Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Dongil Hwang"'
Publikováno v:
IEEE Transactions on Mobile Computing. 22:708-719
Many mobile systems run on ARM-based devices today. People use these for increasingly diverse yet security-sensitive applications. ARM has adopted a security model to tackle this threat, where they manage private information in an isolated trusted ex
Autor:
Jiwon Seo, Inyoung Bang, Yungi Cho, Jangseop Shin, Dongil Hwang, Donghyun Kwon, Yeongpil Cho, Yunheung Paek
Publikováno v:
The Journal of Supercomputing. 79:1032-1064
Autor:
Hyunyoung Oh, Dongil Hwang, Maja Malenko, Myunghyun Cho, Hyungon Moon, Marcel Baunach, Yunheung Paek
Publikováno v:
2022 Design, Automation & Test in Europe Conference & Exhibition (DATE).
Publikováno v:
Electronics
Volume 10
Issue 17
Electronics, Vol 10, Iss 2068, p 2068 (2021)
Volume 10
Issue 17
Electronics, Vol 10, Iss 2068, p 2068 (2021)
The OS kernel is typically preassumed as a trusted computing base in most computing systems. However, it also implies that once an attacker takes control of the OS kernel, the attacker can seize the entire system. Because of such security importance
Publikováno v:
ACM Transactions on Design Automation of Electronic Systems. 22:1-25
The ARM CoreSight Program Trace Macrocell (PTM) has been widely deployed in recent ARM processors for real-time debugging and tracing of software. Using PTM, the external debugger can extract execution behaviors of applications running on an ARM proc
Publikováno v:
ISOCC
The majority of embedded software is written in C/C++ language, which suffers from an abundance of memory vulnerabilities which open gate to attackers to infiltrate into the computer system. Multi-variant execution environment (MVEE) has been propose
Publikováno v:
DATE
The OS kernel is typically the assumed trusted computing base in a system. Consequently, when they try to protect the kernel, developers often build their solutions in a separate secure execution environment externally located and protected by specia
Publikováno v:
ISOCC
In this paper, we propose the design of a generic security interface for RISC-V. This interface increases flexibility of security modules by creating an environment that can operate independently on a host processor. We also present an application us
Autor:
Stijn Volckaert, Per Larsen, Seonhwa Jung, Yeoul Na, Hyungon Moon, Yunheung Paek, Brian Belleville, Dongil Hwang, Jangseop Shin, Joseph Nash, Michael Franz
Publikováno v:
Research in Attacks, Intrusions, and Defenses ISBN: 9783030004699
RAID
RAID
Data-oriented attacks are gaining traction thanks to advances in code-centric mitigation techniques for memory corruption vulnerabilities. Previous work on mitigating data-oriented attacks includes Data Space Randomization (DSR). DSR classifies progr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dadab7ca238aa3fa20911c4be638039a
https://doi.org/10.1007/978-3-030-00470-5_16
https://doi.org/10.1007/978-3-030-00470-5_16
Publikováno v:
HASP@ISCA
The kernel code injection is a common behavior of kernel -compromising attacks where the attackers aim to gain their goals by manipulating an OS kernel. Several security mechanisms have been proposed to mitigate such threats, but they all suffer from