Follow
Donguk Kim
Donguk Kim
Verified email at samsung.com
Title
Cited by
Cited by
Year
Prime+ count: Novel cross-world covert channels on arm trustzone
H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
522018
Electronic apparatus and control method thereof
KH Lee, J Hur, JH Kim, J Park, D Kim
US Patent App. 15/440,283, 2017
402017
A malicious application detection framework using automatic feature extraction tool on android market
D Kim, J Kim, S Kim
3rd International Conference on Computer Science and Information Technology …, 2013
222013
Rethinking anti-emulation techniques for large-scale software deployment
D Jang, Y Jeong, S Lee, M Park, K Kwak, D Kim, BB Kang
computers & security 83, 182-200, 2019
152019
Smokebomb: effective mitigation against cache side-channel attacks on the arm architecture
H Cho, J Park, D Kim, Z Zhao, Y Shoshitaishvili, A Doupé, GJ Ahn
Proceedings of the 18th International Conference on Mobile Systems …, 2020
122020
A counterattack-detection scheme in transmission time-based wormhole detection methods
D Kim, H Kim, G Kim, S Kim
International Journal of Distributed Sensor Networks 9 (3), 184931, 2013
122013
Server and user terminal
S Ha, D Kim, JM Kim
US Patent 10,250,616, 2019
82019
Server and user terminal
S HA, D KIM, JM KIM
WO Patent 2,017,047,928, 2016
82016
Are there wireless hidden cameras spying on me?
J Heo, S Gil, Y Jung, J Kim, D Kim, W Park, Y Kim, KG Shin, CH Lee
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
72022
An efficient kernel introspection system using a secure timer on trustzone
J Kim, D Kim, J Park, J Kim, H Kim
Journal of The Korea Institute of Information Security & Cryptology 25 (4 …, 2015
42015
프락시 기반 애플리케이션 전자서명 검증 시스템
권상완, 김동욱, 이경우
정보보호학회논문지 27 (4), 743-751, 2017
22017
Scheduler-based Defense Method against Address Translation Redirection Attack (ATRA)
D Jang, J Jang, D Kim, C Choi, BB Kang
Journal of The Korea Institute of Information Security & Cryptology 25 (4 …, 2015
22015
안드로이드 앱 캐시 변조 공격의 설계 및 구현
홍석, 김동욱, 김형식
정보보호학회논문지 29 (1), 205-214, 2019
2019
전자 장치 및 그 제어 방법
김동욱, 강병훈, 하승현, 장대희, 장진수, 홍석
KR Patent App. 10-2017-0,148,241, 2017
2017
부채널 공격으로부터 정보를 보호하는 방법 및 디바이스
박진범, 김동욱
KR Patent App. 10-2017-0,138,460, 2017
2017
전자 장치 및 그의 제어 방법
김동욱, 박진범
KR Patent App. 10-2017-0,125,929, 2017
2017
안드로이드 어플리케이션 패키지에 포함된 검증키를 이용한 JNI Caller 검증 방법
홍석, 김동욱
2017년 정보보호학회 하계학술대회 (CISC-S'17), 2017
2017
SERVER AND USER TERMINAL
하승현, 김동욱, 김진목
CN Patent 106,548,062, 2017
2017
전자 장치와 이의 동작 방법
하승현, 김동욱, 김진목, 이호선
KR Patent App. 10-2017-0,008,060, 2017
2017
A Snoop-based Kernel Introspection System against Address Translation Redirection Attack
D Kim, J Kim, J Park
Samsung Journal of Innovative Technology 13, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20