[HW Security] RiskiM: Towards Complete Kernel Protection with Hardware Support, DATE, Mar 2019

RiskiM: Towards Complete Kernel Protection with Hardware Support, DATE, Mar 2019

Dongil Hwang, Donghyun Kwon, Myonghoon Yang, Seongil Jeon, Younghan Lee and Yunheung Paek

0
0

International Papers

SW Security ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks, ACM Conference on Computer and Communications Security (CCS), Oct 2015
SW Security Cross-checking Semantic Correctness: The Case of Finding File System Bugs, ACM Symposium on Operating Systems Principles (SOSP), Oct 2015
HW Security Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines, ACM Transactions on Design Automation of Electronic Systems (TODAES), Sep 2015
SW Security Type Casting Verification: Stopping an Emerging Attack Vector, Usenix Security Symposium (Security), August 2015
HW Security Accelerating Bootstrapping in FHEW using GPUs, The 26th IEEE International Conference on Application-specific Systems, Architectures and Processors, IEEE ASAP Conference, Jul 2015(Acceptance rate: 24.7%)
HW Security Towards a Practical Solution to Detect Code Reuse Attacks on ARM Mobile Devices, In Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP, Jun 2015
HW Security Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping, IEEE Transactions on Dependable and Secure Computing, Jun 2015
HW Security Efficient Dynamic Information Flow Tracking on a Processor with Core Debug Interface, Design Automation Conference (DAC), Jun 2015 (Acceptance rate: 20.5%)
SW Security Understanding Malvertising Through Ad-Injecting Browser Extensions, International Conference on World Wide Web (WWW), May 2015
Mobile Cloud Computing Precise Execution Offloading for Applications with Dynamic Behavior in Mobile Cloud Computing, Pervasive and Mobile Computing, Apr 2015
HW Security EXTRAX: Security Extention To Extract Cache Resident Information For Snoop-based External Monitors, Design Automation and Test in Europe Conference and Exhibition (DATE), Mar 2015 (Acceptance rate: 22.4%)
SW Security Preventing Use-after-free with Dangling Pointers Nullification, Network and Distributed System Security Symposium (NDSS), Feb 2015
HW Security Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors, Journal of Semiconductor Technology and Science, JSTS-2014-035.R1, Feb 2015
Mobile Cloud Computing Reduction of Media Servers Overload with Energy-Saving Adaptive Streaming, Global IT Conference, Jan 2015
Mobile Cloud Computing Techniques to Minimize State Transfer Costs for Dynamic Execution Offloading in Mobile Cloud Computing, IEEE Transactions on Mobile Computing, Nov 2014
Software Optimization and Reconstruction Modulo Scheduler Implementation for VLIW Processor, International SoC Design Conference (ISOCC) Nov 2014
Application Specific Architectures A Study of Burst Transfer Generation, The 9th KIPS International Conference on Ubiquitous Information Technologies and Applications(CUTE), 2014
HW Security CPU Security Extensions to Eliminate Cache Effect for Snoop-based Kernel Integrity Monitor, 51st IEEE/ACM Design Automation Conference, DAC WIP'14, Jun 2014
SW Security From Zygote to Morula: Fortifying weakened ASLR on Android, IEEE Symposium on Security and Privacy (Oakland), May 2014
Mobile Cloud Computing CMcloud: Cloud Platform for Cost-Effective Offloading of Mobile Applications , 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2014 (Acceptance rate: 19%)