Παρακολούθηση
Daehee Jang
Daehee Jang
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα gatech.edu - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Processing optimization and functional properties of gelatin from shark (Isurus oxyrinchus) cartilage
SM Cho, KS Kwak, DC Park, YS Gu, CI Ji, DH Jang, YB Lee, SB Kim
Food hydrocolloids 18 (4), 573-579, 2004
3102004
Ki-mon arm: A hardware-assisted event-triggered monitoring platform for mutable kernel object
H Lee, H Moon, I Heo, D Jang, J Jang, K Kim, Y Paek, BB Kang
IEEE Transactions on Dependable and Secure Computing 16 (2), 287-300, 2017
1262017
Fuzzing javascript engines with aspect-preserving mutation
S Park, W Xu, I Yun, D Jang, T Kim
2020 IEEE Symposium on Security and Privacy (SP), 1629-1642, 2020
1122020
Atra: Address translation redirection attack against hardware-based external monitors
D Jang, H Lee, M Kim, D Kim, D Kim, BB Kang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
622014
Preventing {Use-After-Free} Attacks with Fast Forward Allocation
B Wickman, H Hu, I Yun, D Jang, JW Lim, S Kashyap, T Kim
30th USENIX Security Symposium (USENIX Security 21), 2453-2470, 2021
392021
SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure
D Kim, D Jang, M Park, Y Jeong, J Kim, S Choi, BB Kang
computers & security 82, 118-139, 2019
212019
Rethinking anti-emulation techniques for large-scale software deployment
D Jang, Y Jeong, S Lee, M Park, K Kwak, D Kim, BB Kang
computers & security 83, 182-200, 2019
192019
Detection enhancement for various deepfake types based on residual noise and manipulation traces
J Kang, SK Ji, S Lee, D Jang, JU Hou
IEEE Access 10, 69031-69040, 2022
152022
Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions
VJM Manès, D Jang, C Ryu, BB Kang
computers & security 74, 130-143, 2018
122018
SoK: On the analysis of web browser security
J Lim, Y Jin, M Alharthi, X Zhang, J Jung, R Gupta, K Li, D Jang, T Kim
arXiv preprint arXiv:2112.15561, 2021
82021
EmuID: Detecting presence of emulation through microarchitectural characteristic on ARM
Y Choi, Y Jeong, D Jang, BB Kang, H Lee
Computers & Security 113, 102569, 2022
42022
Badaslr: Exceptional cases of ASLR aiding exploitation
D Jang
computers & security 112, 102510, 2022
42022
Polar: Per-allocation object layout randomization
J Kim, D Jang, Y Jeong, BB Kang
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
42019
S-OpenSGX: A system-level platform for exploring SGX enclave-based computing
C Choi, N Kwak, J Jang, D Jang, K Oh, K Kwag, BB Kang
computers & security 70, 290-306, 2017
42017
Effective memory diversification in legacy systems
D Jang, H Yun
International journal of electrical and computer engineering systems 14 (3 …, 2023
22023
Fuzzing@ home: Distributed fuzzing on untrusted heterogeneous clients
D Jang, A Askar, I Yun, S Tong, Y Cai, T Kim
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
22022
Scheduler-based Defense Method against Address Translation Redirection Attack (ATRA)
D Jang, J Jang, D Kim, C Choi, BB Kang
Journal of The Korea Institute of Information Security & Cryptology 25 (4 …, 2015
22015
Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors
I Heo, D Jang, H Moon, H Cho, S Lee, BB Kang, Y Paek
JSTS: Journal of Semiconductor Technology and Science 15 (1), 48-59, 2015
22015
On the Analysis of Coverage Feedback in a Fuzzing Proprietary System
D Jang, J Kim, J Kim, W Im, M Jeong, B Choi, C Kil
Applied Sciences 14 (13), 5939, 2024
12024
Fuzzability Testing Framework for Incomplete Firmware Binary
J Jang, G Son, H Lee, H Yun, D Kim, S Lee, S Kim, D Jang
IEEE Access, 2023
12023
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20