Processing optimization and functional properties of gelatin from shark (Isurus oxyrinchus) cartilage SM Cho, KS Kwak, DC Park, YS Gu, CI Ji, DH Jang, YB Lee, SB Kim Food hydrocolloids 18 (4), 573-579, 2004 | 310 | 2004 |
Ki-mon arm: A hardware-assisted event-triggered monitoring platform for mutable kernel object H Lee, H Moon, I Heo, D Jang, J Jang, K Kim, Y Paek, BB Kang IEEE Transactions on Dependable and Secure Computing 16 (2), 287-300, 2017 | 126 | 2017 |
Fuzzing javascript engines with aspect-preserving mutation S Park, W Xu, I Yun, D Jang, T Kim 2020 IEEE Symposium on Security and Privacy (SP), 1629-1642, 2020 | 112 | 2020 |
Atra: Address translation redirection attack against hardware-based external monitors D Jang, H Lee, M Kim, D Kim, D Kim, BB Kang Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 62 | 2014 |
Preventing {Use-After-Free} Attacks with Fast Forward Allocation B Wickman, H Hu, I Yun, D Jang, JW Lim, S Kashyap, T Kim 30th USENIX Security Symposium (USENIX Security 21), 2453-2470, 2021 | 39 | 2021 |
SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure D Kim, D Jang, M Park, Y Jeong, J Kim, S Choi, BB Kang computers & security 82, 118-139, 2019 | 21 | 2019 |
Rethinking anti-emulation techniques for large-scale software deployment D Jang, Y Jeong, S Lee, M Park, K Kwak, D Kim, BB Kang computers & security 83, 182-200, 2019 | 19 | 2019 |
Detection enhancement for various deepfake types based on residual noise and manipulation traces J Kang, SK Ji, S Lee, D Jang, JU Hou IEEE Access 10, 69031-69040, 2022 | 15 | 2022 |
Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions VJM Manès, D Jang, C Ryu, BB Kang computers & security 74, 130-143, 2018 | 12 | 2018 |
SoK: On the analysis of web browser security J Lim, Y Jin, M Alharthi, X Zhang, J Jung, R Gupta, K Li, D Jang, T Kim arXiv preprint arXiv:2112.15561, 2021 | 8 | 2021 |
EmuID: Detecting presence of emulation through microarchitectural characteristic on ARM Y Choi, Y Jeong, D Jang, BB Kang, H Lee Computers & Security 113, 102569, 2022 | 4 | 2022 |
Badaslr: Exceptional cases of ASLR aiding exploitation D Jang computers & security 112, 102510, 2022 | 4 | 2022 |
Polar: Per-allocation object layout randomization J Kim, D Jang, Y Jeong, BB Kang 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019 | 4 | 2019 |
S-OpenSGX: A system-level platform for exploring SGX enclave-based computing C Choi, N Kwak, J Jang, D Jang, K Oh, K Kwag, BB Kang computers & security 70, 290-306, 2017 | 4 | 2017 |
Effective memory diversification in legacy systems D Jang, H Yun International journal of electrical and computer engineering systems 14 (3 …, 2023 | 2 | 2023 |
Fuzzing@ home: Distributed fuzzing on untrusted heterogeneous clients D Jang, A Askar, I Yun, S Tong, Y Cai, T Kim Proceedings of the 25th International Symposium on Research in Attacks …, 2022 | 2 | 2022 |
Scheduler-based Defense Method against Address Translation Redirection Attack (ATRA) D Jang, J Jang, D Kim, C Choi, BB Kang Journal of The Korea Institute of Information Security & Cryptology 25 (4 …, 2015 | 2 | 2015 |
Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors I Heo, D Jang, H Moon, H Cho, S Lee, BB Kang, Y Paek JSTS: Journal of Semiconductor Technology and Science 15 (1), 48-59, 2015 | 2 | 2015 |
On the Analysis of Coverage Feedback in a Fuzzing Proprietary System D Jang, J Kim, J Kim, W Im, M Jeong, B Choi, C Kil Applied Sciences 14 (13), 5939, 2024 | 1 | 2024 |
Fuzzability Testing Framework for Incomplete Firmware Binary J Jang, G Son, H Lee, H Yun, D Kim, S Lee, S Kim, D Jang IEEE Access, 2023 | 1 | 2023 |