Zobrazeno 1 - 10
of 54
pro vyhledávání: '"Brent ByungHoon Kang"'
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-22 (2024)
Abstract While container adoption has witnessed significant growth in facilitating the operation of large-scale applications, this increased attention has also attracted adversaries who exploit numerous vulnerabilities present in contemporary contain
Externí odkaz:
https://doaj.org/article/8ce914413d3b44fab7e348d6840e7a3b
Publikováno v:
IEEE Access, Vol 9, Pp 142449-142460 (2021)
There are many challenges in measuring capacity using metrics such as transactions per minute (TPM) and operation per second (OPS) for all server hardware, which are becoming increasingly obsolete due to the shortening of the lifecycle of hardware an
Externí odkaz:
https://doaj.org/article/14e32aa3eb0f46df9ae57cf62c4adfdc
Publikováno v:
IEEE Access, Vol 8, Pp 50531-50542 (2020)
Control flow integrity (CFI) is a generic technique that prevents a control flow hijacking attacks by verifying the legitimacy of indirect branches against a predefined set of targets. State-of-the-art CFI solutions focus on reducing the number of ta
Externí odkaz:
https://doaj.org/article/6b51d620ebb84547aad5bdbf9c0ec96c
Publikováno v:
IEEE Access, Vol 8, Pp 18808-18821 (2020)
Malware has been installed through drive-by downloads via exploit kit attacks. However, the prior signature- or dynamic-based detection approach to the continuously increasing number of suspicious samples is time-consuming. In such circumstances, con
Externí odkaz:
https://doaj.org/article/d0680b0555e94e32b11816dd4424bc2d
Autor:
Jinsoo Jang, Brent Byunghoon Kang
Publikováno v:
IEEE Internet of Things Journal. 9:15814-15826
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:2559-2575
Stack-based memory corruption vulnerabilities have been exploited, allowing attackers to execute arbitrary code and read/write arbitrary memory. Although several solutions have been proposed to prevent memory errors on the stack, they are either limi
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. :1-18
Publikováno v:
IEEE Security & Privacy. 21:6-7
Autor:
Brent Byunghoon Kang, Jonghwan Kim, Minjoon Park, Daehee Jang, Minsu Kim, Yunjong Jung, Hojoon Lee
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 18:2237-2252
Heap randomization, in general, has been a well-trodden area; however, the efficacy of byte-granularity randomization has never been fully explored as misalignment raises various concerns. Modern heap exploits often abuse the determinism in word alig
Autor:
Daegyeong Kim, Wonwoo Choi, Chang-il Lim, Eunjin Kim, Geonwoo Kim, Yongho Song, Junsu Lee, Youngkwang Han, Hojoon Lee, Brent Byunghoon Kang
Publikováno v:
Simulation Modelling Practice and Theory. 125:102743