Dr. Kang is currently an associate professor at the GSIS (Graduate School of Information Security) at KAIST. He has also been with George Mason University as an associate professor in the Volgenau School of Engineering. Dr. Kang received his Ph.D. in Computer Science from the University of California at Berkeley, and M.S. from the University of Maryland at College Park, and B.S. from Seoul National University. Dr. Kang has been working on systems security including OS kernel integrity monitors (http://breakthroughs.kaist.ac.kr/?post_no=163), HW-based trusted execution environment, VM Introspection, Memory address translation integrity, Code-Reuse-Attack defenses, invisible server, anti-spam, and botnet malware analysis.
He has been advising and educating the next-generation cyber security researchers, managers, the federal workforce and policy makers. He has created a series of NSF-funded hands-on Information Assurance (IA) education program, and his research efforts has been sponsored by IARPA, ARO, NSF, ADD, ETRI, NIPA (Brain Scouting Program), TIAA-CREF Faculty Fellowship, Bank of America, SK Telecom and Samsung.
“On-demand Bootstrapping Mechanism for Isolated Cryptographic Operations on Commodity Accelerators” Yonggon Kim, Ohmin Kwon, Jinsoo Jang, Seongwook Jin, Hyeongboo Baek, Brent Byunghoon Kang, Hyunsoo Yoon Computers & Security 2016
“OpenSGX: An Open Platform for SGX Research” Prerit Jain† Soham Desai† Seongmin Kim⋆ Ming-Wei Shih† JaeHyuk Lee⋆Changho Choi⋆ Young Shin⋆ Taesoo Kim† Brent Byunghoon Kang⋆ Dongsu Han⋆ NDSS Symposium 2016
“Vulnerabilities of network OS and mitigation with state-based permission system” J. Noh, S. Lee, J. Park, S. Shin, and B. Kang Security and Communication Networks 2015
“Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping” H. Moon, H. Lee, I. Heo, K. Kim, Y. Paek and B. Kang (corresponding author) IEEE Transactions on Dependable and Secure Computing
“Implementing an Application Specific Instruction-set Processor for System Level Dynamic Program Analysis Engines” I. Heo, M. Kim, Y. Lee, C. Choi, J. Lee, B. Kang, and Y. Paek ACM Transactions on Design Automation of Electronic Systems
“Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors” I. Heo, D. Jang, H. Moon, H. Cho, S. Lee, B. Kang, and Y. Paek Journal of Semiconductor Technology and Science
“SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment” J. Jang, S. Kong, M. Kim, D. Kim and B. Kang (Corresponding Author) Network and Distributed System Security (NDSS) Symposium, 2015 (Acceptance rate 18.6% (55/293))
“ATRA: Address Translation Redirection Attack against Hardware-based External Monitors” D. Jang, H. Lee, M. Kim, D. H. Kim, D. G. Kim and B. Kang (Corresponding Author) ACM Conference on Computer and Communications Security (ACM CCS), 2014 (Acceptance rate 19.5% (114/585))
“Rosemary: A Robust, Secure, and High-performance Network Operating System” S. Shin, Y. Song, T. Lee, S. Lee, J. Chung, P. Porras, V. Yegneswaran, J. Noh, and B. Kang ACM Conference on Computer and Communications Security (ACM CCS), 2014 (Acceptance rate 19.5% (114/585))
“KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object" H. Lee, H. Moon, D. Jang, K. Kim, J. Lee, Y. Paek, and B. Kang (Corresponding Author) USENIX Security 2013 (Acceptance rate: 15.9%(44/277) A top-ranked publication venue in computer security.
“Vigilare: Toward Snoop-based Kernel Integrity Monitor”
H. Moon, H. Lee, J. Lee, K. Kim, Y. Paek, and B. Kang (Corresponding Author) ACM Conference on Computer and Communications Security (ACM CCS), 2012. http://dl.acm.org/citation.cfm?id=2382196.2382202
(Acceptance rates: 17.2%, 14%, 18.9%) A top-ranked publication venue in computer security.
Analytics on Malware and Anti-Spam
“Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure” C. Nunnery, G. Sinclair, B. Kang (Corresponding Author) Proceedings of the 3rd USENIX Conference on Large-Scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More (USENIX LEET), 2010 http://dl.acm.org/citation.cfm?id=1855687
(Acceptance rates: 31.4% [11/35])
“The Waledac Protocol: The How and Why”
G. Sinclair, C. Nunnery, and B. Kang (Corresponding Author)
Proceeding of 4th IEEE International Conference on Malicious and Unwanted Software (IEEE Malware), 2009. (Nominated for best paper award)
The technical details described in Section 3.3 of this paper guided Microsoft’s successful take-down of this highly resilient advanced botnet in Feb. 2010. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5403015
Invited Talks (Selected)
Moderator, Session for “International cooperation to prevent cyber terrorism,” 2014 United Nations Public Service Forum, Day and Awards Ceremony, June 2014
NIPA Brain Scouting Program Seminar with NSHC, Inc and iHEART, Inc, 2013
Samsung DMC Research Division Seminar, “Hardware-Assisted Kernel Integrity Monitors”, 2013
Samsung Software Research Center Talk, “KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object”, 2013
KISA Seminar, “Kernel Monitors, Cloud Botnets, Host Logs and Big Data Security”, June 2013
Courses Taught (* Newly developed)
*KAIST IS522: Introduction to System Security (Fall 2016)
*KAIST IS632: Hypervisor System Security (Spring 2014)
*KAIST IS631: Kernel System Security (Fall 2013, 2014)
*GMU AIT 673 Cyber Incident Handling and Response, Graduate course. (Fall 2011, Spring/Fall 2012)
*GMU AIT 671 Security Systems Life Cycle Management, Graduate course (Fall 2012)
ICDCS Security and Privacy Track 2015 Program Committee
Tutorial co-chair for ACM CCS (Computer Communication Security) 2011, 2012.
ACM Transactions on Information and System Security 2013, 2014
IEEE Transactions on Forensics and Information Security 2012
Area for Security Technology, Journal of Systems and Software (JSS) 2012
IEEE Communications Letters 2011
IEEE Transactions on Parallel and Distributed Systems 2010