Seungkyun Han, Jiyeon Yang, and Jinsoo Jang, Trust-V: Toward Secure and Reliable Storage for Trusted Execution Environments, the ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2026. (To appear)
Seongman Lee, Seoye Kim, Chihyun Song, Byeongsu Woo, Eunyeong Ahn, Junsu Lee, Yeongjin Jang, Jinsoo Jang, Hojoon Lee, Brent ByungHoon Kang (2024). GENESIS: A Generalizable, Efficient, and Secure Intra-kernel Privilege Separation (to appear). In Proceedings of the 39th ACM/SIGAPP Symposium On Applied Computing (SAC).
Seungkyun Han and Jinsoo Jang, MyTEE: Own the Trusted Execution Environment on Embedded Devices, Network and Distributed System Security Symposium (NDSS), 2023. (Acceptance rate: 16.1%)
Jinsoo Jang and Brent Byunghoon Kang, “SelMon : Reinforcing Mobile Device Security with Self-protected Trust Anchor”, The 18th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), 2020. (Acceptance rate: 19.4%, Honourable mentions )
Jinsoo Jang and Brent Byunghoon Kang, “Revisiting the ARM Debug Facility for OS Kernel Security”, Design Automation Conference (DAC), 2019. (BK21 IF:3)
Jinsoo Jang and Brent Byunghoon Kang, “In-process Memory Isolation Using Hardware Watchpoint”, Design Automation Conference (DAC), 2019. (BK21 IF:3)
Jaehyuk Lee, Jinsoo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Taesoo Kim, Marcus Peinado, and Brent Byunghoon Kang, “Hacking in Darkness: Return-oriented Programming against Secure Enclaves”, Usenix Security 2017. (Acceptance rate: 16% (85/522))
Jinsoo Jang, Sunjune Kong, Minsu Kim, Daegyeong Kim, and Brent Byunghoon Kang, "SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment", Network and Distributed System Security Symposium (NDSS), 2015. (Acceptance rate: 16.6% (50/302))
Jinsoo Jang and Brent Byunghoon Kang, "3rdParTEE: Securing Third-Party IoT Services Using the Trusted Execution Environment," in IEEE Internet of Things Journal, 2022
Seongman Lee, Hyeonwoo Kang, Jinsoo Jang, Brent Byunghoon Kang, "SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout", IEEE Transactions on Dependable and Secure Computing (TDSC) 2021. (IF=6.864, Co-corresponding author)
Dongjae Jung, Minsu Kim, Jinsoo Jang, Brent Byunghoon Kang, "Value-Based Constraint Control Flow Integrity", IEEE Access 2020. (Co-corresponding author)
Jinsoo Jang and Brent Byunghoon Kang, “Securing a Communication Channel for the Trusted Execution Environment”, Computers & Security (Elsevier) 2019.
Jinsoo Jang and Brent Byunghoon Kang, “Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection”, IEEE Transactions on Dependable and Secure Computing (TDSC) 2018. (IF=4.41)
Hojoon Lee, Hyungon Moon, Ingoo Heo, Daehee Jang, Jinsoo Jang, Kihwan Kim, Yunheung Paek, and Brent Byunghonn Kang, “KI-Mon ARM: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object”, IEEE Transactions on Dependable and Secure Computing (TDSC) 2017. (IF=4.41)
Changho Choi, Nohyun Kwak, Jinsoo Jang, Daehee Jang, Keunwhee Oh, Kyungsoo Kwag, and Brent Byunghonn Kang, “S-OpenSGX: A system-level platform for exploring SGX enclave-based computing”, Computers & Security (Elsevier) 2017. (IF=2.65)
Jinsoo Jang, Changho Choi, Jaehyuk Lee, Nohyun Kwak, Seongman Lee, Yeseul Choi, and Brent Byunghoon Kang, “PrivateZone: Providing a Private Execution Environment using ARM TrustZone”, IEEE Transactions on Dependable and Secure Computing (TDSC) 2016. (IF=2.926)
Yonggon Kim, Ohmin Kwon, Jinsoo Jang, Seongwook Jin, Hyeongboo Baek, Brent Byunghoon Kang, and Hyunsoo Yoon, "On-demand botstrapping mechanism for isolated cryptographic operations on commodity accelerators", Computers & Security (Elsevier) 2016. (IF=2.849)
양지연, 장진수, "ARM big.LITTLE 아키텍처와 Spectre공격의 효율성", 2022KIISCCC
이재훈, 장진수, "제로클릭 취약점 활용 포렌식 데이터 획득" 2022KIISCCC
한승균, 장진수, “모바일 TPM 및 가상화 기술을 활용한 신뢰 실행 환경의 보안성 향상", CISC-W'20 (한국인터넷진흥원 우수논문상).
Daehee Jang, Jinsoo Jang, Donguk Kim, Changho Choi, and Brent Byunghoon Kang, “Scheduler-based Defense Method against Address Translation Redirection Attack (ATRA)”, Journal of The Korea Institute of Information Security & Cryptology, Vol.25, No.4, Aug. 2015.