[SW Security] Safe and Efficient Implementation of Security System on ARM using Intra-Level Privilege Separation, ACM Transactions on Privacy and Security, Feb 2019

Safe and Efficient Implementation of a Security System on ARM using Intra-level Privilege Separation. ACM Trans. Priv. Secur. 22, 2, Article 10 (February 2019), 30 pages

Donghyun Kwon, Hayoon Yi, Yeongpil Cho, and Yunheung Paek

0
0

International Papers

SW Security Instant OS Updates via Userspace Checkpoint-and-Restart, USENIX Annual Technical Conference (ATC), June 2016
SW Security Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices, USENIX Annual Technical Conference(ATC), Jun 2016 (Acceptance rate: 19%)
SW Security TrackMeOrNot: Enabling Flexible Control on Web Tracking, International Conference on World Wide Web (WWW), April 2016
SW Security Enforcing Kernel Security Invariants with Data Flow Integrity, Network and Distributed System Security Symposium (NDSS), Feb 2016
SW Security ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks, ACM Conference on Computer and Communications Security (CCS), Oct 2015
SW Security Cross-checking Semantic Correctness: The Case of Finding File System Bugs, ACM Symposium on Operating Systems Principles (SOSP), Oct 2015
SW Security Type Casting Verification: Stopping an Emerging Attack Vector, Usenix Security Symposium (Security), August 2015
SW Security Understanding Malvertising Through Ad-Injecting Browser Extensions, International Conference on World Wide Web (WWW), May 2015
SW Security Preventing Use-after-free with Dangling Pointers Nullification, Network and Distributed System Security Symposium (NDSS), Feb 2015
SW Security From Zygote to Morula: Fortifying weakened ASLR on Android, IEEE Symposium on Security and Privacy (Oakland), May 2014
SW Security Protecting Location Privacy Using Location Semantics, ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), August 2011
SW Security binOb+: A Framework for Potent and Stealthy Binary Obfuscation, ACM Symposium on Information, Computer and Communications Security (ASIACCS), April 2010