Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Defeating Zombie Gadgets by Re-randomizing Code upon Disclosure

    Over the past few years, return-oriented programming (ROP) attacks have emerged as a prominent strategy for hijacking control of software. The full power and flexibility of ROP attacks was recently demonstrate...

    Micah Morton, Hyungjoon Koo, Forrest Li in Engineering Secure Software and Systems (2017)

  2. No Access

    Chapter and Conference Paper

    Product Line Based Reuse Methodology for Develo** Generic ECU

    As an important application domain of embedded software, auto-motive software is playing a more important role within automotive industry. There are some essential issues to be resolved; managing software comp...

    Si Won Choi, ** Sun Her, Hyun Koo Kang, Soo Dong Kim in Embedded Software and Systems (2007)

  3. Chapter and Conference Paper

    Secure Password Pocket for Distributed Web Services

    Password authentication (PA) is a general and well-known technique to authenticate a user who is trying to establish a connection in distributed web services. The main idea of PA is to remove complex informati...

    Jae Hyung Koo, Dong Hoon Lee in Network and Parallel Computing (2005)

  4. Chapter and Conference Paper

    Authenticated Public Key Distribution Scheme Without Trusted Third Party

    Public key authentication is necessary to prevent a valid public key of a user from being compromised by a malicious user. Namely, if it is not provided, an adversary can read all encrypted messages between a ...

    Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee in Embedded and Ubiquitous Computing – EUC 20… (2005)