Young-joo Shin

Orcid: 0000-0003-4831-7392

According to our database1, Young-joo Shin authored at least 44 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Deep Learning-Based Detection for Multiple Cache Side-Channel Attacks.
IEEE Trans. Inf. Forensics Secur., 2024

POSTER: On the Feasibility of Inferring SGX Execution through PMU.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Fuzzing of Embedded Systems: A Survey.
ACM Comput. Surv., 2023

MicroCFI: Microarchitecture-Level Control-Flow Restrictions for Spectre Mitigation.
IEEE Access, 2023

Exploiting Memory Page Management in KSM for Remote Memory Deduplication Attack.
Proceedings of the Information Security Applications - 24th International Conference, 2023

DevIOus: Device-Driven Side-Channel Attacks on the IOMMU.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
ThermalBleed: A Practical Thermal Side-Channel Attack.
IEEE Access, 2022

A Performance Evaluation of IPsec with Post-Quantum Cryptography.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

Avengers, Assemble! Survey of WebAssembly Security Solutions.
Proceedings of the IEEE 15th International Conference on Cloud Computing, 2022

2021
DCUIP Poisoning Attack in Intel x86 Processors.
IEICE Trans. Inf. Syst., 2021

Runtime Randomized Relocation of Crypto Libraries for Mitigating Cache Attacks.
IEEE Access, 2021

Multibyte Microarchitectural Data Sampling and its Application to Session Key Extraction Attacks.
IEEE Access, 2021

Quantitative Analysis on Attack Capacity in Meltdown-Type Attacks.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

Constructing Covert Channel on Intel CPU-iGPU platform.
Proceedings of the International Conference on Information Networking, 2021

2020
Decentralized Server-Aided Encryption for Secure Deduplication in Cloud Storage.
IEEE Trans. Serv. Comput., 2020

Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments.
Secur. Commun. Networks, 2020

Inferring Firewall Rules by Cache Side-channel Analysis in Network Function Virtualization.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Software-based Random Number Generators for Resource Constrained Devices.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Cache Side-Channel Attack on Mail User Agent.
Proceedings of the 2020 International Conference on Information Networking, 2020

Return of version downgrade attack in the era of TLS 1.3.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

POSTER: Mitigating Memory Sharing-based Side-channel Attack by Embedding Random Values in Binary for Cloud Environment.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Cross-VM Cache Timing Attacks on Virtualized Network Functions.
IEICE Trans. Inf. Syst., 2019

Reinforcing Meltdown Attack by Using a Return Stack Buffer.
IEEE Access, 2019

FPGA reverse engineering in Vivado design suite based on X-ray project.
Proceedings of the 2019 International SoC Design Conference, 2019

Real-Time Detection on Cache Side Channel Attacks using Performance Counter Monitor.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

High Efficiency, Low-noise Meltdown Attack by using a Return Stack Buffer.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Privacy-Preserving and Updatable Block-Level Data Deduplication in Cloud Storage Services.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Secure proof of storage with deduplication for cloud storage systems.
Multim. Tools Appl., 2017

CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware.
IEICE Trans. Inf. Syst., 2017

An efficient stream cipher for resistive RAM.
IEICE Electron. Express, 2017

A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems.
ACM Comput. Surv., 2017

An Online Data-Oriented Authentication Based on Merkle Tree with Improved Reliability.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

2016
Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage.
IEEE Trans. Knowl. Data Eng., 2016

SEED: Enabling Serverless and Efficient Encrypted Deduplication for Cloud Storage.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

2015
Differentially private client-side data deduplication protocol for cloud storage services.
Secur. Commun. Networks, 2015

2014
Efficient and Secure File Deduplication in Cloud Storage.
IEICE Trans. Inf. Syst., 2014

2012
Scalable and efficient approach for secure group communication using proxy cryptography.
Wirel. Networks, 2012

Security weakness in the Proof of Storage with Deduplication.
IACR Cryptol. ePrint Arch., 2012

2011
MiGuard : Detecting and Guarding against Malicious Iframe through API Hooking.
IEICE Electron. Express, 2011

2007
Decentralized group key management for dynamic networks using proxy cryptography.
Proceedings of the Q2SWinet'07, 2007

An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

2006
Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs.
Proceedings of the Information Security Applications, 7th International Workshop, 2006


  Loading...