설명: img89.gif

Hardware based integrity monitoring for security system

  • Hardware-assisted Efficient Long Branch Tracing for Control Flow Integrity on x86 Processors, Design Automation Conference, June 2017 New

  • KI-Mon ARM: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object, IEEE Transactions on Dependable and Secure Computing, March 2017 New

  • Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping, IEEE Transactions on Dependable and Secure Computing, March-April 1 2017 New

  • A Hardware-based Technique for Efficient Implicit Information Flow Tracking, International Conference on Computer Aided Design (ICCAD), Nov. 2016 (Acceptance rate: 23%)

  • Architectural Supports to Protect OS Kernels from Code-Injection Attacks Hardware and Architectural Support for Security and Privacy (HASP), June 2016

  • Integration of ROP/JOP Monitoring IPs in an ARM-based SoC Design Automation and Test in Europe Conference and Exhibition (DATE), Mar 2016 (Acceptance rate: 24%)

  • Efficient Security Monitoring with Core Debug Interface in an Embedded Processor, ACM Transactions on Design Automation of Electronic Systems (TODAES) Sep. 2016

  • A Hardware-based Technique for Efficient Implicit Information Flow Tracking, Design Automation Conference (DAC) WIP, June 2016

  • HDFI: Hardware-Assisted Data-flow Isolation, IEEE S&P , May 2016 (Acceptance rate: 13.3%)

  • The new real-time debug interface for efficient code reuse attack detection, 2015 International SoC Design Conference (ISOCC), 93-94, 2015

  • Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines, ACM Transactions on Design Automation of Electronic Systems (TODAES) - Special Issue on Reliable, Resilient, and Robust Design of Circuits and Systems, Volume 20 Issue 4, September 2015, Article No. 53

  • Towards a Practical Solution to Detect Code Reuse Attacks on ARM Mobile Devices, In Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP, June 2015

  • Accelerating Bootstrapping in FHEW using GPUs, The 26th IEEE International Conference on Application-specific Systems, Architectures and Processors, IEEE ASAP Conference, July 2015(Acceptance rate: 24.7%)

  • Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping, IEEE Transactions on Dependable and Secure Computing, June 2015

  • Efficient Dynamic Information Flow Tracking on a Processor with Core Debug Interface, Design Automation Conference (DAC), June, 2015 (Acceptance rate: 20.5%)

  • EXTRAX: Security Extention To Extract Cache Resident Information For Snoop-based External Monitors, Design Automation and Test in Europe Conference and Exhibition (DATE), Mar 2015 (Acceptance rate: 22.4%)

  • Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors, Journal of Semiconductor Technology and Science, JSTS-2014-035.R1, 2014

  • CPU Security Extensions to Eliminate Cache Effect for Snoop-based Kernel Integrity Monitor, 51st IEEE/ACM Design Automation Conference, DAC WIP'14, June 2014

  • KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object. , 22nd USENIX Security Symposium, 2013 (Acceptance rate: 15.9%)

  • Vigilare : Toward Snoop-based Kernel Integrity Monitor, 19th ACM conference on computer and communications security, 2012 (Acceptance rate: 18.9%)