Taehun Kim
Research Interests
Biography
Taehun Kim is a Ph.D. student in the Computer Systems Security Lab at Korea University, advised by Prof. Youngjoo Shin. His research centers on CPU microarchitectural attacks and defenses across Intel, AMD, ARM, and Apple Silicon processors, with particular interest in device-driven attacks leveraging SmartNICs, GPUs, and NPUs, and in the security evaluation of trusted execution environments including Intel SGX/TDX, AMD SEV, and ARM TrustZone.
Education
- Ph.D. (in progress)School of CybersecurityKorea University
Earlier degrees — TBA.
Honors & Awards
- Grand Prize, Cybersecurity Paper Competition (2024)
- KISTI Director’s Award (2024)
- Best Paper Award, Korea Software Congress (KSC 2022)
- Excellence Award, Cybersecurity Paper Competition (2021)
- Multiple conference presentation awards (2019–2023)
Publications
- WISAA Survey of Speculative Load Prediction Attacks Exploiting Memory Disambiguation UnitsIn Proceedings of the World Conference on Information Security Applications (WISA), 2025
- ESORICST-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDXIn Proceedings of the European Symposium on Research in Computer Security (ESORICS)[BK21 IF=2] , 2025
- ESORICSCache Demote for Fast Eviction Set Construction and Page Table Attribute LeakageIn Proceedings of the European Symposium on Research in Computer Security (ESORICS)[BK21 IF=2] , 2025
- CCSSysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple SiliconIn Proceedings of the ACM Conference on Computer and Communications Security (CCS)[BK21 IF=4] Also presented at Black Hat Europe 2024. , 2024
- ASIACCSPOSTER: On the Feasibility of Inferring SGX Execution through PMUIn Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS), 2024
- ElectronicsS-ZAC: Hardening Access Control of Service Mesh using Intel SGX for Zero Trust in CloudElectronics, 2024
- WISAExploiting Memory Page Management in KSM for Remote Memory Deduplication AttackIn Proceedings of the World Conference on Information Security Applications (WISA), 2023
- IEEE S&PDevIOus: Device-Driven Side-Channel Attacks on the IOMMUIn Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2023
- IEEE AccessThermalBleed: A Practical Thermal Side-Channel AttackIEEE Access, 2022
- WISAQuantitative Analysis on Attack Capacity in Meltdown-type AttacksIn Proceedings of the World Conference on Information Security Applications (WISA), 2021
- ICOINConstructing Covert Channel on Intel CPU-iGPU PlatformIn Proceedings of the International Conference on Information Networking (ICOIN), 2021
- ElectronicsBreaking KASLR Using Memory Deduplication in Virtualized EnvironmentsElectronics, 2021
- ASIACCS
- ICCE-AsiaGPU Side-channel Attacks are Everywhere: A SurveyIn Proceedings of the IEEE International Conference on Consumer Electronics - Asia (ICCE-Asia), 2020
- Appl. Sci.Real-Time Detection for Cache Side Channel Attack using Performance Counter MonitorApplied Sciences, 2020