PUBLICATIONS 


2024

[6] Hyerean Jang, Taehun Kim, and Youngjoo Shin, "SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon", Black Hat Europe 2024, December 9-12, 2024, London, UK

[5] Songah Joo, Hyerean Jang, and Youngjoo Shin, "POSTER: Beyond the Filter: Advanced Mimicry Attack to Bypass System Call Filtering", The 40th Annual Computer Security Applications Conference (ACSAC 2024), December 9-13, 2024, Honolulu, Hawaii, USA (To Appear)

[4] Hyerean Jang, Taehun Kim, and Youngjoo Shin, "SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon", The 31st ACM Conference on Computer and Communications Security (CCS 2024), October 14-18, 2024, Salt Lake City, USA

[3] Euiseong Moon and Youngjoo Shin, "HBRA: A History-Based Remote Attestation Approach to Resolve Malicious Verifiers in IoT", The 15th International Conference on ICT Convergence (ICTC), October 16-18, 2024, Jeju Island, Korea

[2] Changhee Han, Taehun Kim, Woomin Lee, and Youngjoo Shin, "S-ZAC: Hardening Access Control of Service Mesh using Intel SGX for Zero Trust in Cloud", Electronics, 13(16), 2024

[1] Woomin Lee, Taehun Kim, and Youngjoo Shin, "POSTER: On the Feasibility of Inferring SGX Execution through PMU", The 19th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2024), July 1-5, 2024, Singapore


2023

[6] Hyerean Jang, and Youngjoo Shin, "MicroCFI: Microarchitecture-level Control-Flow Restrictions for Spectre Mitigation", IEEE Access, Vol.11, pp.138699-138711, 2023, DOI:10.1109/ACCESS.2023.3340680

[5] Hodong Kim, Changhee Hahn, Hyunwoo J. Kim, Youngjoo Shin, and Junbeom Hur, "Deep Learning based Detection for Multiple Cache Side-channel Attacks,"  IEEE Transactions on Information Forensics and Security (TIFS), DOI: 10.1109/TIFS.2023.3340088

[4] Seungyeon Bae, Taehun Kim, Woomin Lee, and Youngjoo Shin, "Exploiting Memory Page Management in KSM for Remote Memory Deduplication Attack," The 24nd World Conference on Information Security Applications (WISA), August, 23-25, 2023, Jeju, South Korea

[3] Taehun Kim, Hyeongjin Park, Seokmin Lee, Seunghee Shin, Junbeom Hur, Youngjoo Shin, “DevIOus: Device-Driven Side-Channel Attacks on the IOMMU”,  The 44th IEEE Symposium on Security and Privacy (S&P 2023), May 22-25, 2023, San Francisco, USA

[2] Youngshin Kang, Geunbo Yang, Heesang Eom, Seungwoo Han, Suwhan Baek, Seungil Noh, Youngjoo Shin, Cheolsoo Park, "GAN-based patient information hiding for an ECG authentication system",  Biomed. Eng. Lett. (2023). https://doi.org/10.1007/s13534-023-00266-y

[1] Joobeom Yun, Fayozbek Rustmov, Juhwan Kim, and Youngjoo Shin "Fuzzing of Embedded Systems: A Survey", ACM Computing Surveys (CSUR), Vol. 55, No. 7, pp. 137:1-33:, 2023. 7.


2022

[5]  Seungyeon Bae, Yuseong Chang, Hyeongjin Park, and Youngjoo Shin, "A Performance Evaluation of IPsec with Post-Quantum Cryptography," International Conference on Information Security and Cryptology (ICISC), November 30 ~ December 2, 2022, Seoul, Korea

[4] Seungil Noh, Jaehan Kim, Seokmin Lee, Youngshin Kang, Cheolsoo Park, and Youngjoo Shin, "Broken Heart : Privacy Leakage Analysis on ECG-based Authentication Schemes," Security and Communication Networks, 2022 

[3] Minseo Kim, Hyerean Jang, and Youngjoo Shin, “Avengers, Assemble! Survey of WebAssembly Security Solutions”, IEEE International Conference on Cloud Computing (CLOUD), July 11-16, 2022, Barcelona, Spain 

[2] Gun-hee Ahn, Sang-hyuk An, Dong-kyun Lim, Su-hwan Jeong, Jaewoo Kim, and Youngjoo Shin, "Secure and Efficient Package Management Techniques in Closed Networks," KIPS Transactions on Computer and Communication Systems (KTCCS), 2022

[1]Taehun Kim and Youngjoo Shin, "ThermalBleed: A Practical Thermal Side-Channel Attack", IEEE Access, Vol.10, pp.25718-25731, 2022, DOI:10.1109/ACCESS.2022.3156596


2021

[8] Taehun Kim, Taehyun Kim and Youngjoo Shin, "Breaking KASLR Using Memory Deduplication in Virtualized Environments," Electronics, 2021, 10(17):2174, https://doi.org/10.3390/electronics10172174

[7] Seokmin Lee, Taehun Kim and Youngjoo Shin, "Quantitative Analysis on Attack Capacity in Meltdown-type Attacks," The 22nd World Conference on Information Security Applications (WISA), August, 11-13, 2021, Jeju, South Korea

[6] Youngjoo Shin and Joobeom Yun, "Runtime Randomized Relocation of Crypto Libraries for Mitigating Cache Attacks," IEEE Access, Vol.9, pp.108851 - 108860, 2021 

[5] Youngshin Kang, Hyeonbin Lee, Youngjoo Shin and Cheolsoo Park, "A Secure and Privacy-Preserving ECG-based Personal Authentication", The 5th IEEE International Conference on Smart Internet of Things (SmartIoT 2021), August 13-15, 2021, Jeju, South Korea

[4] Youngjoo Shin, "DCUIP Poisoning Attack in Intel x86 Processors", IEICE Transactions on Information and Systems, Vol.E102-D, No.8, pp.1386-1390, August, 2021

[3]  Youngjoo Shin, "Multibyte microarchitectural data sampling and its application to session key extraction attacks", IEEE Access, Vol.9, pp.80806-80820, 2021

[2] Youngjoo Shin, "(Extended Abstract) DCUIP Poisoning Attack in Intel x86 Processors", The 35th International Conference on Information Networking (ICOIN),  January 13-16, 2021, Jeju, South Korea 

[1] Taehun Kim, Jaehan Kim and Youngjoo Shin, "Constructing Covert Channel on Intel CPU-iGPU Platform",  The 35th International Conference on Information Networking (ICOIN), 13-16, January, 2021, Jeju, South Korea 

 

2020

[12] Youngjoo Shin, Dongyoung Koo, Joobeom Yun, Junbeom Hur, "Decentralized Server-aided Encryption for Secure Deduplication in Cloud Storage," IEEE Transactions on Services Computing , Vol.13, No.6, pp.1021-1033.

[11]  Sangtae Lee, Youngjoo Shin and Junbeom Hur, "Return of Version Downgrade Attack in the Era of TLS 1.3"The 16th International Conference on emerging Networking EXperiments and Technologies (ACM CoNEXT 2020), 1-4 December 2020, Barcelona, Spain

[10] Seungil Noh and Youngjoo Shin, "Software-based Random Number Generators for Resource Constrained Devices", The 11th International Conference on ICT Convergence (ICTC),21-23 October 2020, Jeju, Korea 

[9] Taehun Kim and Youngjoo Shin, "(Poster) Mitigating Memory Sharing-based Side-channel Attack by Embedding Random Values in Binary for Cloud Environment," ACM ASIACCS, 2020 

[8] Taehun Kim and Youngjoo Shin, "GPU Side-channel Attacks are Everywhere: A Survey," The Fifth IEEE/IEIE International Conference On Consumer Electronics (ICCE) Asia, November 1-3, 2020, Seoul, Korea 

[7] Miok Im, Soojin Kim, Youngjoo Shin, "Framework on Cache Side-channel Attack Detection Using Real-time Monitoring," Proceedings of the Korea Information Processing Society Conference, 142-145, 2020

[6] Youngjoo Shin, Dongyoung Koo and Junbeom Hur, "Inferring Firewall Rules by Cache Side-channel Analysis in Network Function Virtualization," IEEE International Conference on Computer Communications (INFOCOM 2020), July 6-9, 2020, Toronto, Canada

[5] Hodong Kim, Hyundo Yoon, Youngjoo Shin and Junbeom Hur, "Cache Side-Channel Attack on Mail User Agent," The 34th International Conference on Information Networking (ICOIN 2020),  January 7-10, 2020, Barcelona, Spain 

[4] Youngjoo Shin, Junbeom Hur, Dongyoung Koo, Joobeom Yun, "Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments", Security and Communication Networks, 2020 

[3] Joobeom Yun, Ki-Woong Park, Dongyoung Koo, Youngjoo Shin, "Lightweight and Seamless Memory Randomization for Mission-Critical Services in Cloud Platform", Energies, 13(6), 2020

[2] Jonghyeon Cho, Taehun Kim, Soojin Kim, Miok Im, Taehyun Kim, Youngjoo Shin, "Real-Time Detection for Cache Side Channel Attack using Performance Counter Monitor." Applied Sciences, 10(1), 2020

[1] Taehun Kim and Youngjoo Shin, "JMP+RAND: Mitigating Memory Sharing-based Side-channel Attack by Embedding Random Values in Binaries," KIPS Transactions on Computer and Communication Systems (KTCCS), 2020 


2019

[7] Hoyoung Yu, Hyung-Min Lee, Youngjoo Shin, Youngmin Kim, "FPGA reverse engineering in Vivado design suite based on X-ray project," 2019 International SoC Design Conference (ISOCC), October 2019, Korea

[6] JongHyeon Cho, TaeHyun Kim and Youngjoo Shin, "Real-Time Detection on Cache Side Channel Attacks using Performance Counter Monitor",ICTC 2019,16-18 October 2019,Jeju,Korea

[5]  TaeHyun Kim and Youngjoo Shin, "High efficiency, low-noise Meltdown attack by using a return stack buffer", ACM ASIACCS 2019, 2-7 July 2019, Auckland, New Zealand 

[4]  Hodong Kim, Hyundo Yoon, Youngjoo Shin and Junbeom Hur, "Poster: FLUSH+REALOD Cache Side-Channel Attack on Mail User Agent," The Network and Distributed System Security (NDSS) Symposium 2019, 24-27 February 2019, San Diego, CA, USA 

[3] Taehyun Kim, Youngjoo Shin, "Reinforcing Meltdown Attack By using Return Stack Buffer," IEEE Access, Vol.7, pp.186065-186077, 2019

[2] Youngjoo Shin, "A VM-Based Detection Framework against Remote Code Execution Attacks for Closed Source Network Devices," Applied Sciences, 9(7), 2019

[1] Youngjoo Shin, "Cross-VM Cache Timing Attacks on Virtualized Network Functions," IEICE Transactions on Information and Systems, Vol.E102-D,No.9,pp.1874-1877,Sep. 2019.


2018

[4] Youngjoo Shin, Hyung Chan Kim, Dokeun Kwon, Ji Hoon Jeong and Junbeom Hur, "Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage", In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS 2018) Toronto, Canada, October 2018. 

[3] Hyungjune Shin, Dongyoung Koo, Youngjoo Shin and Junbeom Hur, "Privacy-preserving and Updatable Block-level Data Deduplication in Cloud Storage Services," IEEE International Conference on Cloud Computing (IEEE CLOUD 2018), July 2-7, 2018, San Francisco, USA.

[2] Dongyoung Koo, Youngjoo Shin, Joobeom Yun, Junbeom Hur, "Improving Security and Reliability in Merkle Tree-based Online Data Authentication with Leakage Resilience," Applied Sciences, 8(12), 2018

[1] Youngjoo Shin, "Fast and Secure Implementation of Modular Exponentiation for Mitigating Fine-grained Cache attacks", Applied Sciences, 8(8), 2018


2017

[9] Dongyoung Koo, Youngjoo Shin, Joobeom Yun, Junbeom Hur, "An Online Data-Oriented Authentication based on Merkle Tree with Improved Reliability", 24th IEEE International Conference on Web Services (IEEE ICWS), 2017. 6. 25~30, Honolulu, Hawaii, USA.

[8] Junbeom Hur, Dongyoung Koo, Youngjoo Shin, Kyungtae Kang, "Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage (Extended Abstract)", 2017 IEEE International Conference on Data Engineering (ICDE), 2017. 4. 19~22, San Diego, USA.

[7] Dongyoung Koo, Youngjoo Shin, Junbeom Hur, "Practical Data Outsourcing Framework with Provably Secure Deduplication in Untrusted Remote Storage", 2017 International Conference on Platform Technology and Service (PlatCon), Busan, Korea, 2017. 2. 13 ~ 15.

[6] Youngjoo Shin, Dongyoung Koo, Junbeom Hur, "A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems", ACM Computing Surveys (CSUR), Vol. 49, No. 4, pp. 74:1-74:38, 2017. 1.

[5] Youngjoo Shin, Dongyoung Koo, Joobeom Yun, Junbeom Hur, "Decentralized Server-aided Encryption for Secure Deduplication in Cloud Storage," IEEE Transactions on Services Computing , DOI:10.1109/TSC.2017.2748594 (Online published), 2017

[4] Youngjoo Shin, Dongyoung Koo, Junbeom Hur, Joobeom Yun, “Secure Proof of Storage with Deduplication for Cloud Storage Systems”, Multimedia Tools and Applications,  Vol.7, Issue 19, pp.19363-19378,2017

[3] Joobeom Yun , Junbeom Hur,  Youngjoo Shin,  Dongyoung Koo , "CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware," IEICE Transactions on Information and Systems, DOI: 10.1587/transinf.2017EDL8052 (Online published), 2017

[2] Dongyoung Koo, Youngjoo Shin, Junbeom Hur, "Privacy-Preserving Aggregation and Authentication of Multi-source Smart Meters in a Smart Grid System," Applied Sciences,  7(10), 2017

[1] Joobeom Yun, Ki-Woong Park, Youngjoo Shin, Hee-Dong Kim, "An efficient stream cipher for resistive RAM", IEICE Electronics Express (ELEX), Vol.14, No.7, pp.20170179, 2017.4.