Brent ByungHoon Kang
Brent ByungHoon Kang
Graduate School of Information Security, KAIST (Korea Advanced Institute of Science and Technology)
Verified email at kaist.ac.kr - Homepage
Title
Cited by
Cited by
Year
Peer-to-Peer Botnets: Overview and Case Study.
JB Grizzard, V Sharma, C Nunnery, BBH Kang, D Dagon
HotBots 7 (2007), 2007
5752007
Rosemary: A robust, secure, and high-performance network operating system
S Shin, Y Song, T Lee, S Lee, J Chung, P Porras, V Yegneswaran, J Noh, ...
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
2572014
Vigilare: toward snoop-based kernel integrity monitor
H Moon, H Lee, J Lee, K Kim, Y Paek, BB Kang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1032012
Vigilare: toward snoop-based kernel integrity monitor
BBK Hyungon Moon, Hojoon Lee, Jihoon Lee, Kihwan Kim, Yunheung Paek
Proceedings of the 2012 ACM Conference on Computer and Communications …, 2012
1032012
Hacking in darkness: Return-oriented programming against secure enclaves
J Lee, J Jang, Y Jang, N Kwak, Y Choi, C Choi, T Kim, M Peinado, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 523-539, 2017
992017
OpenSGX: An Open Platform for SGX Research.
P Jain, SJ Desai, MW Shih, T Kim, SM Kim, JH Lee, C Choi, Y Shin, ...
NDSS 16, 21-24, 2016
952016
Doubleguard: Detecting intrusions in multitier web applications
M Le, A Stavrou, BBH Kang
IEEE Transactions on dependable and secure computing 9 (4), 512-525, 2011
942011
The waledac protocol: The how and why
G Sinclair, C Nunnery, BBH Kang
2009 4th International Conference on Malicious and Unwanted Software …, 2009
852009
Ki-mon: A hardware-assisted event-triggered monitoring platform for mutable kernel object
H Lee, H Moon, D Jang, K Kim, J Lee, Y Paek, BBH Kang
22nd {USENIX} Security Symposium ({USENIX} Security 13), 511-526, 2013
752013
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment.
JS Jang, S Kong, M Kim, D Kim, BB Kang
NDSS, 2015
732015
Towards complete node enumeration in a peer-to-peer botnet
BBH Kang, E Chan-Tin, CP Lee, J Tyra, HJ Kang, C Nunnery, Z Wadler, ...
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
702009
The hash history approach for reconciling mutual inconsistency
BBH Kang, R Wilensky, J Kubiatowicz
23rd International Conference on Distributed Computing Systems, 2003 …, 2003
602003
Network support for mobile multimedia using a self-adaptive distributed proxy
ZM Mao, HW So, B Kang
Proceedings of the 11th international workshop on Network and operating …, 2001
442001
Atra: Address translation redirection attack against hardware-based external monitors
D Jang, H Lee, M Kim, D Kim, D Kim, BB Kang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
402014
Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure.
C Nunnery, G Sinclair, BBH Kang
LEET, 2010
392010
Privatezone: Providing a private execution environment using arm trustzone
J Jang, C Choi, J Lee, N Kwak, S Lee, Y Choi, BB Kang
IEEE Transactions on Dependable and Secure Computing 15 (5), 797-810, 2016
222016
Vulnerabilities of network OS and mitigation with state‐based permission system
J Noh, S Lee, J Park, S Shin, BB Kang
Security and Communication Networks 9 (13), 1971-1982, 2016
192016
Implementing an application-specific instruction-set processor for system-level dynamic program analysis engines
I Heo, M Kim, Y Lee, C Choi, J Lee, BB Kang, Y Paek
ACM Transactions on Design Automation of Electronic Systems (TODAES) 20 (4 …, 2015
192015
RepuScore: Collaborative Reputation Management Framework for Email Infrastructure.
G Singaraju, BBH Kang
LISA 7, 243-251, 2007
182007
Malicious URL protection based on attackers' habitual behavioral analysis
S Kim, J Kim, BBH Kang
Computers & Security 77, 790-806, 2018
122018
The system can't perform the operation now. Try again later.
Articles 1–20