integrity monitor}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {28--37}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382202}, doi = {10.1145/2382196.2382202}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MoonLLKPK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Kang11, author = {Brent ByungHoon Kang}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {DNS-Based Botnet Detection}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {362--363}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_845}, doi = {10.1007/978-1-4419-5906-5\_845}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Kang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/KangS11, author = {Brent ByungHoon Kang and Anurag Srivastava}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Dynamic Malware Analysis}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {367--368}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_846}, doi = {10.1007/978-1-4419-5906-5\_846}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/KangS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/KangS11a, author = {Brent ByungHoon Kang and Gautam Singaraju}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Spam Detection Using Network-Level Characteristics}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1231--1232}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_850}, doi = {10.1007/978-1-4419-5906-5\_850}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/KangS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/KangS11b, author = {Brent ByungHoon Kang and Greg Sinclair}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Unpacking Malware}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1350--1351}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_851}, doi = {10.1007/978-1-4419-5906-5\_851}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/KangS11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1112-2245, author = {DaeHun Nyang and Abedelaziz Mohaisen and Taekyoung Kwon and Brent ByungHoon Kang and Angelos Stavrou}, title = {Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface}, journal = {CoRR}, volume = {abs/1112.2245}, year = {2011}, url = {http://arxiv.org/abs/1112.2245}, eprinttype = {arXiv}, eprint = {1112.2245}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1112-2245.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/NunnerySK10, author = {Chris Nunnery and Greg Sinclair and Brent ByungHoon Kang}, editor = {Michael D. Bailey}, title = {Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure}, booktitle = {3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '10, San Jose, CA, USA, April 27, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/leet-10/tumbling-down-rabbit-hole-exploring-idiosyncrasies-botmaster-systems-multi-tier}, timestamp = {Mon, 20 Nov 2023 09:09:49 +0100}, biburl = {https://dblp.org/rec/conf/leet/NunnerySK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KangCLTKNWSHDK09, author = {Brent ByungHoon Kang and Eric Chan{-}Tin and Christopher P. Lee and James Tyra and Hun Jeong Kang and Chris Nunnery and Zachariah Wadler and Greg Sinclair and Nicholas Hopper and David Dagon and Yongdae Kim}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {Towards complete node enumeration in a peer-to-peer botnet}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {23--34}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533064}, doi = {10.1145/1533057.1533064}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KangCLTKNWSHDK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/SinclairNK09, author = {Greg Sinclair and Chris Nunnery and Brent ByungHoon Kang}, title = {The waledac protocol: The how and why}, booktitle = {4th International Conference on Malicious and Unwanted Software, {MALWARE} 2009, Montr{\'{e}}al, Quebec, Canada, October 13-14, 2009}, pages = {69--77}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MALWARE.2009.5403015}, doi = {10.1109/MALWARE.2009.5403015}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/SinclairNK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/KangN09, author = {Brent ByungHoon Kang and Chris Nunnery}, editor = {Zbigniew W. Ras and William Ribarsky}, title = {Decentralized Peer-to-Peer Botnet Architectures}, booktitle = {Advances in Information and Intelligent Systems}, series = {Studies in Computational Intelligence}, volume = {251}, pages = {251--264}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04141-9\_12}, doi = {10.1007/978-3-642-04141-9\_12}, timestamp = {Tue, 16 May 2017 14:24:36 +0200}, biburl = {https://dblp.org/rec/series/sci/KangN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ceas/SingarajuMK08, author = {Gautam Singaraju and Jeffrey Moss and Brent ByungHoon Kang}, title = {Tracking Email Reputation for Authenticated Sender Identities}, booktitle = {{CEAS} 2008 - The Fifth Conference on Email and Anti-Spam, 21-22 August 2008, Mountain View, California, {USA}}, year = {2008}, url = {http://www.ceas.cc/2008/papers/ceas2008-paper-33.pdf}, timestamp = {Mon, 01 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ceas/SingarajuMK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/SingarajuK08, author = {Gautam Singaraju and Brent ByungHoon Kang}, editor = {Mario Obejas}, title = {Concord: {A} Secure Mobile Data Authorization Framework for Regulatory Compliance}, booktitle = {Proceedings of the 22nd Large Installation System Administration Conference, {LISA} 2008, November 9-14, 2008, San Diego, CA, {USA}}, pages = {91--102}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/lisa08/tech/full\_papers/singaraju/singaraju.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lisa/SingarajuK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/SingarajuK07, author = {Gautam Singaraju and Brent ByungHoon Kang}, editor = {Paul Anderson}, title = {RepuScore: Collaborative Reputation Management Framework for Email Infrastructure}, booktitle = {Proceedings of the 21th Large Installation System Administration Conference, {LISA} 2007, Dallas, Texas, USA, November 11-16, 2007}, pages = {243--251}, publisher = {{USENIX}}, year = {2007}, url = {http://www.usenix.org/events/lisa07/tech/singaraju.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lisa/SingarajuK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/Grizzard0NKD07, author = {Julian B. Grizzard and Vikram Sharma and Chris Nunnery and Brent ByungHoon Kang and David Dagon}, editor = {Niels Provos}, title = {Peer-to-Peer Botnets: Overview and Case Study}, booktitle = {First Workshop on Hot Topics in Understanding Botnets, HotBots'07, Cambridge, MA, USA, April 10, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/hotbots-07/peer-peer-botnets-overview-and-case-study}, timestamp = {Thu, 12 Aug 2021 18:19:16 +0200}, biburl = {https://dblp.org/rec/conf/nsdi/Grizzard0NKD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/KangSJ06, author = {Brent ByungHoon Kang and Gautam Singaraju and Sumeet Jain}, editor = {William LeFebvre}, title = {Privilege Messaging: An Authorization Framework over Email Infrastructure}, booktitle = {Proceedings of the 20th Conference on Systems Administration {(LISA} 2006), Washington, DC, USA, December 3-8, 2006}, pages = {1--16}, publisher = {{USENIX}}, year = {2006}, url = {http://www.usenix.org/events/lisa06/tech/kang.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lisa/KangSJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/KangST05, author = {Brent ByungHoon Kang and Vikram Sharma and Pratik Thanki}, editor = {David N. Blank{-}Edelman}, title = {RegColl: Centralized Registry Framework for Infrastructure System Management}, booktitle = {Proceedings of the 19th Conference on Systems Administration {(LISA} 2005), December 4-9, 2005, San Diego, California, {USA}}, pages = {73--82}, publisher = {{USENIX}}, year = {2005}, url = {http://www.usenix.org/events/lisa05/tech/kang.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lisa/KangST05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.