Prime+ count: Novel cross-world covert channels on arm trustzone H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 55 | 2018 |
{In-Kernel}{Control-Flow} integrity on commodity {OSes} using {ARM} pointer authentication S Yoo, J Park, S Kim, Y Kim, T Kim 31st USENIX Security Symposium (USENIX Security 22), 89-106, 2022 | 30 | 2022 |
Exploiting uses of uninitialized stack variables in linux kernels to leak kernel pointers H Cho, J Park, J Kang, T Bao, R Wang, Y Shoshitaishvili, A Doupé, ... 14th USENIX Workshop on Offensive Technologies (WOOT 20), 2020 | 16 | 2020 |
Smokebomb: effective mitigation against cache side-channel attacks on the arm architecture H Cho, J Park, D Kim, Z Zhao, Y Shoshitaishvili, A Doupé, GJ Ahn Proceedings of the 18th International Conference on Mobile Systems …, 2020 | 12 | 2020 |
ViK: practical mitigation of temporal memory safety violations through object ID inspection H Cho, J Park, A Oest, T Bao, R Wang, Y Shoshitaishvili, A Doupé, ... Proceedings of the 27th ACM International Conference on Architectural …, 2022 | 7 | 2022 |
An efficient kernel introspection system using a secure timer on trustzone J Kim, D Kim, J Park, J Kim, H Kim Journal of The Korea Institute of Information Security & Cryptology 25 (4 …, 2015 | 4 | 2015 |
A Snoop-Based Kernel Introspection System against Address Translation Redirection Attack D Kim, J Kim, J Park, J Kim Journal of the Korea Institute of Information Security & Cryptology 26 (5 …, 2016 | | 2016 |