Prime+ count: Novel cross-world covert channels on arm trustzone H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 59 | 2018 |
Electronic apparatus and control method thereof KH Lee, J Hur, JH Kim, J Park, D Kim US Patent App. 15/440,283, 2017 | 41 | 2017 |
A malicious application detection framework using automatic feature extraction tool on android market D Kim, J Kim, S Kim 3rd International Conference on Computer Science and Information Technology …, 2013 | 24 | 2013 |
Rethinking anti-emulation techniques for large-scale software deployment D Jang, Y Jeong, S Lee, M Park, K Kwak, D Kim, BB Kang computers & security 83, 182-200, 2019 | 19 | 2019 |
Smokebomb: effective mitigation against cache side-channel attacks on the arm architecture H Cho, J Park, D Kim, Z Zhao, Y Shoshitaishvili, A Doupé, GJ Ahn Proceedings of the 18th International Conference on Mobile Systems …, 2020 | 15 | 2020 |
Are there wireless hidden cameras spying on me? J Heo, S Gil, Y Jung, J Kim, D Kim, W Park, Y Kim, KG Shin, CH Lee Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 13 | 2022 |
A counterattack-detection scheme in transmission time-based wormhole detection methods D Kim, H Kim, G Kim, S Kim International Journal of Distributed Sensor Networks 9 (3), 184931, 2013 | 13 | 2013 |
Server and user terminal S HA, D KIM, JM KIM WO Patent 2,017,047,928, 2016 | 8 | 2016 |
An efficient kernel introspection system using a secure timer on trustzone J Kim, D Kim, J Park, J Kim, H Kim Journal of The Korea Institute of Information Security & Cryptology 25 (4 …, 2015 | 4 | 2015 |
프락시 기반 애플리케이션 전자서명 검증 시스템 권상완, 김동욱, 이경우 정보보호학회논문지 27 (4), 743-751, 2017 | 2 | 2017 |
Scheduler-based Defense Method against Address Translation Redirection Attack (ATRA) D Jang, J Jang, D Kim, C Choi, BB Kang Journal of The Korea Institute of Information Security & Cryptology 25 (4 …, 2015 | 2 | 2015 |
안드로이드 앱 캐시 변조 공격의 설계 및 구현 홍석, 김동욱, 김형식 정보보호학회논문지 29 (1), 205-214, 2019 | | 2019 |
전자 장치 및 그 제어 방법 김동욱, 강병훈, 하승현, 장대희, 장진수, 홍석 KR Patent App. 10-2017-0,148,241, 2017 | | 2017 |
부채널 공격으로부터 정보를 보호하는 방법 및 디바이스 박진범, 김동욱 KR Patent App. 10-2017-0,138,460, 2017 | | 2017 |
전자 장치 및 그의 제어 방법 김동욱, 박진범 KR Patent App. 10-2017-0,125,929, 2017 | | 2017 |
안드로이드 어플리케이션 패키지에 포함된 검증키를 이용한 JNI Caller 검증 방법 홍석, 김동욱 2017년 정보보호학회 하계학술대회 (CISC-S'17), 2017 | | 2017 |
SERVER AND USER TERMINAL 하승현, 김동욱, 김진목 CN Patent 106,548,062, 2017 | | 2017 |
전자 장치와 이의 동작 방법 하승현, 김동욱, 김진목, 이호선 KR Patent App. 10-2017-0,008,060, 2017 | | 2017 |
A Snoop-based Kernel Introspection System against Address Translation Redirection Attack D Kim, J Kim, J Park Samsung Journal of Innovative Technology 13, 2016 | | 2016 |
메모리 주소 변환 공격을 탐지하기 위한 Snoop 기반의 커널 검사 시스템 김동욱, 김지훈, 박진범, 김진목 정보보호학회논문지 26 (5), 1151-1160, 2016 | | 2016 |