a.2会议会议记录[C1] Zelun Kong,Minkyung Park,Le Guan,Ning Zhang和Chung Hwan Kim,Tz- DataShield:通过基于Data-flow的嵌入式系统的自动数据保护,基于数据流界面,在32nd网络和分布式系统secu-rity semposium(nds sans sans sanss sansssemposium of 32nnd网络和分布式sans sans sans 2025)中。[C2] Ali Ahad,Gang Wang,Chung Hwan Kim,Suman Jana,Zhiqiang Lin和Yonghwi Kwon,Freepart:通过基于框架的分区和ISO的硬化数据处理软件,在第29届ACM国际ACM国际港口端口的ACP-SAN GRANAGE和SAN GONGRAMES MANERASS(SAN GONGIASS ACMAGES和SANG)会议上(作为SANGOMESS和SAN GRANEMASE CALGAIGS ACM ACM INGRAMES)(以及202) 2024)。[C3]小吴,戴夫(jing)tian和Chung Hwan Kim,在第14届ACM云composium cloud composium的会议记录中,使用CPU安全的飞地建造GPU TEES(SOCC 2023)(SOCC 2023)(SOCC 2023)(SACH CRUBE)(CA,CA,20233)。[C4] MD Shihabul Islam,Mahmoud Zamani,Chung Hwan Kim,Latifur Khan和Kevin Hamlen,在第13届ACM ACM ACM会议会议上,与ARM Trustzone的无信任边缘进行深入学习的机密执行有关数据,应用程序安全和隐私(Copaspy 20223),NC,NC,NC,NC,NC,NC,NC,nc,nc,nc,nc,nc,nc,nc ort trustzone(nc)。[c5] Seulbae Kim, Major Liu, Junghwan “John” Rhee, Yuseok Jeon, Yonghwi Kwon, and Chung Hwan Kim, DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing, in Proceedings of the 29th ACM Conference on Computer and Communications Security (CCS 2022) (Los Angeles, CA, 2022).[C11] Taegyu Kim,Chung Hwan Kim,Altay Ozen,Fan Fei,Zhan Tu,Xiangyu Zhang,Xinyan Deng,Dave(Jing)Tian和Dongyan Xu,从控制模型到程序:[C6] Kyeongseok Yang ∗,Sudharssan Mohan ∗,Yonghwi Kwon,Heejo Lee和Chung Hwan Kim,海报:在第29届ACM Commutity and Communications Secutlies Capecation和Communications Secutlies CACS 2022222222222222222222222222222222年,(ccc cc cc cc cc cc cc cc cc cc cc cc cc cc ccs 2022222222222222222222222222222222222222) 贡献。[c7] Taegyu Kim, Vireshwar Kumar, Junghwan “John” Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, and Dave (Jing) Tian, PASAN: Detecting Peripheral Ac- cess Concurrency Bugs within Bare-metal Embedded Applications, in Proceedings of the 30th USENIX Security研讨会(USENIX Security 2021)(虚拟事件,2021)。[C8] Omid Setayeshfar,Junghwan“ John” Rhee,Chung Hwan Kim和Kyu Hyung Lee找到了我的懒惰:在第18届会议会议上,在第18届会议会议上,关于对侵犯和漏洞和恶意和恶意评估的第18届会议会议上,对真实企业计算机如何跟上软件更新比赛的自动比较分析(dirnerability cestions 2021)(dimva 2021)(dirneva)(dimva 202)。[c9] Kyungtae Kim, Chung Hwan Kim, Junghwan “John” Rhee, Xiao Yu, Haifeng Chen, Dave (Jing) Tian, and Byoungyoung Lee, Vessels: Efficient and Scalable Deep Learning Prediction on Trusted Processors, in Proceedings of the 11th ACM Symposium on Cloud Computing (SOCC 2020) (Virtual Event, 2020).[c10] Yixin Sun, Kangkook Jee, Suphannee Sivakorn, Zhichun Li, Cristian Lumezanu, Lauri Korts-Pärn, Zhenyu Wu, Junghwan Rhee, Chung Hwan Kim, Mung Chiang, and Prateek Mittal, Detecting Malware Injection with Program-DNS Behavior, in Proceedings of the 5th IEEE European安全与隐私研讨会(Euros&P 2020)(虚拟事件,2020年)。
Anne-Kathrin Baczko 1.2,⋆,Matthias Kadler 3,Eduardo Ros 2,Christian M.来自3,4,2,Maciek Wielgus 2,Manel Perucho 5.6,Thomas P. Kichbaum 2,Mislav Balokovi´c 7 13.2,Luca Ricci 3.2,Kazunori Akiyama 14,15.8,Ezequiel Albentosa-Ruíz5,Antxon Alberdi 16,Walter Alef 2,Juan Carlos Algaba 17,Juan Carlos Algaba 17,Richard Anantua 18,142,8.9 Bidisha Bandyopadhyay 20,John Barrett 14,MichiBauböck21,Bradford A. Benson 22.23,Dan Bintley 24.25,Raymond Blundell 9,Katherine L.Bouman 26,Geo Qo Qo Qo i Q. Re i Q. Rey C. Bower C. Bower 27.28 Britzen 2,Avery E. Broderick 32,33.34,Dominique Broguiere 31,Thomas Bronzwaer 13,Sandra Bustamante 35,Do-Youung Byun 36.37,John E. Carlstrom 38.23,39.40 Chatterjee 43,Ming-Tang Chen 27,Yongjun Chen 44.45,Xiaopeng Cheng 36,Ilje Cho 16,36.46,Pierre Christian 47,Nicholas S. Conroy 48.9,John E. Conway 41,John E. Conway 41,James M.Cordes 43,Thomas M.Crawford 23.38,Geo b.