default search action
Brent ByungHoon Kang
Person information
- affiliation: KAIST, Graduate School of Information Security, Daejeon, South Korea
- affiliation (former): George Mason University, Fairfax, VA, USA
- affiliation (PhD): University of California at Berkeley, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Wonwoo Choi, Minjae Seo, Seongman Lee, Brent ByungHoon Kang:
SuM: Efficient shadow stack protection on ARM Cortex-M. Comput. Secur. 136: 103568 (2024) - [j30]Seungyong Yang, Brent ByungHoon Kang, Jaehyun Nam:
Optimus: association-based dynamic system call filtering for container attack surface reduction. J. Cloud Comput. 13(1): 71 (2024) - [c29]Yongho Song, Byeongsu Woo, Youngkwang Han, Brent ByungHoon Kang:
Interstellar: Fully Partitioned and Efficient Security Monitoring Hardware Near a Processor Core for Protecting Systems against Attacks on Privileged Software. CCS 2024: 198-212 - [c28]Seongman Lee, Seoye Kim, Chihyun Song, Byeongsu Woo, Eunyeong Ahn, Junsu Lee, Yeongjin Jang, Jinsoo Jang, Hojoon Lee, Brent ByungHoon Kang:
GENESIS: A Generalizable, Efficient, and Secure Intra-kernel Privilege Separation. SAC 2024: 1366-1375 - [i5]Donghwa Kang, Youngmoon Lee, Eun-Kyu Lee, Brent ByungHoon Kang, Jinkyu Lee, Hyeongboo Baek:
AT-SNN: Adaptive Tokens for Vision Transformer on Spiking Neural Network. CoRR abs/2408.12293 (2024) - [i4]Woojin Shin, Donghwa Kang, Daejin Choi, Brent ByungHoon Kang, Jinkyu Lee, Hyeongboo Baek:
BankTweak: Adversarial Attack against Multi-Object Trackers by Manipulating Feature Banks. CoRR abs/2408.12727 (2024) - 2023
- [j29]Trent Jaeger, Brent ByungHoon Kang, Nele Mentens, Cynthia Sturton:
Impact of Emerging Hardware on Security and Privacy. IEEE Secur. Priv. 21(3): 6-7 (2023) - [j28]Daegyeong Kim, Wonwoo Choi, Chang-il Lim, Eunjin Kim, Geonwoo Kim, Yongho Song, Junsu Lee, Youngkwang Han, Hojoon Lee, Brent ByungHoon Kang:
Towards scalable and configurable simulation for disaggregated architecture. Simul. Model. Pract. Theory 125: 102743 (2023) - [j27]Hojoon Lee, Chihyun Song, Brent ByungHoon Kang:
Harnessing the x86 Intermediate Rings for Intra-Process Isolation. IEEE Trans. Dependable Secur. Comput. 20(4): 3251-3268 (2023) - [c27]Jaemin Park, Brent ByungHoon Kang:
EnclaveVPN: Toward Optimized Utilization of Enclave Page Cache and Practical Performance of Data Plane for Security-Enhanced Cloud VPN. RAID 2023: 397-411 - 2022
- [j26]Yeseul Choi, Yunjong Jeong, DaeHee Jang, Brent ByungHoon Kang, Hojoon Lee:
EmuID: Detecting presence of emulation through microarchitectural characteristic on ARM. Comput. Secur. 113: 102569 (2022) - [j25]Jinsoo Jang, Brent ByungHoon Kang:
3rdParTEE: Securing Third-Party IoT Services Using the Trusted Execution Environment. IEEE Internet Things J. 9(17): 15814-15826 (2022) - [j24]Seongman Lee, Hyeonwoo Kang, Jinsoo Jang, Brent ByungHoon Kang:
SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout. IEEE Trans. Dependable Secur. Comput. 19(4): 2559-2575 (2022) - 2021
- [j23]Hun Joe, Sungjin Kim, Brent ByungHoon Kang:
Quantitative Server Sizing Model for Performance Satisfaction in Secure U2L Migration. IEEE Access 9: 142449-142460 (2021) - [j22]Suyeon Yoo, Sungjin Kim, Seungjae Kim, Brent ByungHoon Kang:
AI-HydRa: Advanced hybrid approach using random forest and deep learning for malware classification. Inf. Sci. 546: 420-435 (2021) - [j21]DaeHee Jang, Jonghwan Kim, Hojoon Lee, Minjoon Park, Yunjong Jung, Minsu Kim, Brent ByungHoon Kang:
On the Analysis of Byte-Granularity Heap Randomization. IEEE Trans. Dependable Secur. Comput. 18(5): 2237-2252 (2021) - 2020
- [j20]Suyeon Yoo, Sungjin Kim, Brent ByungHoon Kang:
The Image Game: Exploit Kit Detection Based on Recursive Convolutional Neural Networks. IEEE Access 8: 18808-18821 (2020) - [j19]Dongjae Jung, Minsu Kim, Jinsoo Jang, Brent ByungHoon Kang:
Value-Based Constraint Control Flow Integrity. IEEE Access 8: 50531-50542 (2020) - [j18]Jinsoo Jang, Brent ByungHoon Kang:
Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection. IEEE Trans. Dependable Secur. Comput. 17(5): 1000-1014 (2020) - [c26]Jinsoo Jang, Brent ByungHoon Kang:
SelMon: reinforcing mobile device security with self-protected trust anchor. MobiSys 2020: 135-147 - [c25]Dokyung Song, Felicitas Hetzelt, Jonghwan Kim, Brent ByungHoon Kang, Jean-Pierre Seifert, Michael Franz:
Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints. USENIX Security Symposium 2020: 2541-2557
2010 – 2019
- 2019
- [j17]Jaehyun Park, Jaehee Ha, Brent ByungHoon Kang, Myungchul Kim:
MoHoP: A protocol providing for both mobility management and host privacy. Comput. Networks 148: 20-33 (2019) - [j16]Jaemin Park, Sungjin Park, Brent ByungHoon Kang, Kwangjo Kim:
eMotion: An SGX extension for migrating enclaves. Comput. Secur. 80: 173-185 (2019) - [j15]Deokjin Kim, DaeHee Jang, Minjoon Park, Yunjong Jeong, Jonghwan Kim, Seokjin Choi, Brent ByungHoon Kang:
SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure. Comput. Secur. 82: 118-139 (2019) - [j14]Jinsoo Jang, Brent ByungHoon Kang:
Securing a communication channel for the trusted execution environment. Comput. Secur. 83: 79-92 (2019) - [j13]DaeHee Jang, Yunjong Jeong, Sungman Lee, Minjoon Park, Kuenhwan Kwak, Donguk Kim, Brent ByungHoon Kang:
Rethinking anti-emulation techniques for large-scale software deployment. Comput. Secur. 83: 182-200 (2019) - [j12]Hojoon Lee, Hyungon Moon, Ingoo Heo, DaeHee Jang, Jinsoo Jang, Kihwan Kim, Yunheung Paek, Brent ByungHoon Kang:
KI-Mon ARM: A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object. IEEE Trans. Dependable Secur. Comput. 16(2): 287-300 (2019) - [c24]Jinsoo Jang, Brent ByungHoon Kang:
In-process Memory Isolation Using Hardware Watchpoint. DAC 2019: 32 - [c23]Jinsoo Jang, Brent ByungHoon Kang:
Revisiting the ARM Debug Facility for OS Kernel Security. DAC 2019: 110 - [c22]Jonghwan Kim, DaeHee Jang, Yunjong Jeong, Brent ByungHoon Kang:
POLaR: Per-Allocation Object Layout Randomization. DSN 2019: 505-516 - [e2]Brent ByungHoon Kang, Jin Soo Jang:
Information Security Applications - 19th International Conference, WISA 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11402, Springer 2019, ISBN 978-3-030-17981-6 [contents] - 2018
- [j11]Valentin J. M. Manès, DaeHee Jang, Chanho Ryu, Brent ByungHoon Kang:
Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions. Comput. Secur. 74: 130-143 (2018) - [j10]Sungjin Kim, Jinkook Kim, Brent ByungHoon Kang:
Malicious URL protection based on attackers' habitual behavioral analysis. Comput. Secur. 77: 790-806 (2018) - [j9]Hojoon Lee, Minsu Kim, Yunheung Paek, Brent ByungHoon Kang:
A dynamic per-context verification of kernel address integrity from external monitors. Comput. Secur. 77: 824-837 (2018) - [j8]Jin Soo Jang, Changho Choi, Jae-Hyuk Lee, Nohyun Kwak, Seongman Lee, Yeseul Choi, Brent ByungHoon Kang:
PrivateZone: Providing a Private Execution Environment Using ARM TrustZone. IEEE Trans. Dependable Secur. Comput. 15(5): 797-810 (2018) - [c21]Hojoon Lee, Chihyun Song, Brent ByungHoon Kang:
Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86. CCS 2018: 1441-1454 - [c20]Donghyun Kwon, Kuenwhee Oh, Junmo Park, Seungyong Yang, Yeongpil Cho, Brent ByungHoon Kang, Yunheung Paek:
Hypernel: a hardware-assisted framework for kernel protection without nested paging. DAC 2018: 34:1-34:6 - [c19]Feng Zhu, Youngtae Yun, Jinpeng Wei, Brent ByungHoon Kang, Yongzhi Wang, Daehyeok Kim, Peng Li, He Xu, Ruchuan Wang:
A Reflective Covert Channel Attack Anchored on Trusted Web Services. ICWS 2018: 84-99 - [c18]Sungjin Kim, Brent ByungHoon Kang:
FriSM: Malicious Exploit Kit Detection via Feature-Based String-Similarity Matching. SecureComm (1) 2018: 416-432 - [e1]Brent ByungHoon Kang, Taesoo Kim:
Information Security Applications - 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10763, Springer 2018, ISBN 978-3-319-93562-1 [contents] - [i3]Hojoon Lee, Chihyun Song, Brent ByungHoon Kang:
Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86. CoRR abs/1805.11912 (2018) - [i2]DaeHee Jang, Jongwhan Kim, Minjoon Park, Yunjong Jung, Minsu Kim, Hojoon Lee, Brent ByungHoon Kang:
RUMA: On the Analysis of Defenses based on Misaligned Accesses. CoRR abs/1807.01023 (2018) - 2017
- [j7]Jaehyun Park, Jiseong Noh, Myungchul Kim, Brent ByungHoon Kang:
Invi-server: Reducing the attack surfaces by making protected server invisible on networks. Comput. Secur. 67: 89-106 (2017) - [j6]Changho Choi, Nohyun Kwak, Jin Soo Jang, DaeHee Jang, Kuenwhee Oh, Kyungsoo Kwag, Brent ByungHoon Kang:
S-OpenSGX: A system-level platform for exploring SGX enclave-based computing. Comput. Secur. 70: 290-306 (2017) - [j5]Hyungon Moon, Hojoon Lee, Ingoo Heo, Kihwan Kim, Yunheung Paek, Brent ByungHoon Kang:
Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping. IEEE Trans. Dependable Secur. Comput. 14(2): 145-157 (2017) - [c17]Jae-Hyuk Lee, Jin Soo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, Brent ByungHoon Kang:
Hacking in Darkness: Return-oriented Programming against Secure Enclaves. USENIX Security Symposium 2017: 523-539 - 2016
- [j4]Yonggon Kim, Ohmin Kwon, Jin Soo Jang, Seongwook Jin, Hyeongboo Baek, Brent ByungHoon Kang, Hyunsoo Yoon:
On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators. Comput. Secur. 62: 33-48 (2016) - [j3]Jiseong Noh, Seunghyeon Lee, Jaehyun Park, Seungwon Shin, Brent ByungHoon Kang:
Vulnerabilities of network OS and mitigation with state-based permission system. Secur. Commun. Networks 9(13): 1971-1982 (2016) - [c16]Prerit Jain, Soham Jayesh Desai, Ming-Wei Shih, Taesoo Kim, Seong-Min Kim, Jae-Hyuk Lee, Changho Choi, Youjung Shin, Brent ByungHoon Kang, Dongsu Han:
OpenSGX: An Open Platform for SGX Research. NDSS 2016 - 2015
- [j2]Ingoo Heo, Minsu Kim, Yongje Lee, Changho Choi, Jinyong Lee, Brent ByungHoon Kang, Yunheung Paek:
Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines. ACM Trans. Design Autom. Electr. Syst. 20(4): 53:1-53:32 (2015) - [c15]Jin Soo Jang, Sunjune Kong, Minsu Kim, Daegyeong Kim, Brent ByungHoon Kang:
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment. NDSS 2015 - 2014
- [c14]Seungwon Shin, YongJoo Song, Taekyung Lee, Sangho Lee, Jaewoong Chung, Phillip A. Porras, Vinod Yegneswaran, Jiseong Noh, Brent ByungHoon Kang:
Rosemary: A Robust, Secure, and High-performance Network Operating System. CCS 2014: 78-89 - [c13]DaeHee Jang, Hojoon Lee, Minsu Kim, Daehyeok Kim, Daegyeong Kim, Brent ByungHoon Kang:
ATRA: Address Translation Redirection Attack against Hardware-based External Monitors. CCS 2014: 167-178 - [c12]Ala'a El Masri, Harry Wechsler, Peter Likarish, Brent ByungHoon Kang:
Identifying users with application-specific command streams. PST 2014: 232-238 - 2013
- [c11]Hojoon Lee, Hyungon Moon, DaeHee Jang, Kihwan Kim, Jihoon Lee, Yunheung Paek, Brent ByungHoon Kang:
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object. USENIX Security Symposium 2013: 511-526 - 2012
- [j1]Meixing Le, Angelos Stavrou, Brent ByungHoon Kang:
DoubleGuard: Detecting Intrusions in Multitier Web Applications. IEEE Trans. Dependable Secur. Comput. 9(4): 512-525 (2012) - [c10]Hyungon Moon, Hojoon Lee, Jihoon Lee, Kihwan Kim, Yunheung Paek, Brent ByungHoon Kang:
Vigilare: toward snoop-based kernel integrity monitor. CCS 2012: 28-37 - 2011
- [r4]Brent ByungHoon Kang:
DNS-Based Botnet Detection. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 362-363 - [r3]Brent ByungHoon Kang, Anurag Srivastava:
Dynamic Malware Analysis. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 367-368 - [r2]Brent ByungHoon Kang, Gautam Singaraju:
Spam Detection Using Network-Level Characteristics. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1231-1232 - [r1]Brent ByungHoon Kang, Greg Sinclair:
Unpacking Malware. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1350-1351 - [i1]DaeHun Nyang, Abedelaziz Mohaisen, Taekyoung Kwon, Brent ByungHoon Kang, Angelos Stavrou:
Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface. CoRR abs/1112.2245 (2011) - 2010
- [c9]Chris Nunnery, Greg Sinclair, Brent ByungHoon Kang:
Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure. LEET 2010
2000 – 2009
- 2009
- [c8]Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim:
Towards complete node enumeration in a peer-to-peer botnet. AsiaCCS 2009: 23-34 - [c7]Greg Sinclair, Chris Nunnery, Brent ByungHoon Kang:
The waledac protocol: The how and why. MALWARE 2009: 69-77 - [p1]Brent ByungHoon Kang, Chris Nunnery:
Decentralized Peer-to-Peer Botnet Architectures. Advances in Information and Intelligent Systems 2009: 251-264 - 2008
- [c6]Gautam Singaraju, Jeffrey Moss, Brent ByungHoon Kang:
Tracking Email Reputation for Authenticated Sender Identities. CEAS 2008 - [c5]Gautam Singaraju, Brent ByungHoon Kang:
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance. LISA 2008: 91-102 - 2007
- [c4]Gautam Singaraju, Brent ByungHoon Kang:
RepuScore: Collaborative Reputation Management Framework for Email Infrastructure. LISA 2007: 243-251 - [c3]Julian B. Grizzard, Vikram Sharma, Chris Nunnery, Brent ByungHoon Kang, David Dagon:
Peer-to-Peer Botnets: Overview and Case Study. HotBots 2007 - 2006
- [c2]Brent ByungHoon Kang, Gautam Singaraju, Sumeet Jain:
Privilege Messaging: An Authorization Framework over Email Infrastructure. LISA 2006: 1-16 - 2005
- [c1]Brent ByungHoon Kang, Vikram Sharma, Pratik Thanki:
RegColl: Centralized Registry Framework for Infrastructure System Management. LISA 2005: 73-82
Coauthor Index
aka: Jinsoo Jang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint