Malicious software, a threat users face on a daily basis, have evolved from simple bankers based on social engineering to advanced persistent threats. Recent research and …
SO Park, O Kwon, Y Kim, SK Cha, H Yoon - Computers & Security, 2021 - Elsevier
Modern deep learning frameworks rely heavily on GPUs to accelerate the computation. However, the security implication of GPU device memory exploitation on deep learning …
During the past decade, virtualization-based (eg, virtual machine introspection) and hardware-assisted approaches (eg, x86 SMM and ARM TrustZone) have been used to …
O Kwon, Y Kim, J Huh, H Yoon - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In the last decade, the dedicated graphics processing unit (GPU) has emerged as an architecture for high-performance computing workloads. Recently, researchers have also …
Automotive cyber-physical systems are in transition from the closed-systems to open- networking systems. As a result, in-vehicle networks such as the controller area network …
D Kwon, K Oh, J Park, S Yang, Y Cho… - Proceedings of the 55th …, 2018 - dl.acm.org
Large OS kernels always suffer from attacks due to their numerous inherent vulnerabilities. To protect the kernel, hypervisors have been employed by many security solutions …
D Hwang, M Yang, S Jeon, Y Lee… - … Design, Automation & …, 2019 - ieeexplore.ieee.org
The OS kernel is typically the assumed trusted computing base in a system. Consequently, when they try to protect the kernel, developers often build their solutions in a separate …
The OS kernel is typically preassumed as a trusted computing base in most computing systems. However, it also implies that once an attacker takes control of the OS kernel, the …