Ki-mon arm: A hardware-assisted event-triggered monitoring platform for mutable kernel object H Lee, H Moon, I Heo, D Jang, J Jang, K Kim, Y Paek, BB Kang IEEE Transactions on Dependable and Secure Computing 16 (2), 287-300, 2017 | 122 | 2017 |
Towards a practical solution to detect code reuse attacks on ARM mobile devices Y Lee, I Heo, D Hwang, K Kim, Y Paek Proceedings of the Fourth Workshop on Hardware and Architectural Support for …, 2015 | 44 | 2015 |
Integration of ROP/JOP monitoring IPs in an ARM-based SoC Y Lee, J Lee, I Heo, D Hwang, Y Paek 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), 331-336, 2016 | 32 | 2016 |
Using CoreSight PTM to integrate CRA monitoring IPs in an ARM-based SoC Y Lee, J Lee, I Heo, D Hwang, Y Paek ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (3 …, 2017 | 31 | 2017 |
Efficient dynamic information flow tracking on a processor with core debug interface J Lee, I Heo, Y Lee, Y Paek Proceedings of the 52nd Annual Design Automation Conference, 1-6, 2015 | 28 | 2015 |
Efficient security monitoring with the core debug interface in an embedded processor J Lee, I Heo, Y Lee, Y Paek ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016 | 25 | 2016 |
Detecting and preventing kernel rootkit attacks with bus snooping H Moon, H Lee, I Heo, K Kim, Y Paek, BB Kang IEEE Transactions on Dependable and Secure Computing 14 (2), 145-157, 2015 | 21 | 2015 |
Implementing an application-specific instruction-set processor for system-level dynamic program analysis engines I Heo, M Kim, Y Lee, C Choi, J Lee, BB Kang, Y Paek ACM Transactions on Design Automation of Electronic Systems (TODAES) 20 (4 …, 2015 | 19 | 2015 |
A hardware-based technique for efficient implicit information flow tracking J Shin, H Zhang, J Lee, I Heo, YY Chen, R Lee, Y Paek 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-7, 2016 | 14 | 2016 |
Exploiting both pipelining and data parallelism with SIMD reconfigurable architecture Y Kim, J Lee, J Lee, TX Mai, I Heo, Y Paek International Symposium on Applied Reconfigurable Computing, 40-52, 2012 | 14 | 2012 |
Extrax: Security extension to extract cache resident information for snoop-based external monitors J Lee, Y Lee, H Moon, I Heo, Y Paek 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), 151-156, 2015 | 11 | 2015 |
An asip approach for motion estimation reusing resources for h. 264 intra prediction I Heo, S Park, J Lee, Y Paek 2010 International SoC Design Conference, 186-189, 2010 | 6 | 2010 |
Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors I Heo, D Jang, H Moon, H Cho, S Lee, BB Kang, Y Paek JSTS: Journal of Semiconductor Technology and Science 15 (1), 48-59, 2015 | 2 | 2015 |
VLIW processor for H. 264: Integer transform and Quantization J Lee, S Yang, S Park, I Heo, Y Paek 2010 International SoC Design Conference, 178-181, 2010 | 2 | 2010 |
재구성형 프로세서 성능과 레지스터와의 상관 관계 탐구 김용주, 허인구, 양승준, 이종원, 최영규, 백윤흥 한국정보처리학회 학술대회논문집 17 (1), 22-25, 2010 | 1 | 2010 |
H. 264 정수변환 및 양자화를 위한 VLIW ASIP 프로세서 양승준, 박상현, 허인구, 김용주, 김경원, 백윤흥 한국정보처리학회 학술대회논문집 16 (2), 9-10, 2009 | 1 | 2009 |
Efficient and Practical Security Monitoring on System-on-Chip with Application-Specific Hardware Modules I Heo 서울대학교 대학원, 2016 | | 2016 |
The new real-time debug interface for efficient code reuse attack detection Y Lee, I Heo, D Hwang, K Kim, Y Paek 2015 International SoC Design Conference (ISOCC), 93-94, 2015 | | 2015 |
Code Reuse Attack 의 탐지를 위한 Meta-data 생성 및 압축 기술 황동일, 허인구, 이진용, 이하윤, 백윤흥 한국정보처리학회 학술대회논문집 22 (1), 424-427, 2015 | | 2015 |
A Meta-data Generation and Compression Technique for Code Reuse Attack Detection D Hwang, I Heo, J Lee, H Yi, Y Paek Proceedings of the Korea Information Processing Society Conference, 424-427, 2015 | | 2015 |