Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Hyungon Moon"'
Publikováno v:
IEEE Access, Vol 11, Pp 62358-62367 (2023)
An operating system kernel has the highest privilege in most computer systems, making its code integrity critical to the entire system’s security. Failure to protect the kernel code integrity allows an attacker to modify the kernel code pages direc
Externí odkaz:
https://doaj.org/article/d3418bc032bb447f9166aaf2da9f4cbd
Publikováno v:
IEEE Transactions on Mobile Computing. 22:708-719
Many mobile systems run on ARM-based devices today. People use these for increasingly diverse yet security-sensitive applications. ARM has adopted a security model to tackle this threat, where they manage private information in an isolated trusted ex
Publikováno v:
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design.
Autor:
Hyunyoung Oh, Dongil Hwang, Maja Malenko, Myunghyun Cho, Hyungon Moon, Marcel Baunach, Yunheung Paek
Publikováno v:
2022 Design, Automation & Test in Europe Conference & Exhibition (DATE).
Publikováno v:
Computer Security – ESORICS 2022 ISBN: 9783031171420
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b06e7663390e1b2618387da4daf3f671
https://doi.org/10.1007/978-3-031-17143-7_18
https://doi.org/10.1007/978-3-031-17143-7_18
Autor:
Brent Byunghoon Kang, Hyungon Moon, Yunheung Paek, Ingoo Heo, Kihwan Kim, Jinsoo Jang, Hojoon Lee, Daehee Jang
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 16:287-300
External hardware-based kernel integrity monitors have been proposed to mitigate kernel-level malwares. However, the existing external approaches have been limited to monitoring the static regions of kernel while the latest rootkits manipulate the dy
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 14:145-157
To protect the integrity of operating system kernels, we present Vigilare system , a kernel integrity monitor that is architected to snoop the bus traffic of the host system from a separate independent hardware. This snoop-based monitoring enabled by
Publikováno v:
IEEE Symposium on Security and Privacy
File systems, a basic building block of an OS, are too big and too complex to be bug free. Nevertheless, file systems rely on regular stress-testing tools and formal checkers to find bugs, which are limited due to the ever-increasing complexity of bo
Autor:
Stijn Volckaert, Per Larsen, Seonhwa Jung, Yeoul Na, Hyungon Moon, Yunheung Paek, Brian Belleville, Dongil Hwang, Jangseop Shin, Joseph Nash, Michael Franz
Publikováno v:
Research in Attacks, Intrusions, and Defenses ISBN: 9783030004699
RAID
RAID
Data-oriented attacks are gaining traction thanks to advances in code-centric mitigation techniques for memory corruption vulnerabilities. Previous work on mitigating data-oriented attacks includes Data Space Randomization (DSR). DSR classifies progr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dadab7ca238aa3fa20911c4be638039a
https://doi.org/10.1007/978-3-030-00470-5_16
https://doi.org/10.1007/978-3-030-00470-5_16
Autor:
Yunheung Paek, Hyungon Moon, Seung-Wook Lee, Hansu Cho, Ingoo Heo, Daehee Jang, Brent Byunghoon Kang
Publikováno v:
JSTS:Journal of Semiconductor Technology and Science. 15:48-59
In recent years, there are increasing threats of rootkits that undermine the integrity of a system by manipulating OS kernel. To cope with the rootkits, in Vigilare, the snoop-based monitoring which snoops the memory traffics of the host system was p