Yeoul Na
Yeoul Na
Geverifieerd e-mailadres voor apple.com
Titel
Geciteerd door
Geciteerd door
Jaar
SoK: sanitizing for security
D Song, J Lettner, P Rajasekaran, Y Na, S Volckaert, P Larsen, M Franz
2019 IEEE Symposium on Security and Privacy (SP), 1275-1295, 2019
532019
Periscope: An effective probing and fuzzing framework for the hardware-os boundary
D Song, F Hetzelt, D Das, C Spensky, Y Na, S Volckaert, G Vigna, ...
2019 Network and Distributed System Security Symposium (NDSS 19), 2019
27*2019
Venerable variadic vulnerabilities vanquished
P Biswas, A Di Federico, SA Carr, P Rajasekaran, S Volckaert, Y Na, ...
26th USENIX Security Symposium (SEC 17), 186-198, 2017
132017
BinRec: attack surface reduction through dynamic binary recovery
T Kroes, A Altinay, J Nash, Y Na, S Volckaert, H Bos, M Franz, C Giuffrida
Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software …, 2018
122018
A processor-based decoupled timing controller for flexible and low-cost 2D/3D plasma display panel design
Y Na, SJ Hwang, J Min, T Kim, SW Kim
IEEE Transactions on Consumer Electronics 57 (1), 19-27, 2011
11*2011
Applying frame layout to hardware design in FPGA for seamless support of cross calls in CPU-FPGA coupling architecture
GNT Huong, Y Na, SW Kim
Microprocessors and microsystems 35 (5), 462-472, 2011
102011
Hardware assisted randomization of data
B Belleville, H Moon, J Shin, D Hwang, JM Nash, S Jung, Y Na, ...
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
82018
Javascript parallelizing compiler for exploiting parallelism from data-parallel html5 applications
Y Na, SW Kim, Y Han
ACM Transactions on Architecture and Code Optimization (TACO) 12 (4), 1-25, 2016
72016
Accelerating Dynamically-Typed Languages on Heterogeneous Platforms Using Guards Optimization
M Qunaibit, S Brunthaler, Y Na, S Volckaert, M Franz
32nd European Conference on Object-Oriented Programming (ECOOP 2018), 2018
6*2018
Passive wireless memory device
Y Han, S Iljong, J Koo, S Kim, J Lee, S Hwang, Y Na
US Patent 8,704,640, 2014
62014
Bytecode corruption attacks are real—and how to defend against them
T Park, J Lettner, Y Na, S Volckaert, M Franz
International Conference on Detection of Intrusions and Malware, and …, 2018
42018
Design of a G-Share branch predictor for EISC processor
IS Kim, JY Jun, Y Na, SW Kim
IEIE Transactions on Smart Processing & Computing 4 (5), 366-370, 2015
32015
DMON: A Distributed Heterogeneous N-Variant System
A Voulimeneas, D Song, F Parzefall, Y Na, P Larsen, M Franz, S Volckaert
arXiv preprint arXiv:1903.03643, 2019
22019
Hierarchical data structure-based timing controller design for plasma display panels
Y Na, SJ Hwang, G Bak, SW Kim, CH Lee, J Min, T Kim
Proceedings of 2010 IEEE International Symposium on Circuits and Systems …, 2010
22010
Distributed heterogeneous n-variant execution
A Voulimeneas, D Song, F Parzefall, Y Na, P Larsen, M Franz, S Volckaert
International Conference on Detection of Intrusions and Malware, and …, 2020
12020
BinRec: dynamic binary lifting and recompilation
A Altinay, J Nash, T Kroes, P Rajasekaran, D Zhou, A Dabrowski, D Gens, ...
Proceedings of the Fifteenth European Conference on Computer Systems, 1-16, 2020
12020
Nojitsu: Locking down javascript engines
T Park, K Dhondt, D Gens, Y Na, S Volckaert, M Franz
2020 Network and Distributed System Security Symposium (NDSS 20), 2020
12020
Design of HTML parallel parser with semantic-based input splitting
JH Lee, Y Na, SW Kim
2016 International Conference on Electronics, Information, and …, 2016
12016
Processor-based decoupled PDP timing controller design
Y Na, SJ Hwang, CH Lee, J Min, T Kim, SW Kim
2011 IEEE International Conference on Consumer Electronics (ICCE), 867-868, 2011
12011
Performance Evaluation of GCC 4. x on EISC Architecture
Y Na, D Jung, Y Han, SW Kim, HG Kim, K Kim
ICEIC: International Conference on Electronics, Informations and …, 2008
12008
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20