Brent Byunghoon Kang

ORCID: 0000-0001-8984-1006
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Cloud Data Security Solutions
  • Network Security and Intrusion Detection
  • Spam and Phishing Detection
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • User Authentication and Security Systems
  • Advanced Memory and Neural Computing
  • Diamond and Carbon-based Materials Research
  • Adversarial Robustness in Machine Learning
  • Cryptography and Data Security
  • Software Testing and Debugging Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Software-Defined Networks and 5G
  • Radiation Effects in Electronics
  • Caching and Content Delivery
  • Neural Networks and Applications
  • Anomaly Detection Techniques and Applications
  • Parallel Computing and Optimization Techniques
  • Distributed systems and fault tolerance
  • CCD and CMOS Imaging Sensors
  • Cloud Computing and Resource Management
  • Cryptographic Implementations and Security
  • Wireless Body Area Networks
  • Personal Information Management and User Behavior

Korea Advanced Institute of Science and Technology
2015-2024

University of Chicago
2021

Kootenay Association for Science & Technology
2018-2019

Georgia Institute of Technology
2016

University of North Carolina at Charlotte
2006-2009

The extremely diffused architecture of the Internet enables propagation malware and presents a significant challenge for development defenses against such propagation. Although machine learning-based detection models can improve approaches in response to this problem, their rates vary according features classification methods. Single learning effectiveness suitability classifiers despite use an appropriate training dataset. Some result high with malicious dataset but have low benign dataset,...

10.1016/j.ins.2020.08.082 article EN cc-by-nc-nd Information Sciences 2020-09-02

Hardware technologies for trusted computing, or execution environments (TEEs), have rapidly matured over the last decade.In fact, TEEs are at brink of widespread commoditization with recent introduction Intel Software Guard Extensions (Intel SGX).Despite such rapid development TEE, software TEE significantly lag behind their hardware counterpart, and currently only a select group researchers privilege accessing this technology.To address problem, we develop an open source platform, called...

10.14722/ndss.2016.23011 article EN 2016-01-01

ARM TrustZone is widely used to provide a Trusted Execution Environment (TEE) for mobile devices. However, the use of limited because resources are only available some pre-authorized applications. In other words, alliances OS vendors and device manufacturers can secure their services. To help overcome this problem, we designed PrivateZone framework enable individual developers utilize resources. Using PrivateZone, run Security Critical Logics (SCL) in Private (PrEE). The advantage its...

10.1109/tdsc.2016.2622261 article EN IEEE Transactions on Dependable and Secure Computing 2016-10-27

Given the energy constraints in autonomous mobile agents (AMAs), such as unmanned vehicles, spiking neural networks (SNNs) are increasingly favored a more efficient alternative to traditional artificial networks. AMAs employ multi-object detection (MOD) from multiple cameras identify nearby objects while ensuring two essential objectives, (R1) timing guarantee and (R2) high accuracy for safety. In this paper, we propose RT-SNN, first system design, aiming at achieving R1 R2 SNN-based MOD...

10.48550/arxiv.2501.18412 preprint EN arXiv (Cornell University) 2025-01-29

Modern applications often involve processing of sensitive information. However, the lack privilege separation within user space leaves application secret such as cryptographic keys just unprotected a "hello world" string. Cutting-edge hardware-supported security features are being introduced. vendor-specific or compatibility with older generations processors. The situation developers no portable solution to incorporate protection for component. We propose LOTRx86, fundamental and approach...

10.1145/3243734.3243748 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2018-10-15

Abstract The advancement of software defined networking (SDN) is redefining traditional computer architecture. role the control plane SDN such importance that SDNs are referred to as network operating systems (OSs). However, robustness and security OS has been overlooked. In this paper, we report three main issues pertaining OSs. First, identified vulnerabilities could be exploited by malicious or buggy applications running on We also four major attack vectors undermine operations: denial...

10.1002/sec.1369 article EN Security and Communication Networks 2015-10-26

External hardware-based kernel integrity monitors have been proposed to mitigate kernel-level malwares. However, the existing external approaches limited monitoring static regions of while latest rootkits manipulate dynamic objects. To address issue, we present KI-Mon, a platform that introduces event-triggered techniques for KI-Mon advances bus traffic snooping technique not only detect memory write on host but also filter out all meaningful generate events. We show how invariant...

10.1109/tdsc.2017.2679710 article EN IEEE Transactions on Dependable and Secure Computing 2017-03-08

Malware has been installed through drive-by downloads via exploit kit attacks. However, the prior signature- or dynamic-based detection approach to continuously increasing number of suspicious samples is time-consuming. In such circumstances, convolutional neural networks (ConvNets) can help in rapid owing their direct image-feature generation using codes. general ConvNet model entails vanishing gradient problem, where features used for a deep learning-based method will become less effective...

10.1109/access.2020.2967746 article EN cc-by IEEE Access 2020-01-01

This paper proposes and describes an active authentication model based on user profiles built from user-issued commands when interacting with GUI-based application. Previous behavioral models derived issued were limited to analyzing the user's interaction *Nix (Linux or Unix) command shell program. Human-computer (HCI) research has explored idea of building users their patterns such graphical interfaces. It did so by keystroke and/or mouse dynamics. However, none had creating capturing...

10.1109/pst.2014.6890944 article EN 2014-07-01

Abstract While container adoption has witnessed significant growth in facilitating the operation of large-scale applications, this increased attention also attracted adversaries who exploit numerous vulnerabilities present contemporary containers. Unfortunately, existing security solutions largely overlooked need to restrict access shared host kernel, particularly exhibiting critical limitations enforcing least privilege for containers during runtime. Hence, we propose Optimus, an automated...

10.1186/s13677-024-00639-3 article EN cc-by Journal of Cloud Computing Advances Systems and Applications 2024-03-23

The existing approaches to instruction trace-based security monitoring hardware are dependent on the privileged software, which presents a significant challenge in defending against attacks software itself. To address this challenge, we propose Interstellar, introduces partitioned near CPU's main core and leverages benefit of hardware-level monitoring. Interstellar is fully partitioned, parallelized, simultaneously detecting hardware. Interstellar's design makes malicious hard...

10.1145/3658644.3690247 article EN cc-by-nc 2024-12-02

ARM TrustZone provides a Trusted Execution Environment (TEE) to isolate security-critical services, which are generally invoked from the Rich (REE) through communication channel established by executing Secure Monitor Call (SMC) with general registers configured as input parameters. Unfortunately, has been abused adversaries incur misbehavior of TEE, analyze internal working and exploit its vulnerabilities. We therefore propose TEE defense (TFence) framework that enables creation partially...

10.1109/tdsc.2018.2840709 article EN IEEE Transactions on Dependable and Secure Computing 2018-05-25

This paper addresses active authentication using scrolling behaviors for biometrics and assesses different classification clustering methods that leverage those traits. The dataset used contained event-driven temporal data captured through monitoring users' reading habits. derived feature set is mainly composed of events their derivatives (changes) 5-gram sequencing to increase the number extracted context. Classification performance in terms both accuracy Area under Curve (AUC) Receiver...

10.1109/iacs.2015.7103185 article EN 2015-04-01

10.1016/j.cose.2019.01.012 article EN publisher-specific-oa Computers & Security 2019-02-01

Stack-based memory corruption vulnerabilities have been exploited, allowing attackers to execute arbitrary code and read/write memory. Although several solutions proposed prevent errors on the stack, they are either limited a specific type of attack (either spatial or temporal attacks) cause significant performance degradation. In this article, we introduce SaVioR, an efficient comprehensive stack protection mechanism. The key technique involves randomization layout reduce its predictability...

10.1109/tdsc.2021.3063843 article EN IEEE Transactions on Dependable and Secure Computing 2021-03-04
Coming Soon ...