Publications

International Journals

    1. S. Yoo and E.-S. Ryu. 2017. Parallel HEVC decoding with asymmetric mobile multicores. Multimedia Tools Appl. 76, 16 (August 2017), 17337-17352. DOI: https://doi.org/10.1007/s11042-016-4269-2
    2. H. Park, S. Yoo, C. Hong and C. Yoo, "Storage SLA Guarantee with Novel SSD I/O Scheduler in Virtualized Data Centers," in IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 8, pp. 2422-2434, 1 Aug. 2016. DOI: 10.1109/ TPDS.2015.2493524
    3. H. Park, H. Jo, C. Hong, Y. Kim, S. Yoo and C. Yoo, "SSD-Tailor: Automated Customization System for Solid-State Drives," in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 34, no. 5, pp. 862-866, May 2015. DOI: 10.1109/TCAD.2015.2394500
    4. S. Yoo, An empirical validation of power-performance scaling: DVFS vs. multi-core scaling in big.LITTLE processor, IEICE Electronics Express, 2015, Volume 12, Issue 8, Pages 20150236, Released April 25, 2015
    5. C. Lee, C. Hong, S. Yoo and C. Yoo, "Compressed and shared swap to extend available memory in virtualized consumer electronics," in IEEE Transactions on Consumer Electronics, vol. 60, no. 4, pp. 628-635, Nov. 2014. doi: 10.1109/ TCE.2014.7027336
    6. S. Yoo and C. Yoo, "Real-Time Scheduling for Xen-ARM Virtual Machines," in IEEE Transactions on Mobile Computing, vol. 13, no. 8, pp. 1857-1867, Aug. 2014. doi: 10.1109/TMC.2013.109


International Conferences

    1. S. Yoo, H. Kim, and J. Kim, 2018. "Secure Compute-VM: Secure Big Data Processing with SGX and Compute Accelerators". In Proceedings of the 3rd Workshop on System Software for Trusted Execution (SysTEX '18). ACM, New York, NY, USA, 34-36. DOI: https://doi.org/10.1145/3268935.3268945
    2. S. Lee, and S. Yoo, "TUX: Trust Update on Linux Booting," 14th International Workshop on Security and Trust Management (STM 2018), Barcelona, Spain, 2018. https://doi.org/10.1007/978-3-030-01141-3_7
    3. S. Yoo, "Leveraging multicores for mobile edge computing," 2018 International Conference on Information Networking (ICOIN 2018), Chiang Mai, 2018, pp. 869-874. doi: 10.1109/ICOIN.2018.8343246
    4. Y. Shim and S. Yoo. 2016. Poster: Breaching Pattern Screen Lock Security. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion (MobiSys '16 Companion). ACM, New York, NY, USA, 78-78. DOI: https://doi.org/10.1145/2938559.2948860
    5. S. Yoo, Y. Shim, Se. Lee, S.-A. Lee, and J. Kim. 2015. A case for bad big.LITTLE switching: how to scale power-performance in SI-HMP. In Proceedings of the Workshop on Power-Aware Computing and Systems (HotPower '15). ACM, New York, NY, USA, 1-5. DOI: http://dx.doi.org/10.1145/2818613.2818745


Open Source/Public Talk

    1. S. Lee, and H. Kim, "TUX: Trust Update on Linux Kernel," Linux Security Summit North America 2018, Vancouver, Canada
    2. S. Yoo, "Making ARM devices Trustworthy," ARM research Summit 2017, Cambridge, United Kingdom
    3. S. Yoo, "Beginning to Harden Linux by Secure boot + Measured boot," LinuxCon 2017, Beijing, China


Domestic Journals (written in Korean)

    1. H. Kim, and S. Yoo, "Vulnerability Analysis on Kernel Code and Memory Protection in Nested Kernel," in Journal of Korean Institute Information Scientists and Engineers (KIISE), vol. 45, no. 9, pp. 873-880, Sep 2018. (to appear)
    2. Y. Lee, and S. Yoo, "Secure Boot + Measured Boot: Guaranteeing the Integrity of the Linux Booting Process," in Korean Institute Information Scientists and Engineers (KIISE) Transactions on Computing Practices, vol. 23, no. 8, pp. 504-509, Aug 2017.


Domestic Conferences (written in Korean)

    1. S. Lee, H. Kim, and S. Yoo, "Comparison between Intel SGX and ARM TZ for Software base trust execution environment," in Proceedings of Korean Institute Information Scientists and Engineers (KIISE) Korea Computer Congress 2018, Jeju, Korea, Jun 2018, pp.1209-1211.
    2. J. Mun, S. Wi, and S. Yoo, "Dijkstra* Algorithm : Minimum Search Cost Optimal Path Exploration," in Proceedings of Korean Institute Information Scientists and Engineers (KIISE) Korea Computer Congress 2018, Jeju, Korea, Jun 2018, pp.323-325.
    3. H. Kim, S. Lee, and S. Yoo, "Security Vulnerability Analysis in Nested Kernel," in Proceedings of Korean Institute Information Scientists and Engineers (KIISE) Korea Software Congress 2017, Busan, Korea, Dec 2017, pp.116-118 (Best Paper Award).
    4. H. Kim, and S. Yoo, "Comparative Study of Trusted Computing: Intel TXT vs. ARM TrustZone," in Proceedings of Korean Institute Information Scientists and Engineers (KIISE) Korea Computer Congress 2017, Jeju, Korea, Jun 2017, pp.1445- 1447.
    5. Y. Lee, H.-S. Kim J.-H. Park, H.-C. Kim, and S. Yoo, "MS-Bootloader for linux," in Proceedings of Korean Institute Information Scientists and Engineers (KIISE) Winter Conference, Pyeongchang, Korea, Dec 2016, pp.778-780 (Best Paper Award).
    6. Y. Shim, H. Kim, and S. Yoo, "Black-box Test Automation Tool for Open TV Platform," in Proceedings of Korean Institute Information Scientists and Engineers (KIISE) Winter Conference, Pyeongchang, Korea, Dec 2014, pp.1687-1689.