Patents by Inventor Brent ByungHoon KANG

Brent ByungHoon KANG has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240078307
    Abstract: The present invention relates to an apparatus for reinforcing security of a mobile trusted execution environment, and relates to an apparatus for reinforcing security of a mobile trusted execution environment for constructing a general-purpose trusted execution environment. According to an embodiment of the present invention, a technology available for a general purpose in a mobile device operating on the basis of an ARM architecture has effects of configuring a trusted execution environment for guaranteeing safe execution of an application without depending on an existing commercial security technology, and of configuring a mobile trusted execution environment by using a write area execution prevention function and a debugging watchpoint, which are general-purpose hardware functions.
    Type: Application
    Filed: June 14, 2021
    Publication date: March 7, 2024
    Applicants: THE INDUSTRY & ACADEMIC COOPERATION IN CHUNGNAM NATIONAL UNIVERSITY, KOREA ADVANCED INSTITUTE OF SCIENCE AND TECHNOLOGY
    Inventors: Jinsoo JANG, Brent Byunghoon KANG
  • Patent number: 10664589
    Abstract: A memory alignment randomization method of a memory heap exploit is provided, memory alignment of objects inside a heap area is randomly performed to mitigate the exploits of the vulnerability of the software memory heap area The heap exploit is powerfully mitigated by aligning randomly obtained memory addresses instead of aligning memory addresses at multiples of 4 or 8 when the memory alignment for the objects inside the heap area.
    Type: Grant
    Filed: April 12, 2017
    Date of Patent: May 26, 2020
    Assignee: Korea Advanced Institute of Science and Technology
    Inventors: Brent ByungHoon Kang, Daehee Jang, Minsu Kim, Jonghwan Kim, Daegyeong Kim, Hojoon Lee
  • Patent number: 10168934
    Abstract: Provided is a method of memory access for a memory controller in an integrity monitoring system sharing memory with a host system. The memory access method may include: receiving a memory access command from a local processor of the integrity monitoring system; accessing a system memory of the host system according to the memory access command; receiving data corresponding to the memory access command from the host system; and forwarding the received data to the local processor, wherein the system memory includes a secure area, access to which is allowed when the memory controller receives a memory access command from the local processor. In a feature of the present invention, there are provided a method and apparatus that can monitor integrity of data processed in the host system in a SoC environment.
    Type: Grant
    Filed: August 14, 2014
    Date of Patent: January 1, 2019
    Assignees: Samsung Electronics Co., Ltd., Seoul National University R&DB Foundation
    Inventors: Hansu Cho, Brent ByungHoon Kang, Yunheung Paek, Seungwook Lee, Junbum Shin
  • Publication number: 20180157827
    Abstract: A memory alignment randomization method of a memory heap exploit is provided, memory alignment of objects inside a heap area is randomly performed to mitigate the exploits of the vulnerability of the software memory heap area The heap exploit is powerfully mitigated by aligning randomly obtained memory addresses instead of aligning memory addresses at multiples of 4 or 8 when the memory alignment for the objects inside the heap area.
    Type: Application
    Filed: April 12, 2017
    Publication date: June 7, 2018
    Applicant: Korea Advanced Institute of Science and Technology
    Inventors: Brent ByungHoon Kang, Daehee Jang, Minsu Kim, Jonghwan Kim, Daegyeong Kim, Hojoon Lee
  • Patent number: 9560063
    Abstract: An apparatus and method for detecting a malicious domain cluster. The apparatus for detecting a malicious domain cluster includes a domain name server (DNS) data collection unit and a malicious domain cluster detection unit. The DNS data collection unit collects DNS traffic over a network, and stores the DNS traffic in a database. The malicious domain cluster detection unit generates a domain cluster based on the DNS data, learns the characteristics of normal and malicious clusters in the domain cluster, and detects whether the domain cluster is malicious based on the result of the learning.
    Type: Grant
    Filed: June 10, 2015
    Date of Patent: January 31, 2017
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Changho Choi, Brent ByungHoon Kang, Sungryoul Lee, JungMin Kang
  • Patent number: 9542557
    Abstract: A snoop-based kernel integrity monitoring apparatus and a method thereof are provided. More particularly, provided are a kernel integrity monitoring apparatus which is provided as a hardware device independent of a host system, and snoops traffic occurring in a system bus of the host system and by detecting a write attempt in a kernel immutable region, monitors integrity of the kernel, and a method thereof. According to the apparatus and method, by analyzing traffic of the system bus of the host system, a write attempt in the kernel immutable region is detected. Thus, a transient attack which is difficult for a snapshot method to detect can be detected.
    Type: Grant
    Filed: April 25, 2014
    Date of Patent: January 10, 2017
    Assignee: SNU R&DB FOUNDATION
    Inventors: Yun Heung Paek, Brent Byunghoon Kang, Hyungon Moon, Hojoon Lee, Jihoon Lee, Kihwan Kim
  • Publication number: 20160294859
    Abstract: An apparatus and method for detecting a malicious domain cluster. The apparatus for detecting a malicious domain cluster includes a domain name server (DNS) data collection unit and a malicious domain cluster detection unit. The DNS data collection unit collects DNS traffic over a network, and stores the DNS traffic in a database. The malicious domain cluster detection unit generates a domain cluster based on the DNS data, learns the characteristics of normal and malicious clusters in the domain cluster, and detects whether the domain cluster is malicious based on the result of the learning.
    Type: Application
    Filed: June 10, 2015
    Publication date: October 6, 2016
    Inventors: Changho CHOI, Brent ByungHoon KANG, Sungryoul LEE, JungMin KANG
  • Publication number: 20160196083
    Abstract: Provided is a method of memory access for a memory controller in an integrity monitoring system sharing memory with a host system. The memory access method may include: receiving a memory access command from a local processor of the integrity monitoring system; accessing a system memory of the host system according to the memory access command; receiving data corresponding to the memory access command from the host system; and forwarding the received data to the local processor, wherein the system memory includes a secure area, access to which is allowed when the memory controller receives a memory access command from the local processor. In a feature of the present invention, there are provided a method and apparatus that can monitor integrity of data processed in the host system in a SoC environment.
    Type: Application
    Filed: August 14, 2014
    Publication date: July 7, 2016
    Applicant: Samsung Electronics Co., Ltd.
    Inventors: Hansu CHO, Brent ByungHoon KANG, Yunheung PAEK, Seungwook LEE, Junbum SHIN
  • Patent number: 8931089
    Abstract: A technology for preventing network attacks. A service request is intercepted at an unaddressed port of a hidden device from a second device. The service request intended for a visible device is processed by the hidden device. A response may be provided based on the processing and sent to the second device.
    Type: Grant
    Filed: January 12, 2012
    Date of Patent: January 6, 2015
    Assignee: Korea Advanced Institute of Science and Technology
    Inventor: Brent ByungHoon Kang
  • Publication number: 20140359183
    Abstract: A snoop-based kernel integrity monitoring apparatus and a method thereof are provided. More particularly, provided are a kernel integrity monitoring apparatus which is provided as a hardware device independent of a host system, and snoops traffic occurring in a system bus of the host system and by detecting a write attempt in a kernel immutable region, monitors integrity of the kernel, and a method thereof. According to the apparatus and method, by analyzing traffic of the system bus of the host system, a write attempt in the kernel immutable region is detected. Thus, a transient attack which is difficult for a snapshot method to detect can be detected.
    Type: Application
    Filed: April 25, 2014
    Publication date: December 4, 2014
    Applicant: SNU R&DB Foundation
    Inventors: Yun Heung Paek, Brent Byunghoon Kang
  • Publication number: 20120180127
    Abstract: A technology for preventing network attacks. A service request is intercepted at an unaddressed port of a hidden device from a second device. The service request intended for a visible device is processed by the hidden device. A response may be provided based on the processing and sent to the second device.
    Type: Application
    Filed: January 12, 2012
    Publication date: July 12, 2012
    Inventor: Brent ByungHoon KANG