[SW Security] binOb+: A Framework for Potent and Stealthy Binary Obfuscation, ACM Symposium on Information, Computer and Communications Security (ASIACCS), April 2010

binOb+: A Framework for Potent and Stealthy Binary Obfuscation, Byoungyoung Lee, Yuna Kim, and Jong Kim, ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2010

0
0

International Papers

HW Security Towards a Practical Solution to Detect Code Reuse Attacks on ARM Mobile Devices, In Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP, Jun 2015
HW Security Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping, IEEE Transactions on Dependable and Secure Computing, Jun 2015
HW Security Efficient Dynamic Information Flow Tracking on a Processor with Core Debug Interface, Design Automation Conference (DAC), Jun 2015 (Acceptance rate: 20.5%)
SW Security Understanding Malvertising Through Ad-Injecting Browser Extensions, International Conference on World Wide Web (WWW), May 2015
Mobile Cloud Computing Precise Execution Offloading for Applications with Dynamic Behavior in Mobile Cloud Computing, Pervasive and Mobile Computing, Apr 2015
HW Security EXTRAX: Security Extention To Extract Cache Resident Information For Snoop-based External Monitors, Design Automation and Test in Europe Conference and Exhibition (DATE), Mar 2015 (Acceptance rate: 22.4%)
SW Security Preventing Use-after-free with Dangling Pointers Nullification, Network and Distributed System Security Symposium (NDSS), Feb 2015
HW Security Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors, Journal of Semiconductor Technology and Science, JSTS-2014-035.R1, Feb 2015
Mobile Cloud Computing Reduction of Media Servers Overload with Energy-Saving Adaptive Streaming, Global IT Conference, Jan 2015
Mobile Cloud Computing Techniques to Minimize State Transfer Costs for Dynamic Execution Offloading in Mobile Cloud Computing, IEEE Transactions on Mobile Computing, Nov 2014
Software Optimization and Reconstruction Modulo Scheduler Implementation for VLIW Processor, International SoC Design Conference (ISOCC) Nov 2014
Application Specific Architectures A Study of Burst Transfer Generation, The 9th KIPS International Conference on Ubiquitous Information Technologies and Applications(CUTE), 2014
HW Security CPU Security Extensions to Eliminate Cache Effect for Snoop-based Kernel Integrity Monitor, 51st IEEE/ACM Design Automation Conference, DAC WIP'14, Jun 2014
SW Security From Zygote to Morula: Fortifying weakened ASLR on Android, IEEE Symposium on Security and Privacy (Oakland), May 2014
Mobile Cloud Computing CMcloud: Cloud Platform for Cost-Effective Offloading of Mobile Applications , 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2014 (Acceptance rate: 19%)
Application Specific Architectures Improving Performance of Loops on DIAM-based VLIW Architecture, Proceedings of the 2014 SIGPLAN/SIGBED Conference on Languages, Compilers and Tools for Embedded Systems(LCTES), May 2014
Application Specific Architectures Selective Validations for Efficient Protections on Coarse-Grained Reconfigurable Architectures, Proceedings of the 24th IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP), Jun 2013 (Acceptance rate: 19.2%)
Application Specific Architectures Architecture Customization of On-chip Reconfigurable Accelerators, ACM Transactions on Design Automation of Electronic Systems (TODAES), Oct 2013
HW Security KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object. , 22nd USENIX Security Symposium, Aug 2013 (Acceptance rate: 15.9%)
Application Specific Architectures Efficient Utilization of Burst Data Transfers of DMA, IEMEK Journal of Embedded Systems and Applications 8 (5), 255-264, Aug 2013