Zobrazeno 1 - 10
of 72
pro vyhledávání: '"Youngjoo Shin"'
Autor:
Hyerean Jang, Youngjoo Shin
Publikováno v:
IEEE Access, Vol 11, Pp 138699-138711 (2023)
Spectre attack exploits the vulnerability in speculative execution, an optimization technique for modern superscalar processors. Among the attack variants, Spectre-BTB and Spectre-RSB are the most threatening because they allow adversaries to execute
Externí odkaz:
https://doaj.org/article/45ab3ba1d10c443f8553dbf6743e7094
Autor:
Taehun Kim, Youngjoo Shin
Publikováno v:
IEEE Access, Vol 10, Pp 25718-25731 (2022)
Modern OSs expose an interface for monitoring CPU temperature to unprivileged users for effective user decision-based thermal management. Due to the low sampling rate and resolution, thermal sensors have generally been restricted to the construction
Externí odkaz:
https://doaj.org/article/eba30d2b04da4e169bba2435841c3a80
Autor:
Youngjoo Shin
Publikováno v:
IEEE Access, Vol 9, Pp 80806-80820 (2021)
Microarchitectural data sampling (MDS) attacks leak secret data from the internal buffers of a processor to the attacker during transient execution. Because of the narrow window of transient execution, previous MDS attacks relied on repetitive sampli
Externí odkaz:
https://doaj.org/article/91746c68772745c096da43b505e69c0e
Autor:
Youngjoo Shin, Joobeom Yun
Publikováno v:
IEEE Access, Vol 9, Pp 108851-108860 (2021)
Crypto libraries such as OpenSSL and Libgcrypt are essential building blocks for implementing secure cloud services. Unfortunately, these libraries are subject to cache side-channel attacks, which are more devastating in cloud environments where inev
Externí odkaz:
https://doaj.org/article/70dd293ae2f5413ca97b53b024eac5f5
Autor:
Taehyun Kim, Youngjoo Shin
Publikováno v:
IEEE Access, Vol 7, Pp 186065-186077 (2019)
Meltdown is a microarchitectural side-channel attack that extracts sensitive data in the kernel space of operating systems (OSs). Meltdown deliberately creates transient executions by exploiting an out-of-order execution technique and obtains the exe
Externí odkaz:
https://doaj.org/article/f13175b63eed4d1db7e1b475aac9a36a
Publikováno v:
Applied Sciences, Vol 10, Iss 11, p 3770 (2020)
Mail user agent (MUA) programs provide an integrated interface for email services. Many MUAs support email encryption functionality to ensure the confidentiality of emails. In practice, they encrypt the content of an email using email encryption stan
Externí odkaz:
https://doaj.org/article/c6658d6d404b468087432460a738fde6
Publikováno v:
Energies, Vol 13, Iss 6, p 1332 (2020)
Nowadays, various computing services are often hosted on cloud platforms for their availability and cost effectiveness. However, such services are frequently exposed to vulnerabilities. Therefore, many countermeasures have been invented to defend aga
Externí odkaz:
https://doaj.org/article/76d4e8583dff4b359444c3ce0d9bd14d
Publikováno v:
Applied Sciences, Vol 10, Iss 3, p 984 (2020)
Cache side channel attacks extract secret information by monitoring the cache behavior of a victim. Normally, this attack targets an L3 cache, which is shared between a spy and a victim. Hence, a spy can obtain secret information without alerting the
Externí odkaz:
https://doaj.org/article/9c4d6df1d730469d905c47b8c6a47e1e
Autor:
Youngjoo Shin
Publikováno v:
Applied Sciences, Vol 9, Iss 7, p 1294 (2019)
Remote code execution attacks against network devices become major challenges in securing networking environments. In this paper, we propose a detection framework against remote code execution attacks for closed source network devices using virtualiz
Externí odkaz:
https://doaj.org/article/0c46f40cdcf24db7a3e1eb3d67003475
Publikováno v:
Applied Sciences, Vol 8, Iss 12, p 2532 (2018)
With the successful proliferation of data outsourcing services, security and privacy issues have drawn significant attention. Data authentication in particular plays an essential role in the storage of outsourced digital content and keeping it safe f
Externí odkaz:
https://doaj.org/article/a319e4c157f64933901d2fc8ff1c38cb