Hacking in darkness: Return-oriented programming against secure enclaves J Lee, J Jang, Y Jang, N Kwak, Y Choi, C Choi, T Kim, M Peinado, ... 26th USENIX Security Symposium (USENIX Security 17), 523-539, 2017 | 224 | 2017 |
SGX-Bomb: Locking down the processor via Rowhammer attack Y Jang, J Lee, S Lee, T Kim Proceedings of the 2nd Workshop on System Software for Trusted Execution, 1-6, 2017 | 182 | 2017 |
OpenSGX: An Open Platform for SGX Research. P Jain, SJ Desai, MW Shih, T Kim, SM Kim, JH Lee, C Choi, Y Shin, ... NDSS 16, 21-24, 2016 | 133 | 2016 |
Privatezone: Providing a private execution environment using arm trustzone J Jang, C Choi, J Lee, N Kwak, S Lee, Y Choi, BB Kang IEEE Transactions on Dependable and Secure Computing 15 (5), 797-810, 2016 | 60 | 2016 |
autofz: automated fuzzer composition at runtime YF Fu, J Lee, T Kim 32nd USENIX Security Symposium (USENIX Security 23), 1901-1918, 2023 | 1 | 2023 |
A Rule Extraction Method Using Relevance Factor for FMM Neural Networks SK Lee, JH Lee, HJ Kim KIPS Transactions on Software and Data Engineering 2 (5), 341-346, 2013 | 1 | 2013 |
Prime+ Retouch: When Cache is Locked and Leaked J Lee, F Sang, T Kim arXiv preprint arXiv:2402.15425, 2024 | | 2024 |
SENSE: Enhancing Microarchitectural Awareness for TEEs via Subscription-Based Notification F Sang, J Lee, X Zhang, M Xu, S Constable, Y Xiao, M Steiner, M Vij, ... | | |