Brent ByungHoon Kang
Orcid: 0000-0001-8984-1006Affiliations:
- KAIST, Graduate School of Information Security, Daejeon, South Korea
- George Mason University, Fairfax, VA, USA (former)
- University of California at Berkeley, CA, USA (PhD)
According to our database1,
Brent ByungHoon Kang
authored at least 70 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
2025
0
1
2
3
4
5
6
7
8
9
10
4
1
1
4
3
3
3
3
6
5
3
2
1
1
1
2
1
2
3
4
1
1
1
3
1
1
1
2
2
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Discriminator to grade classification results of neural networks via Prediction Error Tracking Method.
Knowl. Based Syst., 2025
2024
Optimus: association-based dynamic system call filtering for container attack surface reduction.
J. Cloud Comput., December, 2024
Comput. Secur., January, 2024
BankTweak: Adversarial Attack against Multi-Object Trackers by Manipulating Feature Banks.
CoRR, 2024
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
Interstellar: Fully Partitioned and Efficient Security Monitoring Hardware Near a Processor Core for Protecting Systems against Attacks on Privileged Software.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Simul. Model. Pract. Theory, May, 2023
IEEE Trans. Dependable Secur. Comput., 2023
EnclaveVPN: Toward Optimized Utilization of Enclave Page Cache and Practical Performance of Data Plane for Security-Enhanced Cloud VPN.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
3rdParTEE: Securing Third-Party IoT Services Using the Trusted Execution Environment.
IEEE Internet Things J., 2022
EmuID: Detecting presence of emulation through microarchitectural characteristic on ARM.
Comput. Secur., 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
AI-HydRa: Advanced hybrid approach using random forest and deep learning for malware classification.
Inf. Sci., 2021
Quantitative Server Sizing Model for Performance Satisfaction in Secure U2L Migration.
IEEE Access, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
The Image Game: Exploit Kit Detection Based on Recursive Convolutional Neural Networks.
IEEE Access, 2020
Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020
2019
KI-Mon ARM: A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object.
IEEE Trans. Dependable Secur. Comput., 2019
Comput. Secur., 2019
Comput. Secur., 2019
Comput. Secur., 2019
Comput. Networks, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
Comput. Secur., 2018
A dynamic per-context verification of kernel address integrity from external monitors.
Comput. Secur., 2018
Comput. Secur., 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the Web Services - ICWS 2018, 2018
Proceedings of the 55th Annual Design Automation Conference, 2018
Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEEE Trans. Dependable Secur. Comput., 2017
Invi-server: Reducing the attack surfaces by making protected server invisible on networks.
Comput. Secur., 2017
Comput. Secur., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
2016
Secur. Commun. Networks, 2016
On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators.
Comput. Secur., 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
2015
Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines.
ACM Trans. Design Autom. Electr. Syst., 2015
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
ATRA: Address Translation Redirection Attack against Hardware-based External Monitors.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
CoRR, 2011
2010
Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure.
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010
2009
Proceedings of the Advances in Information and Intelligent Systems, 2009
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Proceedings of the 22nd Large Installation System Administration Conference, 2008
Proceedings of the CEAS 2008, 2008
2007
Proceedings of the First Workshop on Hot Topics in Understanding Botnets, 2007
Proceedings of the 21th Large Installation System Administration Conference, 2007
2006
Proceedings of the 20th Conference on Systems Administration (LISA 2006), 2006
2005
Proceedings of the 19th Conference on Systems Administration (LISA 2005), 2005