Prime+ count: Novel cross-world covert channels on arm trustzone H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 60 | 2018 |
{In-Kernel}{Control-Flow} integrity on commodity {OSes} using {ARM} pointer authentication S Yoo, J Park, S Kim, Y Kim, T Kim 31st USENIX Security Symposium (USENIX Security 22), 89-106, 2022 | 53 | 2022 |
Exploiting uses of uninitialized stack variables in linux kernels to leak kernel pointers H Cho, J Park, J Kang, T Bao, R Wang, Y Shoshitaishvili, A Doupé, ... 14th USENIX Workshop on Offensive Technologies (WOOT 20), 2020 | 24 | 2020 |
ViK: practical mitigation of temporal memory safety violations through object ID inspection H Cho, J Park, A Oest, T Bao, R Wang, Y Shoshitaishvili, A Doupé, ... Proceedings of the 27th ACM International Conference on Architectural …, 2022 | 17 | 2022 |
Smokebomb: effective mitigation against cache side-channel attacks on the arm architecture H Cho, J Park, D Kim, Z Zhao, Y Shoshitaishvili, A Doupé, GJ Ahn Proceedings of the 18th International Conference on Mobile Systems …, 2020 | 15 | 2020 |
TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution J Kim, J Park, S Roh, J Chung, Y Lee, T Kim, B Lee arXiv preprint arXiv:2406.08719, 2024 | 4 | 2024 |
An efficient kernel introspection system using a secure timer on trustzone J Kim, D Kim, J Park, J Kim, H Kim Journal of The Korea Institute of Information Security & Cryptology 25 (4 …, 2015 | 4 | 2015 |
A Snoop-Based Kernel Introspection System against Address Translation Redirection Attack D Kim, J Kim, J Park, J Kim Journal of the Korea Institute of Information Security & Cryptology 26 (5 …, 2016 | | 2016 |