


default search action
Jin Soo Jang
Person information
- affiliation: Korea Advanced Institute of Technology, Daejeon, South Korea
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c8]Seongman Lee
, Seoye Kim
, Chihyun Song
, Byeongsu Woo
, Eunyeong Ahn
, Junsu Lee
, Yeongjin Jang
, Jinsoo Jang
, Hojoon Lee
, Brent ByungHoon Kang
:
GENESIS: A Generalizable, Efficient, and Secure Intra-kernel Privilege Separation. SAC 2024: 1366-1375 - 2023
- [c7]Seung-Kyun Han, Jinsoo Jang:
MyTEE: Own the Trusted Execution Environment on Embedded Devices. NDSS 2023 - 2022
- [j9]Jinsoo Jang
, Brent ByungHoon Kang
:
3rdParTEE: Securing Third-Party IoT Services Using the Trusted Execution Environment. IEEE Internet Things J. 9(17): 15814-15826 (2022) - [j8]Seongman Lee
, Hyeonwoo Kang
, Jinsoo Jang
, Brent ByungHoon Kang
:
SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout. IEEE Trans. Dependable Secur. Comput. 19(4): 2559-2575 (2022) - 2020
- [j7]Dongjae Jung
, Minsu Kim
, Jinsoo Jang
, Brent ByungHoon Kang
:
Value-Based Constraint Control Flow Integrity. IEEE Access 8: 50531-50542 (2020) - [j6]Jinsoo Jang
, Brent ByungHoon Kang
:
Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection. IEEE Trans. Dependable Secur. Comput. 17(5): 1000-1014 (2020) - [c6]Jinsoo Jang, Brent ByungHoon Kang:
SelMon: reinforcing mobile device security with self-protected trust anchor. MobiSys 2020: 135-147
2010 – 2019
- 2019
- [j5]Jinsoo Jang
, Brent ByungHoon Kang:
Securing a communication channel for the trusted execution environment. Comput. Secur. 83: 79-92 (2019) - [j4]Hojoon Lee
, Hyungon Moon, Ingoo Heo, DaeHee Jang, Jinsoo Jang
, Kihwan Kim, Yunheung Paek, Brent ByungHoon Kang:
KI-Mon ARM: A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object. IEEE Trans. Dependable Secur. Comput. 16(2): 287-300 (2019) - [c5]Jinsoo Jang
, Brent ByungHoon Kang:
In-process Memory Isolation Using Hardware Watchpoint. DAC 2019: 32 - [c4]Jinsoo Jang
, Brent ByungHoon Kang:
Revisiting the ARM Debug Facility for OS Kernel Security. DAC 2019: 110 - [e1]Brent ByungHoon Kang, Jin Soo Jang:
Information Security Applications - 19th International Conference, WISA 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11402, Springer 2019, ISBN 978-3-030-17981-6 [contents] - 2018
- [j3]Jin Soo Jang
, Changho Choi
, Jae-Hyuk Lee, Nohyun Kwak, Seongman Lee, Yeseul Choi, Brent ByungHoon Kang:
PrivateZone: Providing a Private Execution Environment Using ARM TrustZone. IEEE Trans. Dependable Secur. Comput. 15(5): 797-810 (2018) - 2017
- [j2]Changho Choi
, Nohyun Kwak, Jin Soo Jang
, DaeHee Jang, Kuenwhee Oh, Kyungsoo Kwag
, Brent ByungHoon Kang
:
S-OpenSGX: A system-level platform for exploring SGX enclave-based computing. Comput. Secur. 70: 290-306 (2017) - [c3]Jae-Hyuk Lee, Jin Soo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, Brent ByungHoon Kang:
Hacking in Darkness: Return-oriented Programming against Secure Enclaves. USENIX Security Symposium 2017: 523-539 - 2016
- [j1]Yonggon Kim, Ohmin Kwon
, Jin Soo Jang
, Seongwook Jin, Hyeongboo Baek, Brent ByungHoon Kang, Hyunsoo Yoon:
On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators. Comput. Secur. 62: 33-48 (2016) - 2015
- [c2]Jin Soo Jang, Sunjune Kong, Minsu Kim, Daegyeong Kim, Brent ByungHoon Kang:
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment. NDSS 2015
2000 – 2009
- 2001
- [c1]Jin Soo Jang, Woo Hyun Ahn, Daeyeon Park:
A Server Framework for Scheduling Multimedia Applications in Open System Environment. ICPADS 2001: 562-572
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint