publications

2026

  1. USENIX Sec
    TIMESLICE-SANDWICH: A GPU Side-channel Attack Exploiting Time-Sliced Scheduling
    Hodong Kim, Gyeongsup Lim, Seunghee Shin, Youngjoo Shin, and Junbeom Hur
    In Proceedings of the USENIX Security Symposium, 2026
  2. ASIACCS
    SysDiver: Lightweight and Fast Static Analysis for Windows Kernel Drivers
    Chanhee Park, Dongjoo Kim, and Youngjoo Shin
    In Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS)[BK21 IF=1] , 2026
  3. ICOIN
    Empirical Study on BMC Firmware Vulnerabilities: Root Causes and Architectural Insights
    Jihye Lee, Chanhee Park, and Youngjoo Shin
    In Proceedings of the International Conference on Information Networking (ICOIN), 2026

2025

  1. ICISC
    PathFault: Automated Exploit Generator for Web Services via HTTP Message Parser Discrepancies
    Juryeok Kim and Youngjoo Shin
    In Proceedings of the International Conference on Information Security and Cryptology (ICISC), 2025
  2. ACSAC
    MimicCall: Bypassing System Call Filters via Kernel Function Redundancy
    Songah Joo, Minchan Park, Hyerean Jang, and Youngjoo Shin
    In Proceedings of the Annual Computer Security Applications Conference (ACSAC)[BK21 IF=2] , 2025
  3. WISA
    A Survey of Speculative Load Prediction Attacks Exploiting Memory Disambiguation Units
    Selynn Kim, Taehun Kim, and Youngjoo Shin
    In Proceedings of the World Conference on Information Security Applications (WISA), 2025
  4. WISA
    PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes
    Yiju Jung, Hyerean Jang, and Youngjoo Shin
    In Proceedings of the World Conference on Information Security Applications (WISA), 2025
  5. ICOIN
    Maximizing GPU Parallelism for a High-performance Cryptanalysis System
    Sangyub Kim and Youngjoo Shin
    In Proceedings of the International Conference on Information Networking (ICOIN), 2025
  6. ESORICS
    T-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDX
    Woomin Lee, Taehun Kim, Seunghee Shin, Junbeom Hur, and Youngjoo Shin
    In Proceedings of the European Symposium on Research in Computer Security (ESORICS)[BK21 IF=2] , 2025
  7. ESORICS
    Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage
    Taehun Kim, Hyerean Jang, and Youngjoo Shin
    In Proceedings of the European Symposium on Research in Computer Security (ESORICS)[BK21 IF=2] , 2025
  8. ASIACCS
    Vulnerable Intel GPU Context: Prohibit Complete Context Restore by Modifying Kernel Driver
    Wonseok Choi and Youngjoo Shin
    In Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS)[BK21 IF=1] , 2025
  9. CSUR
    A Survey of Side-Channel Attacks on Branch Prediction Units
    Jihoon Kim, Hyerean Jang, and Youngjoo Shin
    ACM Computing Surveys, 2025
  10. Electronics
    BranchCloak: Mitigating Side-Channel Attacks on Directional Branch Predictors
    Jihoon Kim, Hyerean Jang, and Youngjoo Shin
    Electronics, 2025
  11. IEEE Access
    FuzzyBin: Enhanced Border Binary Identification by Leveraging Fuzzy Hashing Algorithms
    Dongsoo Kim, Hyerean Jang, and Youngjoo Shin
    IEEE Access, 2025

2024

  1. CCS
    SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon
    Hyerean Jang, Taehun Kim, and Youngjoo Shin
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS)[BK21 IF=4] Also presented at Black Hat Europe 2024. , 2024
  2. ACSAC
    POSTER: Beyond the Filter: Advanced Mimicry Attack to Bypass System Call Filtering
    Songah Joo, Hyerean Jang, and Youngjoo Shin
    In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2024
  3. ICTC
    HBRA: A History-Based Remote Attestation Approach to Resolve Malicious Verifiers in IoT
    Euiseong Moon and Youngjoo Shin
    In Proceedings of the International Conference on ICT Convergence (ICTC), 2024
  4. ASIACCS
    POSTER: On the Feasibility of Inferring SGX Execution through PMU
    Woomin Lee, Taehun Kim, and Youngjoo Shin
    In Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS), 2024
  5. Electronics
    S-ZAC: Hardening Access Control of Service Mesh using Intel SGX for Zero Trust in Cloud
    Changhee Han, Taehun Kim, Woomin Lee, and Youngjoo Shin
    Electronics, 2024

2023

  1. WISA
    Exploiting Memory Page Management in KSM for Remote Memory Deduplication Attack
    Seungyeon Bae, Taehun Kim, Woomin Lee, and Youngjoo Shin
    In Proceedings of the World Conference on Information Security Applications (WISA), 2023
  2. IEEE S&P
    DevIOus: Device-Driven Side-Channel Attacks on the IOMMU
    Taehun Kim, Hyeongjin Park, Seokmin Lee, Seunghee Shin, Junbeom Hur, and Youngjoo Shin
    In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2023
  3. IEEE Access
    MicroCFI: Microarchitecture-level Control-Flow Restrictions for Spectre Mitigation
    Hyerean Jang and Youngjoo Shin
    IEEE Access, 2023
  4. TIFS
    Deep Learning based Detection for Multiple Cache Side-channel Attacks
    Hodong Kim, Changhee Hahn, Hyunwoo J. Kim, Youngjoo Shin, and Junbeom Hur
    IEEE Transactions on Information Forensics and Security, 2023
  5. BMEL
    GAN-based patient information hiding for an ECG authentication system
    Youngshin Kang, Geunbo Yang, Heesang Eom, Seungwoo Han, Suwhan Baek, Seungil Noh, Youngjoo Shin, and Cheolsoo Park
    Biomedical Engineering Letters, 2023
  6. CSUR
    Fuzzing of Embedded Systems: A Survey
    Joobeom Yun, Fayozbek Rustmov, Juhwan Kim, and Youngjoo Shin
    ACM Computing Surveys, 2023

2022

  1. ICISC
    A Performance Evaluation of IPsec with Post-Quantum Cryptography
    Seungyeon Bae, Yuseong Chang, Hyeongjin Park, and Youngjoo Shin
    In Proceedings of the International Conference on Information Security and Cryptology (ICISC), 2022
  2. IEEE CLOUD
    Avengers, Assemble! Survey of WebAssembly Security Solutions
    Minseo Kim, Hyerean Jang, and Youngjoo Shin
    In Proceedings of the IEEE International Conference on Cloud Computing (CLOUD), 2022
  3. SCN
    Broken Heart: Privacy Leakage Analysis on ECG-based Authentication Schemes
    Seungil Noh, Jaehan Kim, Seokmin Lee, Youngshin Kang, Cheolsoo Park, and Youngjoo Shin
    Security and Communication Networks, 2022
  4. IEEE Access
    ThermalBleed: A Practical Thermal Side-Channel Attack
    Taehun Kim and Youngjoo Shin
    IEEE Access, 2022

2021

  1. WISA
    Quantitative Analysis on Attack Capacity in Meltdown-type Attacks
    Seokmin Lee, Taehun Kim, and Youngjoo Shin
    In Proceedings of the World Conference on Information Security Applications (WISA), 2021
  2. SmartIoT
    A Secure and Privacy-Preserving ECG-based Personal Authentication
    Youngshin Kang, Hyeonbin Lee, Youngjoo Shin, and Cheolsoo Park
    In Proceedings of the IEEE International Conference on Smart Internet of Things (SmartIoT), 2021
  3. ICOIN
    (Extended Abstract) DCUIP Poisoning Attack in Intel x86 Processors
    Youngjoo Shin
    In Proceedings of the International Conference on Information Networking (ICOIN), 2021
  4. ICOIN
    Constructing Covert Channel on Intel CPU-iGPU Platform
    Taehun Kim, Taehyun Kim, and Youngjoo Shin
    In Proceedings of the International Conference on Information Networking (ICOIN), 2021
  5. Electronics
    Breaking KASLR Using Memory Deduplication in Virtualized Environments
    Taehun Kim, Jaehan Kim, and Youngjoo Shin
    Electronics, 2021
  6. IEEE Access
    Runtime Randomized Relocation of Crypto Libraries for Mitigating Cache Attacks
    Youngjoo Shin and Joobeom Yun
    IEEE Access, 2021
  7. IEICE
    DCUIP Poisoning Attack in Intel x86 Processors
    Youngjoo Shin
    IEICE Transactions on Information and Systems, 2021
  8. IEEE Access
    Multibyte microarchitectural data sampling and its application to session key extraction attacks
    Youngjoo Shin
    IEEE Access, 2021

2020

  1. CoNEXT
    Return of Version Downgrade Attack in the Era of TLS 1.3
    Sangtae Lee, Youngjoo Shin, and Junbeom Hur
    In Proceedings of the ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT), 2020
  2. ICTC
    Software-based Random Number Generators for Resource Constrained Devices
    Seungil Noh and Youngjoo Shin
    In Proceedings of the International Conference on ICT Convergence (ICTC), 2020
  3. ASIACCS
    (Poster) Mitigating Memory Sharing-based Side-channel Attack by Embedding Random Values in Binary for Cloud Environment
    Taehun Kim and Youngjoo Shin
    In Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS), 2020
  4. ICCE-Asia
    GPU Side-channel Attacks are Everywhere: A Survey
    Taehun Kim and Youngjoo Shin
    In Proceedings of the IEEE International Conference on Consumer Electronics - Asia (ICCE-Asia), 2020
  5. INFOCOM
    Inferring Firewall Rules by Cache Side-channel Analysis in Network Function Virtualization
    Youngjoo Shin, Dongyoung Koo, and Junbeom Hur
    In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2020
  6. ICOIN
    Cache Side-Channel Attack on Mail User Agent
    Hodong Kim, Hyundo Yoon, Youngjoo Shin, and Junbeom Hur
    In Proceedings of the International Conference on Information Networking (ICOIN), 2020
  7. TSC
    Decentralized Server-aided Encryption for Secure Deduplication in Cloud Storage
    Youngjoo Shin, Dongyoung Koo, Joobeom Yun, and Junbeom Hur
    IEEE Transactions on Services Computing, 2020
  8. SCN
    Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments
    Youngjoo Shin, Junbeom Hur, Dongyoung Koo, and Joobeom Yun
    Security and Communication Networks, 2020
  9. Energies
    Lightweight and Seamless Memory Randomization for Mission-Critical Services in Cloud Platform
    Joobeom Yun, Ki-Woong Park, Dongyoung Koo, and Youngjoo Shin
    Energies, 2020
  10. Appl. Sci.
    Real-Time Detection for Cache Side Channel Attack using Performance Counter Monitor
    Jonghyeon Cho, Taehun Kim, Soojin Kim, Miok Im, Taehyun Kim, and Youngjoo Shin
    Applied Sciences, 2020

2019

  1. ISOCC
    FPGA reverse engineering in Vivado design suite based on X-ray project
    Hoyoung Yu, Hyung-Min Lee, Youngjoo Shin, and Youngmin Kim
    In Proceedings of the International SoC Design Conference (ISOCC), 2019
  2. ICTC
    Real-Time Detection on Cache Side Channel Attacks using Performance Counter Monitor
    JongHyeon Cho, TaeHyun Kim, and Youngjoo Shin
    In Proceedings of the International Conference on ICT Convergence (ICTC), 2019
  3. ASIACCS
    High efficiency, low-noise Meltdown attack by using a return stack buffer
    TaeHyun Kim and Youngjoo Shin
    In Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS), 2019
  4. NDSS
    Poster: FLUSH+REALOD Cache Side-Channel Attack on Mail User Agent
    Hodong Kim, Hyundo Yoon, Youngjoo Shin, and Junbeom Hur
    In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2019
  5. IEEE Access
    Reinforcing Meltdown Attack By using Return Stack Buffer
    TaeHyun Kim and Youngjoo Shin
    IEEE Access, 2019
  6. Appl. Sci.
    A VM-Based Detection Framework against Remote Code Execution Attacks for Closed Source Network Devices
    Youngjoo Shin
    Applied Sciences, 2019
  7. IEICE
    Cross-VM Cache Timing Attacks on Virtualized Network Functions
    Youngjoo Shin
    IEICE Transactions on Information and Systems, 2019

2018

  1. CCS
    Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage
    Youngjoo Shin, Hyung Chan Kim, Dokeun Kwon, Ji Hoon Jeong, and Junbeom Hur
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2018
  2. IEEE CLOUD
    Privacy-preserving and Updatable Block-level Data Deduplication in Cloud Storage Services
    Hyungjune Shin, Dongyoung Koo, Youngjoo Shin, and Junbeom Hur
    In Proceedings of the IEEE International Conference on Cloud Computing (CLOUD), 2018
  3. Appl. Sci.
    Improving Security and Reliability in Merkle Tree-based Online Data Authentication with Leakage Resilience
    Dongyoung Koo, Youngjoo Shin, Joobeom Yun, and Junbeom Hur
    Applied Sciences, 2018
  4. Appl. Sci.
    Fast and Secure Implementation of Modular Exponentiation for Mitigating Fine-grained Cache attacks
    Youngjoo Shin
    Applied Sciences, 2018

2017

  1. ICWS
    An Online Data-Oriented Authentication based on Merkle Tree with Improved Reliability
    Dongyoung Koo, Youngjoo Shin, Joobeom Yun, and Junbeom Hur
    In Proceedings of the IEEE International Conference on Web Services (ICWS), 2017
  2. ICDE
    Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage (Extended Abstract)
    Junbeom Hur, Dongyoung Koo, Youngjoo Shin, and Kyungtae Kang
    In Proceedings of the IEEE International Conference on Data Engineering (ICDE), 2017
  3. PlatCon
    Practical Data Outsourcing Framework with Provably Secure Deduplication in Untrusted Remote Storage
    Dongyoung Koo, Youngjoo Shin, and Junbeom Hur
    In Proceedings of the International Conference on Platform Technology and Service (PlatCon), 2017
  4. CSUR
    A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems
    Youngjoo Shin, Dongyoung Koo, and Junbeom Hur
    ACM Computing Surveys, 2017
  5. TSC
    Decentralized Server-aided Encryption for Secure Deduplication in Cloud Storage
    Youngjoo Shin, Dongyoung Koo, Joobeom Yun, and Junbeom Hur
    IEEE Transactions on Services Computing, 2017
  6. MTAP
    Secure Proof of Storage with Deduplication for Cloud Storage Systems
    Youngjoo Shin, Dongyoung Koo, Junbeom Hur, and Joobeom Yun
    Multimedia Tools and Applications, 2017
  7. IEICE
    CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware
    Joobeom Yun, Junbeom Hur, Youngjoo Shin, and Dongyoung Koo
    IEICE Transactions on Information and Systems, 2017
  8. Appl. Sci.
    Privacy-Preserving Aggregation and Authentication of Multi-source Smart Meters in a Smart Grid System
    Dongyoung Koo, Youngjoo Shin, and Junbeom Hur
    Applied Sciences, 2017
  9. ELEX
    An efficient stream cipher for resistive RAM
    Joobeom Yun, Ki-Woong Park, Youngjoo Shin, and Hee-Dong Kim
    IEICE Electronics Express, 2017