Taegyu Kim
Taegyu Kim
Purdue University, Electrical and Computer Engineering
Bestätigte E-Mail-Adresse bei purdue.edu - Startseite
Zitiert von
Zitiert von
Securing Real-Time Microcontroller Systems through Customized Memory View Switching.
CH Kim, T Kim, H Choi, Z Gu, B Lee, X Zhang, D Xu
NDSS, 2018
Learning from the ones that got away: Detecting new forms of phishing attacks
CN Gutierrez, T Kim, R Della Corte, J Avery, D Goldwasser, M Cinque, ...
IEEE Transactions on Dependable and Secure Computing 15 (6), 988-1001, 2018
RevARM: A platform-agnostic ARM binary rewriter for security applications
T Kim, CH Kim, H Choi, Y Kwon, B Saltaformaggio, X Zhang, D Xu
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
RVFUZZER: Finding input validation bugs in robotic vehicles through control-guided testing
T Kim, CH Kim, J Rhee, F Fei, Z Tu, G Walkup, X Zhang, X Deng, D Xu
28th {USENIX} Security Symposium ({USENIX} Security 19), 425-442, 2019
Cross-layer retrofitting of UAVs against cyber-physical attacks
F Fei, Z Tu, R Yu, T Kim, X Zhang, D Xu, X Deng
2018 IEEE International Conference on Robotics and Automation (ICRA), 550-557, 2018
From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with {MAYDAY}
T Kim, CH Kim, A Ozen, F Fei, Z Tu, X Zhang, X Deng, DJ Tian, D Xu
29th {USENIX} Security Symposium ({USENIX} Security 20), 913-930, 2020
I-Filter: Identical Structured Control Flow String filter for accelerated malware variant classification
T Kim, W Hwang, KW Park, KH Park
2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014
Malfinder: Accelerated malware classification system through filtering on manycore system
T Kim, W Hwang, C Kim, DJ Shin, KW Park, KH Park
2015 International Conference on Information Systems Security and Privacy …, 2015
MalCore: Toward a Practical Malware Identification System Enhanced with Manycore Technology
T Kim, KW Park
International Conference on Information Systems Security and Privacy, 31-48, 2015
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications
T Kim, V Kumar, J Rhee, J Chen, K Kim, CH Kim, D Xu, DJ Tian
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–10