Patents by Inventor Brent ByungHoon KANG
Brent ByungHoon KANG has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250004958Abstract: A method for safely designing and implementing an interconnect for a disaggregated system is disclosed. The method for designing and implementing an interconnect for a disaggregated system, according to an embodiment, may comprise the steps of: configuring an interconnect for a disaggregated system by using a layer-based topology; and managing components of the disaggregated system via a plurality of routers included in the configured interconnect.Type: ApplicationFiled: August 2, 2021Publication date: January 2, 2025Applicants: Korea Advanced Institute of Science and Technology, Research & Business Foundation SUNGKYUNKWAN UNIVERSITYInventors: Brent ByungHoon Kang, Daegyeong Kim, Geonwoo Kim, Eunjin Kim, Wonwoo Choi, Chang-il Lim, Youngkwang Han, Hojoon Lee
-
Publication number: 20240078307Abstract: The present invention relates to an apparatus for reinforcing security of a mobile trusted execution environment, and relates to an apparatus for reinforcing security of a mobile trusted execution environment for constructing a general-purpose trusted execution environment. According to an embodiment of the present invention, a technology available for a general purpose in a mobile device operating on the basis of an ARM architecture has effects of configuring a trusted execution environment for guaranteeing safe execution of an application without depending on an existing commercial security technology, and of configuring a mobile trusted execution environment by using a write area execution prevention function and a debugging watchpoint, which are general-purpose hardware functions.Type: ApplicationFiled: June 14, 2021Publication date: March 7, 2024Applicants: THE INDUSTRY & ACADEMIC COOPERATION IN CHUNGNAM NATIONAL UNIVERSITY, KOREA ADVANCED INSTITUTE OF SCIENCE AND TECHNOLOGYInventors: Jinsoo JANG, Brent Byunghoon KANG
-
Patent number: 10664589Abstract: A memory alignment randomization method of a memory heap exploit is provided, memory alignment of objects inside a heap area is randomly performed to mitigate the exploits of the vulnerability of the software memory heap area The heap exploit is powerfully mitigated by aligning randomly obtained memory addresses instead of aligning memory addresses at multiples of 4 or 8 when the memory alignment for the objects inside the heap area.Type: GrantFiled: April 12, 2017Date of Patent: May 26, 2020Assignee: Korea Advanced Institute of Science and TechnologyInventors: Brent ByungHoon Kang, Daehee Jang, Minsu Kim, Jonghwan Kim, Daegyeong Kim, Hojoon Lee
-
Patent number: 10168934Abstract: Provided is a method of memory access for a memory controller in an integrity monitoring system sharing memory with a host system. The memory access method may include: receiving a memory access command from a local processor of the integrity monitoring system; accessing a system memory of the host system according to the memory access command; receiving data corresponding to the memory access command from the host system; and forwarding the received data to the local processor, wherein the system memory includes a secure area, access to which is allowed when the memory controller receives a memory access command from the local processor. In a feature of the present invention, there are provided a method and apparatus that can monitor integrity of data processed in the host system in a SoC environment.Type: GrantFiled: August 14, 2014Date of Patent: January 1, 2019Assignees: Samsung Electronics Co., Ltd., Seoul National University R&DB FoundationInventors: Hansu Cho, Brent ByungHoon Kang, Yunheung Paek, Seungwook Lee, Junbum Shin
-
Publication number: 20180157827Abstract: A memory alignment randomization method of a memory heap exploit is provided, memory alignment of objects inside a heap area is randomly performed to mitigate the exploits of the vulnerability of the software memory heap area The heap exploit is powerfully mitigated by aligning randomly obtained memory addresses instead of aligning memory addresses at multiples of 4 or 8 when the memory alignment for the objects inside the heap area.Type: ApplicationFiled: April 12, 2017Publication date: June 7, 2018Applicant: Korea Advanced Institute of Science and TechnologyInventors: Brent ByungHoon Kang, Daehee Jang, Minsu Kim, Jonghwan Kim, Daegyeong Kim, Hojoon Lee
-
Patent number: 9560063Abstract: An apparatus and method for detecting a malicious domain cluster. The apparatus for detecting a malicious domain cluster includes a domain name server (DNS) data collection unit and a malicious domain cluster detection unit. The DNS data collection unit collects DNS traffic over a network, and stores the DNS traffic in a database. The malicious domain cluster detection unit generates a domain cluster based on the DNS data, learns the characteristics of normal and malicious clusters in the domain cluster, and detects whether the domain cluster is malicious based on the result of the learning.Type: GrantFiled: June 10, 2015Date of Patent: January 31, 2017Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Changho Choi, Brent ByungHoon Kang, Sungryoul Lee, JungMin Kang
-
Patent number: 9542557Abstract: A snoop-based kernel integrity monitoring apparatus and a method thereof are provided. More particularly, provided are a kernel integrity monitoring apparatus which is provided as a hardware device independent of a host system, and snoops traffic occurring in a system bus of the host system and by detecting a write attempt in a kernel immutable region, monitors integrity of the kernel, and a method thereof. According to the apparatus and method, by analyzing traffic of the system bus of the host system, a write attempt in the kernel immutable region is detected. Thus, a transient attack which is difficult for a snapshot method to detect can be detected.Type: GrantFiled: April 25, 2014Date of Patent: January 10, 2017Assignee: SNU R&DB FOUNDATIONInventors: Yun Heung Paek, Brent Byunghoon Kang, Hyungon Moon, Hojoon Lee, Jihoon Lee, Kihwan Kim
-
Publication number: 20160294859Abstract: An apparatus and method for detecting a malicious domain cluster. The apparatus for detecting a malicious domain cluster includes a domain name server (DNS) data collection unit and a malicious domain cluster detection unit. The DNS data collection unit collects DNS traffic over a network, and stores the DNS traffic in a database. The malicious domain cluster detection unit generates a domain cluster based on the DNS data, learns the characteristics of normal and malicious clusters in the domain cluster, and detects whether the domain cluster is malicious based on the result of the learning.Type: ApplicationFiled: June 10, 2015Publication date: October 6, 2016Inventors: Changho CHOI, Brent ByungHoon KANG, Sungryoul LEE, JungMin KANG
-
Publication number: 20160196083Abstract: Provided is a method of memory access for a memory controller in an integrity monitoring system sharing memory with a host system. The memory access method may include: receiving a memory access command from a local processor of the integrity monitoring system; accessing a system memory of the host system according to the memory access command; receiving data corresponding to the memory access command from the host system; and forwarding the received data to the local processor, wherein the system memory includes a secure area, access to which is allowed when the memory controller receives a memory access command from the local processor. In a feature of the present invention, there are provided a method and apparatus that can monitor integrity of data processed in the host system in a SoC environment.Type: ApplicationFiled: August 14, 2014Publication date: July 7, 2016Applicant: Samsung Electronics Co., Ltd.Inventors: Hansu CHO, Brent ByungHoon KANG, Yunheung PAEK, Seungwook LEE, Junbum SHIN
-
Patent number: 8931089Abstract: A technology for preventing network attacks. A service request is intercepted at an unaddressed port of a hidden device from a second device. The service request intended for a visible device is processed by the hidden device. A response may be provided based on the processing and sent to the second device.Type: GrantFiled: January 12, 2012Date of Patent: January 6, 2015Assignee: Korea Advanced Institute of Science and TechnologyInventor: Brent ByungHoon Kang
-
Publication number: 20140359183Abstract: A snoop-based kernel integrity monitoring apparatus and a method thereof are provided. More particularly, provided are a kernel integrity monitoring apparatus which is provided as a hardware device independent of a host system, and snoops traffic occurring in a system bus of the host system and by detecting a write attempt in a kernel immutable region, monitors integrity of the kernel, and a method thereof. According to the apparatus and method, by analyzing traffic of the system bus of the host system, a write attempt in the kernel immutable region is detected. Thus, a transient attack which is difficult for a snapshot method to detect can be detected.Type: ApplicationFiled: April 25, 2014Publication date: December 4, 2014Applicant: SNU R&DB FoundationInventors: Yun Heung Paek, Brent Byunghoon Kang
-
Publication number: 20120180127Abstract: A technology for preventing network attacks. A service request is intercepted at an unaddressed port of a hidden device from a second device. The service request intended for a visible device is processed by the hidden device. A response may be provided based on the processing and sent to the second device.Type: ApplicationFiled: January 12, 2012Publication date: July 12, 2012Inventor: Brent ByungHoon KANG