基本信息
浏览量:1
职业迁徙
个人简介
His academic services include Program Committee for IEEE Security and Privacy, ACM CCS, USENIX SECURITY, and Tutorial co-chair for ACM CCS. His research interests include designing Trusted Computing Environment (TCE) and securing host system based on the TCE (e.g., System integrity monitors, HW-based trusted execution environment, Memory address translation integrity (http://breakthroughs.kaist.ac.kr/?post_no=163), Code-Reuse-Attack(CRA) defenses, Heap memory defenses, Malware analysis and Dialects computing). He has been advising and educating the next-generation cyber security researchers, managers, the federal workforce and policy makers. He has created a series of NSF-funded hands-on Information Assurance (IA) education program, and his research efforts has been sponsored by ONR, NRF, IARPA, ARO, NSF, ADD, ETRI, IITP (Brain Scouting Program), TIAA-CREF Faculty Fellowship, Bank of America, LG, SK Telecom and Samsung.
研究兴趣
论文共 34 篇作者统计合作学者相似作者
按年份排序按引用量排序主题筛选期刊级别筛选合作者筛选合作机构筛选
时间
引用量
主题
期刊级别
合作者
合作机构
Seongman Lee, Seoye Kim,Chihyun Song, Byeongsu Woo, Eunyeong Ahn, Junsu Lee,Yeongjin Jang,Jinsoo Jang,Hojoon Lee,Brent Byunghoon Kang
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing (2024)
Journal of Cloud Computingno. 1 (2024): 1-22
IEEE Security & Privacyno. 3 (2023): 6-7
Daegyeong Kim, Wonwoo Choi, Chang-il Lim, Eunjin Kim, Geonwoo Kim, Yongho Song,Junsu Lee,Youngkwang Han,Hojoon Lee,Brent ByungHoon Kang
Simul. Model. Pract. Theory (2023): 102743-102743
PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023pp.397-411, (2023)
加载更多
作者统计
合作学者
合作机构
D-Core
- 合作者
- 学生
- 导师
数据免责声明
页面数据均来自互联网公开来源、合作出版商和通过AI技术自动分析结果,我们不对页面数据的有效性、准确性、正确性、可靠性、完整性和及时性做出任何承诺和保证。若有疑问,可以通过电子邮件方式联系我们:report@aminer.cn