Wook Shin
According to our database1,
Wook Shin
authored at least 20 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code Pages.
Proceedings of the 33rd USENIX Security Symposium, 2024
2018
Proceedings of the 27th USENIX Security Symposium, 2018
2013
2011
IEEE Trans. Consumer Electron., 2011
2010
A Performance/Energy Analysis and Optimization of Multi-Core Architectures with Voltage Scaling Techniques.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the POLICY 2010, 2010
A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework.
Proceedings of the 2010 International Conference on Security & Management, 2010
2009
Proceedings of the Emerging Challenges for Security, 2009
An Asymptotic Performance/Energy Analysis and Optimization of Multi-core Architectures.
Proceedings of the Distributed Computing and Networking, 10th International Conference, 2009
2008
PAS: A Wireless-Enabled, Cell-Phone-Incorporated Personal Assistant System for Independent and Assisted Living.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
2007
Proceedings of the Advances in Information and Computer Security, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the IEEE International Conference on Systems, 2006
Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems.
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, 2006
2005
Extended Role Based Access Control with Procedural Constraints for Trusted Operating Systems.
IEICE Trans. Inf. Syst., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
2003
Proceedings of the Information Security and Cryptology, 2003
2001
Proceedings of the 8th Pacific Rim International Symposium on Dependable Computing (PRDC 2001), 2001