Jin Soo Jang

Learn More
R. Wendell, C. Ishihara, K. Abe, Y. Hayato, T. Iida, M. Ikeda, K. Iyogi, J. Kameda, K. Kobayashi, Y. Koshio, Y. Kozuma, M. Miura, S. Moriyama, M. Nakahata, S. Nakayama, Y. Obayashi, H. Ogawa, H. Sekiya, M. Shiozawa, Y. Suzuki, A. Takeda, Y. Takenaga, Y. Takeuchi, K. Ueno, K. Ueshima, H. Watanabe, S. Yamada, T. Yokozawa, S. Hazama, H. Kaji, T. Kajita, K.(More)
ARM TrustZone, which provides a Trusted Execution Environment (TEE), normally plays a role in keeping security-sensitive resources safe. However, to properly control access to the resources, it is not enough to just isolate them from the Rich Execution Environment (REE). In addition to the isolation, secure communication should be guaranteed between(More)
M. H. Ahn, E. Aliu, S. Andringa, S. Aoki, Y. Aoyama, J. Argyriades, K. Asakura, R. Ashie, F. Berghaus, H. G. Berns, H. Bhang, A. Blondel, S. Borghi, J. Bouchez, S. C. Boyd, J. Burguet-Castell, D. Casper, J. Catala, C. Cavata, A. Cervera, S. M. Chen, K. O. Cho, J. H. Choi, U. Dore, S. Echigo, X. Espinal, M. Fechner, E. Fernandez, K. Fujii, Y. Fujii, S.(More)
K. Abe, Y. Hayato, T. Iida, K. Iyogi, J. Kameda, Y. Koshio, Y. Kozuma, Ll. Marti, M. Miura, S. Moriyama, M. Nakahata, S. Nakayama, Y. Obayashi, H. Sekiya, M. Shiozawa, Y. Suzuki, A. Takeda, Y. Takenaga, K. Ueno, K. Ueshima, S. Yamada, T. Yokozawa, C. Ishihara, H. Kaji, T. Kajita, K. Kaneyuki, K. P. Lee, T. McLachlan, K. Okumura, Y. Shimizu, N. Tanimoto, L.(More)
In this letter, a new model for application layer DDoS attack detection is proposed. With the proposed model, the profiles for a normal user's legitimate traffic pattern and a DDoS attack traffic pattern can be generated. We can detect the DDoS attack traffic with the generated profiles in a short period of time with little consumption of computing(More)
Intel Software Guard Extensions (SGX) is a hardwarebased Trusted Execution Environment (TEE) that is widely seen as a promising solution to traditional security threats. While SGX promises strong protection to bugfree software, decades of experience show that we have to expect vulnerabilities in any non-trivial application. In a traditional environment,(More)
J. Gustafson, K. Abe, Y. Haga, Y. Hayato, M. Ikeda, K. Iyogi, J. Kameda, Y. Kishimoto, M. Miura, S. Moriyama, M. Nakahata, T. Nakajima, Y. Nakano, S. Nakayama, A. Orii, H. Sekiya, M. Shiozawa, A. Takeda, H. Tanaka, T. Tomura, R. A. Wendell, T. Irvine, T. Kajita, I. Kametani, K. Kaneyuki, Y. Nishimura, E. Richard, K. Okumura, L. Labarga, P. Fernandez, S.(More)
K. Abe, Y. Hayato, K. Iyogi, J. Kameda, M. Miura, S. Moriyama, M. Nakahata, S. Nakayama, R. A. Wendell, H. Sekiya, M. Shiozawa, Y. Suzuki, A. Takeda, Y. Takenaga, K. Ueno, T. Yokozawa, H. Kaji, T. Kajita, K. Kaneyuki, K. P. Lee, K. Okumura, T. McLachlan, L. Labarga, E. Kearns, J. L. Raaf, J. L. Stone, L. R. Sulak, M. Goldhaber, K. Bays, G. Carminati, W. R.(More)
M. H. Ahn, E. Aliu, S. Andringa, S. Aoki, Y. Aoyama, J. Argyriades, K. Asakura, R. Ashie, F. Berghaus, H. G. Berns, H. Bhang, A. Blondel, S. Borghi, J. Bouchez, S. C. Boyd, J. Burguet-Castell, D. Casper, J. Catala, C. Cavata, A. Cervera, S. M. Chen, K. O. Cho, J. H. Choi, U. Dore, S. Echigo, X. Espinal, M. Fechner, E. Fernandez, K. Fujii, Y. Fujii, S.(More)