Adaptive Spiking Neural Networks for Real-Time Multi-Object Detection Tasks [to appear]
Donghwa Kang, Woojin Shin, Cheol-Ho Hong, Brent Byunghoon Kang, Jinkyu Lee and Hyeongboo Baek
Design Automation Conference (DAC) 2026
Timestep-Compressed Attack on Spiking Neural Networks through Timestep-Level Backpropagation [to appear]
Donghwa Kang, Doohyun Kim, Sang-Ki Ko, Jinkyu Lee, Hyeongboo Baek, Brent ByungHoon Kang
Annual Association for the Advancement of Artificial Intelligence (AAAI) 2026
Software Supply Chain Security Guidance
Contributed by Minjoon Park, Changil Lim, Changjo Yun, Brent Byunghoon Kang
Ministry of Science and ICT, and National Intelligence Service, and Presidential Committee on the Digital Platform Government [PDF]
Towards scalable and configurable simulation for disaggregated architecture
Daegyeong Kim, Wonwoo Choi, Chang-il Lim, Eunjin Kim, Geonwoo Kim, Yongho Song, Junsu Lee, Youngkwang Han, Hojoon Lee, Brent Byunghoon Kang
Simulation Modelling Practice and Theory (SIMPAT) 2023 [PDF] [BIBTEX] [SOURCE]
OpenSGX: An Open Platform for SGX Research
Prerit Jain, Soham Desai, Seongmin Kim, Ming-Wei Shih,
JaeHyuk Lee, Changho Choi, Young Shin, Taesoo Kim, Brent Byunghoon Kang, Dongsu Han
23nd Annual Network and Distributed System Security Symposium, NDSS 2016 (15.4%) [PDF] [BIBTEX]
Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors
Ingoo Heo, Daehee Jang, Hyunggon Moon, Hansu Cho, Seungwook Lee, Brent Byunghoon Kang, and Yunheung Paek
Journal of Semiconductor Technology and Science [PDF] [BIBTEX]
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment
Jinsoo Jang, Sunjune Kong, Minsoo Kim, Daegyeong Kim and Brent Byunghoon Kang
22nd Annual Network and Distributed System Security Symposium, NDSS 2015 (Acceptance rate 16.6% (50/302)) [PDF] [BIBTEX] [PRESENTATION]
ATRA: Address Translation Redirection Attack against Hardware-based External Monitors
Daehee Jang, Hojoon Lee, Minsoo Kim, Daehyeok Kim, Daegyeong Kim and Brent Byunghoon Kang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS) (Acceptance rate 19.5% (114/585)) [PDF] [BIBTEX] [PRESENTATION]
Rosemary: A Robust, Secure, and High-performance Network Operating System
Seungwon Shin, Yongsoo Song, Taekyung Lee, Sangho Lee, Jaewoong Chung, Phillip Porras, Vinod Yegneswaran†, Jiseong Noh and Brent Byunghoon Kang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS) (Acceptance rate 19.5% (114/585)) [PDF] [BIBTEX]
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object
Hojoon Lee, Hyungon Moon, Daehee Jang, Kihwan Kim, Jihoon Lee, Yunheung Paek and Brent Byunghoon Kang
13th USENIX Security Symposium (USENIX Security 2013) (Acceptance rate: 15.9% (44/277)) [PDF] [BIBTEX]
Vigilare: Toward Snoop-based Kernel Integrity Monitor.
Hyungon Moon, Hojoon Lee, Jihoon Lee, Kihwan Kim, Yunheung Paek and Brent Byunghoon Kang
Proceedings of the 2012 ACM SIGSAC Conference on Computer and Communications Security (CCS) (Acceptance rates: 17.2%, 14%, 18.9%) [PDF] [BIBTEX]
DoubleGuard: Detecting Intrusions In Multi-tier Web Applications.
M. Le, A. Stavrou, B. Kang
IEEE Transactions on Dependable and Secure Computing, July-Aug. 2012, Volume: 9, Issue: 4 Page(s): 512-525.
Identifying Users with Application-Specific Command Streams
A. El-Masri, P. Likarish, H. Wechsler, B. Kang
Twelfth Annual International Conference on Privacy, Security and Trust (PST 2014) July 2014, REGULAR paper. (Acceptance rate 47/161 = 29%) [PDF] [BIBTEX]
Developing and Refining Infected-Host Enumeration Methods for Advanced Botnets
C. Nunnery and B. Kang
2012.12.25, Telecommunications Review, Vol. 22 Issue 6.
Entropy-Based Measurement of IP Address Inflation in the Waledac Botnet.
R. Weaver, C. Nunnery, G. Singaraju, and B. Kang
CERT FloCon 2011
Towards Complete Node Enumeration in a Peer-to-Peer Botnet.
B. Kang, E. Chan-Tin, C. Lee, J. Tyra, H. Kang, C. Nunnery, Z. Wadler, G. Sinclair, N. Hopper, D. Dagon and Y. Kim
ACM Symposium on Information, Computer & Communication Security (ASIACCS 2009) [PDF] [BIBTEX]
Hash History Approach for Reconciling Mutual Inconsistency
B. Kang, R. Wilensky, J. Kubiatowicz, Proceedings of 23rd International Conference on Distributed Computing Systems (ICDCS), 2003 (Acceptance rates: 17.7%, 17.7%, 13.8%)
Network Support for Mobile Multimedia using a Self-adaptive Distributed Proxy
Z. Mao, H. So, B. Kang and R. Katz
Proceedings of 11th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), 2001 (Acceptance rates: 33.3%, 30.5%, 30%)
[PDF] [BIBTEX]
Toward a Model of Self-administering Data
B. Kang and R. Wilensky
Proceedings of the first ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL), 2001 (Acceptance rates: 30%, 25%, 33%)
Dissertation: “S2D2: A Framework for Scalable and Secure Optimistic Replication.”
B. Kang
Ph.D. Dissertation, 2004. UC Berkeley TechReport, UCB/CSD-04-1351, Committee: Robert Wilensky, John Kubiatowicz, Eric Brewer, and John Chuang Qualification Exam Area: Operating Systems (with Security) [PDF]
Utility Patent: "SYSTEM AND METHOD FOR IMPLEMENTING A HIDDEN SERVER".
Filed by George Mason University, January 12, 2012.
Sole Inventor, Publication number: US 2012/0180127, Publication date: July 12, 2012
Entropy-Based Measurement of IP Address Inflation in the Waledac Botnet
R. Weaver, C. Nunnery, G. Singaraju, and B. Kang, CERT/CC (Computer Emergency Readiness Team) Proceedings of FloCon 2011. [PDF]
Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure.
C. Nunnery, G. Sinclair and B. Kang
USENIX LEET 2010 [PDF]
The Waledac Protocol: The How and Why.
G. Sinclair, C. Nunnery and B. Kang
IEEE Malware 2009 [PDF]
Tracking Email Reputation for Authenticated Sender Identities.
G. Singaraju, J. Moss and B. Kang
CEAS 2008 [PDF]
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance.
G. Singaraju and B. Kang
LISA 2008 [PDF]
RepuScore: Collaborative Reputation Management Framework for Email Infrastructure.
G. Singaraju and B. Kang
LISA 2007 [PDF]
Peer-to-Peer Botnets: Overview and Case Study.
J. Grizzard, V. Sharma, C. Nunnery, B. Kang and D. Dagon.
(Cited by 340 times since its publication in Fall 2007)
USENIX HOTBOTS 2007 [PDF]
Privilege Messaging: An Authorization Framework over Email Infrastructure
B. Kang , G. Singaraju, and S. Jain
USENIX 20th Large Installation System Administration Conference (USENIX LISA), 2006 [PDF]
RegColl: Centralized Registry Framework for Infrastructure System Management
B. Kang, V. Sharma, and P. Thanki
USENIX 19th Large Installation System Administration Conference (USENIX LISA), 2005 [PDF]
Decentralized Peer-to-Peer Botnet Architectures
B. Kang and C. Nunnery
Book Chapter: "Advances in Information & Intelligent Systems", 2009 Springer Studies in Computational Intelligence, SCI 251, pp. 251?264. Springer-Verlag Berlin Heidelberg 2009
http://link.springer.com/chapter/10.1007/978-3-642-04141-9_12
Spam Detection Using Network-Level Characteristics
B. Kang and G. Singaraju
Encyclopedia of Cryptography and Security, 2nd Edition, Springer 2011
http://www.informatik.uni-trier.de/~ley/db/reference/crypt/crypt2011.html
Unpacking Malware
B. Kang and G. Sinclair
Encyclopedia of Cryptography and Security, 2nd Edition, Springer 2011
http://www.informatik.uni-trier.de/~ley/db/reference/crypt/crypt2011.html
DNS-Based Botnet Detection
B. Kang and M. Lim
Encyclopedia of Cryptography and Security, 2nd Edition, Springer 2011
http://www.informatik.uni-trier.de/~ley/db/reference/crypt/crypt2011.html
Dynamic Analysis Of Malware
B. Kang and A. Srivastava
Encyclopedia of Cryptography and Security, 2nd Edition, Springer 2011
http://www.informatik.uni-trier.de/~ley/db/reference/crypt/crypt2011.html
Teaching Security With Network Testbeds
J. Mirkovic, M. Ryan, J. Hickey, K. Sklower, P. Reiher, P. Peterson, B. Kang, M. Chuah, D. Massey, G. Ragusa
SIGCOMM 2011 Education Workshop.
http://edusigcomm.info.ucl.ac.be/pmwiki/uploads/Workshop2011/20110312001/sigedu.pdf
(Also appeared in SIGCOMM Computer Communication Review)
Interactive simulation tools for information assurance education
H. Yu, K. Williams, J. Xu, X. Yuan, B. Chu, B. Kang, T. Kombol
Proceedings of the Second Annual Conference on Education in Information Security (ACEIS), 2009
Unified Table Approach for Typographic Rendering
B. Kang (Sole Author)
Electronic Publishing, Artistic Imaging, and Digital Typography, 7th International Conference on Raster Imaging and Digital Typography (RIDT), 1998, Lecture Notes in Computer Science (LNCS), Springer Verlag, St. Malo, France, 1998. Volume 1375/1998, 55-65, DOI: 10.1007/BFb0053262
http://www.springerlink.com/content/26466n942338t236/
Hypervisor is a software platform that virtualizes computer hardware to support multiple instances of operating system running concurrently on a shared hardware system. Hypervisors are also widely used for cloud-based hosting service. This hypervisor platform can be utilized for higher degree of isolation for computer security monitoring and analysis. It provides an adequate environment for building kernel integrity monitors. This course will provide the fundamentals and inner-workings of hypervisors in the context of designing new security, monitoring, and analysis tools.
Operating system kernel is the most critical component in the system as it provides the basic functionalities and the secure environment in which applications run and operate. In this course, the fundamentals of OS kernel and system programming, principles and operation of the open-source Linux operating system are taught with an emphasis on security aspect, so that students can acquire a comprehensive understanding of operating system kernel, analysis methods and countermeasures against various rootkit malware that compromise and manipulate operating system.
This course covers the overall content of information security. The first half covers basics of information security including Usability, Protocols, Access Control and Cryptography. The latter part includes specific areas such as software and system security as well as web and network security.
[link]The main purpose of this course is to review the fundamental concepts in operating systems with the view of security perspective and learn about system exploitations and the defenses methods in order to cultivate the ability to design a robust system against security attacks. Also, it covers kernel reference monitors and trusted execution environment which can be employed to design secure systems.
ADDRESS
N5 2320 at KAIST,
291 Daehak-ro,
Yuseong-gu, Daejeon,
Republic of Korea 305-701
CONTACTS
Phone: +82 (42) 350-8338