Wook Shin

According to our database1, Wook Shin authored at least 20 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code Pages.
Proceedings of the 33rd USENIX Security Symposium, 2024

2018
A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping.
Proceedings of the 27th USENIX Security Symposium, 2018

2013
A Description of the KCipher-2 Encryption Algorithm.
RFC, August, 2013

2011
AMY: Use your cell phone to create a protected personal network over devices.
IEEE Trans. Consumer Electron., 2011

2010
A Performance/Energy Analysis and Optimization of Multi-Core Architectures with Voltage Scaling Techniques.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

A Small But Non-negligible Flaw in the Android Permission Scheme.
Proceedings of the POLICY 2010, 2010

A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
How to Bootstrap Security for Ad-Hoc Network: Revisited.
Proceedings of the Emerging Challenges for Security, 2009

An Asymptotic Performance/Energy Analysis and Optimization of Multi-core Architectures.
Proceedings of the Distributed Computing and Networking, 10th International Conference, 2009

2008
PAS: A Wireless-Enabled, Cell-Phone-Incorporated Personal Assistant System for Independent and Assisted Living.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

2007
Enforcement of Integrated Security Policy in Trusted Operating Systems.
Proceedings of the Advances in Information and Computer Security, 2007

A Policy Language for the Extended Reference Monitor in Trusted Operating Systems.
Proceedings of the The Second International Conference on Availability, 2007

2006
I-Living: An Open System Architecture for Assisted Living.
Proceedings of the IEEE International Conference on Systems, 2006

Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems.
Proceedings of the Information Security Practice and Experience, 2006

Securing the drop-box architecture for assisted living.
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, 2006

2005
Extended Role Based Access Control with Procedural Constraints for Trusted Operating Systems.
IEICE Trans. Inf. Syst., 2005

Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

2003
Extended Role Based Access Control and Procedural Restrictions.
Proceedings of the Information Security and Cryptology, 2003

2001
Extended BLP Security Model Based on Process Reliability for Secure Linux Kernel.
Proceedings of the 8th Pacific Rim International Symposium on Dependable Computing (PRDC 2001), 2001


  Loading...