Follow
Daehee Jang
Daehee Jang
Verified email at gatech.edu - Homepage
Title
Cited by
Cited by
Year
Processing optimization and functional properties of gelatin from shark (Isurus oxyrinchus) cartilage
SM Cho, KS Kwak, DC Park, YS Gu, CI Ji, DH Jang, YB Lee, SB Kim
Food hydrocolloids 18 (4), 573-579, 2004
2962004
Ki-mon arm: A hardware-assisted event-triggered monitoring platform for mutable kernel object
H Lee, H Moon, I Heo, D Jang, J Jang, K Kim, Y Paek, BB Kang
IEEE Transactions on Dependable and Secure Computing 16 (2), 287-300, 2017
1182017
Fuzzing javascript engines with aspect-preserving mutation
S Park, W Xu, I Yun, D Jang, T Kim
2020 IEEE Symposium on Security and Privacy (SP), 1629-1642, 2020
902020
Atra: Address translation redirection attack against hardware-based external monitors
D Jang, H Lee, M Kim, D Kim, D Kim, BB Kang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
572014
Preventing {Use-After-Free} Attacks with Fast Forward Allocation
B Wickman, H Hu, I Yun, D Jang, JW Lim, S Kashyap, T Kim
30th USENIX Security Symposium (USENIX Security 21), 2453-2470, 2021
262021
SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure
D Kim, D Jang, M Park, Y Jeong, J Kim, S Choi, BB Kang
computers & security 82, 118-139, 2019
202019
Rethinking anti-emulation techniques for large-scale software deployment
D Jang, Y Jeong, S Lee, M Park, K Kwak, D Kim, BB Kang
computers & security 83, 182-200, 2019
132019
Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions
VJM Manès, D Jang, C Ryu, BB Kang
computers & security 74, 130-143, 2018
112018
Detection enhancement for various deepfake types based on residual noise and manipulation traces
J Kang, SK Ji, S Lee, D Jang, JU Hou
IEEE Access 10, 69031-69040, 2022
82022
Badaslr: Exceptional cases of ASLR aiding exploitation
D Jang
computers & security 112, 102510, 2022
42022
Polar: Per-allocation object layout randomization
J Kim, D Jang, Y Jeong, BB Kang
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
42019
S-OpenSGX: A system-level platform for exploring SGX enclave-based computing
C Choi, N Kwak, J Jang, D Jang, K Oh, K Kwag, BB Kang
computers & security 70, 290-306, 2017
42017
Effective memory diversification in legacy systems
D Jang, H Yun
International journal of electrical and computer engineering systems 14 (3 …, 2023
22023
Fuzzing@ Home: Distributed Fuzzing on Untrusted Heterogeneous Clients
D Jang, A Askar, I Yun, S Tong, Y Cai, T Kim
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
22022
EmuID: Detecting presence of emulation through microarchitectural characteristic on ARM
Y Choi, Y Jeong, D Jang, BB Kang, H Lee
Computers & Security 113, 102569, 2022
22022
SOK: On the Analysis of Web Browser Security
J Lim, Y Jin, M Alharthi, X Zhang, J Jung, R Gupta, K Li, D Jang, T Kim
arXiv preprint arXiv:2112.15561, 2021
22021
Scheduler-based Defense Method against Address Translation Redirection Attack (ATRA)
D Jang, J Jang, D Kim, C Choi, BB Kang
Journal of The Korea Institute of Information Security & Cryptology 25 (4 …, 2015
22015
Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors
I Heo, D Jang, H Moon, H Cho, S Lee, BB Kang, Y Paek
JSTS: Journal of Semiconductor Technology and Science 15 (1), 48-59, 2015
22015
On the analysis of byte-granularity heap randomization
D Jang, J Kim, H Lee, M Park, Y Jung, M Kim, BB Kang
IEEE Transactions on Dependable and Secure Computing 18 (5), 2237-2252, 2019
12019
P2FAAS: Toward Privacy-Preserving Fuzzing as a Service
F Sang, D Jang, MW Shih, T Kim
arXiv preprint arXiv:1909.11164, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20