Daehee Jang
Daehee Jang
Verified email at - Homepage
Cited by
Cited by
Processing optimization and functional properties of gelatin from shark (Isurus oxyrinchus) cartilage
SM Cho, KS Kwak, DC Park, YS Gu, CI Ji, DH Jang, YB Lee, SB Kim
Food hydrocolloids 18 (4), 573-579, 2004
Ki-mon arm: A hardware-assisted event-triggered monitoring platform for mutable kernel object
H Lee, H Moon, I Heo, D Jang, J Jang, K Kim, Y Paek, BB Kang
IEEE Transactions on Dependable and Secure Computing 16 (2), 287-300, 2017
Fuzzing javascript engines with aspect-preserving mutation
S Park, W Xu, I Yun, D Jang, T Kim
2020 IEEE Symposium on Security and Privacy (SP), 1629-1642, 2020
Atra: Address translation redirection attack against hardware-based external monitors
D Jang, H Lee, M Kim, D Kim, D Kim, BB Kang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Preventing {Use-After-Free} Attacks with Fast Forward Allocation
B Wickman, H Hu, I Yun, D Jang, JW Lim, S Kashyap, T Kim
30th USENIX Security Symposium (USENIX Security 21), 2453-2470, 2021
SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure
D Kim, D Jang, M Park, Y Jeong, J Kim, S Choi, BB Kang
computers & security 82, 118-139, 2019
Rethinking anti-emulation techniques for large-scale software deployment
D Jang, Y Jeong, S Lee, M Park, K Kwak, D Kim, BB Kang
computers & security 83, 182-200, 2019
Detection enhancement for various deepfake types based on residual noise and manipulation traces
J Kang, SK Ji, S Lee, D Jang, JU Hou
IEEE Access 10, 69031-69040, 2022
Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions
VJM Manès, D Jang, C Ryu, BB Kang
computers & security 74, 130-143, 2018
SoK: On the analysis of web browser security
J Lim, Y Jin, M Alharthi, X Zhang, J Jung, R Gupta, K Li, D Jang, T Kim
arXiv preprint arXiv:2112.15561, 2021
Badaslr: Exceptional cases of ASLR aiding exploitation
D Jang
computers & security 112, 102510, 2022
Polar: Per-allocation object layout randomization
J Kim, D Jang, Y Jeong, BB Kang
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
S-OpenSGX: A system-level platform for exploring SGX enclave-based computing
C Choi, N Kwak, J Jang, D Jang, K Oh, K Kwag, BB Kang
computers & security 70, 290-306, 2017
EmuID: Detecting presence of emulation through microarchitectural characteristic on ARM
Y Choi, Y Jeong, D Jang, BB Kang, H Lee
Computers & Security 113, 102569, 2022
Effective memory diversification in legacy systems
D Jang, H Yun
International journal of electrical and computer engineering systems 14 (3 …, 2023
Fuzzing@ home: Distributed fuzzing on untrusted heterogeneous clients
D Jang, A Askar, I Yun, S Tong, Y Cai, T Kim
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
Scheduler-based Defense Method against Address Translation Redirection Attack (ATRA)
D Jang, J Jang, D Kim, C Choi, BB Kang
Journal of The Korea Institute of Information Security & Cryptology 25 (4 …, 2015
Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors
I Heo, D Jang, H Moon, H Cho, S Lee, BB Kang, Y Paek
JSTS: Journal of Semiconductor Technology and Science 15 (1), 48-59, 2015
Fuzzability Testing Framework for Incomplete Firmware Binary
J Jang, G Son, H Lee, H Yun, D Kim, S Lee, S Kim, D Jang
IEEE Access, 2023
On the analysis of byte-granularity heap randomization
D Jang, J Kim, H Lee, M Park, Y Jung, M Kim, BB Kang
IEEE Transactions on Dependable and Secure Computing 18 (5), 2237-2252, 2019
The system can't perform the operation now. Try again later.
Articles 1–20