publications
2026
- USENIX SecTIMESLICE-SANDWICH: A GPU Side-channel Attack Exploiting Time-Sliced SchedulingIn Proceedings of the USENIX Security Symposium, 2026
- ASIACCSSysDiver: Lightweight and Fast Static Analysis for Windows Kernel DriversIn Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS)[BK21 IF=1] , 2026
- ICOINEmpirical Study on BMC Firmware Vulnerabilities: Root Causes and Architectural InsightsIn Proceedings of the International Conference on Information Networking (ICOIN), 2026
2025
- ICISCPathFault: Automated Exploit Generator for Web Services via HTTP Message Parser DiscrepanciesIn Proceedings of the International Conference on Information Security and Cryptology (ICISC), 2025
- ACSACMimicCall: Bypassing System Call Filters via Kernel Function RedundancyIn Proceedings of the Annual Computer Security Applications Conference (ACSAC)[BK21 IF=2] , 2025
- WISAA Survey of Speculative Load Prediction Attacks Exploiting Memory Disambiguation UnitsIn Proceedings of the World Conference on Information Security Applications (WISA), 2025
- WISAPodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in KubernetesIn Proceedings of the World Conference on Information Security Applications (WISA), 2025
- ICOINMaximizing GPU Parallelism for a High-performance Cryptanalysis SystemIn Proceedings of the International Conference on Information Networking (ICOIN), 2025
- ESORICST-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDXIn Proceedings of the European Symposium on Research in Computer Security (ESORICS)[BK21 IF=2] , 2025
- ESORICSCache Demote for Fast Eviction Set Construction and Page Table Attribute LeakageIn Proceedings of the European Symposium on Research in Computer Security (ESORICS)[BK21 IF=2] , 2025
- ASIACCSVulnerable Intel GPU Context: Prohibit Complete Context Restore by Modifying Kernel DriverIn Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS)[BK21 IF=1] , 2025
- CSURA Survey of Side-Channel Attacks on Branch Prediction UnitsACM Computing Surveys, 2025
- ElectronicsBranchCloak: Mitigating Side-Channel Attacks on Directional Branch PredictorsElectronics, 2025
- IEEE AccessFuzzyBin: Enhanced Border Binary Identification by Leveraging Fuzzy Hashing AlgorithmsIEEE Access, 2025
2024
- CCSSysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple SiliconIn Proceedings of the ACM Conference on Computer and Communications Security (CCS)[BK21 IF=4] Also presented at Black Hat Europe 2024. , 2024
- ACSACPOSTER: Beyond the Filter: Advanced Mimicry Attack to Bypass System Call FilteringIn Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2024
- ICTCHBRA: A History-Based Remote Attestation Approach to Resolve Malicious Verifiers in IoTIn Proceedings of the International Conference on ICT Convergence (ICTC), 2024
- ASIACCSPOSTER: On the Feasibility of Inferring SGX Execution through PMUIn Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS), 2024
- ElectronicsS-ZAC: Hardening Access Control of Service Mesh using Intel SGX for Zero Trust in CloudElectronics, 2024
2023
- WISAExploiting Memory Page Management in KSM for Remote Memory Deduplication AttackIn Proceedings of the World Conference on Information Security Applications (WISA), 2023
- IEEE S&PDevIOus: Device-Driven Side-Channel Attacks on the IOMMUIn Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2023
- IEEE AccessMicroCFI: Microarchitecture-level Control-Flow Restrictions for Spectre MitigationIEEE Access, 2023
- TIFSDeep Learning based Detection for Multiple Cache Side-channel AttacksIEEE Transactions on Information Forensics and Security, 2023
- BMELGAN-based patient information hiding for an ECG authentication systemBiomedical Engineering Letters, 2023
- CSURFuzzing of Embedded Systems: A SurveyACM Computing Surveys, 2023
2022
- ICISCA Performance Evaluation of IPsec with Post-Quantum CryptographyIn Proceedings of the International Conference on Information Security and Cryptology (ICISC), 2022
- IEEE CLOUDAvengers, Assemble! Survey of WebAssembly Security SolutionsIn Proceedings of the IEEE International Conference on Cloud Computing (CLOUD), 2022
- SCNBroken Heart: Privacy Leakage Analysis on ECG-based Authentication SchemesSecurity and Communication Networks, 2022
- IEEE AccessThermalBleed: A Practical Thermal Side-Channel AttackIEEE Access, 2022
2021
- WISAQuantitative Analysis on Attack Capacity in Meltdown-type AttacksIn Proceedings of the World Conference on Information Security Applications (WISA), 2021
- SmartIoTA Secure and Privacy-Preserving ECG-based Personal AuthenticationIn Proceedings of the IEEE International Conference on Smart Internet of Things (SmartIoT), 2021
- ICOIN(Extended Abstract) DCUIP Poisoning Attack in Intel x86 ProcessorsIn Proceedings of the International Conference on Information Networking (ICOIN), 2021
- ICOINConstructing Covert Channel on Intel CPU-iGPU PlatformIn Proceedings of the International Conference on Information Networking (ICOIN), 2021
- ElectronicsBreaking KASLR Using Memory Deduplication in Virtualized EnvironmentsElectronics, 2021
- IEEE AccessRuntime Randomized Relocation of Crypto Libraries for Mitigating Cache AttacksIEEE Access, 2021
- IEICEDCUIP Poisoning Attack in Intel x86 ProcessorsIEICE Transactions on Information and Systems, 2021
- IEEE AccessMultibyte microarchitectural data sampling and its application to session key extraction attacksIEEE Access, 2021
2020
- CoNEXTReturn of Version Downgrade Attack in the Era of TLS 1.3In Proceedings of the ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT), 2020
- ICTCSoftware-based Random Number Generators for Resource Constrained DevicesIn Proceedings of the International Conference on ICT Convergence (ICTC), 2020
- ASIACCS
- ICCE-AsiaGPU Side-channel Attacks are Everywhere: A SurveyIn Proceedings of the IEEE International Conference on Consumer Electronics - Asia (ICCE-Asia), 2020
- INFOCOMInferring Firewall Rules by Cache Side-channel Analysis in Network Function VirtualizationIn Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2020
- ICOINCache Side-Channel Attack on Mail User AgentIn Proceedings of the International Conference on Information Networking (ICOIN), 2020
- TSCDecentralized Server-aided Encryption for Secure Deduplication in Cloud StorageIEEE Transactions on Services Computing, 2020
- SCNToward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing EnvironmentsSecurity and Communication Networks, 2020
- EnergiesLightweight and Seamless Memory Randomization for Mission-Critical Services in Cloud PlatformEnergies, 2020
- Appl. Sci.Real-Time Detection for Cache Side Channel Attack using Performance Counter MonitorApplied Sciences, 2020
2019
- ISOCCFPGA reverse engineering in Vivado design suite based on X-ray projectIn Proceedings of the International SoC Design Conference (ISOCC), 2019
- ICTCReal-Time Detection on Cache Side Channel Attacks using Performance Counter MonitorIn Proceedings of the International Conference on ICT Convergence (ICTC), 2019
- ASIACCSHigh efficiency, low-noise Meltdown attack by using a return stack bufferIn Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS), 2019
- NDSSPoster: FLUSH+REALOD Cache Side-Channel Attack on Mail User AgentIn Proceedings of the Network and Distributed System Security Symposium (NDSS), 2019
- IEEE AccessReinforcing Meltdown Attack By using Return Stack BufferIEEE Access, 2019
- Appl. Sci.A VM-Based Detection Framework against Remote Code Execution Attacks for Closed Source Network DevicesApplied Sciences, 2019
- IEICECross-VM Cache Timing Attacks on Virtualized Network FunctionsIEICE Transactions on Information and Systems, 2019
2018
- CCSUnveiling Hardware-based Data Prefetcher, a Hidden Source of Information LeakageIn Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2018
- IEEE CLOUDPrivacy-preserving and Updatable Block-level Data Deduplication in Cloud Storage ServicesIn Proceedings of the IEEE International Conference on Cloud Computing (CLOUD), 2018
- Appl. Sci.Improving Security and Reliability in Merkle Tree-based Online Data Authentication with Leakage ResilienceApplied Sciences, 2018
- Appl. Sci.Fast and Secure Implementation of Modular Exponentiation for Mitigating Fine-grained Cache attacksApplied Sciences, 2018
2017
- ICWSAn Online Data-Oriented Authentication based on Merkle Tree with Improved ReliabilityIn Proceedings of the IEEE International Conference on Web Services (ICWS), 2017
- ICDESecure Data Deduplication with Dynamic Ownership Management in Cloud Storage (Extended Abstract)In Proceedings of the IEEE International Conference on Data Engineering (ICDE), 2017
- PlatConPractical Data Outsourcing Framework with Provably Secure Deduplication in Untrusted Remote StorageIn Proceedings of the International Conference on Platform Technology and Service (PlatCon), 2017
- CSURA Survey of Secure Data Deduplication Schemes for Cloud Storage SystemsACM Computing Surveys, 2017
- TSCDecentralized Server-aided Encryption for Secure Deduplication in Cloud StorageIEEE Transactions on Services Computing, 2017
- MTAPSecure Proof of Storage with Deduplication for Cloud Storage SystemsMultimedia Tools and Applications, 2017
- IEICECLDSafe: An Efficient File Backup System in Cloud Storage against RansomwareIEICE Transactions on Information and Systems, 2017
- Appl. Sci.Privacy-Preserving Aggregation and Authentication of Multi-source Smart Meters in a Smart Grid SystemApplied Sciences, 2017
- ELEXAn efficient stream cipher for resistive RAMIEICE Electronics Express, 2017