Hacking in darkness: Return-oriented programming against secure enclaves J Lee, J Jang, Y Jang, N Kwak, Y Choi, C Choi, T Kim, M Peinado, ... 26th USENIX Security Symposium (USENIX Security 17), 523-539, 2017 | 218 | 2017 |
SGX-Bomb: Locking down the processor via Rowhammer attack Y Jang, J Lee, S Lee, T Kim Proceedings of the 2nd Workshop on System Software for Trusted Execution, 1-6, 2017 | 171 | 2017 |
OpenSGX: An Open Platform for SGX Research. P Jain, SJ Desai, MW Shih, T Kim, SM Kim, JH Lee, C Choi, Y Shin, ... NDSS 16, 21-24, 2016 | 132 | 2016 |
Privatezone: Providing a private execution environment using arm trustzone J Jang, C Choi, J Lee, N Kwak, S Lee, Y Choi, BB Kang IEEE Transactions on Dependable and Secure Computing 15 (5), 797-810, 2016 | 56 | 2016 |
A Rule Extraction Method Using Relevance Factor for FMM Neural Networks SK Lee, JH Lee, HJ Kim KIPS Transactions on Software and Data Engineering 2 (5), 341-346, 2013 | 1 | 2013 |
autofz: automated fuzzer composition at runtime YF Fu, J Lee, T Kim 32nd USENIX Security Symposium (USENIX Security 23), 1901-1918, 2023 | | 2023 |
SENSE: Enhancing Microarchitectural Awareness for TEEs via Subscription-Based Notification F Sang, J Lee, X Zhang, M Xu, S Constable, Y Xiao, M Steiner, M Vij, ... | | |