​
Login / Signup
Wook Shin
Publication Activity (10 Years)
Years Active: 2001-2024
Publications (10 Years): 2
Top Topics
Oriented Programming
Microsoft Windows
Remote Attestation
Trusted Platform Module
Top Venues
USENIX Security Symposium
</>
Publications
</>
Seunghun Han
,
Seong-Joong Kim
,
Wook Shin
,
Byung Joon Kim
,
Jae-Cheol Ryou
Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code Pages.
USENIX Security Symposium
(2024)
Seunghun Han
,
Wook Shin
,
Jun-Hyeok Park
,
Hyoung-Chun Kim
A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping.
USENIX Security Symposium
(2018)
Shinsaku Kiyomoto
,
Wook Shin
A Description of the KCipher-2 Encryption Algorithm.
RFC
7008 (2013)
Wook Shin
,
Kazuhide Fukushima
,
Shinsaku Kiyomoto
,
Yutaka Miyake
AMY: Use your cell phone to create a protected personal network over devices.
IEEE Trans. Consumer Electron.
57 (1) (2011)
Wook Shin
,
Sanghoon Kwak
,
Shinsaku Kiyomoto
,
Kazuhide Fukushima
,
Toshiaki Tanaka
A Small But Non-negligible Flaw in the Android Permission Scheme.
POLICY
(2010)
Wook Shin
,
Shinsaku Kiyomoto
,
Kazuhide Fukushima
,
Toshiaki Tanaka
A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework.
Security and Management
(2010)
Wook Shin
,
Shinsaku Kiyomoto
,
Kazuhide Fukushima
,
Toshiaki Tanaka
A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework.
SocialCom/PASSAT
(2010)
Jeong-Gun Lee
,
Wook Shin
,
Suk-Jin Kim
,
Eun-Gu Jung
A Performance/Energy Analysis and Optimization of Multi-Core Architectures with Voltage Scaling Techniques.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(6) (2010)
Jeong-Gun Lee
,
Eun-Gu Jung
,
Wook Shin
An Asymptotic Performance/Energy Analysis and Optimization of Multi-core Architectures.
ICDCN
(2009)
Wook Shin
,
Carl A. Gunter
,
Shinsaku Kiyomoto
,
Kazuhide Fukushima
,
Toshiaki Tanaka
How to Bootstrap Security for Ad-Hoc Network: Revisited.
SEC
(2009)
Zheng Zeng
,
Sammy Yu
,
Wook Shin
,
Jennifer C. Hou
PAS: A Wireless-Enabled, Cell-Phone-Incorporated Personal Assistant System for Independent and Assisted Living.
ICDCS
(2008)
Hyung Chan Kim
,
Rudrapatna S. Ramakrishna
,
Wook Shin
,
Kouichi Sakurai
Enforcement of Integrated Security Policy in Trusted Operating Systems.
IWSEC
(2007)
Hyung Chan Kim
,
Rudrapatna S. Ramakrishna
,
Wook Shin
,
Kouichi Sakurai
A Policy Language for the Extended Reference Monitor in Trusted Operating Systems.
ARES
(2007)
Hyung Chan Kim
,
Wook Shin
,
Rudrapatna S. Ramakrishna
,
Kouichi Sakurai
Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems.
ISPEC
(2006)
Michael J. May
,
Wook Shin
,
Carl A. Gunter
,
Insup Lee
Securing the drop-box architecture for assisted living.
FMSE
(2006)
Qixin Wang
,
Wook Shin
,
Xue Liu
,
Zheng Zeng
,
Cham Oh
,
Bedoor K. AlShebli
,
Marco Caccamo
,
Carl A. Gunter
,
Elsa L. Gunter
,
Jennifer C. Hou
,
Karrie Karahalios
,
Lui Sha
I-Living: An Open System Architecture for Assisted Living.
SMC
(2006)
Wook Shin
,
Jeong-Gun Lee
,
Hong Kook Kim
,
Kouichi Sakurai
Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2005)
Wook Shin
,
Jong-Youl Park
,
Dong-Ik Lee
Extended Role Based Access Control with Procedural Constraints for Trusted Operating Systems.
IEICE Trans. Inf. Syst.
(3) (2005)
Wook Shin
,
Dong-Ik Lee
,
Hyoung-Chun Kim
,
Jung-Min Kang
,
Jin-Seok Lee
Extended Role Based Access Control and Procedural Restrictions.
ICISC
(2003)
Jung-Min Kang
,
Wook Shin
,
C.-G. Park
,
Dong-Ik Lee
Extended BLP Security Model Based on Process Reliability for Secure Linux Kernel.
PRDC
(2001)