This work was partly supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea Government(MSIT),(No.2020-0-00952,Development of 5G edge security technology for ensuring 5G+service stability and availability,50%);the Institute of Information and Communications Technology Planning and Evaluation(IITP)grant funded by the MSIT(Ministry of Science and ICT),Korea(No.IITP-2022-2020-0-01602,ITRC(Information Technology Research Center)support program,50%).
Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for s...
Cloud Computing provides various services to the customer in aflex-ible and reliable manner.Virtual Machines(VM)are created from physical resources of the data center for handling huge number of requests as a task.Thes...
Infrastructure as a Service(IaaS)provides logical separation between data,network,applications and machines from the physical constrains of real machines.IaaS is one of the basis of cloud virtualization.Recently,secur...
Malware analysis is a task of utmost importance in cyber-security.Two approaches exist for malware analysis:static and dynamic.Modern malware uses an abundance of techniques to evade both dynamic and static analysis t...
This work was supported jointly by National Natural Science Foundation of China(Grants Nos.61672251,61732010,61825202)。
Emerging non-volatile memory(NVM) technologies promise high density, low cost and dynamic random access memory(DRAM)-like performance, at the expense of limited write endurance and high write energy consumption. It is...