Hacking in darkness: Return-oriented programming against secure enclaves J Lee, J Jang, Y Jang, N Kwak, Y Choi, C Choi, T Kim, M Peinado, ... 26th USENIX Security Symposium (USENIX Security 17), 523-539, 2017 | 205 | 2017 |
SGX-Bomb: Locking down the processor via Rowhammer attack Y Jang, J Lee, S Lee, T Kim Proceedings of the 2nd Workshop on System Software for Trusted Execution, 1-6, 2017 | 161 | 2017 |
OpenSGX: An Open Platform for SGX Research. P Jain, SJ Desai, MW Shih, T Kim, SM Kim, JH Lee, C Choi, Y Shin, ... NDSS 16, 21-24, 2016 | 131 | 2016 |
Privatezone: Providing a private execution environment using arm trustzone J Jang, C Choi, J Lee, N Kwak, S Lee, Y Choi, BB Kang IEEE Transactions on Dependable and Secure Computing 15 (5), 797-810, 2016 | 54 | 2016 |
A Rule Extraction Method Using Relevance Factor for FMM Neural Networks SK Lee, JH Lee, HJ Kim KIPS Transactions on Software and Data Engineering 2 (5), 341-346, 2013 | 1 | 2013 |
autofz: Automated Fuzzer Composition at Runtime YF Fu, J Lee, T Kim arXiv preprint arXiv:2302.12879, 2023 | | 2023 |