Jinsoo Jang 
Ph.D., Postdoctoral fellow, CySecLab 
Graduate School of Information Security
Korea Advanced Institute of Science and Technology
I'm exploring how to secure real-world devices with the trusted execution environment, general hardware features, privileged software (e.g., hypervisor), and the compiler techniques. laughing

  • Office : #2321, N5 Building, KAIST 
    Email : jisjang (at) 
    Phone : +82-42-350-8338


  • Ph.D. Graduate School of Information Security, KAIST, 9/2014 - 2/2018 (Dissertation: Security and Universality Improvement for Trusted Execution EnvironmentAdvisor: Brent Byunghoon Kang)
  • M.S. Graduate School of Information Security, KAIST, 9/2012 - 8/2014 (Thesis: Secure Channel in-between Rich Execution Environment and Trusted Execution Environment. Advisor: Brent Byunghoon Kang)
  • B.S. Computer Science, Ajou University, 3/2000 - 8/2007


  • System Security
    • System Hardening with Trusted Execution Environment technology (e.g., TrustZone and Intel SGX)
    • Compiler-based Code Instrumentation (e.g., LLVM-based OS kernel hardening)
    • Application Shielding and In-process Memory Isolation


  • Conference 
    • Jinsoo Jang and Brent Byunghoon Kang, “Revisiting the ARM Debug Facility for OS Kernel Security”, Design Automation Conference (DAC), 2019. (to appear)
    • Jinsoo Jang and Brent Byunghoon Kang, “In-process Memory Isolation Using Hardware Watchpoint”, Design Automation Conference (DAC), 2019. (to appear)
    • Jaehyuk Lee, Jinsoo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Taesoo Kim, Marcus Peinado, and Brent Byunghoon Kang, “Hacking in Darkness: Return-oriented Programming against Secure Enclaves”, Usenix Security 2017. (Acceptance rate: 16% (85/522)) [PDF][BIBTEX]
    • Jinsoo Jang, Sunjune Kong, Minsu Kim, Daegyeong Kim, and Brent Byunghoon Kang, "SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment", Network and Distributed System Security Symposium (NDSS), 2015. (Acceptance rate: 16.6% (50/302)) [PDF] [BIBTEX] [PPT]
  • Journal
    • Jinsoo Jang and Brent Byunghoon Kang, “Securing a Communication Channel for the Trusted Execution Environment”, Computers & Security (Elsevier) 2019. 
    • Jinsoo Jang and Brent Byunghoon Kang, “Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection”, IEEE Transactions on Dependable and Secure Computing (TDSC) 2018. (IF=4.41) [PDF] [BIBTEX]
    • Hojoon Lee, Hyungon Moon, Ingoo Heo, Daehee Jang, Jinsoo Jang, Kihwan Kim, Yunheung Paek, and Brent Byunghonn Kang, “KI-Mon ARM: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object”, IEEE Transactions on Dependable and Secure Computing (TDSC) 2017. (IF=4.41) [PDF] [BIBTEX]
    • Changho Choi, Nohyun Kwak, Jinsoo Jang, Daehee Jang, Keunwhee Oh, Kyungsoo Kwag, and Brent Byunghonn Kang, “S-OpenSGX: A system-level platform for exploring SGX enclave-based computing”, Computers & Security (Elsevier) 2017. (IF=2.65) [PDF] [BIBTEX]
    • Jinsoo Jang, Changho Choi, Jaehyuk Lee, Nohyun Kwak, Seongman Lee, Yeseul Choi, and Brent Byunghoon Kang, “PrivateZone: Providing a Private Execution Environment using ARM TrustZone”, IEEE Transactions on Dependable and Secure Computing (TDSC) 2016. (IF=2.926) [PDF] [BIBTEX]
    • Yonggon Kim, Ohmin Kwon, Jinsoo Jang, Seongwook Jin, Hyeongboo Baek, Brent Byunghoon Kang, and Hyunsoo Yoon, "On-demand botstrapping mechanism for isolated cryptographic operations on commodity accelerators", Computers & Security (Elsevier) 2016. (IF=2.849) [PDF] [BIBTEX]
    • Daehee Jang, Jinsoo Jang, Donguk Kim, Changho Choi, and Brent Byunghoon Kang, “Scheduler-based Defense Method against Address Translation Redirection Attack (ATRA)”, Journal of The Korea Institute of Information Security & Cryptology, Vol.25, No.4, Aug. 2015.


  • Jinsoo Jang, Daehee Jang, Brent Byunghoon Kang, and Donguk Kim, “A Electronic Device And Method For Protecting The Kernel Space of the Memory”, 10-2015-0165474
  • Jinsoo Jang and Brent Byunghoon Kang, “Method and Apparatus for Providing A Private Execution Environment Using ARM TrustZone”, 10-2017-0029080


  • Graduate Teaching Assistant, KAIST
    • Computer Security (SEP543) (Summer 2018)
    • Hypervisor System Security (IS632) (Spring 2016, Spring 2018)
    • Introduction to System Security (IS522) (Fall 2016)
  • LG Electronics Security Specialist Lecture Assistant, KAIST
    • OS Security and Trusted Execution Environment (Summer 2018)


  • Amkor Technology Korea (System Developer) 2/2008 - 9/2012
    • Service Oriented Architecture (SOA), B2B, and Manufacturing Execution System (MES) Development
  • KEPCO Research Institute (Consulting) 7/2017
    • ARM TrustZone-based Trusted Execution Environment


  •  PI
    • Real-time Kernel Anomaly Detection (NSR) 4/2018 - Present
  • Co-PI
    • Towards Dialects Computing in Network and System Protocols (ONR) 9/2018 - Present
  • Researcher
    • Enhancing Security, Wide Applicability and Applications of TEE (NRF) 3/2017 - Present
    • Building Secure IoT Platform (Samsung Science & Technology Foundation) 7/2015 - 6/2017
    • Security Critical Logic Protection Using Intel SGX (Samsung Electronics) 4/2016 - 12/2016
    • Snooper-based Anomaly Detection (Samsung Electronics) 5/2015 - 12/2015
    • Threat Analysis for IoT Platform (SKT) 4/2014 - 1/2015
    • Rootkit Detection Using Mobile Hypervisor (I-heart, Inc) 9/2012 - 8/2013


  • Conference Session Chair
    • WISA 2018, Jeju (Short paper II, Invited Talk, and System Security Sessions)
  • External Paper Reviewer
    • IEEE S&P (2016 - 2018), Usenix Security (2015), ACM CCS (2015 - 2018), NDSS (2019), ASIACCS (2016, 2018), WISA (2017 - 2018), and ICDCS (2015 - 2016)