Peer-to-Peer Botnets: Overview and Case Study. JB Grizzard, V Sharma, C Nunnery, BBH Kang, D Dagon HotBots 7 (2007), 2007 | 636 | 2007 |
Rosemary: A robust, secure, and high-performance network operating system S Shin, Y Song, T Lee, S Lee, J Chung, P Porras, V Yegneswaran, J Noh, ... Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 344 | 2014 |
Hacking in darkness: Return-oriented programming against secure enclaves J Lee, J Jang, Y Jang, N Kwak, Y Choi, C Choi, T Kim, M Peinado, ... 26th USENIX Security Symposium (USENIX Security 17), 523-539, 2017 | 236 | 2017 |
Vigilare: toward snoop-based kernel integrity monitor BBK Hyungon Moon, Hojoon Lee, Jihoon Lee, Kihwan Kim, Yunheung Paek Proceedings of the 2012 ACM Conference on Computer and Communications …, 2012 | 139 | 2012 |
OpenSGX: An Open Platform for SGX Research. P Jain, SJ Desai, MW Shih, T Kim, SM Kim, JH Lee, C Choi, Y Shin, ... NDSS 16, 21-24, 2016 | 135 | 2016 |
Ki-mon arm: A hardware-assisted event-triggered monitoring platform for mutable kernel object H Lee, H Moon, I Heo, D Jang, J Jang, K Kim, Y Paek, BB Kang IEEE Transactions on Dependable and Secure Computing 16 (2), 287-300, 2017 | 126 | 2017 |
Secret: Secure channel between rich execution environment and trusted execution environment. JS Jang, S Kong, M Kim, D Kim, BB Kang NDSS, 1-15, 2015 | 119 | 2015 |
DoubleGuard: Detecting intrusions in multitier web applications M Le, A Stavrou, BBH Kang IEEE Transactions on dependable and secure computing 9 (4), 512-525, 2011 | 101 | 2011 |
AI-HydRa: Advanced hybrid approach using random forest and deep learning for malware classification S Yoo, S Kim, S Kim, BB Kang Information Sciences 546, 420-435, 2021 | 92 | 2021 |
Towards complete node enumeration in a peer-to-peer botnet BBH Kang, E Chan-Tin, CP Lee, J Tyra, HJ Kang, C Nunnery, Z Wadler, ... Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 90 | 2009 |
The waledac protocol: The how and why G Sinclair, C Nunnery, BBH Kang 2009 4th International Conference on Malicious and Unwanted Software …, 2009 | 89 | 2009 |
The hash history approach for reconciling mutual inconsistency BBH Kang, R Wilensky, J Kubiatowicz 23rd International Conference on Distributed Computing Systems, 2003 …, 2003 | 76 | 2003 |
Agamotto: Accelerating kernel driver fuzzing with lightweight virtual machine checkpoints D Song, F Hetzelt, J Kim, BB Kang, JP Seifert, M Franz 29th USENIX Security Symposium (USENIX Security 20), 2541-2557, 2020 | 65 | 2020 |
Privatezone: Providing a private execution environment using arm trustzone J Jang, C Choi, J Lee, N Kwak, S Lee, Y Choi, BB Kang IEEE Transactions on Dependable and Secure Computing 15 (5), 797-810, 2016 | 64 | 2016 |
Atra: Address translation redirection attack against hardware-based external monitors D Jang, H Lee, M Kim, D Kim, D Kim, BB Kang Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 62 | 2014 |
Network support for mobile multimedia using a self-adaptive distributed proxy ZM Mao, HW So, B Kang Proceedings of the 11th international workshop on Network and operating …, 2001 | 47 | 2001 |
Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure. C Nunnery, G Sinclair, BBH Kang LEET, 2010 | 42 | 2010 |
Malicious URL protection based on attackers' habitual behavioral analysis S Kim, J Kim, BBH Kang Computers & Security 77, 790-806, 2018 | 41 | 2018 |
Lord of the x86 rings: A portable user mode privilege separation architecture on x86 H Lee, C Song, BB Kang Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 40 | 2018 |
Vulnerabilities of network OS and mitigation with state‐based permission system J Noh, S Lee, J Park, S Shin, BB Kang Security and Communication Networks 9 (13), 1971-1982, 2016 | 23 | 2016 |