Hojoon Lee

Orcid: 0000-0001-5344-6266

Affiliations:
  • Sungkyunkwan University, Department of Computer Science and Engineering, South Korea
  • Korea Advanced Institute of Science and Technology, Daejeon, South Korea (PhD 2018)


According to our database1, Hojoon Lee authored at least 22 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
RustSan: Retrofitting AddressSanitizer for Efficient Sanitization of Rust.
Proceedings of the 33rd USENIX Security Symposium, 2024

GENESIS: A Generalizable, Efficient, and Secure Intra-kernel Privilege Separation.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

(In)visible Privacy Indicator: Security Analysis of Privacy Indicator on Android Devices.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Towards scalable and configurable simulation for disaggregated architecture.
Simul. Model. Pract. Theory, May, 2023

Harnessing the x86 Intermediate Rings for Intra-Process Isolation.
IEEE Trans. Dependable Secur. Comput., 2023

DID We Miss Anything?: Towards Privacy-Preserving Decentralized ID Architecture.
IEEE Trans. Dependable Secur. Comput., 2023

SE-PIM: In-Memory Acceleration of Data-Intensive Confidential Computing.
IEEE Trans. Cloud Comput., 2023

Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM Architectures (Extended Version).
CoRR, 2023

Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM Architectures.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
EmuID: Detecting presence of emulation through microarchitectural characteristic on ARM.
Comput. Secur., 2022

A Comprehensive Analysis of Today's Malware and Its Distribution Network: Common Adversary Strategies and Implications.
IEEE Access, 2022

2021
On the Analysis of Byte-Granularity Heap Randomization.
IEEE Trans. Dependable Secur. Comput., 2021

PIM-Enclave: Bringing Confidential Computation Inside Memory.
CoRR, 2021

Confidential Machine Learning Computation in Untrusted Environments: A Systems Security Perspective.
IEEE Access, 2021

2019
KI-Mon ARM: A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object.
IEEE Trans. Dependable Secur. Comput., 2019

2018
RUMA: On the Analysis of Defenses based on Misaligned Accesses.
CoRR, 2018

A dynamic per-context verification of kernel address integrity from external monitors.
Comput. Secur., 2018

Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping.
IEEE Trans. Dependable Secur. Comput., 2017

2014
ATRA: Address Translation Redirection Attack against Hardware-based External Monitors.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
Vigilare: toward snoop-based kernel integrity monitor.
Proceedings of the ACM Conference on Computer and Communications Security, 2012


  Loading...